{"id":450,"date":"2018-07-04T14:34:54","date_gmt":"2018-07-04T14:34:54","guid":{"rendered":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/?post_type=chapter&#038;p=450"},"modified":"2018-07-05T18:03:50","modified_gmt":"2018-07-05T18:03:50","slug":"blown-to-bits-chapter-2","status":"publish","type":"chapter","link":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/chapter\/blown-to-bits-chapter-2\/","title":{"raw":"Blown to Bits Chapter 2, 7, 8","rendered":"Blown to Bits Chapter 2, 7, 8"},"content":{"raw":"<div>\r\n<p style=\"text-align: center\"><strong>Blown to Bits<\/strong><\/p>\r\n<p style=\"text-align: center\"><em>Your <\/em><em>Life, Liberty, and Happiness After the Digital Explosion<\/em><\/p>\r\n\r\n<h3 style=\"text-align: center\">Hal Abelson Ken Ledeen Harry Lewis<\/h3>\r\n&nbsp;\r\n\r\n<img class=\"aligncenter size-full wp-image-457\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04142913\/Image_001.png\" alt=\"\" width=\"148\" height=\"19\" \/>\r\n<p style=\"text-align: center\">Upper Saddle River, NJ \u2022 Boston \u2022 Indianapolis \u2022 San Francisco New York \u2022 Toronto \u2022 Montreal \u2022 London \u2022 Munich \u2022 Paris \u2022 Madrid \u2022 Cape Town \u2022 Sydney \u2022 Tokyo \u2022 Singapore \u2022 Mexico City<\/p>\r\n\r\n<\/div>\r\n<div>\r\n\r\nMany of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals.\r\n\r\nThe authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.\r\n\r\nThe publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and\/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact:\r\n\r\nU.S. Corporate and Government Sales (800) 382-3419 <a href=\"mailto:corpsales@pearsontechgroup.com\">corpsales@pearsontechgroup.com<\/a>\r\n\r\nFor sales outside the United States, please contact:\r\n\r\nInternational Sales <a href=\"mailto:international@pearson.com\">international@pearson.com<\/a>\r\n\r\nVisit us on the Web: <a href=\"http:\/\/www.informit.com\/aw\">www.informit.com\/aw<\/a>\r\n\r\n<em>Library of Congress Cataloging-in-Publication Data:<\/em>\r\n\r\nAbelson, Harold.\r\n\r\nBlown to bits : your life, liberty, and happiness after the digital explosion \/ Hal Abelson, Ken Ledeen, Harry Lewis.p. cm.\r\n\r\nISBN 0-13-713559-9 (hardback : alk. paper) 1. Computers and civilization. 2. Information technology\u2014Technological innovations. 3. Digital media. I. Ledeen, Ken, 1946- II. Lewis, Harry R. III. Title.\r\n\r\nQA76.9.C66A245 2008 303.48\u201933\u2014dc222008005910\r\n\r\nCopyright \u00a9 2008 Hal Abelson, Ken Ledeen, and Harry Lewis\r\n\r\nThis work is licensed under the Creative Commons Attribution-Noncommercial-Share Alike\r\n\r\n3.0\u00a0 United States License. To view a copy of this license visit <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/3.0\/us\/\">http:\/\/creativecommons.org\/licenses\/by-nc-sa\/3.0\/us\/<\/a> or send a letter to Creative Commons 171 Second Street, Suite 300, San Francisco, California, 94105, USA.\r\n\r\nFor information regarding permissions, write to: Pearson Education, Inc.\r\n\r\nRights and Contracts Department 501 Boylston Street, Suite 900\r\n\r\nBoston, MA 02116\r\n\r\nFax (617) 671 3447\r\n\r\n<\/div>\r\n<div>\r\n\r\nISBN-13: 978-0-13-713559-2\r\n\r\nISBN-10: 0-13-713559-9\r\n\r\nText printed in the United States on recycled paper at RR Donnelley in Crawfordsville, Indiana. Third printing December 2008\r\n\r\n<strong>This Book Is Safari Enabled<\/strong>\r\n\r\nThe Safari\u00ae Enabled icon on the cover of your favorite technology book means the book is available through Safari Bookshelf. When you buy this book, you get free access to the online edition for 45 days.\r\n\r\nSafari Bookshelf is an electronic reference library that lets you easily search thousands of technical books, find code samples, download chapters, and access technical information whenever and wherever you need it.\r\n\r\nTo gain 45-day Safari Enabled access to this book:\r\n\r\n\u2022\u00a0\u00a0 Go to <a href=\"http:\/\/www.informit.com\/onlineedition\">http:\/\/www.informit.com\/onlineedition<\/a>\r\n\r\n\u2022\u00a0\u00a0 Complete the brief registration form\r\n\r\n\u2022\u00a0\u00a0 Enter the coupon code 9SD6-IQLD-ZDNI-AGEC-AG6L\r\n\r\nIf you have difficulty registering on Safari Bookshelf or accessing the online edition, please e-mail <a href=\"mailto:customer-service@safaribooksonline.com\">customer-service@safaribooksonline.com.<\/a>\r\n\r\n<\/div>\r\n<div>\r\n\r\n<b>Editor<\/b><strong>\u00a0in Chief<\/strong>\r\n\r\nMark Taub\r\n\r\n<strong>Acquisitions Editor<\/strong>\r\n\r\nGreg Doench\r\n\r\n<strong>Development Editor<\/strong>\r\n\r\nMichael Thurston\r\n\r\n<strong>Managing\u00a0 Editor<\/strong>\r\n\r\nGina Kanouse\r\n\r\n<strong>Senior Project Editor<\/strong>\r\n\r\nKristy Hart\r\n\r\n<strong>Copy Editor<\/strong>\r\n\r\nWater Crest Publishing, Inc.\r\n\r\n<strong>Indexer<\/strong>\r\n\r\nErika Millen\r\n\r\n<strong>Proofreader<\/strong>\r\n\r\nWilliams Woods Publishing Services\r\n\r\n<strong>Publishing Coordinator<\/strong>\r\n\r\nMichelle Housley\r\n\r\n<strong>Interior Designer and Composition<\/strong>\r\n\r\nNonie Ratcliff\r\n\r\n<strong>Cover Designer<\/strong>\r\n\r\nChuti Prasertsith\r\n\r\n<\/div>\r\n&nbsp;\r\n<div>\r\n<p style=\"text-align: center\">CHAPTER 2<\/p>\r\n<p style=\"text-align: center\"><strong>Naked in the Sunlight<\/strong><\/p>\r\n<p style=\"text-align: center\"><strong><em>Privacy Lost, Privacy Abandoned<\/em><\/strong><\/p>\r\n<strong><em>\u00a0<\/em><\/strong><span style=\"font-size: 1em\">1984 Is Here, and We Like It<\/span>\r\n\r\nOn July 7, 2005, London was shaken as suicide bombers detonated four explosions, three on subways and one on a double-decker bus. The attack on the transit system was carefully timed to occur at rush hour, maximizing its destructive impact. 52 people died and 700 more were injured.\r\n\r\nSecurity in London had already been tight. The city was hosting the G8 Summit, and the trial of fundamentalist cleric Abu Hamza al-Masri had just begun. Hundreds of thousands of surveillance cameras hadn\u2019t deterred the terrorist act, but the perpetrators were caught on camera. Their pictures were sent around the world instantly. Working from 80,000 seized tapes, police were able to reconstruct a reconnaissance trip the bombers had made two weeks earlier.\r\n\r\nGeorge Orwell\u2019s <em>1984 <\/em>was published in 1948. Over the subsequent years, the book became synonymous with a world of permanent surveillance, a soci- ety devoid of both privacy and freedom:\u2026there seemed to be no color in anything except the posters that were plastered everywhere. The black-mustachio\u2019d face gazed down from every commanding corner. There was one on the house front immedi- ately opposite. BIG BROTHER IS WATCHING YOU \u2026\r\n\r\nThe real 1984 came and went nearly a quarter century ago. Today, Big Brother\u2019s two-way telescreens would be amateurish toys. Orwell\u2019s imagined\u00a0<span style=\"font-size: 1rem;text-align: initial\">London had cameras everywhere. His actual city now has at least half a million. Across the UK, there is one surveillance camera for every dozen people. The average Londoner is photographed hundreds of times a day by electronic eyes on the sides of buildings and on utility poles.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nYet there is much about the digital world that Orwell did not imagine. He did not anticipate that cameras are far from the most pervasive of today\u2019s tracking technologies. There are dozens of other kinds of data sources, and the data they produce is retained and analyzed. Cell phone companies know not only what numbers you call, but where you have carried your phone. Credit card companies know not only where you spent your money, but what you spent it on. Your friendly bank keeps electronic records of your transactions not only to keep your balance right, but because it has to tell the government if you make huge withdrawals. The digital explosion has scattered the bits of our lives everywhere: records of the clothes we wear, the soaps we wash with, the streets we walk, and the cars we drive and where we drive them. And although Orwell\u2019s Big Brother had his cameras, he didn\u2019t have search engines to piece the bits together, to find the needles in the haystacks. Wherever we go, we leave digital footprints, while computers of staggering capacity reconstruct our movements from the tracks. Computers re-assemble the clues to form a comprehensive image of who we are, what we do, where we are doing it, and whom we are discussing it with.\r\n\r\nPerhaps none of this would have surprised Orwell. Had he known about electronic miniaturization, he might have guessed that we would develop an astonishing array of tracking technologies. Yet there is something more fundamental that distinguishes the world of <em>1984 <\/em>from the actual world of today. We have fallen in love with this always-on world. We accept our loss of privacy in exchange for efficiency, convenience, and small price discounts. According to a 2007 Pew\/Internet Project report, \u201c60% of Internet users say they are not worried about how much information is available about them online.\u201d Many of us publish and broadcast the most intimate moments of our lives for all the world to see, even when no one requires or even asks us to do so. 55% of teenagers and 20% of adults have created profiles on social networking web sites. A third of the teens with profiles, and half the adults, place no restrictions on who can see them.\r\n\r\nIn Orwell\u2019s imagined London, only O\u2019Brien and other members of the Inner Party could escape the gaze of the telescreen. For the rest, the constant gaze was a source of angst and anxiety. Today, we willingly accept the gaze. We either don\u2019t think about it, don\u2019t know about it, or feel helpless to avoid it except by becoming hermits. We may even judge its benefits to outweigh its risks. In Orwell\u2019s imagined London, like Stalin\u2019s actual Moscow, citizens spied on their fellow citizens. Today, we can all be Little Brothers, using our search\u00a0<span style=\"font-size: 1rem;text-align: initial\">engines to check up on our children, our spouses, our neighbors, our col- leagues, our enemies, and our friends. More than half of all adult Internet users have done exactly that.\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">The explosive growth in digital technologies has radically altered our expectations about what will be private and shifted our thinking about what <\/span><em style=\"font-size: 1rem;text-align: initial\">should <\/em><span style=\"font-size: 1rem;text-align: initial\">be private. Ironically, the notion of privacy has become fuzzier at the same time as the secrecy-enhancing technology of encryption has become widespread.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nIndeed, it is remarkable that we no longer blink at intrusions that a decade ago would have seemed shocking. Unlike the story of secrecy, there was no single technological event that caused the change, no privacy-shattering breakthrough\u2014only a steady advance on several technological fronts that ultimately passed a tipping point. Many devices got cheaper, better, and smaller. Once they became useful consumer goods, we stopped worrying about their uses as surveillance devices. For example, if the police were the only ones who had cameras in their cell phones, we would be alarmed. But as long as we have them too, so we can send our friends funny pictures from parties, we don\u2019t mind so much that others are taking pictures of us. The social evolution that was supported by consumer technologies in turn made us more accepting of new enabling technologies; the social and technological evolutions have proceeded hand in hand. Meanwhile, international terrorism has made the public in most democracies more sympathetic to intrusive measures intended to protect our security. With corporations trying to make money from us and the government trying to protect us, civil libertarians are a weak third voice when they warn that we may not want others to know so much about us.\r\n\r\nSo we tell the story of privacy in stages. First, we detail the enabling technologies, the devices and computational processes that have made it easy and convenient for us to lose our privacy\u2014some of them familiar technologies, and some a bit more mysterious. We then turn to an analysis of how we have lost our privacy, or simply abandoned it. Many privacy-shattering things have happened to us, some with our cooperation and some not. As a result, the sense of personal privacy is very different today than it was two decades ago. Next, we discuss the social changes that have occurred cultural shifts\u00a0<span style=\"font-size: 1rem;text-align: initial\">that were facilitated by the technological diffusion, which in turn made new technologies easier to deploy. And finally we turn to the big question: What does privacy even mean in the digitally exploded world? Is there any hope of keeping anything private when everything is bits, and the bits are stored, copied, and moved around the world in an instant? And if we can\u2019t\u2014or won\u2019t\u2014keep our personal information to ourselves anymore, how can we make ourselves less vulnerable to the downsides of living in such an exposed world? Standing naked in the sunlight, is it still possible to protect ourselves against ills and evils from which our privacy used to protect us?<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nFootprints and FingerprintsAs we do our daily business and lead our private lives, we leave footprints and fingerprints. We can see our footprints in mud on the floor and in the sand and snow outdoors. We would not be surprised that anyone who went to the trouble to match our shoes to our footprints could determine, or guess, where we had been. Fingerprints are different. It doesn\u2019t even occur to us that we are leaving them as we open doors and drink out of tumblers. Those who have guilty consciences may think about fingerprints and worry about where they are leaving them, but the rest of us don\u2019t.\r\n\r\nIn the digital world, we all leave both electronic footprints and electronic fingerprints data trails we leave intentionally, and data trails of which we are unaware or unconscious. The identifying data may be useful for forensic purposes. Because most of us don\u2019t consider ourselves criminals, however, we tend not to worry about that. What we don\u2019t think about is that the various small smudges we leave on the digital landscape may be useful to someone else\u2014someone who wants to use the data we left behind to make money or to get something from us. It is therefore important to understand how and where we leave these digital footprints and fingerprints.\r\n\r\nSmile While We Snap!Big Brother had his legions of cameras, and the City of London has theirs today. But for sheer photographic pervasiveness, nothing beats the cameras in the cell phones in the hands of the world\u2019s teenagers. Consider the alleged misjudgment of Jeffrey Berman. In early December 2007, a man about\u00a0<span style=\"font-size: 1rem;text-align: initial\">60 years old committed a series of assaults on the Boston public transit system, groping girls and exposing himself. After one of the assaults, a victim took out her cell phone. Click! Within hours, a good head shot was up on the Web and was shown on all the Boston area television stations. Within a day, Berman was under arrest and charged with several crimes. \u201cObviously we, from time to time, have plainclothes officers on the trolley, but that\u2019s a very difficult job to do,\u201d said the chief of the Transit Police. \u201cThe fact that this girl had the wherewithal to snap a picture to identify him was invaluable.\u201d<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nThat is, it would seem, a story with a happy ending, for the victim at least. But the massive dissemination of cheap cameras coupled with universal access to the Web also enables a kind of vigilante justice\u2014a ubiquitous Little- Brotherism, in which we can all be detectives, judges, and corrections officers. Mr. Berman claims he is innocent; perhaps the speed at which the teenager\u2019s snapshot was disseminated unfairly created a presumption of his guilt. Bloggers can bring global disgrace to ordinary citizens.\r\n\r\nIn June 2005, a woman allowed her dog to relieve himself on a Korean subway, and subsequently refused to clean up his mess, despite offers from others to help. The incident was captured by a fellow passenger and posted online. She soon became known as \u201cgae-ttong-nyue\u201d (Korean for \u201cpuppy poo girl\u201d). She was identified along with her family, was shamed, and quit school. There is now a Wikipedia entry about the incident. Before the digital explosion before bits made it possible to convey information instantaneously,everywhere her actions would have been embarrassing and would have been known to those who were there at the time. It is unlikely that the story would have made it around the world, and that it would have achieved such notoriety and permanence.\r\n\r\nStill, in these cases, at least someone thought someone did something wrong. The camera just happened to be in the right hands at just the right moment. But looking at images on the Web is now a leisure activity that any- one can do at any time, anywhere in the world. Using Google Street View, you can sit in a caf\u00e9 in Tajikistan and identify a car that was parked in my drive- way when Google\u2019s camera came by (perhaps months ago). From Seoul, you can see what\u2019s happening right now, updated every few seconds, in Picadilly Circus or on the strip in Las Vegas. These views were always available to the public, but cameras plus the Web changed the meaning of \u201cpublic.\u201d\r\n\r\n<\/div>\r\n<div>\r\n\r\nAnd an electronic camera is not just a camera. <em>Harry Potter and the Deathly Hallows <\/em>is, as far as anyone knows, the last book in the Harry Potter series. Its arrival was eagerly awaited, with lines of anxious Harry fans stretching around the block at bookstores everywhere. One fan got a pre- release copy, painstakingly photographed every page, and posted the entire book online before the official release. A labor of love, no doubt, but a blatant copyright violation as well. He doubtless figured he was just posting the pixels, which could not be traced back to him. If that was his presumption, he was wrong. His digital fingerprints were all over the images.\r\n\r\nDigital cameras encode metadata along with the image. This data, known as the Exchangeable Image File Format (EXIF), includes camera settings (shutter speed, aperture, compression, make, model, orientation), date and time, and, in the case of our Harry Potter fan, the make, model, and serial number of his camera (a Canon Rebel 350D, serial number 560151117). If he registered his camera, bought it with a credit card, or sent it in for service, his identity could be known as well.\r\n\r\nKnowing Where You AreGlobal Position Systems (GPSs) have improved the marital lives of count- less males too stubborn to ask directions. Put a Garmin or a Tom Tom in a car, and it will listen to precisely timed signals from satellites reporting their positions in space. The GPS calculates its own location from the satellites\u2019 locations and the times their signals are received. The 24 satellites spinning 12,500 miles above the earth enable your car to locate itself within 25 feet, at a price that makes these systems popular birthday presents.\r\n\r\nIf you carry a GPS-enabled cell phone, your friends can find you, if that its what you want. If your GPS-enabled rental car has a radio transmitter, you can be found whether you want it or not. In 2004, Ron Lee rented a car from Payless in San Francisco. He headed east to Las Vegas, then back to Los Angeles, and finally home. He was expecting to pay $150 for his little vaca- tion, but Payless made him pay more\u2014$1,400, to be precise. Mr. Lee forgot to read the fine print in his rental contract. He had not gone too far; his con- tract was for unlimited mileage. He had missed the fine print that said, \u201cDon\u2019t leave California.\u201d When he went out of state, the unlimited mileage clause was invalidated. The fine print said that Payless would charge him $1 per Nevada mile, and that is exactly what the company did. They knew where he was, every minute he was on the road.\r\n\r\nA GPS will locate you anywhere on earth; that is why mountain climbers carry them. They will locate you not just on the map but in three dimensions, telling you how high up the mountain you are. But even an ordinary cell phone will serve as a rudimentary positioning system. If you are traveling in\u00a0<span style=\"font-size: 1rem;text-align: initial\">settled territory\u2014any place where you can get cell phone coverage\u2014the signals from the cell phone towers can be used to locate you. That is how Tanya Rider was found (see Chapter 1 for details). The location is not as precise as that supplied by a GPS\u2014only within ten city blocks or so\u2014but the fact that it is possible at all means that photos can be stamped with identifying information about where they were shot, as well as when and with what camera.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nKnowing Even Where Your Shoes AreA Radio Frequency Identification tag\u2014RFID, for short\u2014can be read from a distance of a few feet. Radio Frequency Identification is like a more elaborate version of the familiar bar codes that identify products. Bar codes typically identify what kind of thing an item is\u2014the make and model, as it were. Because RFID tags have the capacity for much larger numbers, they can provide a unique serial number for each item: not just \u201cCoke, 12 oz. can\u201d but \u201cCoke can #12345123514002.\u201d And because RFID data is transferred by radio waves rather than visible light, the tags need not be visible to be read, and the sensor need not be visible to do the reading.\r\n\r\nRFIDs are silicon chips, typically embedded in plastic. They can be used to tag almost anything (see Figure 2.1). \u201cProx cards,\u201d which you wave near a sensor to open a door, are RFID tags; a few bits of information identifying you are transmitted from the card to the sensor. Mobil\u2019s \u201cSpeedpass\u201d is a little RFID on a keychain; wave it near a gas pump and the pump knows whom to charge for the gasoline. For a decade, cattle have had RFIDs implanted in their flesh, so individual animals can be tracked. Modern dairy farms log the milk production of individual cows, automatically relating the cow\u2019s identity to its daily milk output. Pets are commonly RFID-tagged so they can be reunited with their owners if the animals go missing for some reason. The possibility of tagging humans is obvious, and has been proposed for certain high-security applications, such as controlling access to nuclear plants.\r\n\r\nBut the interesting part of the RFID story is more mundane\u2014putting tags in shoes, for example. RFID can be the basis for powerful inventory tracking systems.\r\n\r\nRFID tags are simple devices. They store a few dozen bits of information, usually unique to a particular tag. Most are passive devices, with no batteries, and are quite small. The RFID includes a tiny electronic chip and a small coil, which acts as a two-way antenna. A weak\u00a0<span style=\"font-size: 1rem;text-align: initial\">current flows through the coil when the RFID passes through an electromagnetic field\u2014for example, from a scanner in the frame of a store, under the car- pet, or in someone\u2019s hand. This feeble current is just strong enough to power the chip and induce it to transmit the identifying information. Because RFIDs are tiny and require no connected power source, they are easily hidden. We see them often as labels affixed to products; the one in Figure 2.1 was between the pages of a book bought from a bookstore. They can be almost undetectable.<\/span>\r\n<table style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 50%\"><img class=\"alignnone size-full wp-image-451\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04134759\/Image_009.gif\" alt=\"\" width=\"210\" height=\"148\" \/><\/td>\r\n<td style=\"width: 50%\"><img class=\"alignnone size-full wp-image-452\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04134801\/Image_010.gif\" alt=\"\" width=\"204\" height=\"140\" \/><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<div>\r\n\r\n<strong>FIGURE 2.1 <\/strong>An RFID found between the pages of a book. A bookstore receiving a box of RFID-tagged books can check the incoming shipment against the order without opening the carton. If the books and shelves are scanned during stocking, the cash register can identify the section of the store from which each purchased copy was sold.\r\n\r\nRFIDs are generally used to improve record-keeping, not for snooping. Manufacturers and merchants want to get more information, more reliably, so they naturally think of tagging merchandise. But only a little imagination is required to come up with some disturbing scenarios. Suppose, for example, that you buy a pair of red shoes at a chain store in New York City, and the shoes have an embedded RFID. If you pay with a credit card, the store knows your name, and a good deal more about you from your purchasing history. If you wear those shoes when you walk into a branch store in Los Angeles a month later, and that branch has an RFID reader under the rug at the entrance, the clerk could greet you by name. She might offer you a scarf to match the shoes\u2014or to match anything else you bought recently from any other branch of the store. On the other hand, the store might know that you have a habit of returning almost everything you buy\u2014in that case, you might find yourself having trouble finding anyone to wait on you!\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe technology is there to do it. We know of no store that has gone quite this far, but in September 2007, the Galeria Kaufhof in Essen, Germany equipped the dressing rooms in the men\u2019s clothing department with RFID readers. When a customer tries on garments, a screen informs him of avail- able sizes and colors. The system may be improved to offer suggestions about accessories. The store keeps track of what items are tried on together and what combinations turn into purchases. The store will remove the RFID tags from the clothes after they are purchased\u2014if the customer asks; otherwise, they remain unobtrusively and could be scanned if the garment is returned to the store. Creative retailers everywhere dream of such ways to use devices to make money, to save money, and to give them small advantages over their competitors. Though Galeria Kaufhof is open about its high-tech men\u2019s department, the fear that customers won\u2019t like their clever ideas sometimes holds back retailers\u2014and sometimes simply causes them to keep quiet about what they are doing.\r\n\r\nBlack Boxes Are Not Just for Airplanes AnymoreOn April 12, 2007, John Corzine, Governor of New Jersey, was heading back to the governor\u2019s mansion in Princeton to mediate a discussion between Don Imus, the controversial radio personality, and the Rutgers University women\u2019s basketball team.\r\n\r\nHis driver, 34-year-old state trooper Robert Rasinski, headed north on the Garden State Parkway. He swerved to avoid another car and flipped the Governor\u2019s Chevy Suburban. Governor Corzine had not fastened his seatbelt, and broke 12 ribs, a femur, his collarbone, and his sternum. The details of exactly what happened were unclear. When questioned, Trooper Rasinski said he was not sure how fast they were going\u2014but we <em>do <\/em>know. He was going 91 in a 65 mile per hour zone. There were no police with radar guns around; no human being tracked his speed. We know his exact speed at the moment of impact because his car, like 30 million cars in America, had a black box\u2014an \u201cevent data recorder\u201d (EDR) that captured every detail about what was going on just before the crash. An EDR is an automotive \u201cblack box\u201d like the ones recovered from airplane crashes. EDRs started appearing in cars around 1995. By federal law, they will be mandatory in the United States beginning in 2011. If you are driving a new GM, Ford, Isuzu, Mazda, Mitsubishi, or Subaru, your car has one\u2014whether anyone told you that or not. So do about half of new Toyotas. Your insurance company is probably entitled to its data if you have an accident. Yet most people do not realize that they exist.\r\n\r\n<\/div>\r\n<div>\r\n\r\nEDRs capture information about speed, braking time, turn signal status, seat belts: things needed for accident reconstruction, to establish responsibil- ity, or to prove innocence. CSX Railroad was exonerated of all liability in the death of the occupants of a car when its EDR showed that the car was stopped on the train tracks when it was hit. Police generally obtain search warrants before downloading EDR data, but not always; in some cases, they do not have to. When Robert Christmann struck and killed a pedestrian on October 18, 2003, Trooper Robert Frost of the New York State Police downloaded data from the car at the accident scene. The EDR revealed that Christmann had been going 38 MPH in an area where the speed limit was 30. When the data was introduced at trial, Christmann claimed that the state had violated his Fourth Amendment rights against unreasonable searches and seizures, because it had not asked his permission or obtained a search warrant before retrieving the data. That was not necessary, ruled a New York court. Taking bits from the car was not like taking something out of a house, and no search warrant was necessary.\r\n\r\nBits mediate our daily lives. It is almost as hard to avoid leaving digital footprints as it is to avoid touching the ground when we walk. Yet even if we live our lives without walking, we would unsuspectingly be leaving fingerprints anyway.\r\n\r\n<\/div>\r\n<div>\r\n<blockquote>\r\n<h4>It is almost as hard to avoid leaving digital footprints as it is to avoid touching the ground when we walk.<\/h4>\r\n<\/blockquote>\r\nSome of the intrusions into our privacy come because of the unexpected, unseen side effects of things we do quite voluntarily. We painted the hypothetical picture of the shopper with the RFID- tagged shoes, who is either welcomed or\u00a0<span style=\"font-size: 1rem;text-align: initial\">shunned on her subsequent visits to the store, depending on her shopping his<\/span><span style=\"font-size: 1rem;text-align: initial\">tory. Similar surprises can lurk almost anywhere that bits are exchanged. That is, for practical purposes, pretty much everywhere in daily life.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nTracing PaperIf I send an email or download a web page, it should come as no surprise that I\u2019ve left some digital footprints. After all, the bits have to get to me, so some part of the system knows where I am. In the old days, if I wanted to be anony- mous, I could write a note, but my handwriting might be recognizable, and I might leave fingerprints (the oily kind) on the paper. I might have typed, but Perry Mason regularly solved crimes by matching a typewritten note with the unique signature of the suspect\u2019s typewriter. More fingerprints.\r\n\r\n<\/div>\r\n<div>\r\n\r\nSo, today I would laserprint the letter and wear gloves. But even that may not suffice to disguise me. Researchers at Purdue have developed techniques for matching laser-printed output to a particular printer. They analyze printed sheets and detect unique characteristics of each manufacturer and each individual printer\u2014fingerprints that can be used, like the smudges of old type- writer hammers, to match output with source. It may be unnecessary to put the microscope on individual letters to identify what printer produced a page. The Electronic Frontier Foundation has demonstrated that many color printers secretly encode the printer serial number, date, and time on every page that they print (see Figure 2.2). Therefore, when you print a report, you should not assume that no one can tell who printed it.\r\n\r\n<img class=\"aligncenter size-full wp-image-453\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04134806\/Image_012.gif\" alt=\"\" width=\"338\" height=\"228\" \/>\r\n\r\nSource: Laser fingerprint. Electronic Frontier Foundation. <a href=\"http:\/\/w.2.eff.org\/Privacy\/printers\/\">http:\/\/w.2.eff.org\/Privacy\/printers\/<\/a> docucolor\/.\r\n\r\n<strong>FIGURE 2.2 <\/strong>Fingerprint left by a Xerox DocuColor 12 color laser printer. The dots are very hard to see with the naked eye; the photograph was taken under blue light. The dot pattern encodes the date (2005-05-21), time (12:50), and the serial number of the printer (21052857).\r\n\r\nThere was a sensible rationale behind this technology. The government wanted to make sure that office printers could not be used to turn out sets of hundred dollar bills. The technology that was intended to frustrate counterfeiters makes it possible to trace every page printed on color laser printers back to the source. Useful technologies often have unintended consequences.\r\n\r\n<\/div>\r\n<div>\r\n\r\nMany people, for perfectly legal and valid reasons, would like to protect their anonymity. They may be whistle blowers or dissidents. Perhaps they are merely railing against injustice in their workplace. Will technologies that undermine anonymity in political discourse also stifle free expression? A measure of anonymity is essential in a healthy democracy\u2014and in the U.S., has been a weapon used to advance free speech since the time of the Revolution. We may regret a complete abandonment of anonymity in favor of communication technologies\u00a0 that\u00a0leave fingerprints.\u00a0The problem is not just the existence of fingerprints, but that no one told us that we are creating them.\r\n\r\n<\/div>\r\n<div>\r\n<blockquote>\r\n<h4>The problem is not just the existence of fingerprints, but that no one told us that we are creating them.<\/h4>\r\n<\/blockquote>\r\n&nbsp;\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe Parking Garage Knows More Than You ThinkOne day in the spring of 2006, Anthony and his wife drove to Logan Airport to pick up some friends. They took two cars, which they parked in the garage. Later in the evening, they paid at the kiosk inside the terminal, and left or tried to. One car got out of the garage without a problem, but Anthony\u2019s was held up for more than an hour, in the middle of the night, and was not allowed to leave. Why? Because his ticket did not match his license plate.\r\n\r\nIt turns out that every car entering the airport garage has its license plate photographed at the same time as the ticket is being taken. Anthony had held both tickets while he and his wife were waiting for their friends, and then he gave her back one\u2014the \u201cwrong\u201d one, as it turned out. It was the one he had taken when he drove in. When he tried to leave, he had the ticket that matched his wife\u2019s license plate number. A no-no.\r\n\r\nWho knew that if two cars arrive and try to leave at the same time, they may not be able to exit if the tickets are swapped? In fact, who knew that every license plate is photographed as it enters the garage?\r\n\r\nThere is a perfectly sensible explanation. People with big parking bills sometimes try to duck them by picking up a second ticket at the end of their trip. When they drive out, they try to turn in the one for which they would have to pay only a small fee. Auto thieves sometimes try the same trick. So the system makes sense, but it raises many questions. Who else gets access to the license plate numbers? If the police are looking for a particular car, can they search the scanned license plate numbers of the cars in the garage? How long is the data retained? Does it say anywhere, even in the fine print, that your visit to the garage is not at all anonymous?\r\n\r\n<\/div>\r\n&nbsp;\r\n<div>\r\n\r\nAll in Your PocketThe number of new data sources\u2014and the proliferation and interconnection of old data sources\u2014is part of the story of how the digital explosion shattered privacy. But the other part of the technology story is about how all that data is put together.\r\n\r\nOn October 18, 2007, a junior staff member at the British national tax agency sent a small package to the government\u2019s auditing agency via TNT, a private delivery service. Three weeks later, it had not arrived at its destination and was reported missing. Because the sender had not used TNT\u2019s \u201cregistered mail\u201d option, it couldn\u2019t be traced, and as of this writing has not been found. Perhaps it was discarded by mistake and never made it out of the mail- room; perhaps it is in the hands of criminals.\r\n\r\nThe mishap rocked the nation. As a result of the data loss, every bank and millions of individuals checked account activity for signs of fraud or identity theft. On November 20, the head of the tax agency resigned. Prime Minister Gordon Brown apologized to the nation, and the opposition party accused the Brown administration of having \u201cfailed in its first duty to protect the public.\u201d\r\n\r\nThe package contained two computer disks. The data on the disks included names, addresses, birth dates, national insurance numbers (the British equiv- alent of U.S. Social Security Numbers), and bank account numbers of 25 mil- lion people\u2014nearly 40% of the British population, and almost every child in the land. The tax office had all this data because every British child receives weekly government payments, and most families have the money deposited directly into bank accounts. Ten years ago, that much data would have required a truck to transport, not two small disks. Fifty years ago, it would have filled a building.\r\n\r\nThis was a preventable catastrophe. Many mistakes were made; quite ordinary mistakes. The package should have been registered. The disks should have been encrypted. It should not have taken three weeks for someone to speak up. But those are all age-old mistakes. Offices have been sending pack- ages for centuries, and even Julius Caesar knew enough to encrypt information if he had to use intermediaries to deliver it. What happened in 2007 that could not have happened in 1984 was the assembly of such a massive data- base in a form that allowed it to be easily searched, processed, analyzed, connected to other databases, transported and \u201clost.\u201d\r\n\r\nExponential growth in storage size, processing speed, and communication speed\u2014have changed the same old thing into something new. Blundering, stupidity, curiosity, malice, and thievery are not new. The fact that sensitive data\u00a0<span style=\"font-size: 1rem;text-align: initial\">about everyone in a nation could fit on a laptop <\/span><em style=\"font-size: 1rem;text-align: initial\">is <\/em><span style=\"font-size: 1rem;text-align: initial\">new. The ability to search for a needle in the haystack of the Internet <\/span><em style=\"font-size: 1rem;text-align: initial\">is <\/em><span style=\"font-size: 1rem;text-align: initial\">new. Easily connecting \u201cpublic\u201d data sources that used to be stored in file drawers in Albuquerque and Atlanta, but are now both electronically accessible from Algeria\u2014<\/span><em style=\"font-size: 1rem;text-align: initial\">that <\/em><span style=\"font-size: 1rem;text-align: initial\">is new too.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nTraining, laws, and software all can help. But the truth of the matter is that as a society, we don\u2019t really know how to deal with these consequences of the digital explosion. The technology revolution is outstripping society\u2019s capacity to adjust to the changes in what can be taken for granted. The Prime Minister had to apologize to the British nation because among the things that have been blown to bits is the presumption that no junior staffer could do that much damage by mailing a small parcel.\r\n\r\nConnecting the DotsThe way we leave fingerprints and footprints is only part of what is new. We have always left a trail of information behind us, in our tax records, hotel reservations, and long distance telephone bills. True, the footprints are far clearer and more complete today than ever before. But something else has changed\u2014the harnessing of computing power to correlate data, to connect the dots, to put pieces together, and to create cohesive, detailed pictures from what would otherwise have been meaningless fragments. The digital explosion does not just blow things apart. Like the explosion at the core of an atomic bomb, it blows things together as well. Gather up the details, connect the dots, assemble the parts of the puzzle, and a clear picture will emerge.\r\n\r\nComputers can sort through databases too massive and too boring to be examined with human eyes. They can assemble colorful pointillist paintings out of millions of tiny dots, when any few dots would reveal nothing. When a federal court released half a million Enron emails obtained during the cor- ruption trial, computer scientists quickly identified the subcommunities, and perhaps conspiracies, among Enron employees, using no data other than the pattern of who was emailing whom (see Figure 2.3). The same kinds of clustering algorithms work on patterns of telephone calls. You can learn a lot by knowing who is calling or emailing whom, even if you don\u2019t know what they are saying to each other\u2014especially if you know the time of the communica- tions and can correlate them with the time of other events.\r\n\r\nSometimes even public information is revealing. In Massachusetts, the Group Insurance Commission (GIC) is responsible for purchasing health insurance for state employees. When the premiums it was paying jumped one year, the GIC asked for detailed information on every patient encounter. And\u00a0<span style=\"font-size: 1rem;text-align: initial\">for good reason: All kinds of health care costs had been growing at prodigious rates. In the public interest, the state had a responsibility to understand how it was spending taxpayer money. The GIC did not want to know patients\u2019 names; it did not want to track individuals, and it did not want people to <\/span><em style=\"font-size: 1rem;text-align: initial\">think <\/em><span style=\"font-size: 1rem;text-align: initial\">they were being tracked. Indeed, tracking the medical visits of individuals would have been illegal.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\n<img class=\"aligncenter size-full wp-image-454\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04134810\/Image_014.gif\" alt=\"\" width=\"403\" height=\"409\" \/>\r\n\r\nSource: Enron, Jeffrey Heer. Figure 3 from <a href=\"http:\/\/jheer.org\/enron\/v1\/\">http:\/\/jheer.org\/enron\/v1\/.<\/a>\r\n\r\n<strong>FIGURE 2.3\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>Diagram showing clusters of Enron emailers, indicating which employees carried on heavy correspondence with which others. The evident \u201cblobs\u201d may be the outlines of conspiratorial cliques.\r\n\r\nSo, the GIC data had no names, no addresses, no Social Security Numbers, no telephone numbers\u2014nothing that would be a \u201cunique identifier\u201d enabling a mischievous junior staffer in the GIC office to see who exactly had a\u00a0<span style=\"font-size: 1rem;text-align: initial\">particular ailment or complaint. To use the official lingo, the data was \u201cde-identified\u201d; that is, stripped of identifying information. The data did include the gender, birth date, zip code, and similar facts about individuals making medical claims, along with some information about why they had sought medical attention. That information was gathered not to challenge any particular person, but to learn about patterns\u2014if the truckers in Worcester are having lots of back injuries, for example, maybe workers in that region need better training on how to lift heavy items. Most states do pretty much the same kind of analysis of de-identified data about state workers.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nNow this was a valuable data set not just for the Insurance Commission, but for others studying public health and the medical industry in Massachusetts. Academic researchers, for example, could use such a large inventory of medical data for epidemiological studies. Because it was all de-identified, there was no harm in letting others see it, the GIC figured. In fact, it was such good data that private industry\u2014for example, businesses in the health management sec- tor\u2014might pay money for it. And so the GIC sold the data to businesses. The taxpayers might even benefit doubly from this decision: The data sale would provide a new revenue source to the state, and in the long run, a more informed health care industry might run more efficiently. But how de-identified really was the material?\r\n\r\nLatanya Sweeney was at the time a researcher at MIT (she went on to become a computer science professor at Carnegie Mellon University). She wondered how hard it would be for those who had received the deidentified data to \u201cre-identify\u201d the records and learn the medical problems of a particular state employee\u2014for example, the governor of the Commonwealth.\r\n\r\nGovernor Weld lived, at that time, in Cambridge, Massachusetts. Cambridge, like many municipalities, makes its voter lists publicly available, for a charge of $15, and free for candidates and political organizations. If you know the precinct, they are available for only $.75. Sweeney spent a few dollars and got the voter lists for Cambridge. Anyone could have done the same. According to the Cambridge voter registration list, there were only six people in Cambridge with Governor Weld\u2019s birth date, only three of those were men, and only one of those lived in Governor Weld\u2019s five-digit zip code. Sweeney could use that combination of factors, birth date, gender, and zip code to recover the Governor\u2019s medical records\u2014and also those for members of his family, since the data was organized by employee. This type of re-identification is straightforward. In Cambridge, in fact, birth date alone was sufficient to identify more than 10% of the population. Nationally, gender, zip code, and date of birth are all it takes to identify 87% of the U.S. population uniquely.\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe data set contained far more than gender, zip code, and birth date. In fact, any of the 58 individuals who received the data in 1997 could have identified any of the 135,000 people in the database. \u201cThere is no patient con- fidentiality,\u201d said Dr. Joseph Heyman, president of the Massachusetts Medical Society. \u201cIt\u2019s gone.\u201d It is easy to read a story like this and scream, \u201cHeads should roll!.\u201d But it is actually quite hard to figure out <em>who, if anyone, made a mistake<\/em>. Certainly collecting the information was the right thing to do, given that health costs are a major expense for all businesses and institutions. The GIC made an hon- est effort to deidentify the data before releasing it. Arguably the GIC might not have released the data to other state agencies, but that would be like saying that every department of govern<span style=\"font-size: 1rem;text-align: initial\">ment should acquire its heating oil independently. Data is a valuable resource, and once someone has collected it, the government is entirely correct in wanting it used for the public good. Some might object to selling<\/span>\r\n\r\n<\/div>\r\n<div>\r\n<blockquote>\r\n<h4>It is easy to read a story like this and scream, \u201cHeads should roll!.\u201d But it is actually quite hard to figure out who, if anyone, made a mistake.<\/h4>\r\n<\/blockquote>\r\n<\/div>\r\n&nbsp;\r\n<div>\r\n\r\nthe data to an outside business, but only in retrospect; had the data really been better de-identified, whoever made the decision to sell the data might well have been rewarded for helping to hold down the cost of government.\r\n\r\nPerhaps the mistake was the ease with which voter lists can be obtained. However, it is a tradition deeply engrained in our system of open elections that the public may know who is eligible to vote, and indeed who has voted. And voter lists are only one source of public data about the U.S. population. How many 21-year-old male Native Hawaiians live in Middlesex County, Massachusetts? In the year 2000, there were four. Anyone can browse the U.S. Census data, and sometimes it can help fill in pieces of a personal picture: Just go to factfinder.census.gov.\r\n\r\nThe mistake was thinking that the GIC data was truly deidentified, when it was not. But with so many data sources available, and so much computing power that could be put to work connecting the dots, it is very hard to know just how much information has to be discarded from a database to make it truly anonymous. Aggregating data into larger units certainly helps releasing data by five-digit zip codes reveals less than releasing it by nine-digit zip codes. But the coarser the data, the less it reveals also of the valuable information for which it was made available. How can we solve a problem that results from many developments, no one of which is really a problem in itself?\r\n\r\n<\/div>\r\n<div>\r\n\r\nWhy We Lost Our Privacy, or Gave It AwayInformation technology did not cause the end of privacy, any more than automotive technology caused teen sex. Technology creates opportunities and risks, and people, as individuals and as societies, decide how to live in the changed landscape of new possibilities. To understand why we have less pri- vacy today than in the past, we must look not just at the gadgets. To be sure, we should be wary of spies and thieves, but we should also look at those who protect us and help us and we should also take a good look in the mirror.\r\n\r\nWe are most conscious of our personal information winding up in the hands of strangers when we think about data loss or theft. Reports like the one about the British tax office have become fairly common. The theft of information about 45 million customers of TJX stores, described in Chapter 5, \u201cSecret Bits,\u201d was even larger than the British catastrophe. In 2003, Scott Levine, owner of a mass email business named Snipermail, stole more than a billion personal information records from Acxiom. Millions of Americans are victimized by identity theft every year, at a total cost in the tens of billions of dollars annually. Many more of us harbor daily fears that just \u201ca little bit\u201d of our financial information has leaked out, and could be a personal time bomb if it falls into the wrong hands.\r\n\r\nWhy can\u2019t we just keep our personal information to ourselves? Why do so many other people have it in the first place, so that there is an opportunity for it to go astray, and an incentive for creative crooks to try to steal it?\r\n\r\nWe lose control of our personal information because of things we do to ourselves, and things others do to us. Of things we do to be ahead of the curve, and things we do because everyone else is doing them. Of things we do to save money, and things we do to save time. Of things we do to be safe from our enemies, and things we do because we feel invulnerable. Our loss of privacy is a problem, but there is no one answer to it, because there is no one reason why it is happening. It is a messy problem, and we first have to think about it one piece at a time. We give away information about ourselves voluntarily leave visible foot- prints of our daily lives\u2014because we judge, perhaps without thinking about it very much, that the benefits outweigh the costs. To be sure, the benefits are many.\r\n\r\nSaving TimeFor commuters who use toll roads or bridges, the risk-reward calculation is not even close. Time is money, and time spent waiting in a car is also anxiety and\u00a0<span style=\"font-size: 1rem;text-align: initial\">frustration. If there is an option to get a toll booth transponder, many com- muters will get one, even if the device costs a few dollars up front. Cruising past the cars waiting to pay with dollar bills is not just a relief; it actually brings the driver a certain satisfied glow.\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">The transponder, which the driver attaches to the windshield from inside the car, is an RFID, powered with a battery so identifying information can be sent to the sensor several feet away as the driver whizzes past. The sensor can be mounted in a constricted travel lane, where a toll booth for a human toll- taker might have been. Or it can be mounted on a boom above traffic, so the driver doesn\u2019t even need to change lanes or slow down.\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">And what is the possible harm? Of course, the state is recording the fact that the car has passed the sensor; that is how the proper account balance can be debited to pay the toll. When the balance gets too low, the driver\u2019s credit card may get billed automatically to replenish the balance. All that only makes the system better\u2014no fumbling for change or doing anything else to pay for your travels.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe monthly bill\u2014for the Massachusetts Fast Lane, for example\u2014shows where and when you got on the highway\u2014when, accurate to the second. It also shows where you got off and how far you went. Informing you of the mileage is another useful service, because Massachusetts drivers can get a refund on certain fuel taxes, if the fuel was used on the state toll road. Of course, you do not need a PhD to figure out that the state also knows when you got off the road, to the second, and that with one subtraction and one division, its computers could figure out if you were speeding. Technically, in fact, it would be trivial for the state to print the appropriate speeding fine at the bottom of the statement, and to bill your credit card for that amount at the same time as it was charging for tolls. That would be taking convenience a bit too far, and no state does it, yet.\r\n\r\nWhat does happen right now, however, is that toll transponder records are introduced into divorce and child custody cases. You\u2019ve never been within five miles of that lady\u2019s house? Really? Why have you gotten off the high- way at the exit near it so many times? You say you can be the better custodial parent for your children, but the facts suggest otherwise. As one lawyer put it, \u201cWhen a guy says, \u2018Oh, I\u2019m home every day at five and I have dinner with my kids every single night,\u2019 you subpoena his E-ZPass and you find out he\u2019s crossing that bridge every night at 8:30. Oops!\u201d These records can be subpoenaed, and have been, hundreds of times, in family law cases. They have also been used in employment cases, to prove that the car of a worker who said he was working was actually far from the workplace. But most of us aren\u2019t planning to cheat on our spouses or our bosses, so the loss of privacy seems like no loss at all, at least compared to the time\u00a0<span style=\"font-size: 1rem;text-align: initial\">saved. Of course, if we actually <\/span><em style=\"font-size: 1rem;text-align: initial\">were <\/em><span style=\"font-size: 1rem;text-align: initial\">cheating, we <\/span><em style=\"font-size: 1rem;text-align: initial\">would <\/em><span style=\"font-size: 1rem;text-align: initial\">be in a big hurry, and might take some risks to save a few minutes!<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nSaving MoneySometimes it\u2019s money, not time, which motivates us to leave footprints. Such is the case with supermarket loyalty cards. If you do not want Safeway to keep track of the fact that you bought the 12-pack of Yodels despite your recent cholesterol results, you can make sure it doesn\u2019t know. You simply pay the \u201cprivacy tax\u201d\u2014the surcharge for customers not presenting a loyalty card. The purpose of loyalty cards is to enable merchants to track individual item purchases. (Item-level transactions are typically not tracked by credit card companies, which do not care if you bought Yodels instead of granola, so long as you pay the bill.) With loyalty cards, stores can capture details of cash transactions as well. They can process all the transaction data, and draw inferences about shoppers\u2019 habits. Then, if a lot of people who buy Yodels also buy Bison Brew Beer, the store\u2019s automated cash register can automatically spit out a discount coupon for Bison Brew as your Yodels are being bagged. A \u201cdiscount\u201d for you, and more sales for Safeway. Everybody wins. Don\u2019t they?\r\n\r\nAs grocery stores expand their web-based business, it is even easier for them to collect personal information about you. Reading the fine print when you sign up is a nuisance, but it is worth doing, so you understand what you are giving and what you are getting in return. Here are a few sentences of Safeway\u2019s privacy policy for customers who use its web site:\r\n\r\nSafeway may use personal information to provide you with news- letters, articles, product or service alerts, new product or service announcements, saving awards, event invitations, personally tailored coupons, program and promotional information and offers, and other information, which may be provided to Safeway by other companies.\u2026 We may provide personal information to our partners and suppliers for customer support services and processing of personal information on behalf of Safeway. We may also share personal information with our affiliate companies, or in the course of an actual or potential sale, re-organization, consolidation, merger, or amalgamation of our business or businesses.\r\n\r\nDreary reading, but the language gives Safeway lots of leeway. Maybe you don\u2019t care about getting the junk mail. Not everyone thinks it is junk, and the\u00a0<span style=\"font-size: 1rem;text-align: initial\">company does let you \u201copt out\u201d of receiving it (although in general, few people bother to exercise opt-out rights). But Safeway has lots of \u201caffiliates,\u201d and who knows how many companies with which it <\/span><em style=\"font-size: 1rem;text-align: initial\">might <\/em><span style=\"font-size: 1rem;text-align: initial\">be involved in a merger or sale of part of its business. Despite privacy concerns voiced by groups like C.A.S.P.I.A.N. (Consumers Against Supermarket Privacy Invasion and Numbering, www.nocards.org), most shoppers readily agree to have the data collected. The financial incentives are too hard to resist, and most consumers just don\u2019t worry about marketers knowing their purchases. But when- ever purchases can be linked to your name, there is a record, somewhere in a huge database, of whether you use regular or super tampons, lubricated or unlubricated condoms, and whether you like regular beer or lite. You have authorized the company to share it, and even if you hadn\u2019t, the company could lose it accidentally, have it stolen, or have it subpoenaed.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nConvenience of the CustomerThe most obvious reason not to worry about giving information to a company is that you do business with them, and it is in your interest to see that they do their business with you better. You have no interest in whether they make more money from you, but you do have a strong interest in making it easier and faster for you to shop with them, and in cutting down the amount of stuff they may try to sell you that you would have no interest in buying. So your interests and theirs are, to a degree, aligned, not in opposition. Safeway\u2019s privacy policy states this explicitly: \u201cSafeway Club Card information and other information may be used to help make Safeway\u2019s products, services, and programs more useful to its customers.\u201d Fair enough.\r\n\r\nNo company has been more progressive in trying to sell customers what they might want than the online store Amazon. Amazon suggests products to repeat customers, based on what they have bought before or what they have simply looked at during previous visits to Amazon\u2019s web site. The algorithms are not perfect; Amazon\u2019s computers are drawing inferences from data, not being clairvoyant. But Amazon\u2019s guesses are pretty good, and recommending the wrong book every now and then is a very low-cost mistake. If Amazon does it too often, I might switch to Barnes and Noble, but there is no injury to me. So again: Why should anyone care that Amazon knows so much about me? On the surface, it seems benign. Of course, we don\u2019t want the credit card information to go astray, but who cares about knowing what books I have looked at online?\r\n\r\nOur indifference is another marker of the fact that we are living in an exposed world, and that it feels very different to live here. In 1988, when a\r\n\r\n<\/div>\r\n<div>\r\n<blockquote><strong>H<\/strong><strong>OW <\/strong><strong>S<\/strong><strong>ITES <\/strong><strong>K<\/strong><strong>NOW <\/strong><strong>W<\/strong><strong>HO <\/strong><strong>Y<\/strong><strong>OU <\/strong><strong>A<\/strong><strong>RE<\/strong>\r\n\r\n1.\u00a0\u00a0\u00a0 <strong>You <\/strong><strong>tell them<\/strong>. Log in to Gmail, Amazon, or eBay, and you are letting them know exactly who you are.\r\n\r\n2.\u00a0\u00a0\u00a0 <strong>They\u2019ve left cookies on one of your previous visits<\/strong>. A <em>cookie <\/em>is a small text file stored on your local hard drive that contains information that a particular web site wants to have available during your current session (like your shopping cart), or from one session to the next. Cookies give sites persistent information for tracking and personalization. Your browser has a command for showing cookies\u2014you may be surprised how many web sites have left them!\r\n\r\n3.\u00a0\u00a0\u00a0 <strong>They have your IP address<\/strong>. The web server has to know where you are so that it can ship its web pages to you. Your IP address is a number like 66.82.9.88 that locates your computer in the Internet (see the Appendix for details). That address may change from one day to the next. But in a residential setting, your Internet Service Provider (your <em>ISP<\/em>\u2014typically your phone or cable company) knows who was assigned each IP address at any time. Those records are often subpoenaed in court cases.\r\n\r\nIf you are curious about who is using a particular IP address, you can check the American Registry of Internet Numbers (www.arin.net). Services such as whatismyip.com, whatismyip.org, and ipchicken.com also allow you to check your own IP address. And <a href=\"http:\/\/www.whois.net\/\">www.whois.net <\/a>allows you to check who owns a domain name such as harvard.com\u2014which turns out to be the Harvard Bookstore, a privately owned bookstore right across the street from the university. Unfortunately, that information won\u2019t reveal who is sending you spam, since spammers routinely forge the source of email they send you.<\/blockquote>\r\nvideotape rental store clerk turned over Robert Bork\u2019s movie rental records to a Washington, DC newspaper during Bork\u2019s Supreme Court confirmation hearings, Congress was so outraged that it quickly passed a tough privacy protection bill, The Video Privacy Protection Act. Videotape stores, if any still exist, can be fined simply for keeping rental records too long. Twenty years later, few seem to care much what Amazon does with its millions upon millions of detailed, fine-grained views into the brains of all its customers.\r\n\r\nIt\u2019s Just Fun to Be ExposedSometimes, there can be no explanation for our willing surrender of our privacy except that we take joy in the very act of exposing ourselves to public\u00a0<span style=\"font-size: 1rem;text-align: initial\">view. Exhibitionism is not a new phenomenon. Its practice today, as in the past, tends to be in the province of the young and the drunk, and those wish- ing to pretend they are one or the other. That correlation is by no means perfect, however. A university president had to apologize when an image of her threatening a Hispanic male with a stick leaked out from her MySpace page, with a caption indicating that she had to \u201cbeat off the Mexicans because they were constantly flirting with my daughter.\u201d<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nAnd there is a continuum of outrageousness. The less wild of the party photo postings blend seamlessly with the more personal of the blogs, where the bloggers are chatting mostly about their personal feelings. Here there is not exuberance, but some simpler urge\r\n\r\n<\/div>\r\n&nbsp;\r\n<div>\r\n<blockquote>\r\n<h4>Bits don\u2019t fade and they don\u2019t yellow. Bits are forever. And we don\u2019t know how to live with that.<\/h4>\r\n<\/blockquote>\r\nfor human connectedness. That passion, too, is not new. What <em>is <\/em>new is that a photo or video or diary entry, once posted, is visible to the entire world, and that there is no taking it\u00a0<span style=\"font-size: 1rem;text-align: initial\">back. Bits don\u2019t fade and they don\u2019t yellow. Bits are forever. And we don\u2019t know how to live with that.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nFor example, a blog selected with no great design begins:\r\n\r\nThis is the personal web site of Sarah McAuley. \u2026 I think sharing my life with strangers is odd and narcissistic, which of course is why I\u2019m addicted to it and have been doing it for several years now. Need more? You can read the \u201cAbout Me\u201d section, drop me an email, or you know, just read the drivel that I pour out on an almost-daily basis.\r\n\r\nNo thank you, but be our guest. Or consider that there is a Facebook group just for women who want to upload pictures of themselves uncontrollably drunk. Or the Jennicam, through which Jennifer Kay Ringley opened her life to the world for seven years, setting a standard for exposure that many since have surpassed in explicitness, but few have approached in its endless ordinariness. We are still experimenting, both the voyeurs and viewed.\r\n\r\nBecause You Can\u2019t Live Any Other WayFinally, we give up data about ourselves because we don\u2019t have the time, patience, or single-mindedness about privacy that would be required to live our daily lives in another way. In the U.S., the number of credit, debit, and bank cards is in the billions. Every time one is used, an electronic handshake records a few bits of information about who is using it, when, where, and for what. It is now virtually unheard of for people to make large purchases of\u00a0<span style=\"font-size: 1rem;text-align: initial\">ordinary consumer goods with cash. Personal checks are going the way of cassette tape drives, rendered irrelevant by newer technologies. Even if you could pay cash for everything you buy, the tax authorities would have you in their databases anyway. There even have been proposals to put RFIDs in currency notes, so that the movement of cash could be tracked.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nOnly sects such as the Amish still live without electricity. It will soon be almost that unusual to live without Internet connectivity, with all the finger- prints it leaves of your daily searches and logins and downloads. Even the old dumb TV is rapidly disappearing in favor of digital communications. Digital TV will bring the advantages of video on demand\u2014no more trips to rent movies or waits for them to arrive in the mail\u2014at a price: Your television service provider will record what movies you have ordered. It will be so attractive to be able to watch what we want when we want to watch it, that we won\u2019t miss either the inconvenience or the anonymity of the days when all the TV stations washed your house with their airwaves. You couldn\u2019t pick the broadcast times, but at least no one knew which waves you were grabbing out of the air.\r\n\r\nLittle Brother Is WatchingSo far, we have discussed losses of privacy due to things for which we could, in principle anyway, blame ourselves. None of us really needs a loyalty card, we should always read the fine print when we rent a car, and so on. We would all be better off saying \u201cno\u201d a little more often to these privacy-busters, but few of us would choose to live the life of constant vigilance that such res- olute denial would entail. And even if we were willing to make those sacri- fices, there are plenty of other privacy problems caused by things others do to us.\r\n\r\nThe snoopy neighbor is a classic American stock figure the busybody who watches how many liquor bottles are in your trash, or tries to figure out whose Mercedes is regularly parked in your driveway, or always seems to know whose children were disorderly last Saturday night. But in Cyberspace, we are all neighbors. We can all check up on each other, without even opening the curtains a crack.\r\n\r\nPublic Documents Become VERY PublicSome of the snooping is simply what anyone could have done in the past by paying a visit to the Town Hall. Details that were always public\u2014but inacces- sible\u2014are quite accessible now.\u00a0<span style=\"font-size: 1rem;text-align: initial\">In 1975, Congress created the Federal Election Commission to administer the Federal Election Campaign Act. Since then, all political contributions have been public information. There is a difference, though, between \u201cpublic\u201d and \u201creadily accessible.\u201d Making public data available on the Web shattered the veil of privacy that came from inaccessibility. <\/span><span style=\"font-size: 1rem;text-align: initial\">Want to know who gave money to Al Franken for Senate? Lorne Michaels from Saturday Night Live, Leonard Nimoy, Paul Newman, Craig Newmark (the \u201ccraig\u201d of craigslist.com), and Ginnie W., who works with us and may not have wanted us to know her political leanings. Paul B., and Henry G., friends of ours, covered their bases by giving to both Obama and Clinton.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe point of the law was to make it easy to look up big donors. But since data is data, what about checking on your next-door neighbors? Ours defi- nitely leaned toward Obama over Clinton, with no one in the Huckabee camp. Or your clients? One of ours gave heartily to Dennis Kucinich. Or your daugh- ter\u2019s boyfriend? You can find out for yourself, at <a href=\"http:\/\/www.fec.gov\/\">www.fec.gov <\/a>or fundrace.huffingtonpost.com. We\u2019re not telling about our own.\r\n\r\nHosts of other facts are now available for armchair browsing facts that in the past were nominally public but required a trip to the Registrar of Deeds. If you want to know what you neighbor paid for their house, or what it\u2019s worth today, many communities put all of their real estate tax rolls online. It was always public; now it\u2019s accessible. It was never wrong that people could get this information, but it feels very different now that people can browse through it from the privacy of their home. If you are curious about someone, you can try to find him or her on Facebook, MySpace, or just using an ordinary search engine. A college would not peek at the stupid Facebook page of an applicant, would it? Absolutely not, says the Brown Dean of Admissions, \u201cunless someone says there\u2019s some- thing we should look at.\u201d\r\n\r\nNew participatory websites create even bigger opportunities for information-sharing. If you are about to go on a blind date, there are special sites just for that. Take a look at <a href=\"http:\/\/www.dontdatehimgirl.com\/\">www.dontdatehimgirl.com, <\/a>a social networking site with a self-explanatory focus. When we checked, this warning about one man had just been posted, along with his name and photograph: \u201cCompulsive womanizer, liar, internet cheater; pathological liar who can\u2019t be trusted as a friend much less a boyfriend. Total creep! Twisted and sick\u2014needs mental help. Keep your daughter away from this guy!\u201d Of course, such information may be worth exactly what we paid for it. There is a similar site, <a href=\"http:\/\/www.platewire.com\/\">www.platewire.com, <\/a>for reports about bad drivers. If you are not dating or driving, perhaps you\u2019d like to check out a neighborhood before you move in, or just register a public warning about the obnoxious revelers who live next door to you. If so, <a href=\"http:\/\/www.rottenneighbor.com\/\">www.rottenneighbor.com <\/a>is the site for you. When we\u00a0<span style=\"font-size: 1rem;text-align: initial\">typed in the zip code in which one of us lives, a nice Google map appeared with a house near ours marked in red. When we clicked on it, we got this report on our neighbor: <\/span><span style=\"font-size: 1rem;text-align: initial\">you\u2019re a pretty blonde, slim and gorgeous. hey, i\u2019d come on to you if i weren\u2019t gay. you probably have the world handed to you like most pretty women. is that why you think that you are too good to pick up after your dog? you know that you are breaking the law as well as being disrespectful of your neighbors. well, i hope that you step in your own dogs poop on your way to work, or on your way to dinner. i hope that the smell of your self importance follows you all day.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nFor a little money, you can get a lot more information. In January 2006, John Aravosis, creator of Americablog.com, purchased the detailed cell phone records of General Wesley Clark. For $89.95, he received a listing of all of Clark\u2019s calls for a three-day period. There are dozens of online sources for this kind of information. You might think you\u2019d have to be in the police or the FBI to find out who people are calling on their cell phones, but there are handy services that promise to provide anyone with that kind of information for a modest fee. The <em>Chicago Sun Times <\/em>decided to put those claims to a test, so it paid $110 to locatecell.com and asked for a month\u2019s worth of cell phone records of one Frank Main, who happened to be one of its own reporters. The <em>Sun Times <\/em>did it all with a few keystrokes\u2014provided the telephone number, the dates, and a credit card number. The request went in on Friday of a long weekend, and on Tuesday morning, a list came back in an email. The list included 78 telephone numbers the reporter had called\u2014 sources in law enforcement, people he was writing stories about, and editors in the newspaper. It was a great service for law enforcement\u2014except that criminals can use it too, to find out whom the detectives are calling. These incidents stimulated passage of the Telephone Records and Privacy Act of 2006, but in early 2008, links on locatecell.com were still offering to help \u201cfind cell phone records in seconds,\u201d and more.\r\n\r\nIf cell phone records are not enough information, consider doing a proper background check. For $175, you can sign up as an \u201cemployer\u201d with ChoicePoint and gain access to reporting services including criminal records, credit history, motor vehicle records, educational verification, employment verification, Interpol, sexual offender registries, and warrants searchers\u2014they are all there to be ordered, with <em>a la carte <\/em>pricing. Before we moved from paper to bits, this information was publicly available, but largely inaccessible. Now, all it takes is an Internet connection and a credit card. This is one\u00a0<span style=\"font-size: 1rem;text-align: initial\">of the most important privacy transformations. Information that was previously available only to professionals with specialized access or a legion of local workers is now available to everyone.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nThen there is real spying. Beverly O\u2019Brien suspected her husband was having an affair. If not a physical one, at a minimum she thought he was engaging in inappropriate behavior online. So, she installed some monitoring software. Not hard to do on the family computer, these packages are promoted as \u201cparental control software\u201d a tool to monitor your child\u2019s activities, along with such other uses as employee monitoring, law enforcement, and to \u201ccatch a cheating spouse.\u201d Beverly installed the software, and discovered that her hapless hubby, Kevin, was chatting away while playing Yahoo! Dominoes. She was an instant spy, a domestic wire-tapper. The marketing materials for her software neglected to tell her that installing spyware that intercepts communications traffic was a direct violation of Florida\u2019s Security of Communications Act, and the trial court refused to admit any of the evidence in their divorce proceeding. The legal system worked, but that didn\u2019t change the fact that spying has become a relatively commonplace activity, the domain of spouses and employers, jilted lovers, and business competitors.\r\n\r\nIdle CuriosityThere is another form of Little Brother-ism, where amateurs can sit at a computer connected to the Internet and just look for something interesting not about their neighbors or husbands, but about anyone at all. With so much data out there, anyone can discover interesting personal facts, with the\u00a0<span style=\"font-size: 1rem;text-align: initial\">investment of a little time and a little imagination. To take a different kind of example, imagine having your family\u2019s medical history re-identified from a paper in an online medical journal.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\n<img class=\"aligncenter size-full wp-image-455\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04134813\/Image_021.gif\" alt=\"\" width=\"208\" height=\"352\" \/>\r\n\r\nFigure 2.4 shows a map of the incidence of a disease, let\u2019s say syphilis, in a part of Boston. The \u201csyphilis epidemic\u201d in this illustration is actually a sim- ulation. The data was just made up, but maps exactly like this have been common in journals for decades. Because the area depicted is more than 10 square kilometers, there is no way to figure out which house corresponds to a dot, only which neighborhood.\r\n\r\nSource: John S. Brownstein, Christopher A. Cassa, Kenneth D. Mandl, No place to hide\u2014reverse identification of patients from published maps, <em>New England Journal of Medicine<\/em>, 355:16, October 19, 2007, 1741-1742.\r\n\r\n<strong>FIGURE 2.4\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>Map of part of Boston as from a publication in a medical journal, showing where a disease has occurred. (Simulated data.)\r\n\r\nAt least that was true in the days when journals were only print documents. Now journals are available online, and authors have to submit their\u00a0<span style=\"font-size: 1rem;text-align: initial\">figures as high-resolution JPEGs. Figure 2.5 shows what happens if you download the published journal article from the journal\u2019s web site, blow up a small part of the image, and superimpose it on an easily available map of the corresponding city blocks. For each of the seven disease locations, there is only a single house to which it could correspond. Anyone could figure out where the people with syphilis live.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\n<img class=\"aligncenter wp-image-456 size-full\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04134816\/Image_022.gif\" alt=\"\" width=\"376\" height=\"229\" \/>\r\n\r\nSource: John S. Brownstein, Christopher A. Cassa, Kenneth D. Mandl, No place to hide\u2014reverse identification of patients from published maps, <em>New England Journal of Medicine<\/em>, 355:16, October 19, 2007, 1741-1742.\r\n\r\n<strong>FIGURE 2.5 <\/strong>Enlargement of Figure 2.4 superimposed on a housing map of a few blocks of the city, showing that individual households can be identified to online readers, who have access to the high-resolution version of the epidemiology map.\r\n\r\nThis is a re-identification problem, like the one Latanya Sweeney noted when she showed how to get Governor Weld\u2019s medical records. There are things that can be done to solve this one. Perhaps the journal should not use such high-resolution images (although that could cause a loss of crispness, or even visibility\u2014one of the nice things about online journals is that the visually impaired can magnify them, to produce crisp images at a very large scale). Perhaps the data should be \u201cjittered\u201d or \u201cblurred\u201d so what appears on the screen for illustrative purposes is intentionally incorrect in its fine details. There are always specific policy responses to specific re-identification scenarios. Every scenario is a little different, however, and it is often hard to articulate sensible principles to describe what should be fixed.\r\n\r\n<\/div>\r\n<div>\r\n\r\nIn 2001, four MIT students attempted to re-identify Chicago homicide victims for a course project. They had extremely limited resources: no proprietary databases such as the companies that check credit ratings possess, no access to government data, and very limited computing power. Yet they were able to identify nearly 8,000 individuals from a target set of 11,000.\r\n\r\nThe source of the data was a free download from the Illinois Criminal Justice Authority. The primary reference data source was also free. The Social Security Administration provides a comprehensive death index including name, birth date, Social Security Number, zip code of last residence, date of death, and more. Rather than paying the nominal fee for the data (after all, they were students), these researchers used one of the popular genealogy web sites, RootsWeb.com, as a free source for the Social Security Death Index (SSDI) data. They might also have used municipal birth and death records, which are also publicly available.\r\n\r\nThe SSDI did not include gender, which was important to completing an accurate match. But more public records came to the rescue. They found a database published by the census bureau that enabled them to infer gender from first names\u2014most people named \u201cRobert\u201d are male, and most named \u201cSusan\u201d are female. That, and some clever data manipulation, was all it took. It is far from clear that it was wrong for any particular part of these data sets to be publicly available, but the combination revealed more than was intended.\r\n\r\nThe more re-identification problems we see, and the more <em>ad hoc <\/em>solutions we develop, the more we develop a deep-set fear that our problems may never end. These problems arise because there is a great deal of public data, no one piece of which is problematic, but which creates privacy violations in combination. It is the opposite of what we know about salt\u2014that the component elements, sodium and chlorine, are both toxic, but the compound itself is safe. Here we have toxic compounds arising from the clever combination of harm- less components. What can possibly be done about <em>that?<\/em>\r\n\r\nBig Brother, Abroad and in the U.S.Big Brother really is watching today, and his job has gotten much easier because of the digital explosion. In China, which has a long history of tracking individuals as a mechanism of social control, the millions of residents of Shenzhen are being issued identity cards, which record far more than the bearer\u2019s name and address. According to a report in the <em>New York Times<\/em>, the cards will document the individual\u2019s work history, educational background,\u00a0<span style=\"font-size: 1rem;text-align: initial\">religion, ethnicity, police record, medical insurance status, landlord\u2019s phone number, and reproductive history. Touted as a crime-fighting measure, the new technology\u2014developed by an American company\u2014will come in handy in case of street protests or any individual activity deemed suspicious by the authorities. The sort of record-keeping that used to be the responsibility of local authorities is becoming automated and nationalized as the country prospers and its citizens become increasingly mobile. The technology makes it easier to know where everyone is, and the government is taking advantage of that opportunity. Chinese tracking is far more detailed and pervasive than Britain\u2019s ubiquitous surveillance cameras.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nYou Pay for the Mike, We\u2019ll Just Listen InPlanting tiny microphones where they might pick up conversations of under- world figures used to be risky work for federal authorities. There are much safer alternatives now that many people carry their own radio-equipped microphones with them all the time.\r\n\r\nMany cell phones can be reprogrammed remotely so that the microphone is always on and the phone is transmitting, even if you think you have pow- ered it off. The FBI used this technique in 2004 to listen to John Tomero\u2019s con- versations with other members of his organized crime family. A federal court ruled that this \u201croving bug,\u201d installed after due authorization, constituted a legal from of wiretapping. Tomero could have prevented it by removing the battery, and now some nervous business executives routinely do exactly that. The microphone in a General Motors car equipped with the OnStar system can also be activated remotely, a feature that can save lives when OnStar operators contact the driver after receiving a crash signal. OnStar warns, \u201cOnStar will cooperate with official court orders regarding criminal investigations from law enforcement and other agencies,\u201d and indeed, the FBI has used this method to eavesdrop on conversations held inside cars. In one case, a federal court ruled against this way of collecting evidence\u2014but not on privacy grounds. The roving bug disabled the normal operation of OnStar, and the court simply thought that the FBI had interfered with the vehicle owner\u2019s contractual right to chat with the OnStar operators!\r\n\r\nIdentifying Citizens\u2014Without ID CardsIn the age of global terrorism, democratic nations are resorting to digital surveillance to protect themselves, creating hotly contested conflicts with traditions of individual liberty. In the United States, the idea of a national\u00a0<span style=\"font-size: 1rem;text-align: initial\">identification card causes a furious libertarian reaction from parties not usu- ally outspoken in defense of individual freedom. Under the REAL ID act of 2005, uniform federal standards are being implemented for state-issued drivers\u2019 licenses. Although it passed through Congress without debate, the law is opposed by at least 18 states. Resistance pushed back the implementation timetable first to 2009, and then, in early 2008, to 2011. Yet even fully implemented, REAL ID would fall far short of the true national ID preferred by those charged with fighting crime and preventing terrorism.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nAs the national ID card debate continues in the U.S., the FBI is making it irrelevant by exploiting emerging technologies. There would be no need for anyone to carry an ID card if the govern-\r\n\r\n<\/div>\r\n&nbsp;\r\n<div>\r\n<blockquote>\r\n<h4>As the national ID card debate continues in the U.S., the FBI is making it irrelevant by exploiting emerging technologies.<\/h4>\r\n<\/blockquote>\r\nment had enough biometric data on Americans\u2014that is, detailed records of their fingerprints, irises, voices, walking gaits, facial features, scars, and the shape of their earlobes. Gather a combination of measurements on individuals walking in\u00a0<span style=\"font-size: 1rem;text-align: initial\">public places, consult the databases, connect the dots, and\u2014bingo!\u2014their names pop up on the computer screen. No need for them to carry ID cards; the combination of biometric data would pin them down perfectly.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nWell, only imperfectly at this point, but the technology is improving. And the data is already being gathered and deposited in the data vault of the FBI\u2019s Criminal Justice Information Services database in Clarksburg, West Virginia. The database already holds some 55 million sets of fingerprints, and the FBI processes 100,000 requests for matches every day. Any of 900,000 federal, state, and local law enforcement officers can send a set of prints and ask the FBI to identify it. If a match comes up, the individual\u2019s criminal history is there in the database too.\r\n\r\nBut fingerprint data is hard to gather; mostly it is obtained when people are arrested. The goal of the project is to get identifying information on nearly everyone, and to get it without bothering people too much. For example, a simple notice at airport security could advise travelers that, as they pass through airport security, a detailed \u201csnapshot\u201d will be taken as they enter the secure area. The traveler would then know what is happening, and could have refused (and stayed home). As an electronic identification researcher puts it, \u201cThat\u2019s the key. You\u2019ve chosen it. You have chosen to say, \u2018Yeah, I want this place to recognize me.\u2019\u201d No REAL ID controversies, goes the theory; all the data being gathered would, in some sense at least, be offered voluntarily.\r\n\r\n<\/div>\r\n<div>\r\n\r\nFriendly Cooperation Between Big SiblingsIn fact, there are two Big Brothers, who often work together. And we are, by and large, glad they are watching, if we are aware of it at all. Only occasion- ally are we alarmed about their partnership.\r\n\r\nThe first Big Brother is Orwell\u2019s\u2014the government. And the other Big Brother is the industry about which most of us know very little: the business of aggregating, consolidating, analyzing, and reporting on the billions of individual transactions, financial and otherwise, that take place electronically every day. Of course, the commercial data aggregation companies are not in the spying business; none of their data reaches them illicitly. But they do know a lot about us, and what they know can be extremely valuable, both to businesses and to the government.\r\n\r\nThe new threat to privacy is that computers can extract significant information from billions of apparently uninteresting pieces of data, in the way that mining technology has made it economically feasible to extract precious metals from low-grade ore. Computers can correlate databases on a massive level, linking governmental data sources together with private and commercial ones, creating comprehensive digital dossiers on millions of people. With their massive data storage and processing power, they can make connections in the data, like the clever connections the MIT students made with the Chicago homicide data, but using brute force rather than ingenuity. And the computers can discern even very faint traces in the data\u2014traces that may help track payments to terrorists, set our insurance rates, or simply help us be sure that our new babysitter is not a sex offender. And so we turn to the story of the government and the aggregators.\r\n\r\nAcxiom is the country\u2019s biggest customer data company. Its business is to aggregate transaction data from all those swipes of cards in card readers all over the world\u2014in 2004, this amounted to more than a billion transactions a day. The company uses its massive data about financial activity to support the credit card industry, banks, insurers, and other consumers of information about how people spend money. Unsurprisingly, after the War on Terror began, the Pentagon also got interested in Acxiom\u2019s data and the ways they gather and analyze it. Tracking how money gets to terrorists might help find the terrorists and prevent some of their attacks.\r\n\r\nChoicePoint is the other major U.S. data aggregator. ChoicePoint has more than 100,000 clients, which call on it for help in screening employment candidates, for example, or determining whether individuals are good insurance risks. Acxiom and ChoicePoint are different from older data analysis operations, simply because of the scale of their operations. Quantitative differences have\u00a0<span style=\"font-size: 1rem;text-align: initial\">qualitative effects, as we said in Chapter 1; what has changed is not the technology, but rather the existence of rich data sources. Thirty years ago, credit cards had no magnetic stripes. Charging a purchase was a mechanical operation; the raised numerals on the card made an impression through carbon paper so you could have a receipt, while the top copy went to the company that issued the card. Today, if you charge something using your CapitalOne card, the bits go instantly not only to CapitalOne, but to Acxiom or other aggregators. The ability to search through huge commercial data sources\u2014 including not just credit card transaction data, but phone call records, travel tickets, and banking transactions, for example\u2014is another illustration that more of the same can create something new.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nPrivacy laws do exist, of course. For a bank, or a data aggregator, to post your financial data on its web site would be illegal. Yet privacy is still devel- oping as an area of the law, and it is connected to commercial and govern- ment interests in uncertain and surprising ways.\r\n\r\nA critical development in privacy law was precipitated by the presidency of Richard Nixon. In what is generally agreed to be an egregious abuse of presidential power, Nixon used his authority as president to gather informa- tion on those who opposed him\u2014in the words of his White House Counsel at the time, to \u201cuse the available federal machinery to screw our political ene- mies.\u201d Among the tactics Nixon used was to have the Internal Revenue Service audit the tax returns of individuals on an \u201cenemies list,\u201d which included congressmen, journalists, and major contributors to Democratic causes. Outrageous as it was to use the IRS for this purpose, it was not ille- gal, so Congress moved to ban it in the future.\r\n\r\nThe Privacy Act of 1974 established broad guidelines for when and how the Federal Government can assemble dossiers on citizens it is not investigat- ing for crimes. The government has to give public notice about what infor- mation it wants to collect and why, and it has to use it only for those reasons. The Privacy Act limits what the government can do to gather information about individuals and what it can do with records it holds. Specifically, it states, \u201cNo agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written con- sent of, the individual to whom the record pertains, unless \u2026.\u201d If the govern- ment releases information inappropriately, even to another government agency, the affected citizen can sue for damages in civil court. The protections provided by the Privacy Act are sweeping, although not as sweeping as they may seem. Not every government office is in an \u201cagency\u201d; the courts are not, for example. The Act requires agencies to give public notice of the uses to which they will put the information, but the notice can be buried in the\r\n\r\n<\/div>\r\n<div>\r\n\r\nFederal Register where the public probably won\u2019t see it unless news media happen to report it. Then there is the \u201cunless\u201d clause, which includes significant exclusions. For example, the law does not apply to disclosures for statistical, archival, or historical purposes, civil or criminal law enforcement activities, Congressional investigations, or valid Freedom of Information Act requests.\r\n\r\nIn spite of its exclusions, government practices changed significantly because of this law. Then, a quarter century later, came 9\/11. <em>Law enforcement <\/em><em>should have seen it all coming<\/em>, was the constant refrain as investigations revealed how many unconnected dots were in the hands of different govern ment agencies. <em>It all could have been prevented if the investigative fiefdoms had been talking to each other. They should have been able to connect the dots<\/em>. But they could not in part because the Privacy Act restricted inter-agency data transfers. A response was badly needed. The Department of Homeland Security was created to ease some of the interagency communication problems, but that government reorganization was only a start.\r\n\r\nIn January 2002, just a few months after the World Trade Center attack, the Defense Advanced Research Projects Agency (DARPA) established the Information Awareness Office (IAO) with a mission to:\r\n\r\nimagine, develop, apply, integrate, demonstrate, and transition information technologies, components and prototype, closed-loop, information systems that will counter asymmetric threats by achieving total information awareness useful for preemption; national security warning; and national security decision making. The most serious asymmetric threat facing the United States is terrorism, a threat characterized by collections of people loosely organized in shadowy net- works that are difficult to identify and define. IAO plans to develop technology that will allow understanding of the intent of these net- works, their plans, and potentially define opportunities for disrupting or eliminating the threats. To effectively and efficiently carry this out, we must promote sharing, collaborating, and reasoning to convert nebulous data to knowledge and actionable options.\r\n\r\nVice Admiral John Poindexter directed the effort that came to be known as \u201cTotal Information Awareness\u201d (TIA). The growth of enormous private data repositories provided a convenient way to avoid many of the prohibitions of the Privacy Act. The Department of Defense can\u2019t get data from the Internal Revenue Service, because of the 1974 Privacy Act. <em>But they can both buy it from private data aggregators! <\/em>In a May 2002 email to Adm. Poindexter, Lt. Col Doug Dyer discussed negotiations with Acxiom.\r\n\r\n<\/div>\r\n<div>\r\n\r\nAcxiom\u2019s Jennifer Barrett is a lawyer and chief privacy officer. She\u2019s testified before Congress and offered to provide help. One of the key suggestions she made is that people will object to Big Brother, wide- coverage databases, but they don\u2019t object to use of relevant data for specific purposes that we can all agree on. Rather than getting all the data for any purpose, we should start with the goal, tracking terrorists to avoid attacks, and then identify the data needed (although we can\u2019t define all of this, we can say that our templates and models of terror- ists are good places to start). Already, this guidance has shaped my thinking.\r\n\r\nUltimately, the U.S. may need huge databases of commercial transactions that cover the world or certain areas outside the U.S. This information provides economic utility, and thus provides two reasons why foreign countries would be interested. Acxiom could build this mega- scale database.\r\n\r\nThe <em>New York Times <\/em>broke the story in October 2002. As Poindexter had explained in speeches, the government had to \u201cbreak down the stovepipes\u201d separating agencies, and get more sophisticated about how to create a big picture out of a million details, no one of which might be meaningful in itself. The <em>Times <\/em>story set off a sequence of reactions from the Electronic Privacy Information Center and civil libertarians. Congress defunded the office in 2003. Yet that was not the end of the idea.\r\n\r\nThe key to TIA was data mining, looking for connections across disparate data repositories, finding patterns, or \u201csignatures,\u201d that might identify terror- ists or other undesirables. The General Accountability Office report on Data Mining (GAO-04-548) reported on their survey of 128 federal departments. They described 199 separate data mining efforts, of which 122 used personal information.\r\n\r\nAlthough IAO and TIA went away, Project ADVISE at the Department of Homeland Security continued with large-scale profiling system development. Eventually, Congress demanded that the privacy issues concerning this pro- gram be reviewed as well. In his June 2007 report (OIG-07-56), Richard Skinner, the DHS Inspector General, stated that \u201cprogram managers did not address privacy impacts before implementing three pilot initiatives,\u201d and a few weeks later, the project was shut down. But ADVISE was only one of twelve data-mining projects going on in DHS at the time. Similar privacy concerns led to the cancellation of the Pentagon\u2019s TALON database project. That project sought to compile a database of reports of\u00a0<span style=\"font-size: 1rem;text-align: initial\">suspected threats to defense facilities as part of a larger program of domestic counterintelligence.\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">The Transportation Security Administration (TSA) is responsible for airline passenger screening. One proposed system, CAPPS II, which was ultimately terminated over privacy concerns, sought to bring together disparate data sources to determine whether a particular individual might pose a transportation threat. Color-coded assessment tags would determine whether you could board quickly, be subject to further screening, or denied access to air travel. The government creates projects, the media and civil liberties groups raise serious privacy concerns, the projects are cancelled, and new ones arise to take their place. The cycle seems to be endless. In spite of Americans\u2019 traditional suspicions about government surveillance of their private lives, the cycle seems to be almost an inevitable consequence of Americans\u2019 concerns about their security, and the responsibility that government officials feel to use the best available technologies to protect the nation. Corporate databases often contain the best information on the people about whom the govern<\/span><span style=\"font-size: 1rem;text-align: initial\">ment is curious.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nTechnology Change and Lifestyle ChangeNew technologies enable new kinds of social interactions. There were no sub- urban shopping malls before private automobiles became cheap and widely used. Thirty years ago, many people getting off an airplane reached for cigarettes; today, they reach for cell phones. As Heraclitus is reported to have said 2,500 years ago, \u201call is flux\u201d\u2014everything keeps changing. The reach-for- your-cell phone gesture may not last much longer, since airlines are starting to provide onboard cell phone coverage.\r\n\r\nThe more people use a new technology, the more useful it becomes. (This is called a \u201cnetwork effect\u201d; see Chapter 4, \u201cNeedles in the Haystack.\u201d) When one of us got the email address lewis@harvard as a second-year graduate student, it was a vainglorious joke; all the people he knew who had email addresses were students in the same office with him. Email culture could not develop until a lot of people had email, but there wasn\u2019t much point in hav- ing email if no one else did.\r\n\r\nTechnology changes and social changes reinforce each other. Another way of looking at the technological reasons for our privacy loss is to recognize that the social institutions enabled by the technology are now more important than the practical uses for which the technology was originally conceived. Once a lifestyle change catches on, we don\u2019t even think about what it depends on.\r\n\r\n<\/div>\r\n<div>\r\n\r\nCredit Card CultureThe usefulness of the data aggregated by Acxiom and its kindred data aggre- gation services rises as the number of people in their databases goes up, and as larger parts of their lives leave traces in those databases. When credit cards were mostly short-term loans taken out for large purchases, the credit card data was mostly useful for determining your creditworthiness. It is still use- ful for that, but now that many people buy virtually everything with credit cards, from new cars to fast-food hamburgers, the credit card transaction database can be mined for a detailed image of our lifestyles. The information is there, for example, to determine if you usually eat dinner out, how much traveling you do, and how much liquor you tend to consume. Credit card companies do in fact analyze this sort of information, and we are glad they do. If you don\u2019t seem to have been outside Montana in your entire life and you turn up buying a diamond bracelet in Rio de Janeiro, the credit card com- pany\u2019s computer notices the deviation from the norm, and someone may call to be sure it is really you.\r\n\r\nThe credit card culture is an economic problem for many Americans, who accept more credit card offers than they need, and accumulate more debt than they should. But it is hard to imagine the end of the little plastic cards, unless even smaller RFID tags replace them. Many people carry almost no cash today, and with every easy swipe, a few more bits go into the databases.\r\n\r\nEmail CultureEmail is culturally in between telephoning and writing a letter. It is quick, like telephoning (and instant messaging is even quicker). It is permanent, like a letter. And like a letter, it waits for the recipient to read it. Email has, to a great extent, replaced both of the other media for person-to-person communication, because it has advantages of both. But it has the problems that other communication methods have, and some new ones of its own.\r\n\r\nPhone calls are not intended to last forever, or to be copied and redistributed to dozens of other people, or to turn up in court cases. When we use email as though it were a telephone, we tend to forget about what else might happen to it, other than the telephone-style use, that the recipient will read it and throw it away. Even Bill Gates probably wishes that he had written his corporate emails in a less telephonic voice. After testifying in an antitrust lawsuit that he had not contemplated cutting a deal to divide the web browser market with a competitor, the government produced a candid email he had sent, seeming to contradict his denial: \u201cWe could even pay them money as part of the deal, buying a piece of them or something.\u201d\r\n\r\n<\/div>\r\n<div>\r\n\r\n&nbsp;\r\n<blockquote>\r\n<h4>Email is as public as postcards, unless it is encrypted, which it usually is not.<\/h4>\r\n<\/blockquote>\r\nEmail is bits, traveling within an ISP and through the Internet, using email software that may keep copies, filter it for spam, or submit it to any other form of inspection the ISP may choose. If your email service provider is Google, the point of the inspection is to attach some\u00a0<span style=\"font-size: 1rem;text-align: initial\">appropriate advertising. If you are working within a financial services corporation, your emails are probably logged\u2014even the ones to your grandmother because the company has to be able to go back and do a thorough audit if something inappropriate happens.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nEmail is as public as postcards, unless it is encrypted, which it usually is not. Employers typically reserve the right to read what is sent through com- pany email. Check the policy of your own employer; it may be hard to find, and it may not say what you expect. Here is Harvard\u2019s policy, for example:\r\n\r\nEmployees must have no expectation or right of privacy in anything they create, store, send, or receive on Harvard\u2019s computers, networks, or telecommunications systems. \u2026. Electronic files, e-mail, data files, images, software, and voice mail may be accessed at any time by management or by other authorized personnel for any business purpose. Access may be requested and arranged through the system(s) user, however, this is not required.\r\n\r\nEmployers have good reason to retain such sweeping rights; they have to be able to investigate wrongdoing for which the employer would be liable. As a result, such policies are often less important than the good judgment and ethics of those who administer them. Happily, Harvard\u2019s are generally good. But as a general principle, the more people who have the authority to snoop, the more likely it is that someone will succumb to the temptation.\r\n\r\nCommercial email sites can retain copies of messages even after they have been deleted. And yet, there is very broad acceptance of public, free, email ser- vices such as Google\u2019s Gmail, Yahoo! Mail, or Microsoft\u2019s Hotmail. The technology is readily available to make email private: whether you use encryption tools, or secure email services such as Hushmail, a free, web-based email service that incorporates PGP-based encryption (see Chapter 5). The usage of these services, though, is an insignificant fraction of their unencrypted counterparts. Google gives us free, reliable email service and we, in return, give up some space on our computer screen for ads. Convenience and cost trump privacy. By and large, users don\u2019t worry that Google, or its competitors, have all their mail. It\u2019s a bit like letting the post office keep a copy of every letter you send, but we are so used to it, we don\u2019t even think about it.\r\n\r\n<\/div>\r\n<div>\r\n\r\nWeb CultureWhen we send an email, we think at least a <em>little <\/em>bit about the impression we are making, because we are sending it to a human being. We may well say things we would not say face-to-face, and live to regret that. Because we can\u2019t see anyone\u2019s eyes or hear anyone\u2019s voice, we are more likely to over- react and be hurtful, angry, or just too smart for our own good. But because email is directed, we don\u2019t send email thinking that no one else will ever read what we say.\r\n\r\nThe Web is different. Its social sites inherit their communication culture not from the letter or telephone call, but from the wall in the public square, littered with broadsides and scribbled notes, some of them signed and some not. Type a comment on a blog, or post a photo on a photo album, and your action can be as anonymous as you wish it to be\u2014you do not know to whom your message is going. YouTube has millions of personal videos. Photo- archiving sites are the shoeboxes and photo albums of the twenty-first cen- tury. Online backup now provides easy access to permanent storage for the contents of our personal computers. We entrust commercial entities with much of our most private information, without apparent concern. The gener- ation that has grown up with the Web has embraced social networking in all its varied forms: MySpace, YouTube, LiveJournal, Facebook, Xanga, Classmates.com, Flickr, dozens more, and blogs of every shape and size. More than being taken, personal privacy has been given away quite freely, because everyone else is doing it\u2014the surrender of privacy is more than a way to social connectedness, it is a social institution in its own right. There are 70 million bloggers sharing everything from mindless blather to intimate per- sonal details. Sites like <a href=\"http:\/\/www.loopt.com\/\">www.loopt.com<\/a> let you find your friends, while twitter.com lets you tell the entire world where you are and what you are doing. The Web is a confused, disorganized, chaotic realm, rich in both gold and garbage.\r\n\r\nThe \u201cold\u201d web, \u201cWeb 1.0,\u201d as we now refer to it, was just an information resource. You asked to see something, and you got to see it. Part of the dis- inhibition that happens on the new \u201cWeb 2.0\u201d social networking sites is due to the fact that they still allow the movie-screen illusion\u2014that we are \u201cjust looking,\u201d or if we are contributing, we are not leaving footprints or finger- prints if we use pseudonyms. (See Chapter 4 for more on Web 1.0 and Web 2.0.)\r\n\r\nBut of course, that is not really the way the Web ever worked. It is important to remember that even Web 1.0 was never anonymous, and even \u201cjust looking\u201d leaves fingerprints.\r\n\r\n<\/div>\r\n<div>\r\n\r\nIn July 2006, a <em>New York Times <\/em>reporter called Thelma Arnold of Lilburn, Georgia. Thelma wasn\u2019t expecting the call. She wasn\u2019t famous, nor was she involved in anything particularly noteworthy. She enjoyed her hobbies, helped her friends, and from time to time looked up things on the Web\u2014stuff about her dogs, and her friends\u2019 ailments.\r\n\r\nThen AOL, the search engine she used, decided to release some \u201canonymous\u201d query data. Thelma, like most Internet users, may not have known that AOL had kept every single topic that she, and every other one of their users, had asked about. But it did. In a moment of unenlightened generosity, AOL released for research use a small sample: about 20 million queries from 658,000 different users. That is actually not a lot of data by today\u2019s standards. For example, in July 2007, there were about 5.6 billion search engine queries, of which roughly 340 million were AOL queries. So, 20 million queries comprise only a couple of days\u2019 worth of search queries. In an effort to protect their clients\u2019 privacy, AOL \u201cdeidentified\u201d the queries. AOL never mentioned anyone by name; they used random numbers instead. Thelma was 4417149. AOL mistakenly presumed that removing a single piece of personal identification would make it hard to figure out who the users were. It turned out that for some of the users, it wasn\u2019t hard at all.\r\n\r\nIt didn\u2019t take much effort to match Thelma with her queries. She had searched for \u201clandscapers in Lilburn, GA\u201d and several people with the last name \u201cArnold,\u201d leading to the obvious question of whether there were any Arnolds in Lilburn. Many of Thelma\u2019s queries were not particularly useful for identifying her, but were revealing nonetheless: \u201cdry mouth,\u201d \u201cthyroid,\u201d \u201cdogs that urinate on everything,\u201d and \u201cswing sets.\u201d\r\n\r\nThelma was not the only person to be identified. User 22690686 (Terri) likes astrology, and the Edison National Bank, Primerica, and Budweiser. 5779844 (Lawanna) was interested in credit reports, and schools. From what he searched for, user 356693 seems to have been an aide to Chris Shays, Congressman from Connecticut.\r\n\r\nOne of the privacy challenges that we confront as we rummage through the rubble of the digital explosion is that information exists without context. Was Thelma Arnold suffering from a wide range of ailments? One might read- ily conclude that from her searches. The fact is that she often tried to help her friends by understanding their medical problems.\r\n\r\nOr consider AOL user 17556639, whose search history was released along with Thelma Arnold\u2019s. He searched for the following:\r\n\r\n<\/div>\r\n<div>\r\n\r\nhow to kill your wife 23 Mar, 22:09 wife killer 23 Mar, 22:11\r\n\r\npoop 23 Mar, 22:12\r\n\r\ndead people 23 Mar, 22:13\r\n\r\npictures of dead people 23 Mar, 22:15\r\n\r\nkilled people 23 Mar, 22:16\r\n\r\ndead pictures 23 Mar, 22:17\r\n\r\nmurder photo 23 Mar, 22:20\r\n\r\nsteak and cheese 23 Mar, 22:22\r\n\r\nphoto of death 23 Mar, 22:30\r\n\r\ndeath 23 Mar, 22:33\r\n\r\ndead people photos 23 Mar, 22:33\r\n\r\nphoto of dead people 23 Mar, 22:35\r\n\r\n<a href=\"http:\/\/www.murderdpeople.com\/\">www.murderdpeople.com <\/a>23 Mar, 22:37\r\n\r\ndecapitated photos 23 Mar, 22:39\r\n\r\ncar crashes3 23 Mar, 22:40\r\n\r\ncar crash photo 23 Mar, 22:41\r\n\r\nIs this AOL user a potential criminal? Should AOL have called the police? Is 17556639 about to kill his wife? Is he (or she) a researcher with a spelling problem and an interest in Philly cheese steak? Is reporting him to the police doing a public service, or is it an invasion of privacy?\r\n\r\nThere is no way to tell just from these queries if this user was contemplat- ing some heinous act or doing research for a novel that involves some grisly scenes. When information is incomplete and decontextualized, it is hard to judge meaning and intent.\r\n\r\nIn this particular case, we happen to know the answer. The user, Jason from New Jersey, was just fooling around, trying to see if Big Brother was watching. He wasn\u2019t planning to kill his wife at all. Inference from incom- plete data has the problem of false positives\u2014thinking you have something that you don\u2019t, because there are other patterns that fit the same data.\r\n\r\nInformation without context often leads to erroneous conclusions. Because our digital trails are so often retrieved outside the context within which they were created, they sometimes suggest incorrect interpretations. Data interpretation comes with balanced social responsibilities, to protect society when there is evidence of criminal behavior or intent, and also to protect the individual when such evidence is too limited to be reliable. Of course, for every example of misleading and ambiguous data, someone will want to solve the problems it creates by collecting more data, rather than less.\r\n\r\n<\/div>\r\n<div>\r\n\r\nBeyond PrivacyThere is nothing new under the sun, and the struggles to define and enforce privacy are no exception. Yet history shows that our concept of privacy has evolved, and the law has evolved with it. With the digital explosion, we have arrived at a moment where further evolution will have to take place rather quickly.\r\n\r\nLeave Me AloneMore than a century ago, two lawyers raised the alarm about the impact technology and the media were having on personal privacy:\r\n\r\nInstantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that \u201cwhat is whispered in the closet shall be proclaimed from the house-tops.\u201d\r\n\r\nThis statement is from the seminal law review article on privacy, published in 1890 by Boston attorney Samuel Warren and his law partner, Louis Brandeis, later to be a justice of the U.S. Supreme Court. Warren and Brandeis went on, \u201cGossip is no longer the resource of the idle and of the vicious, but has become a trade, which is pursued with industry as well as effrontery. To sat- isfy a prurient taste the details of sexual relations are spread broadcast in the columns of the daily papers. To occupy the indolent, column upon column is filled with idle gossip, which can only be procured by intrusion upon the domestic circle.\u201d New technologies made this garbage easy to produce, and then \u201cthe supply creates the demand.\u201d And those candid photographs and gossip columns were not merely taste- less; they were bad. Sounding like modern critics of mindless reality TV, Warren and Brandeis raged that society was going to hell in a handbasket because of all that stuff that was being spread about.\r\n\r\nEven gossip apparently harmless, when widely and persistently circulated, is potent for evil. It both belittles and perverts. It belittles by inverting the relative importance of things, thus dwarfing the thoughts and aspirations of a people. When personal gossip attains the dignity of print, and crowds the space available for matters of\u00a0<span style=\"font-size: 1rem;text-align: initial\">real interest to the community, what wonder that the ignorant and thoughtless mistake its relative importance. Easy of comprehension, appealing to that weak side of human nature which is never wholly cast down by the misfortunes and frailties of our neighbors, no one can be surprised that it usurps the place of interest in brains capable of other things. Triviality destroys at once robustness of thought and delicacy of feeling. No enthusiasm can flourish, no generous impulse can survive under its blighting influence.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe problem they perceived was that it was hard to say just why such inva- sions of privacy should be unlawful. In individual cases, you could say some- thing sensible, but the individual legal decisions were not part of a general regime. The courts had certainly applied legal sanctions for defamation\u2014 publishing malicious gossip that was false\u2014but then what about malicious gossip that was true? Other courts had imposed penalties for publishing an individual\u2019s private letters\u2014but on the basis of property law, just as though the individual\u2019s horse had been stolen rather than the words in his letters. That did not seem to be the right analogy either. No, they concluded, such rationales didn\u2019t get to the nub. When something private is published about you, something has been taken from you, you are a victim of theft\u2014but the thing stolen from you is part of your identity as a person. In fact, privacy was a right, they said, a \u201cgeneral right of the individual to be let alone<em>.<\/em>\u201d That right had long been in the background of court decisions, but the new technologies had brought this matter to a head. In articulating this new right, Warren and Brandeis were, they asserted, grounding it in the principle of \u201cinviolate personhood,\u201d the sanctity of individual identity.\r\n\r\nPrivacy and FreedomThe Warren-Brandeis articulation of privacy as a right to be left alone was influential, but it was never really satisfactory. Throughout the twentieth century, there were simply too many good reasons for <em>not <\/em>leaving people alone, and too many ways in which people <em>preferred <\/em>not to be left alone. And in the U.S., First Amendment rights stood in the way of privacy rights. As a general rule, the government simply cannot stop me from saying <em>anything<\/em>. In particular, it usually cannot stop me from saying what I want about your private affairs. Yet the Warren-Brandeis definition worked well enough for a long time, because, as Robert Fano put it, \u201cThe pace of technological progress was for a long time sufficiently slow as to enable society to learn pragmatically how to exploit new technology and prevent its abuse, with society maintain- ing its equilibrium most of the time.\u201d By the late 1950s, the emerging\u00a0<span style=\"font-size: 1rem;text-align: initial\">electronic technologies, both computers and communication, had destroyed that balance. Society could no longer adjust pragmatically, because surveil- lance technologies were developing too quickly.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe result was a landmark study of privacy by the Association of the Bar of the City of New York, which culminated in the publication, in 1967, of a book by Alan Westin, entitled <em>Privacy and Freedom. <\/em>(Fano was reviewing Westin\u2019s book when he painted the picture of social disequilibrium caused by rapid technological change.) Westin proposed a crucial shift of focus.\r\n\r\nBrandeis and Warren had seen a loss of privacy as a form of personal injury, which might be so severe as to cause \u201cmental pain and distress, far greater than could be inflicted by mere bodily injury.\u201d Individuals had to take responsibility for protecting themselves. \u201cEach man is responsible for his own acts and omissions only.\u201d But the law had to provide the weapons with which to resist invasions of privacy.\r\n\r\nWestin recognized that the Brandeis-Warren formulation was too absolute, in the face of the speech rights of other individuals and society\u2019s legitimate data-gathering practices. Protection might come not from protective shields, but from control over the uses to which personal information could be put. \u201cPrivacy,\u201d wrote Westin, \u201cis the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.\u201d\r\n\r\n\u2026 what is needed is a structured and rational weighing process, with definite criteria that public and private authorities can apply in comparing the claim for disclosure or surveillance through new devices with the claim to privacy. The following are suggested as the basic steps of such a process: measuring the seriousness of the need to con- duct surveillance; deciding whether there are alternative methods to meet the need; deciding what degree of reliability will be required of the surveillance instrument; determining whether true consent to surveillance has been given; and measuring the capacity for limitation and control of the surveillance if it is allowed.\r\n\r\nSo even if there were a legitimate reason why the government, or some other party, might know something about you, your right to privacy might limit what the knowing party could do with that information.\r\n\r\nThis more nuanced understanding of privacy emerged from the important social roles that privacy plays. Privacy is not, as Warren and Brandeis had it, the right to be isolated from society\u2014privacy is a right that makes society work. Fano mentioned three social roles of privacy. First, \u201cthe right to maintain the privacy of one\u2019s personality can be regarded as part of the right of\u00a0<span style=\"font-size: 1rem;text-align: initial\">self-preservation\u201d\u2014the right to keep your adolescent misjudgments and personal conflicts to yourself, as long as they are of no lasting significance to your ultimate position in society. Second, privacy is the way society allows <\/span><span style=\"font-size: 1rem;text-align: initial\">deviations from prevailing social norms,<\/span>\r\n\r\n<\/div>\r\n&nbsp;\r\n<div>\r\n<blockquote>\r\n<h4 style=\"text-align: left\">Privacy is the way society allows deviations from prevailing social norms, given that social progress requires social experimentation.<\/h4>\r\n<\/blockquote>\r\ngiven that no one set of social norms is universally and permanently satisfactory and indeed, given that social progress requires social experimentation. And third, privacy is essential to the development of independent thought it enables some decoupling of the individual from society, so that thoughts can be shared in limited\u00a0<span style=\"font-size: 1rem;text-align: initial\">circles and rehearsed before public exposure.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\n<em>Privacy and Freedom<\/em>, and the rooms full of disk drives that sprouted in government and corporate buildings in the 1960s, set off a round of soul- searching about the operational significance of privacy rights. What, in practice, should those holding a big data bank think about when collecting the data, handling it, and giving it to others?\r\n\r\nFair Information Practice PrinciplesIn 1973, the Department of Health, Education, and Welfare issued \u201cFair Information Practice Principles\u201d (FIPP), as follows:\r\n\r\n\u2022\u00a0\u00a0 <strong>Openness. <\/strong>There must be no personal data record-keeping systems whose very existence is secret.\r\n\r\n\u2022\u00a0\u00a0 <strong>Disclosure. <\/strong>There must be a way for a person to find out what infor- mation about the person is in a record and how it is used.\r\n\r\n\u2022\u00a0\u00a0 <strong>Secondary use. <\/strong>There must be a way for a person to prevent informa- tion about the person that was obtained for one purpose from being used or made available for other purposes without the person\u2019s consent.\r\n\r\n\u2022\u00a0\u00a0 <strong>Correction. <\/strong>There must be a way for a person to correct or amend a record of identifiable information about the person.\r\n\r\n\u2022\u00a0\u00a0 <strong>Security. <\/strong>Any organization creating, maintaining, using, or dissemi- nating records of identifiable personal data must assure the reliability of the data for its intended use and must take precautions to prevent misuses of the data.\r\n\r\n<\/div>\r\n<div>\r\n\r\nThese principles were proposed for U.S. medical data, but were never adopted. Nevertheless, they have been the foundation for many corporate privacy poli- cies. Variations on these principles have been codified in international trade agreements by the Organization of Economic Cooperation and Development (OECD) in 1980, and within the European Union (EU) in 1995. In the United States, echoes of these principles can be found in some state laws, but federal laws generally treat privacy on a case by case or \u201csectorial\u201d basis. The 1974 Privacy Act applies to interagency data transfers within the federal govern- ment, but places no limitations on data handling in the private sector. The Fair Credit Reporting Act applies only to consumer credit data, but does not apply to medical data. The Video Privacy Act applies only to videotape rentals, but not to \u201cOn Demand\u201d movie downloads, which did not exist when the Act was passed! Finally, few federal or state laws apply to the huge data banks in the file cabinets and computer systems of cities and towns. American government is decentralized, and authority over government data is decentralized as well.\r\n\r\nThe U.S. is not lacking in privacy laws. But privacy has been legislated inconsistently and confusingly, and in terms dependent on technological contingencies. There is no national consensus on what should be protected, and how protections should be enforced. Without a more deeply informed collective judgment on the benefits and costs of privacy, the current legislative hodgepodge may well get worse in the United States.\r\n\r\nThe discrepancy between American and European data privacy standards threatened U.S. involvement in international trade, because an EU directive would prohibit data transfers to nations, such as the U.S., that do not meet the European \u201cadequacy\u201d standard for privacy protection. Although the U.S. sectorial approach continues to fall short of European requirements, in 2000 the European Commission created a \u201csafe harbor\u201d for American businesses with multinational operations. This allowed individual corporations to establish their practices are adequate with respect to seven principles, covering notice, choice, onward transfer, access, security, data integrity, and enforcement.\r\n\r\n<\/div>\r\n<div>\r\n\r\nIt is, unfortunately, too easy to debate whether the European omnibus approach is more principled than the U.S. piecemeal approach, when the real question is whether either approach accomplishes what we want it to achieve. The Privacy Act of 1974 assured us that obscure statements would be buried deep in the Federal Register, providing the required official notice about massive governmental data collection plans\u2014better than nothing, but providing \u201copenness\u201d only in a narrow and technical sense. Most large corporations doing business with the public have privacy notices, and virtually no one reads them. Only 0.3% of Yahoo! users read its privacy notice in 2002, for example. In the midst of massive negative publicity that year when Yahoo! changed its privacy policy to allow advertising messages, the number of users who accessed the privacy policy rose only to 1%. None of the many U.S. privacy laws prevented the warrantless wiretapping program instituted by the Bush administration, nor the cooperation with it by major U.S. telecommunications companies.\r\n\r\nIndeed, cooperation between the federal government and private industry seems more essential than ever for gathering information about drug trafficking and international terrorism, because of yet another technological development. Twenty years ago, most long-distance telephone calls spent at least part of their time in the air, traveling by radio waves between microwave antenna towers or between the ground and a communication satellite. Government eavesdroppers could simply listen in (see the discussion of Echelon in Chapter 5). Now many phone calls travel through fiber optic cables instead, and the government is seeking the capacity to tap this privately owned infrastructure.\r\n\r\nHigh privacy standards have a cost. They can limit the public usefulness of data. Public alarm about the release of personal medical information has led to major legislative remedies. The Health Information Portability and Accountability Act (HIPAA) was intended both to encourage the use of electronic data interchange for health information, and to impose severe penal- ties for the disclosure of \u201cProtected Health Information,\u201d a very broad category including not just medical histories but, for example, medical payments. The bill mandates the removal of anything that could be used to re-connect medical records to their source. HIPAA is fraught with problems in an environment of ubiquitous data and powerful computing. Connecting the dots by assembling disparate data sources makes it extremely difficult to achieve the level of anonymity that HIPAA sought to guarantee. But help is available, for a price, from a whole new industry of HIPAA-compliance advisors. If you search for HIPAA online, you will likely see advertisements for services that will help you protect your data, and also keep you out of jail.\r\n\r\n<\/div>\r\n<div>\r\n\r\nAt the same time as HIPAA and other privacy laws have safeguarded our personal information, they are making medical research costly and sometimes impossible to conduct. It is likely that classic studies such as the Framingham Heart Study, on which much public policy about heart disease was founded, could not be repeated in today\u2019s environment of strengthened privacy rules. Dr. Roberta Ness, president of the American College of Epidemiology, reported that \u201cthere is a perception that HIPAA may even be having a negative effect on public health surveillance practices.\u201d\r\n\r\nThe European reliance on the Fair Information Practice Principles is often no more useful, in practice, than the American approach. Travel through London, and you will see many signs saying \u201cWarning: CCTV in use\u201d to meet the \u201cOpenness\u201d requirement about the surveillance cameras. That kind of notice throughout the city hardly empowers the individual. After all, even Big Brother satisfied the FIPP Openness standard, with the ubiquitous notices that he was watching! And the \u201cSecondary Use\u201d requirement, that European citi- zens should be asked permission before data collected for one purpose is used for another, is regularly ignored in some countries, although compliance practices are a major administrative burden on European businesses and may cause European businesses at least to pause and think before \u201crepurposing\u201d data they have gathered. Sociologist Amitai Etzioni repeatedly asks European\u00a0<span style=\"font-size: 1rem;text-align: initial\">audiences if they have <\/span><em style=\"font-size: 1rem;text-align: initial\">ever <\/em><span style=\"font-size: 1rem;text-align: initial\">been asked for permission to re-use data collected about them, and has gotten only a single positive response\u2014and that was from a gentleman who had been asked by a U.S. company.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe five FIPP principles, and the spirit of transparency and personal control that lay behind them, have doubtless led to better privacy practices. But they have been overwhelmed by the digital explosion, along with the insecurity of the world and all the social and cultural changes that have occurred in daily life. Fred H. Cate, a privacy scholar at the Indiana University, characterizes the FIPP principles as almost a complete bust:\r\n\r\nModern privacy law is often expensive, bureaucratic, burdensome, and offers surprisingly little protection for privacy. It has substituted individual control of information, which it in fact rarely achieves, for privacy protection. In a world rapidly becoming more global through information technologies, multinational commerce, and rapid travel, data protection laws have grown more fractured and protectionist.\r\n\r\nThose laws have become unmoored from their principled basis, and the principles on which they are based have become so varied and procedural, that our continued intonation of the FIPPS mantra no longer obscures the fact that this emperor indeed has few if any clothes left.\r\n\r\nPrivacy as a Right to Control InformationIt is time to admit that we don\u2019t even really know what we want. The bits are everywhere; there is simply no locking them down, and no one really wants to do that anymore. The meaning of pri-\r\n\r\n<\/div>\r\n<div>\r\n<blockquote>\r\n<h4 style=\"text-align: left\">The bits are everywhere; there is simply no locking them down, and no one really wants to do<\/h4>\r\n<p style=\"text-align: left\"><em>that anymore.<\/em><\/p>\r\n<\/blockquote>\r\nvacy has changed, and we do not have a good way of describing it. It is not the right to be left alone, because not even the most extreme measures will disconnect our digital selves from the rest of the world. It is not the right to keep our private information to ourselves, because the billions of\u00a0<span style=\"font-size: 1rem;text-align: initial\">atomic factoids don\u2019t any more lend themselves into binary classification, private or public.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nReade Seligmann would probably value his privacy more than most Americans alive today. On Monday, April 17, 2006, Seligmann was indicted in connection with allegations that a 27-year-old performer had been raped at a party at a Duke fraternity house. He and several of his lacrosse teammates instantly became poster children for everything that is wrong with\r\n\r\n<\/div>\r\n<div>\r\n\r\nAmerican society\u2014an example of national over-exposure that would leave even Warren and Brandeis breathless if they were around to observe it. Seligmann denied the charges, and at first it looked like a typical he-said, she-said scenario, which could be judged only on credibility and presumptions about social stereotypes.\r\n\r\nBut during the evening of that fraternity party, Seligmann had left a trail of digital detritus. His data trail indicated that he could not have been at the party long enough, or at the right time, to have committed the alleged rape. Time-stamped photos from the party showed that the alleged victim of his rape was dancing at 12:02 AM. At 12:24 AM, he used his ATM card at a bank, and the bank\u2019s computers kept records of the event. Seligmann used his cell phone at 12:25 AM, and the phone company tracked every call he made, just as your phone company keeps a record of every call you make and receive. Seligmann used his prox card to get into his dormitory room at 12:46 AM, and the university\u2019s computer kept track of his comings and goings, just as other computers keep track of every card swipe or RFID wave you and I make in our daily lives. Even during the ordinary movements of a college student going to a fraternity party, every step along the way was captured in digital detail. If Seligmann had gone to the extraordinary lengths necessary to avoid leaving digital fingerprints\u2014not using a modern camera, a cell phone, or a bank, and living off campus to avoid electronic locks\u2014his defense would have lacked important exculpatory evidence.\r\n\r\nWhich would we prefer\u2014the new world with digital fingerprints every- where and the constant awareness that we are being tracked, or the old world with few digital footprints and a stronger sense of security from prying eyes? And what is the point of even asking the question, when the world cannot be restored to its old information lock-down?\r\n\r\nIn a world that has moved beyond the old notion of privacy as a wall around the individual, we could instead regulate those who would inappro- priately <em>use <\/em>information about us. If I post a YouTube video of myself dancing in the nude, I should expect to suffer some personal consequences. Ultimately, as Warren and Brandeis said, individuals have to take responsibility for their actions. But society has drawn lines in the past around which facts are relevant to certain decisions, and which are not. Perhaps, the border of privacy having become so porous, the border of relevancy could be stronger. As Daniel Weitzner explains:\r\n\r\nNew privacy laws should emphasize usage restrictions to guard against unfair discrimination based on personal information, even if it\u2019s publicly available. For instance, a prospective employer might be able to find a video of a job applicant entering an AIDS clinic or a\u00a0<span style=\"font-size: 1rem;text-align: initial\">mosque. Although the individual might have already made such facts public, new privacy protections would preclude the employer from making a hiring decision based on that information and attach real penalties for such abuse.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nIn the same vein, it is not intrinsically wrong that voting lists and political contributions are a matter of public record. Arguably, they are essential to the good functioning of the American democracy. Denying someone a promotion because of his or her political inclinations <em>would be <\/em>wrong, at least for most jobs. Perhaps a nuanced classification of the ways in which others are allowed to use information about us would relieve some of our legitimate fears about the effects of the digital explosion.\r\n\r\nIn <em>The Transparent Society<\/em>, David Brin wrote:\r\n\r\nTransparency is not about eliminating privacy. It\u2019s about giving us the power to hold accountable those who would <em>violate <\/em>it. Privacy implies serenity at home and the right to be let alone. It may be irksome how much other people know about me, but I have no right to police their minds. On the other hand I care very deeply about what others <em>do <\/em>to me and to those I love. We all have a right to some place where we can feel safe.\r\n\r\nDespite the very best efforts, and the most sophisticated technologies, we can- not control the spread of our private information. And we often want infor- mation to be made public to serve our own, or society\u2019s purposes.\r\n\r\nYet there can still be principles of accountability for the <em>misuse <\/em>of infor- mation. Some ongoing research is outlining a possible new web technology, which would help ensure that information is used appropriately even if it is known. Perhaps automated classification and reasoning tools, developed to help connect the dots in networked information systems, can be retargeted to limit inappropriate use of networked information. A continuing border war is likely to be waged, however, along an existing free speech front: the line sep- arating my right to tell the truth about you from your right not to have that information used against you. In the realm of privacy, the digital explosion has left matters deeply unsettled.\r\n\r\n<\/div>\r\n&nbsp;\r\n<div>\r\n\r\nAlways OnIn <em>1984, <\/em>the pervasive, intrusive technology could be turned off:\r\n\r\nAs O\u2019Brien passed the telescreen a thought seemed to strike him. He stopped, turned aside and pressed a switch on the wall. There was a sharp snap. The voice had stopped.\r\n\r\nJulia uttered a tiny sound, a sort of squeak of surprise. Even in the midst of his panic, Winston was too much taken aback to be able to hold his tongue.\r\n\r\n\u201cYou can turn it off!\u201d he said.\r\n\r\n\u201cYes,\u201d said O\u2019Brien, \u201cwe can turn it off. We have that privilege. \u2026Yes, everything is turned off. We are alone.\u201d\r\n\r\nSometimes we can still turn it off today, and should. But mostly we don\u2019t want to. We don\u2019t want to be alone; we want to be connected. We find it con- venient to leave it on, to leave our footprints and fingerprints everywhere, so we will be recognized when we come back. We don\u2019t want to have to keep retyping our name and address when we return to a web site. We like it when the restaurant remembers our name, perhaps because our phone number showed up on caller ID and was linked to our record in their database. We appreciate buying grapes for $1.95\/lb instead of $3.49, just by letting the store know that we bought them. We may want to leave it on for ourselves because we know it is on for criminals. Being watched reminds us that they are watched as well. Being watched also means we are being watched over.\r\n\r\nAnd perhaps we don\u2019t care that so much is known about us because that is the way human society used to be\u2014kinship groups and small settlements, where knowing everything about everyone else was a matter of survival. Having it on all the time may resonate with inborn preferences we acquired millennia ago, before urban life made anonymity possible. Still today, privacy means something very different in a small rural town than it does on the Upper East Side of Manhattan.\r\n\r\nWe cannot know what the cost will be of having it on all the time. Just as troubling as the threat of authoritarian measures to restrict personal liberty is the threat of voluntary conformity. As Fano astutely observed, privacy allows limited social experimentation\u2014the deviations from social norms that are much riskier to the individual in the glare of public exposure, but which can be, and often have been in the past, the leading edges of progressive social changes. With it always on, we may prefer not to try anything unconventional, and stagnate socially by collective inaction.\r\n\r\n<\/div>\r\nFor the most part, it is too late, realistically, ever to turn it off. We may once have had the privilege of turning it off, but we have that privilege no more. We have to solve our privacy problems another way.\r\n<h3 style=\"text-align: center\">\u2737<\/h3>\r\nThe digital explosion is shattering old assumptions about who knows what. Bits move quickly, cheaply, and in multiple perfect copies. Information that used to be public in principle\u2014for example, records in a courthouse, the price you paid for your house, or stories in a small-town newspaper\u2014is now available to everyone in the world. Information that used to be private and available to almost no one\u2014medical records and personal snapshots, for example\u2014can become equally widespread through carelessness or malice. The norms and business practices and laws of society have not caught up to the change.\r\n\r\nThe oldest durable communication medium is the written document. Paper documents have largely given way to electronic analogs, from which paper copies are produced. But are electronic documents really like paper documents? Yes and no, and misunderstanding the document metaphor can be costly. That is the story to which we now turn.\r\n<h1 style=\"text-align: center\">CHAPTER 7\r\n<strong>You Can\u2019t Say That on the Internet\r\n<\/strong><strong>Guarding the Frontiers of Digital Expression<\/strong><\/h1>\r\n<h2><strong>Do You Know Where Your Child Is on the Web Tonight?<\/strong><\/h2>\r\nIt was every parent\u2019s worst nightmare. Katherine Lester, a 16-year-old honors student from Fairgrove, Michigan, went missing in June 2006. Her parents had no idea what had happened to her; she had never given them a moment\u2019s worry. They called the police. Then federal authorities got involved. After three days of terrifying absence, she was found, safe\u2014in Amman, Jordan.\r\n<div>\r\n\r\nFairgrove is too small to have a post office, and the Lesters lived in the last house on a dead-end street. In another time, Katherine\u2019s school, six miles away, might have been the outer limit of her universe. But through the Internet, her universe was\u2014the whole world. Katherine met a Palestinian man, Abdullah Jimzawi, from Jericho on the West Bank. She found his profile on the social networking web site, MySpace, and sent him a message: \u201cu r cute.\u201d They quickly learned everything about each other through online messages. Lester tricked her mother into getting her a passport, and then took off for the Middle East. When U.S. authorities met her plane in Amman, she agreed to return home, and apologized to her parents for the distress she had caused them.\r\n\r\nA month later, Representative Judy Biggert of Illinois rose in the House to co-sponsor the Deleting Online Predators Act (DOPA). \u201cMySpace.com and\u00a0<span style=\"font-size: 1rem;text-align: initial\">other networking web sites have become new hunting grounds for child predators,\u201d she said, noting that \u201cwe were all horrified\u201d by the story of Katherine Lester. \u201cAt least let\u2019s give parents some comfort that their children won\u2019t fall prey while using the Internet at schools and libraries that receive federal funding for Internet services.\u201d The law would require those institutions to prevent children from using on-location computers to access chat rooms and social networking web sites without adult supervision.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nSpeaker after speaker rose in the House to stress the importance of protecting children from online predators, but not all supported the bill. The language was \u201coverbroad and ambiguous,\u201d said one. As originally drafted, it seemed to cover not just MySpace, but sites such as Amazon and Wikipedia. These sites possess some of the same characteristics as MySpace\u2014users can create personal profiles and continually share information with each other using the Web. Although the law might block children in schools and libraries from \u201cplaces\u201d where they meet friends (and sometimes predators), it would also prevent access to online encyclopedias and bookstores, which rely on content posted by users.\r\n\r\nInstead of taking the time to develop a sharper definition of what exactly was to be prohibited, DOPA\u2019s sponsors hastily redrafted the law to omit the definition, leaving it to the Federal Communications Commission to decide later just what the law would cover. Some murmured that the upcoming midterm elections were motivating the sponsors to put forward an ill- considered and showy effort to protect children\u2014an effort that would likely be ineffective and so vague as to be unconstitutional.\r\n\r\nChildren use computers in lots of places; restricting what happens in schools and libraries would hardly discourage determined teenagers from sneaking onto MySpace. Only the most overbearing parents could honestly answer the question USA Today asked in its article about \u201ccyber-predators\u201d: \u201cIt\u2019s 11 p.m. Do you know where your child is on the Web tonight?\u201d\r\n\r\nThe statistics about what can go wrong were surely terrifying. The Justice Department has made thousands of arrests for \u201ccyber enticement\u201d\u2014almost always older men using social networking web sites to lure teenagers into meetings, some of which end very badly. Yet, as the American Library Association stated in opposition to DOPA, education, not prohibition, is the \u201ckey to safe use of the Internet.\u201d Students have to learn to cooperate online, because network use, and all the human interactions it enables, are basic tools of the new, globally interconnected world of business, education, and citizenship.\r\n\r\nAnd perhaps even the globally interconnected world of true love. The tale of Katherine Lester took an unexpected turn. From the moment she was found in Jordan, Lester steadily insisted that she intended to marry Jimzawi.\u00a0<span style=\"font-size: 1rem;text-align: initial\">Jimzawi, who was 20 when he and Lester first made contact, claimed to be in love with her\u2014and his mother agreed. Jimzawi begged Lester to tell her parents the truth before she headed off to meet him, but she refused. Upon her return, authorities charged Lester as a runaway child and took her passport away from her. But on September 12, 2007, having attained legal independence by turning 18, she again boarded a plane to the Middle East, finally to meet her beloved face to face. The affair finally ended a few weeks later in an exchange of accusations and denials, and a hint that a third party had attracted Lester\u2019s attentions. There was no high-tech drama to the breakup\u2014 except that it was televised on Dr. Phil.<\/span>\r\n\r\n<span style=\"font-size: 1rem;text-align: initial\">The explosion in digital communications has confounded long-held assumptions about human relationships\u2014how people meet, how they come to know each other, and how they decide if they can trust each other. At the same time, the explosion in digital information, in the form of web pages and downloadable photographs, has put at the fingertips of millions material that only a few years ago no one could have found without great effort and expense. Political dissidents in Chinese Internet caf\u00e9s can (if they dare) read pro-democracy blogs. People all around the world who are ashamed about their illness, starved for information about their sexual identity, or eager to connect with others of their minority faith can find facts, opinion, advice, and companionship. And children too small to leave home by themselves can see lurid pornography on their families\u2019 home computers. Can societies anymore control what their members see and to whom they talk?<\/span>\r\n\r\n<\/div>\r\n<h2>Metaphors for Something Unlike Anything Else<\/h2>\r\n<div>\r\n\r\nDOPA, which has not been passed into law, is the latest battle in a long war between conflicting values. On the one hand, society has an interest in keeping unwanted information away from children. On the other hand, society as a whole has an interest in maximizing open communication. The U.S. Constitution largely protects the freedom to speak and the right to hear. Over and over, society has struggled to find a metaphor for electronic communication that captures the ways in which it is the same as the media of the past and the ways in which it is different. Laws and regulations are built on traditions; only by understanding the analogies can the speech principles of the past be extended to the changed circumstances of the present or be consciously transcended.\r\n\r\nWhat laws should apply? The Internet is not exactly like anything else. If you put up a web site, that is something like publishing a book, so perhaps\u00a0<span style=\"font-size: 1rem;text-align: initial\">the laws about books should apply. But that was Web 1.0 a way for \u201cpublishers\u201d to publish and viewers to view. In the dynamic and participatory Web 2.0, sites such as MySpace change constantly in response to user postings. If you send an email, or contribute to a blog, that is something like placing a telephone call, or maybe a conference call, so maybe laws about telephones should be the starting point. Neither metaphor is perfect. Maybe television is a better analogy, since browsing the Web is like channel surfing except that the Internet is two-way, and there is no limit to the number of \u201cchannels.\u201d<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nUnderneath the web software and the email software is the Internet itself. The Internet just delivers packets of bits, not knowing or caring whether they are parts of books, movies, text messages, or voices, nor whether the bits will wind up in a web browser, a telephone, or a movie projector. John Perry Barlow, former lyricist for the Grateful Dead and co-founder of the Electronic Frontier Foundation, used a striking metaphor to describe the Internet as it burst into public consciousness in the mid-1990s. The world\u2019s regulation of the flow of information, he said, had long controlled the transport of wine bottles. In \u201cmeatspace,\u201d the physical world, different rules applied to books, postal mail, radio broadcasts, and telephone calls\u2014different kinds of bottles. Now the wine itself flowed freely through the network, nothing but bits freed from their packaging. Anything could be put in, and the same kind of thing would come out. But in between, it was all the same stuff\u2014just bits. What are the rules of Cyberspace\u2014what are the rules for the bits themselves?\r\n\r\nWhen information is transmitted between two parties, whether the information is spoken words, written words, pictures, or movies, there is a source and a destination. There may also be some intermediaries. In a lecture hall, the listeners hear the speaker directly, although whoever provided the hall also played an important role in making the communication possible. Books have authors and readers, but also publishers and booksellers in between. It is natural to ascribe similar roles to the various parties in an Internet communication, and, when things go wrong, to hold any and all of the parties responsible. For example, when Pete Solis contacted a 14-year-old girl (\u201cJane Doe\u201d) through her MySpace profile and allegedly sexually assaulted her when they met in person, the girl\u2019s parents sued MySpace for $30 million for enabling the assault.\r\n\r\nThe Internet has a complex structure. The source and destination may be friends emailing each other, they may be a commercial web site and a residential customer, or they may be one office of a company sending a mockup of an advertising brochure to another office halfway around the world. The source and destination each has an ISP. Connecting the ISPs are routing switches, fiber optic cables, satellite links, and so on. A packet that flows through the Internet may pass through devices and communication links\u00a0<span style=\"font-size: 1rem;text-align: initial\">owned by dozens of different parties. For convenience (and in the style of Jonathan Zittrain), we\u2019ll call the collection of devices that connect the ISPs to each other the cloud. As shown in Figure 7.1, speech on the Internet goes from the source to an ISP, into the cloud, out of the cloud to another ISP, and to its destination (see the sidebar, \u201cCloud Computing,\u201d in Chapter 3 for additional information about this).<\/span>\r\n\r\n[caption id=\"attachment_475\" align=\"aligncenter\" width=\"364\"]<img class=\"wp-image-475 size-full\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05143221\/Image_005.png\" alt=\"\" width=\"364\" height=\"213\" \/> FIGURE 7.1 Where to regulate the Internet? Based on figure by Jonathan Zittrain[\/caption]\r\n\r\nIf a government seeks to control speech, it can attack at several different points. It can try to control the speaker or the speaker\u2019s ISP, by criminalizing certain kinds of speech. But that won\u2019t work if the speaker isn\u2019t in the same country as the listener. It can try to control the listener, by prohibiting pos- session of certain kinds of materials. In the U.S., possession of copyrighted software without an appropriate license is illegal, as is possession of other copyrighted material with the intent to profit from redistributing it. If citizens have reasonable privacy rights, however, it is hard for the government to know what its citizens possess. In a society such as the U.S., where citizens have reasonable rights of due process, one-at-a-time prosecutions for possession are unwieldy. As a final alternative, the government can try to control the intermediaries.\r\n\r\nThere are parallels in civil law. The parents of the Jane Doe sued MySpace because it was in the communication path between Mr. Solis and their daughter, even though MySpace was not the alleged assailant.\r\n\r\n<\/div>\r\n<div>\r\n<div class=\"textbox shaded\">\r\n<p style=\"text-align: center\"><strong>DEFAMING PUBLIC FIGURES<\/strong><\/p>\r\nDamaging statements about public figures, even if false, are not defamatory unless they were made with malicious intent. This extra clause protects news media against libel claims by celebrities who are offended by the way the press depicts them. It was not always so, however. The pivotal case was New York Times Co. v. Sullivan, 376 U.S. 254 (1964), in which the newspaper was sued by officials in Alabama on the basis of a pro-civil-rights advertisement it published. The story is detailed, along with a readable history of the First Amendment, in Make No Law by Anthony Lewis (Vintage Paperback, 1992). For a later account of First Amendment struggles, see Lewis\u2019s Freedom for the Thought That We Hate (Basic Books, 2008).\r\n\r\n<\/div>\r\nVery early, defamation laws had to adapt to the Internet. In the U.S., speech is defamatory if it is false, communicated to third parties, and dam- ages one\u2019s reputation.\r\n\r\nIn the physical world, when the speaker defames someone, the intermediaries between the speaker and the listener sometimes share responsibility with the speaker\u2014and sometimes not. If we defame someone in this book, we may be sued, but so may the book\u2019s publisher, who might have known that what we were writing was false. On the other hand, the trucker who transported the book to the bookstore probably isn\u2019t liable, even though he too helped get our words from us to our readers. Are the various electronic intermediaries more like publishers, or truckers? Do the parents of Jane Doe have a case against MySpace?\r\n\r\nSociety has struggled to identify the right metaphors to describe the parties to an electronic communication. To understand this part of the story of electronic information, we have to go back to pre-Internet electronic communication.\r\n<h2>Publisher or Distributor?<\/h2>\r\n<div>\r\n\r\nCompuServe was an early provider of computer services, including bulletin boards and other electronic communities users could join for a fee. One of these fora, Rumorville USA, provided a daily newsletter of reports about broadcast journalism and journalists. CompuServe didn\u2019t screen or even collect the rumors posted on Rumorville. It contracted with a third party, Don Fitzpatrick Associates (DFA), to provide the content. CompuServe simply posted whatever DFA provided without reviewing it. And for a long time, no one complained.\r\n\r\n<\/div>\r\nIn 1990, a company called Cubby, Inc. started a competing service, Skuttlebut, which also reported gossip about TV and radio broadcasting. Items appeared on Rumorville describing Skuttlebut as a \u201cnew start-up scam\u201d and alleging that its material was being stolen from Rumorville. Cubby cried foul and went after CompuServe, claiming defamation. CompuServe acknowledged that the postings were defamatory, but claimed it was not acting as a publisher of the information\u2014just a distributor. It simply was sending on to subscribers what other people gave it. It wasn\u2019t responsible for the contents, any more than a trucker is responsible for libel that might appear in the magazines he handles.\r\n\r\nWhat was the right analogy? Was CompuServe more like a newspaper, or more like the trucker who transports the newspaper to its readers?\r\n\r\nMore like the trucker, ruled the court. A long legal tradition held distributors blameless for the content of the publications they delivered. Distributors can\u2019t be expected to have read all the books on their trucks. Grasping for a better analogy, the court described CompuServe as \u201can electronic for-profit library.\u201d Distributor or library, CompuServe was independent of DFA and couldn\u2019t be held responsible for libelous statements in what DFA provided. The case of Cubby v. CompuServe was settled decisively in CompuServe\u2019s favor. Cubby might go after the source, but that wasn\u2019t CompuServe. CompuServe was a blameless intermediary. So was MySpace, years later, when Jane Doe\u2019s parents sought redress for Mr. Solis\u2019s alleged assault of their daughter. In a ruling building on the Cubby decision, MySpace was absolved of responsibility for what Solis had posted.\r\n\r\nWhen Cubby v. CompuServe was decided, providers of computer services everywhere exhaled. If the decision had gone the other way, electronic distribution of information might have become a risky business that few dared to enter. Computer networks created an information infrastructure unprecedented in its low overhead. A few people could connect tens of thousands, even millions, to each other at very low cost. If everything disseminated had to be reviewed by human readers before it was posted, to ensure that any damaging statements were truthful, its potential use for participatory democracy would be severely limited. For a time, a spirit of freedom ruled.\r\n<h2>Neither Liberty nor Security<\/h2>\r\n\u201cThe law often demands that we sacrifice some liberty for greater security. Sometimes, though, it takes away our liberty to provide us less security.\u201d So wrote law professor Eugene Volokh in the fall of 1995, commenting on a court case that looked similar to Cubby v. CompuServe, but wasn\u2019t.\r\n\r\n<\/div>\r\n<table class=\"shaded alignleft\" style=\"border-collapse: collapse;width: 4.04335%;height: 141px\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\"><strong>Eugene Volokh has a blog, volokh.com, in which he comments regularly on information freedom issues and many other things<\/strong>.<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nProdigy was a provider of computer services, much like CompuServe. But in the early 1990s, as worries began to rise about the sexual content of materials available online, Prodigy sought to distinguish itself as a fam<span style=\"font-size: 1rem;text-align: initial\">ily-oriented service. It pledged to exercise editorial control over the postings on its bulletin boards. \u201cWe make no apology,\u201d Prodigy stated, \u201cfor pursuing a value system that reflects the culture of the millions of American families we aspire to serve. Certainly no responsible newspaper does less\u2026.\u201d Prodigy\u2019s success in the market was due in no small measure to the security families felt in accessing its fora, rather than the anything-goes sites offered by other services.<\/span>\r\n<div>\r\n\r\nOne of Prodigy\u2019s bulletin boards, called \u201cMoney Talk,\u201d was devoted to financial services. In October 1994, someone anonymously posted comments on Money Talk about the securities investment firm Stratton Oakmont. The firm, said the unidentified poster, was involved in \u201cmajor criminal fraud.\u201d Its president was \u201csoon to be proven criminal.\u201d The whole company was a \u201ccult of brokers who either lie for a living or get fired.\u201d\r\n\r\nStratton Oakmont sued Prodigy for libel, claiming that Prodigy should be regarded as the publisher of these defamatory comments. It asked for $200 million in damages. Prodigy countered that it had zero responsibility for what its posters said. The matter had been settled several years earlier by the CubbyCompuServe decision. Prodigy wasn\u2019t the publisher of the comments, just the distributor.\r\n\r\nIn a decision that stunned the Internet community, a New York court ruled otherwise. By exercising editorial control in support of its family-friendly image, said the court, Prodigy became a publisher, with the attendant responsibilities and risks. Indeed, Prodigy had likened itself to a newspaper publisher, and could not at trial claim to be something less.\r\n\r\nIt was all quite logical, as long as the choice was between two metaphors: distributor or newspaper. In reality, though, a service provider wasn\u2019t exactly like either. Monitoring for bad language was a pretty minor form of editorial work. That was a far cry from checking everything for truthfulness.\r\n\r\nBe that as it may, the court\u2019s finding undercut efforts to create safe districts in Cyberspace. After the decision, the obvious advice went out to bulletin board operators: Don\u2019t even consider editing or censoring. If you do, Stratton Oakmont v. Prodigy means you may be legally liable for any malicious false- hood that slips by your review. If you don\u2019t even try, Cubby v. CompuServe means you are completely immune from liability.\r\n\r\n<\/div>\r\nThis was fine for the safety of the site operators, but what about the public interest? Freedom of expression was threatened, since fewer families would be willing to roam freely through the smut that would be posted. At the same time, security would not be improved, since defamers could always post their lies on the remaining services with their all-welcome policies.\r\n<h2>The Nastiest Place on Earth<\/h2>\r\nEvery communication technology has been used to control, as well as to facilitate, the flow of ideas. Barely a century after the publication of the Gutenberg Bible, Pope Paul IV issued a list of 500 banned authors. In the United States, the First Amendment protects authors and speakers from government interference: Congress shall make no law \u2026 abridging the freedom of speech, or of the press \u2026. But First Amendment protections are not absolute. No one has the right to publish obscene materials. The government can destroy materials it judges to be obscene, as postal authorities did in 1918 when they burned magazines containing excerpts of James Joyce\u2019s Ulysses.\r\n\r\nWhat exactly counts as obscene has been a matter of much legal wrangling over the course of U.S. history. The prevailing standard today is the one the Supreme Court used in 1973 in deciding the case of Miller v. California, and is therefore called the Miller Test. To determine whether material is obscene, a court must consider the following:\r\n<ol>\r\n \t<li>Whether the average person, applying contemporary community standards, would find that the work, taken as a whole, appeals to the prurient interest.<\/li>\r\n \t<li>Whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law.<\/li>\r\n \t<li>Whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value.<\/li>\r\n<\/ol>\r\nOnly if the answer to each part is \u201cyes\u201d does the work qualify as obscene. The Miller decision was a landmark, because it established that there were no national standards for obscenity. There were only \u201ccommunity\u201d standards, which could be different in Mississippi than in New York City. But there were no computer networks in 1973. What is a \u201ccommunity\u201d in Cyberspace?\r\n\r\nIn 1992, the infant World Wide Web was hardly world-wide, but many Americans were using dial-up connections to access information on centralized, electronic bulletin boards. Some bulletin boards were free and united communities of interest\u2014lovers of baseball or birds, for example. Others distributed free software. Bob and Carleen Thomas of Milpitas, California, ran a different kind of bulletin board, called Amateur Action. In their advertising, they described it as \u201cThe Nastiest Place on Earth.\u201d\r\n\r\nFor a fee, anyone could download images from Amateur Action. The pictures were of a kind not usually shown in polite company, but readily available in magazines sold in the nearby cities of San Francisco and San Jose. The Thomases were raided by the San Jose police, who thought they might have been distributing obscene materials. After looking at their pictures, the police decided that the images were not obscene by local standards.\r\n\r\nBob and Carleen were not indicted, and they added this notice to their bulletin board: \u201cThe San Jose Police Department as well as the Santa Clara County District Attorney\u2019s Office and the State of California agree that Amateur Action BBS is operating in a legal manner.\u201d\r\n\r\nTwo years later, in February 1994, the Thomases were raided again, and their computer was seized. This time, the complaint came from Agent David Dirmeyer, a postal inspector\u2014in western Tennessee. Using an assumed name, Dirmeyer had paid $55 and had downloaded images to his computer in Memphis. Nasty stuff indeed, particularly for Memphis: bestiality, incest, and sado-masochism. The Thomases were arrested. They stood trial in Memphis on federal charges of transporting obscene material via common carrier, and via interstate commerce. They were convicted by a Tennessee jury, which concluded that their Milpitas bulletin board violated the community standards of Memphis. Bob was sentenced to 37 months incarceration and Carleen to 30.\r\n\r\nThe Thomases appealed their conviction, on the grounds that they could not have known where the bits were going, and that the relevant community, if not San Jose, was a community of Cyberspace. The appeals court did not agree. Dirmeyer had supplied a Tennessee postal address when he applied for membership in Amateur Action. The Thomases had called him at his Memphis telephone number to give him the password\u2014they had known where he was. The Thomases, concluded the court, should have been more careful where they sent their bits, once they started selling them out of state. Shipping the bits was just like shipping a videotape by UPS (a charge of which the Thomases were also convicted). The laws of meatspace applied to Cyberspace\u2014and one city\u2019s legal standards sometimes applied thousands of miles away.\r\n<h2>The Most Participatory Form of Mass Speech<\/h2>\r\n<div>\r\n\r\nPornography was part of the electronic world from the moment it was possible to store and transmit words and images. The Thomases learned that bits were like books, and the same obscenity standards applied.\r\n\r\nIn the mid-1990s, something else happened. The spread of computers and networks vastly increased the number of digital images available and the number of people viewing them. Digital pornography became not just the same old thing in a new form\u2014it seemed to be a brand-new thing, because there was so much of it and it was so easy to get in the privacy of the home. Nebraska Senator James Exon attached an anti-Internet-pornography amendment to a telecommunications bill, but it seemed destined for defeat on civil liberties grounds. And then all hell broke loose.\r\n\r\nOn July 3, 1995, Time Magazine blasted \u201cCYBERPORN\u201d across its cover. The accompanying story, based largely a single university report, stated:\r\n<blockquote>What the Carnegie Mellon researchers discovered was: THERE\u2019S AN AWFUL LOT OF PORN ONLINE. In an 18-month study, the team surveyed 917,410 sexually explicit pictures, descriptions, short stories, and film clips. On those Usenet newsgroups where digitized images are stored, 83.5% of the pictures were pornographic.<\/blockquote>\r\nThe article later noted that this statistic referred to only a small fraction of all data traffic but failed to explain that the offending images were mostly on limited-access bulletin boards, not openly available to children or anyone else. It mentioned the issue of government censorship, and it quoted John Perry Barlow on the critical role of parents. Nonetheless, when Senator Grassley of Iowa read the Time Magazine story into the Congressional Record, attributing its conclusions to a study by the well-respected Georgetown University Law School, he called on Congress to \u201chelp parents who are under assault in this day and age\u201d and to \u201chelp stem this growing tide.\u201d\r\n\r\nGrassley\u2019s speech, and the circulation in the Capitol building of dirty pictures downloaded by a friend of Senator Exon, galvanized the Congress to save the children of America. In February 1996, the Communications Decency Act, or CDA, passed almost unanimously and was signed into law by President Clinton.\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe CDA made it a crime to use \u201cany interactive computer service to dis- play in a manner available to a person under 18 years of age, any comment, request, suggestion, proposal, image, or other communication that, in con- text, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs.\u201d Criminal penalties would also fall on anyone who \u201cknowingly permits any telecommunications facility under such person\u2019s control to be used\u201d for such prohibited activities. And finally, it criminalized the transmission of materials that were \u201cobscene or indecent\u201d to persons known to be under 18.\r\n\r\nThese \u201cdisplay provisions\u201d of the CDA vastly extended existing anti- obscenity laws, which already applied to the Internet. The dual prohibitions against making offensive images available to a person under 18, and against transmitting indecent materials to persons known to be under 18, were unlike anything that applied to print publications. \u201cIndecency,\u201d whatever it meant, was something short of obscenity, and only obscene materials had been illegal prior to the CDA. A newsstand could tell the difference between a 12-year-old customer and a 20-year-old, but how could anyone check ages in Cyberspace?\r\n\r\nWhen the CDA was enacted, John Perry Barlow saw the potential of the Internet for the free flow of information challenged. He issued a now-classic manifesto against the government\u2019s effort to regulate speech:\r\n<blockquote>Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You have no sovereignty where we gather\u2026. We are creating a world that all may enter without privilege or prejudice accorded by race, economic power, military force, or station of birth. We are creating a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity\u2026. In our world, all the sentiments and expressions of humanity, from the debasing to the angelic, are parts of a seamless whole, the global conversation of bits\u2026. [Y]ou are trying to ward off the virus of liberty by erecting guard posts at the frontiers of Cyberspace.<\/blockquote>\r\nBrave and stirring words, even if the notion of Cyberspace as a \u201cseamless whole\u201d had already been rendered doubtful. At a minimum, bits had to meet different obscenity standards in Memphis than in Milpitas, as the Thomases\u00a0<span style=\"font-size: 1rem;text-align: initial\">had learned. In fact, the entire metaphor of the Internet as a \u201cspace\u201d with \u201cfrontiers\u201d was fatally flawed, and misuse of that metaphor continues to plague laws and policies to this day.<\/span>\r\n\r\n<\/div>\r\nCivil libertarians joined the chorus challenging the Communications Decency Act. In short order, a federal court and the U.S. Supreme Court ruled in the momentous case of ACLU v. Reno. The display provisions of the CDA were unconstitutional. \u201cThe Government may only regulate free speech for a compelling reason,\u201d wrote Judge Dalzell in the district court decision, \u201cand in the least restrictive manner.\u201d It would chill discourse unacceptably to demand age verification over the Internet from every person who might see material that any adult has a legal right to see.\r\n\r\nThe government had argued that the authority of the Federal Communications Commission (FCC) to regulate the content of TV and radio broadcasts, which are required not to be \u201cindecent,\u201d provided an analogy for government oversight of Internet communications.\r\n\r\nThe courts disagreed. The FCC analogy was wrong, they ruled, because the Internet was far more open than broadcast media. Different media required different kinds of laws, and the TV and radio laws were more restrictive than laws were for print media, or should be for the Internet. \u201cI have no doubt\u201d wrote Judge Dalzell, \u201cthat a Newspaper Decency Act, passed because Congress discovered that young girls had read a front page article in the New York Times on female genital mutilation in Africa, would be unconstitutional\u2026. The Internet may fairly be regarded as a never-ending worldwide conversation. The Government may not, through the CDA, interrupt that conversation. As the most participatory form of mass speech yet developed, the Internet deserves the highest protection from governmental intrusion.\u201d The CDA\u2019s dis- play provisions were dead.\r\n\r\nIn essence, the court was unwilling to risk the entire Internet\u2019s promise as a vigorous marketplace of ideas to serve the narrow purpose of protecting children from indecency. Instead, it transferred the burden of blocking unwanted communications from source ISPs to the destination. The DOPA\u2019s proposed burden on libraries and schools is heir to the court\u2019s ruling over- turning the CDA. Legally, there seemed to be nowhere else to control speech except at the point where it came out of the cloud and was delivered to the listener.\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">\r\n<p style=\"text-align: center\"><strong>DEFENDING ELECTRONIC FREEDOMS<\/strong><\/p>\r\n<span style=\"font-family: inherit;font-size: inherit\">The Electronic Frontier Foundation, <\/span><a style=\"font-family: inherit;font-size: inherit\" href=\"http:\/\/www.eff.org\/\">www.eff.org, <\/a><span style=\"font-family: inherit;font-size: inherit\">is the leading public advocacy group defending First Amendment and other personal rights in Cyberspace. Ironically, it often finds itself in opposition with media and telecommunications companies. In principle, communications companies should have the greatest interest in unfettered exchange of information. In actual practice, they often benefit financially from policies that limit consumer choice or expand surveillance and data-gathering about private citizens. The EFF was among the plaintiffs bringing suit in the case that overturned the CDA.<\/span><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nLost in the 1995\u201396 Internet indecency hysteria was the fact that the \u201cCarnegie Mellon report\u201d that started the legislative ball rolling had been discredited almost as soon as the Time Magazine story appeared. The report\u2019s author, Martin Rimm, was an Electrical Engineering undergraduate. His\u00a0study\u2019s methodology was flawed, and perhaps fraudulent. For example, he told adult bulletin board operators that he was studying how best to market pornography online, and that he would repay them for their cooperation by sharing his tips. His conclusions were unreliable. Why hadn\u2019t that been caught when his article was published? Because the article was not a product of Georgetown University, as Senator Grassley had said. Rather, it appeared in the Georgetown Law Review, a student publication that used neither peer nor professional reviewers. Three weeks after publishing the \u201cCyberporn\u201d article, Time acknowledged that Rimm\u2019s study was untrustworthy. In spite of this repudiation, Rimm salvaged something\u00a0from his efforts: He published a book called <em>The Pornographer\u2019s Handbook: How to Exploit Women, Dupe Men, &amp; Make Lots of Money.<\/em>\r\n<h2>Protecting Good Samaritans\u2014and a Few Bad Ones<\/h2>\r\n<div>\r\n\r\nThe Stratton Oakmont v. Prodigy decision, which discouraged ISPs from exer- cising any editorial judgment, had been handed down in 1995, just as Congress was preparing to enact the Communications Decency Act to protect children from Internet porn. Congress recognized that the consequences of Stratton Oakmont would be fewer voluntary efforts by ISPs to screen their sites for offensive content. So, the bill\u2019s sponsors added a \u201cGood Samaritan\u201d provision to the CDA.\r\n\r\nThe intent was to allow ISPs to act as editors without running the risk that they would be held responsible for the edited content, thus putting themselves in the jam in which Prodigy had found itself. So the CDA included a provision absolving ISPs of liability on account of anything they did, in good faith,\u00a0<span style=\"font-size: 1rem;text-align: initial\">to filter out \u201cobscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable\u201d material. For good measure, the CDA pushed the Cubby court\u2019s \u201cdistributor\u201d metaphor to the limit, and beyond. ISPs should not be thought of as publishers, or as sources either. \u201cNo provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.\u201d This was the bottom line of \u00a7230 of the CDA, and it meant that there would be no more Stratton Oakmont v. Prodigy Catch-22s.<\/span>\r\n\r\n<\/div>\r\nWhen the U.S. Supreme Court struck down the CDA in 1996, it negated only the display provisions, the clauses that threatened the providers of \u201cindecent\u201d content. The Good Samaritan clause was allowed to stand and remains the law today. ISPs can do as much as they want to filter or censor their content, without any risk that they will assume publishers\u2019 liabilities in the process.\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">\r\n<p style=\"text-align: center\"><strong>THE CDA AND DISCRIMINATION<\/strong><\/p>\r\n<span style=\"font-family: inherit;font-size: inherit\">The \u201cGood Samaritan\u201d clause envisioned a sharp line between \u201cservice providers\u201d (which got immunity) and \u201ccontent providers\u201d (which did not). But as the technology world evolved, the distinction became fuzzy. A room- mate-matching service was sued in California, on the basis that it invited users to discriminate by categorizing their roommate preferences (women only, for example). A court ruled that the operators of the web site were immune as service providers. An appeals court reversed the decision, on the basis that the web site became a content provider by filtering the information applicants provided\u2014people seeking female roommates would not learn about men looking for roommates. There was nothing wrong with that, but the principle that the roommate service had blanket protection, under the CDA, to filter as it wished would mean that with equal impunity, it could\u00a0 ask about racial preferences and honor them. That form of discrimination would be illegal in newspaper ads. \u201cWe doubt,\u201d wrote the appeals court judge, \u201cthis is what Congress had in mind when it passed the CDA.\u201d<\/span><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nOr as little as they choose, as Ken Zeran learned to his sorrow a few years later.\u00a0The worst terrorist attack in history on U.S. soil prior to the 2001 destruction of New York\u2019s World Trade Center was the bombing of the Alfred P. Murrah Federal building in Oklahoma City on April 19, 1995. 168 people were killed, some of them children in a day care center. Hundreds more were injured when the building collapsed around them and glass and rubble rained down on the neighborhood. One man who made it out alive likened the event to the detonation of an atomic bomb.\r\n\r\nLess than a week later, someone with screen name \u201cKen ZZ03\u201d posted an advertisement on an America On Line (AOL) bulletin board. Ken had \u201cNaughty Oklahoma T-Shirts\u201d for sale. Among the available slogans were \u201cVisit Oklahoma\u2014it\u2019s a Blast\u201d and \u201cRack\u2019em, Stack\u2019em, and Pack\u2019em\u2014Oklahoma 1995.\u201d Others were even cruder and more tasteless. To get your T-shirt, said the ads, you should call Ken. The posting gave Ken\u2019s phone number.\r\n\r\nThe number belonged to Ken Zeran, an artist and filmmaker in Seattle, Washington. Zeran had nothing to do with the posting on AOL. It was a hoax.\r\n\r\nKen Zeran started to receive calls. Angry, insulting calls. Then death threats.\r\n\r\nZeran called AOL and asked them to take down the posting and issue a retraction. An AOL employee promised to take down the original posting, but said retractions were against company policy.\r\n\r\nThe next day, an anonymous poster with a slightly different screen name offered more T-shirts for sale, with even more offensive slogans.\r\n\r\nCall Ken. And by the way\u2014there\u2019s high demand. So if the phone is busy, call back.\r\n\r\nZeran kept calling AOL to ask that the postings be removed and that further postings be prevented. AOL kept promising to close down the accounts and remove the postings, but didn\u2019t. By April 30, Ken was receiving a phone call every two minutes. Ken\u2019s art business depended on that phone number\u2014 he couldn\u2019t change it or fail to answer it, without losing his livelihood.\r\n\r\nAbout this time, Shannon Fullerton, the host of a morning drive-time radio talk show on KRXO in Seattle, received by email a copy of one of the postings. Usually his show was full of light-hearted foolishness, but after the bombing, Fullerton and his radio partner had devoted several shows to sharing community grief about the Oklahoma City tragedy. Fullerton read Ken\u2019s T-shirt slogans over the air. And he read Ken\u2019s telephone number and told his listeners to call Ken and tell him what they thought of him.\r\n\r\nZeran got even more calls, and more death threats. Fearing for his safety, he obtained police surveillance of his home. Most callers were not interested\u00a0in hearing what Ken had to say when he answered the phone, but he managed to keep one on the line long enough to learn about the KRXO broadcast. Zeran contacted the radio station. KRXO issued a retraction, after which the number of calls Ken received dropped to fifteen per day. Eventually, a newspaper exposed the hoax. AOL finally removed the postings, after leaving them visible for a week. Ken\u2019s life began to return to normal.\r\n\r\n&nbsp;\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">\r\n<p style=\"text-align: center\"><strong>WAS THE RADIO STATION LIABLE?<\/strong><\/p>\r\nZeran sued the radio station separately, but failed in that effort as well. Much as he may have suffered, reasoned the court, it wasn\u2019t defamation, because none of the people who called him even knew who Ken Zeran was so his reputation couldn\u2019t possibly have been damaged when the radio station spoke ill of \u201cKen\u201d!<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nZeran sued AOL, claiming defamation, among other things. By putting up the postings, and leaving them up long after it had been informed that they were false, AOL had damaged him severely.\r\n\r\nThe decision went against Zeran, and the lower court\u2019s decision held up on appeal. AOL certainly had behaved like a publisher, by communicating the postings in the first place and by choosing not to remove them when informed that they were fraudulent. Unlike the defendant in the Cubby v. CompuServe case, AOL knew exactly what it was publishing. But the Good Samaritan provision of the CDA specifically stated that AOL should not legally be treated as a publisher. AOL had no liability for Zeran\u2019s woes.\r\n\r\nZeran\u2019s only recourse was to identify the actual speaker, the pseudonymous Ken ZZ03 who made the postings. And AOL would not help him do that. Everyone felt sorry for Ken, but the system gave him no help.\r\n\r\nThe posters could evade responsibility as long as they remained anonymous, as they easily could on the Internet. And Congress had given the ISPs a complete waiver of responsibility for the consequences of false and damaging statements, even when the ISP knew they were false. Had anyone in Congress thought through the implications of the Good Samaritan clause?\r\n<div>\r\n<h2>Laws of Unintended Consequences<\/h2>\r\nThe Good Samaritan provision of the CDA has been the friend of free speech, and a great relief to Internet Service Providers. Yet its application has defied logical connection to the spirit that created it.\r\n\r\n<\/div>\r\nSidney Blumenthal was a Clinton aide whose job it was to dish dirt on the president\u2019s enemies. On August 11, 1997, conservative online columnist Matt Drudge reported, \u201cSidney Blumenthal has a spousal abuse past that has been effectively covered up.\u201d The White House denied it, and the next day Drudge withdrew the claim. The Blumenthals sued AOL, which had a deal with Drudge. And had deeper pockets\u2014the Blumenthals asked for $630,000,021. AOL was as responsible for the libel as Drudge, claimed the Blumenthals, because AOL could edit what Drudge supplied. AOL could even insist that Drudge delete items AOL did not want posted. The court sided with AOL, and cited the Good Samaritan clause of the CDA. AOL couldn\u2019t be treated like a publisher, so it couldn\u2019t be held liable for Drudge\u2019s falsehoods. Case closed.\r\n\r\nEven\u00a0 more\u00a0 strangely, the Good\u00a0<span style=\"font-size: 1rem;text-align: initial\">Samaritan clause of the Communications Decency Act has been used to protect an ISP whose chat room was being used to peddle child pornography.<\/span>\r\n<div>\r\n\r\nIn 1998, Jane and John Doe, a mother and her minor son, sued AOL for harm inflicted on the son. The Does alleged that AOL chat rooms were used to sell porno<span style=\"font-size: 1rem;text-align: initial\">graphic images of the boy made when he was 11 years old. They claimed that in 1997, Richard Lee Russell had lured John and two other boys to engage in sexual activities with each other and with Russell. Russell then used AOL chat rooms to market photographs and videotapes of these sexual encounters.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nJane Doe complained to AOL. Under the terms of its agreement with its users, AOL specifically reserved the right to terminate the service of anyone engaged in such improper activities. And yet AOL did not suspend Russell\u2019s service, or even warn him to stop what he was doing. The Does wanted compensation from AOL for its role in John Doe\u2019s sexual abuse.\r\n\r\nThe Does lost. Citing the Good Samaritan clause, and the precedent of the Zeran decision, the Florida courts held AOL blameless. Online service providers who knowingly allow child pornography to be marketed on their bulletin boards could not be treated as though they had published ads for kiddie porn.\r\n\r\nThe Does appealed and lost again. The decision in AOL\u2019s favor was 4-3 at the Florida Supreme Court. Judge J. Lewis fairly exploded in his dissenting opinion.\r\n<blockquote>The Good Samaritan clause was an attempt to remove disincentives from the development of filtering and blocking technologies, which would assist parents in their efforts to protect children. \u201c[I]t is inconceivable that Congress intended the CDA to shield from potential liability an ISP alleged to have taken absolutely no actions to curtail illicit activities \u2026 while profiting\u00a0<span style=\"font-size: 1rem;text-align: initial\">from its customer\u2019s continued use of the service.\u201d The law had been transformed into one \u201cwhich both condones and exonerates a flagrant and reprehensible failure to act by an ISP in the face of \u2026 material unquestionably harmful to children.\u201d This made no sense. The sequence of decisions \u201cthrusts Congress into the unlikely position of having enacted legislation that encourages and protects the involvement of ISPs as silent partners in criminal enterprises for profit.\u201d<\/span><\/blockquote>\r\n<\/div>\r\nThe problem, as Judge Lewis saw it, was that it wasn\u2019t enough to say that ISPs were not like publishers. They really were more like distributors\u2014as Ken Zeran had tried to argue\u2014and distributors are not entirely without responsibility for what they distribute. A trucker who knows he is carrying child pornography, and is getting a cut of the profits, has some legal liability for his complicity in illegal commerce. His role is not that of a publisher, but it is not nothing either. The Zeran court had created a muddle by using the wrong analogy. Congress had made the muddle possible by saying nothing about the right analogy after saying that publishing was the wrong one.\r\n<div>\r\n<h2>Can the Internet Be Like a Magazine Store?<\/h2>\r\nAfter the display provision of the CDA was ruled unconstitutional in 1997, Congress went back to work to protect America\u2019s children. The Child Online Protection Act (COPA), passed into law in 1998, contained many of the key elements of the CDA, but sought to avoid the CDA\u2019s constitutional problems by narrowing it. It applied only to \u201ccommercial\u201d speech, and criminalized knowingly making available to minors \u201cmaterial harmful to minors.\u201d For the purposes of this law, a \u201cminor\u201d was anyone under 17. The statute extended the Miller Test for obscenity to create a definition of material that was not obscene but was \u201charmful to minors:\u201d\r\n<blockquote>The term \u201cmaterial that is harmful to minors\u201d means any communication \u2026 that \u2014 (A) the average person, applying contemporary community standards, would find, taking the material as a whole and with respect to minors, is designed to appeal to \u2026 the prurient interest; (B) depicts, describes, or represents, in a manner patently offensive with respect to minors, \u2026 [a] sexual act, or a lewd exhibition of the genitals or post-pubescent female breast; and (C) taken as a whole, lacks serious literary, artistic, political, or scientific value for minors.<\/blockquote>\r\n<\/div>\r\n<div>\r\n\r\nCOPA was challenged immediately and never took effect. A federal judge enjoined the government from enforcing it, ruling that it was likely to be unconstitutional. The matter bounced between courts through two presidencies. The case started out as ACLU v. Reno, for a time was known as ACLU v. Ashcroft, and was decided as ACLU v. Gonzalez. The judges were uniformly sympathetic to the intent of Congress to protect children from material they should not see. But in March 2007, the ax finally fell on COPA. Judge Lowell A. Reed, Jr., of U.S. District Court for the Eastern District of Pennsylvania, confirmed that the law went too far in restricting speech.\r\n\r\nPart of the problem was with the vague definition of material \u201charmful to minors.\u201d The prurient interests of a 16-year-old were not the same as those of an 8-year-old; and what had literary value for a teenager might be value- less for a younger child. How would a web site designer know which standard he should use to avoid the risk of imprisonment?\r\n\r\nBut there was an even more basic problem. COPA was all about keeping away from minors material that would be perfectly legal for adults to have. It put a burden on information distributors to ensure that recipients of such information were of age. COPA provided a \u201csafe harbor\u201d against prosecution for those who in good faith checked the ages of their customers. Congress imagined a magazine store where the clerks wouldn\u2019t sell dirty magazines to children who could not reach the countertop, and might ask for identification of any who appeared to be of borderline age. The law envisioned that some- thing similar would happen in Cyberspace:\r\n<blockquote>It is an affirmative defense to prosecution under this section that the defendant, in good faith, has restricted access by minors to material that is harmful to minors (A) by requiring use of a credit card, debit account, adult access code, or adult personal identification number; (B) by accepting a digital certificate that verifies age; or (C) by any other reasonable measures that are feasible under available technology.<\/blockquote>\r\nThe big problem was that these methods either didn\u2019t work or didn\u2019t even exist. Not every adult has a credit card, and credit card companies don\u2019t want their databases used to check customers\u2019 ages. And if you don\u2019t know what is meant by an \u201cadult personal identification number\u201d or a \u201cdigital certificate that verifies age,\u201d don\u2019t feel badly\u2014neither do we. Clauses (B) and (C) were basically a plea from Congress for the industry to come up with some technical magic for determining age at a distance.\r\n\r\n<\/div>\r\n<div>\r\n\r\nIn the state of the art, however, computers can\u2019t reliably tell if the party on the other end of a communications link is human or is another computer. For a computer to tell whether a human is over or under the age of 17, even imperfectly, would be very hard indeed. Mischievous 15-year-olds could get around any simple screening system that could be used in the home. The Internet just isn\u2019t like a magazine store.\r\n\r\nEven if credit card numbers or personal identification systems could distinguish children from adults, Judge Reed reasoned, such methods would intimidate computer users. Fearful of identity theft or government surveil- lance, many computer users would refuse interrogation and would not reveal personal identifying information as the price for visiting web sites deemed \u201charmful to minors.\u201d The vast electronic library would, in practice, fall into disuse and start to close down, just as an ordinary library would become use- less if everyone venturing beyond the children\u2019s section had to endure a background check.\r\n\r\nCongress\u2019s safe harbor recommendations, concluded Judge Reed, if they worked at all, would limit Internet speech drastically. Information adults had a right to see would, realistically, become unavailable to them. The filtering technologies noted when the CDA was struck down had improved, so the government could not credibly claim that limiting speech was the only possible approach to protecting children. And even if the free expression concerns were calmed or ignored, and even if everything COPA suggested worked perfectly, plenty of smut would still be available to children. The Internet was borderless, and COPA\u2019s reach ended at the U.S. frontier. COPA couldn\u2019t stop the flood of harmful bits from abroad.\r\n\r\nSumming up, Reed quoted the thoughts of Supreme Court Justice Kennedy about a flag-burning case. \u201cThe hard fact is that sometimes we must make decisions we do not like. We make them because they are right, right in the sense that the law and the Constitution, as we see them, compel the result.\u201d Much as he was sympathetic to the end of protecting children from harmful communications, Judge Reed concluded, \u201cperhaps we do the minors of this country harm if First Amendment protections, which they will with age inherit fully, are chipped away in the name of their protection.\u201d\r\n<h2>Let Your Fingers Do the Stalking<\/h2>\r\nNewsgroups for sharing sexual information and experiences started in the early 1980s. By the mid-90s, there were specialty sites for every orientation and inclination. So when a 28-year-old woman entered an Internet chat room\u00a0<span style=\"font-size: 1rem;text-align: initial\">in 1998 to share her sexual fantasies, she was doing nothing out of the ordinary. She longed to be assaulted, she said, and invited men reading her email to make her fantasy a reality. \u201cI want you to break down my door and rape me,\u201d she wrote.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nWhat was unusual was that she gave her name and address\u2014and instructions about how to get past her building\u2019s security system. Over a period of several weeks, nine men took up her invitation and showed up at her door, often in the middle of the night. When she sent them away, she followed up with a further email to the chat room, explaining that her rejections were just part of the fantasy.\r\n\r\nIn fact, the \u201cwoman\u201d sending the emails was Gary Dellapenta, a 50-year- old security guard whose attentions the actual woman had rebuffed. The victim of this terrifying hoax did not even own a computer. Dellapenta was caught because he responded directly to emails sent to entrap him. He was convicted and imprisoned under a recently enacted California anti- \u201ccyber- stalking\u201d statute. The case was notable not because the events were unusual, but because it resulted in a prosecution and conviction. Most victims are not so successful in seeking redress. Most states lacked appropriate laws, and most victims could not identify their stalkers. Sometimes the stalker did not even know the victim\u2014but simply found her contact information somewhere in Cyberspace.\r\n\r\nSpeeches and publications with frightening messages have long received First Amendment protections in the U.S., especially when their subject is political. Only when a message is likely to incite \u201cimminent lawless action\u201d (in the words of a 1969 Supreme Court decision) does speech become illegal\u2014 a test rarely met by printed words. This high threshold for government intervention builds on a \u201cclear and present danger\u201d standard explained most eloquently by Justice Louis Brandeis in a 1927 opinion. \u201cFear of serious injury cannot alone justify suppression of free speech \u2026. No danger flowing from speech can be deemed clear and present, unless the incidence of the evil apprehended is so imminent that it may befall before there is opportunity for full discussion.\u201d\r\n\r\nCourts apply the same standard to web sites. An anti-abortion group listed the names, addresses, and license plate numbers of doctors performing abortions on a web site called the \u201cNuremberg Files.\u201d It suggested stalking the doctors, and updated the site by graying out the names of those who had been wounded and crossing off those who had been murdered. The web site\u2019s creators acknowledged that abortion was legal, and claimed not to be threatening anyone, only collecting dossiers in the hope that the doctors could at some point in the future be held accountable for \u201ccrimes against humanity.\u201d\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe anti-abortion group was taken to court in a civil action. After a long legal process, the group was found liable for damages because \u201ctrue threats of violence were made with the intent to intimidate.\u201d\r\n\r\nThe courts had a very difficult time with the question of whether the Nuremberg Files web site was threatening or not, but there was nothing intrinsic to the mode of publication that complicated that decision. In fact, the same group had issued paper \u201cWANTED\u201d posters, which were equally part of the materials at issue. Reasonable jurists could, and did, come to different conclusions about whether the text on the Nuremberg Files web site met the judicial threshold.\r\n\r\nBut the situation of Dellapenta\u2019s victim, and other women in similar situations, seemed to be different. The scores being settled at their expense had no political dimensions. There were already laws against stalking and telephone harassment; the Internet was being used to recruit proxy stalkers and harassers. Following the lead of California and other states, Congress passed a federal anti-cyberstalking law.\r\n<h2>Like an Annoying Telephone Call?<\/h2>\r\nThe \u201c2005 Violence Against Women and Department of Justice Reauthorization Act\u201d (signed into law in early 2006) assigned criminal penalties to any- one who \u201cutilizes any device or software that can be used to originate telecommunications or other types of communications that are transmitted, in whole or in part, by the Internet \u2026 without disclosing his identity and with intent to annoy, abuse, threaten, or harass any person\u2026.\u201d The clause was little noticed when the Act was passed in the House on a voice vote and in the Senate unanimously.\r\n\r\nCivil libertarians again howled, this time about a single word in the legislation. It was fine to outlaw abuse, threats, and harassment by Internet. Those terms had some legal history. Although it was not always easy to tell whether the facts fit the definitions, at least the courts had standards for judging what these words meant.\r\n\r\nBut \u201cannoy\u201d? People put lots of annoying things on web sites and say lots of annoying things in chat rooms. There is even a web site, annoy.com, devoted to posting annoying political messages anonymously. Could Congress really have intended to ban the use of the Internet to annoy people?\r\n\r\nCongress had extended telephone law to the Internet, on the principle that harassing VoIP calls should not receive more protection than harassing land- line telephone calls. In using broad language for electronic communications,\u00a0<span style=\"font-size: 1rem;text-align: initial\">however, it created another in the series of legal muddles about the aptness of a metaphor.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe Telecommunications Act of 1934 made it a criminal offense for any- one to make \u201ca telephone call, whether or not conversation ensues, without disclosing his identity and with intent to annoy, abuse, threaten, or harass any person at the called number.\u201d In the world of telephones, the ban posed no threat to free speech, because a telephone call is one-to-one communication. If the person you are talking to doesn\u2019t want to listen, your free speech rights are not infringed. The First Amendment gives you no right to be sure anyone in particular hears you. If your phone call is unwelcome, you can easily find another forum in which to be annoying. The CDA, in a clause that was not struck down along with the display provisions, extended the prohibition to faxes and emails\u2014still, basically, person-to-person communications. But harassing VoIP calls were not criminal under the Telecommunications Act. In an effort to capture all telephone-like technologies under the same regulation, the same clause was extended to all forms of electronic communication, including the vast \u201celectronic library\u201d and \u201cmost participatory form of mass speech\u201d that is the Internet.\r\n\r\nDefenders of the law assured alarmed bloggers that \u201cannoying\u201d sites would not be prosecuted unless they also were personally threatening, abusive, or harassing. This was an anti-cyberstalking provision, they argued, not a censorship law. Speech protected by the First Amendment would certainly be safe. Online publishers, on the other hand, were reluctant to trust prosecutors\u2019 judgment about where the broadly written statute would be applied. And based on the bizarre and unexpected uses to which the CDA\u2019s Good Samaritan provisions had been put, there was little reason for confidence that the legislative context for the law would restrict its application to one corner of Cyberspace.\r\n\r\nThe law was challenged by The Suggestion Box, which describes itself as helping people send anonymous emails for reasons such as to \u201creport sensitive information to the media\u201d and to \u201csend crime tips to law enforcement agencies anonymously.\u201d The law, as the complaint argued, might criminalize the sort of employee whistle-blowing that Congress encouraged in the after- math of scandals about corporate accounting practices. The Suggestion Box dropped its challenge when the Government stated that mere annoyances would not be prosecuted, only communications meant \u201cto instill fear in the victim.\u201d So the law is in force, with many left wishing that Congress would be more precise with its language!\r\n\r\nWhich brings us to the present. The \u201cannoyance\u201d clause of the Violence Against Women Act stands, but only because the Government says that it doesn\u2019t mean what it says. DOPA, with which this chapter began, remains\u00a0<span style=\"font-size: 1rem;text-align: initial\">stuck in Congress. Like the CDA and COPA, DOPA has worthy goals. The measures it proposes would, however, probably do more harm than good. In requiring libraries to monitor the computer use of children using sites such as MySpace, it would likely make those sites inaccessible through public libraries, while having little impact on child predators. The congressional sponsors have succumbed to a well-intentioned but misguided urge to control a social problem by restricting the technology that assists it.<\/span>\r\n\r\n<\/div>\r\n<h2>Digital Protection, Digital Censorship\u2014and Self-Censorship<\/h2>\r\nThe First Amendment\u2019s ban on government censorship complicates government efforts to protect the safety and security of U.S. citizens. Given a choice between protection from personal harm\u00a0and some fool\u2019s need to spout profanities, most of us would opt for safety. Security is immediate and freedom is long-term, and most people are short-range thinkers. And most people think of security as a personal thing, and gladly leave it to the government to worry about the survival of the nation.\r\n\r\nBut in the words of one scholar, the bottom line on the First Amendment is that \u201cin a society pledged to self-government, it is never true that, in the long run, the security of the nation is endangered by the freedom of the people.\u201d The Internet censorship bills have passed Congress by wide margins because members of Congress dare not be on record as voting against the safety of their constituents\u2014and especially against the safety of children. Relatively isolated from political pressure, the courts have repeatedly undone speech-restricting legislation passed by elected officials.\r\n\r\nFree speech precedes the other freedoms enumerated in the Bill of Rights, but not just numerically. In a sense, it precedes them logically as well. In the words of Supreme Court Justice Benjamin Cardozo, it is \u201cthe matrix, the indispensable condition, of nearly every other form of freedom.\u201d\r\n\r\nFor most governments, the misgivings about censoring electronic information are less profound.\r\n\r\nIn Saudi Arabia, you can\u2019t get to <a href=\"http:\/\/www.sex.com\/\">www.sex.com. <\/a>In fact, every web access in Saudi Arabia goes through government computers to make sure the URL isn\u2019t on the government\u2019s blacklist. In Thailand, <a href=\"http:\/\/www.stayinvisible.com\/\">www.stayinvisible.com <\/a>is blocked; that\u2019s a source of information about Internet privacy and tools to assist in anonymous web surfing. The disparity of information freedom standards between the U.S. and other countries creates conflicts when electronic transactions involve two nations. As discussed in Chapter 4, China insists that Google not help its citizens get information the government does not want them to have. If you try to get to certain web sites from your hotel room in Shanghai, you suddenly lose your Internet connection, with no explanation. You might think there was a glitch in the network somewhere, except that you can reconnect and visit other sites\u00a0<span style=\"font-size: 1rem;text-align: initial\">with no problems.<\/span>\r\n<div>\r\n\r\nSelf-censorship by Internet com- panies is also increasing\u2014the price they pay for doing business in certain countries. Thailand and Turkey blocked the video-sharing site YouTube after it carried clips lampooning (and, as those governments saw it, insulting) their current or former rulers. A Google official described censor- ship as the company\u2019s \u201cNo. 1 barrier to trade.\u201d Stirred by the potential costs in lost business and legal battles, Internet companies have become outspoken information libertarians, even as they do what must be done to meet the requirements of foreign governments. Google has even hired a Washington lobbyist to seek help from the U.S. government in its efforts to resist censorship abroad.\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">\r\n<p style=\"text-align: center\"><strong>I<\/strong><strong>NTERNET <\/strong><strong>F<\/strong><strong>REEDOM<\/strong><\/p>\r\nA great many organizations devote significant effort to maintaining the Internet\u2019s potential as a free marketplace of ideas. In addition to EFF, already mentioned earlier in this chapter, some others include: the Electronic Privacy Information Network, www.epic.org; The Free Expression Network, freeexpression.org, which is actually a coalition; the American Civil Liberties Union, www.aclu.org; and the Chilling Effects Clearinghouse, <a href=\"http:\/\/www.chillingeffects.org\/\">www.chillingeffects.org. <\/a>The OpenNet Initiative, opennet.net, monitors Internet censorship around the world. OpenNet\u2019s findings are presented in <em>Access Denied: The Practice and Policy of Global Internet Filtering<\/em>, by Ronald\u00a0<span style=\"font-family: inherit;font-size: inherit\">J. Deibert, John G. Palfrey, Rafal Rohozinski, and Jonathan Zittrain (eds.), MIT Press, 2008.<\/span><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nIt is easy for Americans to shrug their isolationist shoulders over such problems. As long as all the information is available in the U.S., one might reason, who cares what version of Google or YouTube runs in totalitarian regimes abroad? That is for those countries to sort out.\u00a0<span style=\"font-size: 1rem;text-align: initial\">But the free flow of information into the U.S. is threatened by the laws of other nations about the operation of the press. Consider the case of Joseph Gutnick and Barron\u2019s magazine.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nOn October 30, 2000, the financial weekly Barron\u2019s published an article suggesting that Australian businessman Joseph Gutnick was involved in money-laundering and tax evasion. Gutnick sued Dow Jones Co., the publisher of Barron\u2019s, for defamation. The suit was filed in an Australian court. Gutnick maintained that the online edition of the magazine, available in Australia for a fee, was in effect published in Australia. Dow Jones countered that the place of \u201cpublication\u201d of the online magazine was New Jersey, where its web servers were located. The suit, it argued, should have been brought in a U.S. court and judged by the standards of U.S. libel law, which are far more favorable to the free speech rights of the press. The Australian court agreed with Gutnick, and the suit went forward. Gutnick ultimately won an apology from Dow Jones and $580,000 in fines and legal costs.\r\n\r\nThe implications seem staggering. Americans on American soil expect to be able to speak very freely, but the Australian court claimed that the global Internet made Australia\u2019s laws applicable wherever the bits reaching Australian soil may have originated. The Amateur Action conundrum about what community standards apply to the borderless Internet had been translated to the world of global journalism. Will the freedom of the Internet press henceforth be the minimum applying to any of the nations of the earth? Is it possible that a rogue nation could cripple the global Internet press by extorting large sums of money from alleged defamers, or by imposing death sentences on reporters it claimed had insulted their leaders?\r\n\r\nThe American press tends to fight hard for its right to publish the truth, but the censorship problems reach into Western democracies more insidiously for global corporations not in the news business. It is sometimes easier for American companies to meet the minimum \u201cworld\u201d standards of information freedom than to keep different information available in the U.S. There may even be reasons in international law and trade agreements that make such accommodations to censorship more likely. Consider the trials of Yahoo! France.\r\n\r\nIn May 2000, the League Against Racism and Anti-Semitism (LICRA, in its French acronym) and the Union of French Jewish Students (UEJF) demanded to a French court that Yahoo! stop making Nazi paraphernalia available for online auction, stop showing pictures of Nazi memorabilia, and prohibit the dissemination of anti-Semitic hate speech on discussion groups available in France. Pursuant to the laws of France, where the sale and display of Nazi items is illegal, the court concluded that what Yahoo! was doing was an\u00a0<span style=\"font-size: 1rem;text-align: initial\">offense to the \u201ccollective memory\u201d of the country and a violation of Article R654 of the Penal Code. It told Yahoo! that the company was a threat to \u201cinternal public order\u201d and that it had to make sure no one in France could view such items.<\/span>\r\n\r\n<\/div>\r\nYahoo! removed the items from the yahoo.fr site ordinarily available in France. LICRA and UEJF then discovered that from within France, they could also get to the American site, yahoo.com, by slightly indirect means. Reaching across the ocean in a manner reminiscent of the Australian court\u2019s defamation action, the French court demanded that the offending items, images, and words be removed from the American web site as well.\r\n\r\nYahoo! resisted for a time, claiming it couldn\u2019t tell where the bits were going\u2014an assertion somewhat lacking in credibility since the company tended to attach French-language advertising to web pages if they were dis- patched to locations in France. Eventually, Yahoo! made a drastic revision of its standards for the U.S. site. Hate speech was prohibited under Yahoo\u2019s revised service terms with its users, and most of the Nazi memorabilia disappeared. But Nazi stamps and coins were still available for auction on the U.S. site, as were copies of Mein Kampf. In November 2000, the French court affirmed and extended its order: Mein Kampf could not be offered for sale in France. The fines were adding up.\r\n\r\nYahoo! sought help in U.S. courts. It had committed no crime in the U.S., it stated. French law could not leap the Atlantic and trump U.S. First Amendment protections. Enforcement of the French order would have a chilling effect on speech in the United States. A U.S. district court agreed, and the decision was upheld on appeal by a three-judge panel of the Court of Appeals for the Ninth Circuit (Northern California).\r\n\r\nBut in 2006, the full 11-member court of appeals reversed the decision and found against Yahoo!. The company had not suffered enough, according to the majority opinion, nor tried long enough to have the French change their\u00a0<span style=\"font-size: 1rem;text-align: initial\">minds, for appeal to First\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">Amendment protections to be appropriate. A dissenting opinion spoke plainly about what the court seemed to be doing. \u201cWe should not allow a foreign court order,\u201d wrote Judge William Fletcher, \u201cto be used as leverage to quash constitution- ally protected speech\u2026.\u201d<\/span>\r\n<div>\r\n\r\nSuch conflicts will be more common in the future, as more bits flow\u00a0<span style=\"font-size: 1rem;text-align: initial\">across national borders. The laws, trade agreements, and court decisions of the next few years, many of them regulating the flow of \u201cintellectual property,\u201d will shape the world of the future. It would be a sad irony if information liberty, so stoutly defended for centuries in the U.S., would fall in the twenty-first century to a combination of domestic child protection laws and international money-making opportunities. But as one British commentator said when the photo-hosting site Flickr removed photos to conform with orders from Singapore, Germany, Hong Kong, and Korea, \u201cLibertarianism is all very well when you\u2019re a hacker. But business is business.\u201d<\/span>\r\n\r\n<\/div>\r\nInformation freedom on the Internet is a tricky business. Technological changes happen faster than legal changes. When a technology shift alarms the populace, legislators respond with overly broad laws. By the time challenges have worked their way through the courts, another cycle of technology changes has happened, and the slow heartbeat of lawmaking pumps out another poorly drafted statute.\r\n\r\nThe technology of radio and television has also challenged the legislative process, but in a different way. In the broadcast world, strong commercial forces are arrayed in support of speech-restricting laws that have long since outgrown the technology that gave birth to them. We now turn to those changes in the radio world.\r\n\r\n&nbsp;\r\n<h1 style=\"text-align: center\">CHAPTER 8\r\nBits in the Air\r\n<em>Old Metaphors, New Technologies, and Free Speech<\/em><\/h1>\r\n<div>\r\n\r\nCensoring the President\r\n\r\nOn July 17, 2006, U.S. President George Bush and British Prime Minister Tony Blair were chatting at the G-8 summit in St. Petersburg, Russia. The event was a photo opportunity, but the two leaders did not realize that a microphone was on. They were discussing what the UN might do to quell the conflict between Israel and militant forces in Lebanon. \u201cSee the irony is,\u201d said Bush, \u201cwhat they need to do is get Syria to get Hezbollah to stop doing this shit and it\u2019s over.\u201d\r\n\r\nThe cable network CNN carried the clip in full and posted it on the Web, but most broadcast stations bleeped out the expletive. They were aware of the fines, as much as $325,000, that the Federal Communications Commission might impose for airing the word \u201cshit.\u201d\r\n\r\nThe FCC had long regulated speech over the public airways, but had raised its decency standards after the 2002 \u201cGolden Globes\u201d awards presentation. Singer Bono had won the \u201cBest Original Song\u201d award. In his acceptance speech, broadcast live on NBC, he said, \u201cThis is really, really, fucking brilliant.\u201d The FCC ruled that this remark was \u201cpatently offensive under contemporary community standards for the broadcast medium.\u201d It promised to fine and even pull the licenses of stations broadcasting such remarks.\r\n\r\nIn 2006, the Commission extended the principle from the F-word to the S-word. Nicole Richie, referring to a reality TV show on which she had done some farm work, said to Paris Hilton, \u201cWhy do they even call it The Simple Life? Have you ever tried to get cow shit out of a Prada purse? It\u2019s not so fucking simple.\u201d The FCC\u2019s ruling on Richie\u2019s use of the excrement metaphor implied that Bush\u2019s use would be \u201cpresumptively profane\u201d in the eyes of the FCC.\r\n\r\n<\/div>\r\nA federal court reversed the FCC\u2019s policy against such \u201cfleeting\u201d expletives\u2014an expansion of indecency policies that had been in place for decades. Congress quickly introduced legislation to restore the FCC\u2019s new and strict standard, and the whole matter was to be argued before the U.S. Supreme Court in the spring of 2008. The FCC had adopted its new standards after complaints about broadcast indecency rose from fewer than 50 to about 1.4 million in the period from 2000 to 2004. Congress may have thought that the new speech code reflected a public mandate.\r\n\r\nUnder the First Amendment, the government is generally not in the speech-restricting business. It can\u2019t force its editorial judgments on news- papers, even to increase the range of information available to readers. The Supreme Court struck down as unconstitutional a Florida law assuring political candidates a simple \u201cright to reply\u201d to newspaper attacks on them.\r\n\r\nNonetheless, in 2006, an agency of the federal government was trying to keep words off television, using rules that \u201cpresumptively\u201d covered even a candid conversation about war and peace between leaders of the free world. Dozens of newspapers printed Bush\u2019s remark in full, and anyone with an Internet connection could hear the audio. In spite of the spike in indecency complaints to the FCC, Americans are generally opposed to having the government nanny their television shows.\r\n<h2>How Broadcasting Became Regulated<\/h2>\r\nThe FCC gained its authority over what is said on radio and TV broadcasts when there were fewer ways to distribute information. The public airways were scarce, went the theory, and the government had to make sure they were used in the public interest. As radio and television became universally accessible, a second rationale emerged for government regulation of broadcast speech. Because the broadcast media have \u201ca uniquely pervasive presence in the lives of all Americans,\u201d as the Supreme Court put it in 1978, the government had a special interest in protecting a defenseless public from objection- able radio and television content.\r\n\r\nThe explosion in communications technologies has confused both rationales. In the digital era, there are far more ways for bits to reach the consumer, so broadcast radio and television are hardly unique in their pervasiveness.<span style=\"font-size: 1rem;text-align: initial\">With minimal technology, anyone can sit at home or in Starbucks and choose from among billions of web pages and tens of millions of blogs. Shock jock Howard Stern left broadcast radio for satellite radio, where the FCC has no authority to regulate what he says.<\/span>\r\n<div>\r\n\r\nMore than 90% of American televi<span style=\"font-size: 1rem;text-align: initial\">sion viewers get their TV signal through similarly unregulated cable or satellite, not through broadcasts from rooftop antennas. RSS feeds supply up-to-date information to millions of on-the-go cell phone<\/span><span style=\"font-size: 1rem;text-align: initial\">users. Radio stations and television channels are today neither scarce nor uniquely pervasive.<\/span>\r\n\r\n<\/div>\r\nFor the government to protect children from all offensive information arriving through any communication medium, its authority would have to be expanded greatly and updated continuously. Indeed, federal legislation has been introduced to do exactly that\u2014to extend FCC indecency regulations for broadcast media to satellite and cable television as well.\r\n\r\nThe explosion in communications raises another possibility, however. If almost anyone can now send information that many people can receive, per- haps the government\u2019s interest in restricting transmissions should be less than what it once was, not greater. In the absence of scarcity, perhaps the government should have no more authority over what gets said on radio and TV than it does over what gets printed in newspapers. In that case, rather than expanding the FCC\u2019s censorship authority, Congress should eliminate it entirely, just as the Supreme Court ended Florida\u2019s regulation of newspaper content.\r\n\r\nParties who already have spots on the radio dial and the TV channel lineup respond that the spectrum\u2014the public airwaves\u2014should remain a limited resource, requiring government protection. No one is making any more radio spectrum, goes the theory, and it needs to be used in the public interest.\r\n\r\nBut look around you. There are still only a few stations on the AM and FM radio dials. But thousands, maybe tens of thousands, of radio communications are passing through the air around you. Most Americans walk around with two-way radios in their pockets\u2014devices we call cell phones\u2014and most of the nation\u2019s teenagers seem to be talking on them simultaneously. Radios and television sets could be much, much smarter than they now are and could make better use of the airwaves, just as cell phones do.\r\n\r\nEngineering developments have vitiated the government\u2019s override of the First Amendment on radio and television. The Constitution demands, under these changed circumstances, that the government stop its verbal policing.\r\n\r\nAs a scientific argument, the claim that the spectrum is necessarily scarce is now very weak. Yet that view is still forcefully advanced by the very industry that is being regulated. The incumbent license holders\u2014existing broadcast stations and networks\u2014have an incentive to protect their \u201cturf\u201d in the spectrum against any risk, real or imagined, that their signals might be corrupted. By deterring technological innovation, incumbents can limit competition and avoid capital investments. These oddly intertwined strands\u2014the government\u2019s interest in artificial scarcity to justify speech regulation\u00a0and the incumbents\u2019 interest in artificial scarcity to limit competition and costs\u2014today impair both cultural and technological creativity, to the detriment of society.\r\n\r\nTo understand the confluent forces that have created the world of today\u2019s radio and television censorship, we have to go back to the inventors of the technology.\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">\r\n<p style=\"text-align: center\"><strong>S<\/strong><strong>URVIVING\u00a0 ON <\/strong><strong>W<\/strong><strong>IRELESS<\/strong><\/p>\r\nA dramatic example of the pervasiveness of wireless networks, in spite of the limits on spectrum where they are allowed to operate, was provided in the aftermath of the destruction of the World Trade Center on September 11, 2001.<span style=\"font-family: inherit;font-size: inherit\">Lower Manhattan communicated for several days largely on the strength of wireless. Something similar happened after the December 2006 earthquake that severed undersea communications cables in southeast Asia.<\/span><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<span style=\"color: #077fab;font-size: 1.15em;font-weight: 600\">From Wireless Telegraph to Wireless Chaos<\/span>\r\n<div>\r\n\r\nRed, orange, yellow, green, blue\u2014the colors of the rainbow\u2014are all different and yet are all the same. Any child with a crayon box knows that they are all different. They are the same because they are all the result of electromagnetic radiation striking our eyes. The radiation travels in waves that oscillate very quickly. The only physical difference between red and blue is that red waves oscillate around 450,000,000,000,000 times per second, and blue waves about 50% faster.\r\n\r\nBecause the spectrum of visible light is continuous, an infinity of colors exists between red and blue. Mixing light of different frequencies creates other colors\u2014for example, half blue waves and half red creates a shade of pink known as magenta, which does not appear in the rainbow.\r\n\r\nIn the 1860s, British physicist James Clerk Maxwell realized that light consists of electromagnetic waves. His equations predicted that there might be waves of other frequencies\u2014waves that people couldn\u2019t sense. Indeed, such\u00a0<span style=\"font-size: 1rem;text-align: initial\">waves have been passing right through us from the beginning of time. They shower down invisibly from the sun and the stars, and they radiate when lightning strikes. No one suspected they existed until Maxwell\u2019s equations said they should. Indeed, there should be a whole spectrum of invisible waves of different frequencies, all traveling at the same great speed as visible light. In 1887, the radio era began with a demonstration by Henrich Hertz. He bent a wire into a circle, leaving a small gap between the two ends. When he set off a big electric spark a few feet away, a tiny spark jumped the gap of the almost-completely-circular wire. The big spark had set off a shower of unseen electromagnetic waves, which had traveled through space and caused electric current to flow in the other wire. The tiny spark was the current completing the circuit. Hertz had created the first antenna, and had revealed the radio waves that struck it. The unit of frequency is named in his honor: One cycle per second is 1 hertz, or Hz for short. A kHz (kilohertz) is a thousand cycles per second, and a MHz (megahertz) is a million cycles per second. These are the units on the AM and FM radio dials.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nGugliemo Marconi was neither a mathematician nor a scientist. He was an inventive tinkerer. Only 13 years old at the time of Hertz\u2019s experiment, Marconi spent the next decade developing, by trial and error, better ways of creating bursts of radio waves, and antennas for detecting them over greater distances.\r\n\r\nIn 1901, Marconi stood in Newfoundland and received a single Morse code letter transmitted from England. On the strength of this success, the Marconi Wireless Telegraph Company was soon enabling ships to communicate with each other and with the shore. When the Titanic left on its fateful voyage in 1912, it was equipped with Marconi equipment. The main job of the ship\u2019s radio operators was to relay personal messages to and from passengers, but they also received at least 20 warnings from other ships about the icebergs that lay ahead.\r\n\r\nThe words \u201cWireless Telegraph\u201d in the name of Marconi\u2019s company suggest the greatest limitation of early radio. The technology was conceived as a device for point-to-point communication. Radio solved the worst problem of telegraphy. No calamity, sabotage, or war could stop wireless transmissions by severing cables. But there was a compensating disadvantage: Anyone could listen in. The enormous power of broadcasting to reach thousands of people at once was at first seen as a liability. Who would pay to send a message to another person when anyone could hear it?\r\n\r\nAs wireless telegraphy became popular, another problem emerged\u2014one that has shaped the development of radio and television ever since. If several people were transmitting simultaneously in the same geographic area, their\u00a0<span style=\"font-size: 1rem;text-align: initial\">signals couldn\u2019t be kept apart. The Titanic disaster demonstrated the confusion that could result. The morning after the ship hit the iceberg, American newspapers reported excitedly that all passengers had been saved and the ship was being towed to shore. The mistake resulted from a radio operator\u2019s garbled merger of two unrelated segments of Morse code. One ship inquired if \u201call Titanic passengers safe?\u201d A completely different ship reported that it was \u201c300 miles west of the Titanic and towing an oil tank to Halifax.\u201d All the ships had radios and radio operators. But there were no rules or conventions about whether, how, or when to use them.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nListeners to Marconi\u2019s early transmitters were easily confused because they had no way to \u201ctune in\u201d a particular communication. For all of Marconi\u2019s genius in extending the range of transmission, he was using essentially Hertz\u2019s method for generating radio waves: big sparks. The sparks splattered electromagnetic energy across the radio spectrum. The energy could be stopped and started to turn it into dots and dashes, but there was nothing else to control. One radio operator\u2019s noise was like any other\u2019s. When several transmitted simultaneously, chaos resulted.\r\n\r\nThe many colors of visible light look white if all blended together. A color filter lets through some frequencies of visible light but not others. If you look at the world through a red filter, everything is a lighter or darker shade of red, because only the red light comes through. What radio needed was something similar for the radio spectrum: a way to produce radio waves of a single frequency, or at least a narrow range of frequencies, and a receiver that could let through those frequencies and screen out the rest. Indeed, that technology already existed.\r\n\r\nIn 1907, Lee De Forest patented a key technology for the De Forest Radio Telephone Company\u2014dedicated to sending voice and even music over the radio waves. When he broadcast Enrico Caruso from the Metropolitan Opera House on January 13, 1910, the singing reached ships at sea. Amateurs huddled over receivers in New York and New Jersey. The effect was sensational. Hundreds of amateur broadcasters sprang into action over the next few years, eagerly saying whatever they wanted, and playing whatever music they could, to anyone who happened to be listening.\r\n\r\nBut with no clear understanding\u00a0<span style=\"font-size: 1rem;text-align: initial\">about what frequencies to use, radio communication was a hit-or-miss affair. Even what the New York Times described as the \u201chomeless song waves\u201d of the Caruso broadcast clashed with\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">another station that, \u201cdespite all entreaties,\u201d insisted on broadcasting at the identical 350kHz frequency. Some people could \u201ccatch the ecstasy\u201d of Caruso\u2019s voice, but others got only some annoying Morse code: \u201cI took a beer just now.\u201d<\/span>\r\n\r\n<\/div>\r\n<h2>Radio Waves in Their Channels<\/h2>\r\nThe emerging radio industry could not grow under such conditions. Commercial interests complemented the concerns of the U.S. Navy about amateur interference with its ship communications. The Titanic disaster, although it owed little to the failures of radio, catalyzed government action. On May 12, 1912, William Alden Smith called for radio regulation on the floor of the U.S. Senate. \u201cWhen the world weeps together over a common loss\u2026,\u201d proclaimed the Senator, \u201cwhy should not the nations clear the sea of its conflicting idioms and wisely regulate this new\u00a0servant of humanity?\u201d\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">\r\n<p style=\"text-align: center\"><strong>H<\/strong><strong>IGH <\/strong><strong>F<\/strong><strong>REQUENCIES<\/strong><\/p>\r\nOver the years, technological improvements have made it possible to use higher and higher frequencies. Early TV was broadcast at what were then considered \u201cVery High Frequencies\u201d (VHF) because they were higher than AM radio. Technology improved again, and more stations appeared at \u201cUltra High Frequencies\u201d (UHF). The high- est frequency in commercial use today is 77GHz\u201477 gigahertz, that is, 77,000MHz. In general, high frequency signals fade with distance more than low signals, and are therefore mainly useful for localized or urban environments.\u00a0<span style=\"font-family: inherit;font-size: inherit\">Short waves correspond to high frequencies because all radio waves travel at the same speed, which is the speed of light.<\/span><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<div>\r\n\r\nThe Radio Act of 1912 limited broadcasting to license holders. Radio licenses were to be \u201cgranted by the Secretary of Commerce and Labor upon application therefor.\u201d In granting the license, the Secretary would stipulate the frequencies \u201cauthorized for use by the station for the prevention of interference and the hours for which the station is licensed for work.\u201d The Act reserved for government use the choice frequencies between about 200 and 500kHz, which permitted the clearest communications over long distances. Amateurs were pushed off to \u201cshort wave\u201d frequencies above 1500kHz, considered useless for technological reasons. The frequency 1000kHz was reserved for distress calls, and licensed stations were required to listen to it every 15 minutes (the one provision that\u00a0<span style=\"font-size: 1rem;text-align: initial\">might have helped the Titanic, since the radio operators of a nearby ship had gone off-duty and missed the Titanic\u2019s rescue pleas). The rest of the spectrum the Secretary could assign to commercial radio stations and private businesses. Emphasizing the nature of radio as \u201cwireless telegraphy,\u201d the Act made it a crime for anyone hearing a radio message to divulge it to anyone except its intended recipient.<\/span>\r\n\r\n<\/div>\r\nMuch has changed since 1912. The uses of radio waves have become more varied, the allocation of spectrum blocks has changed, and the range of usable frequencies has grown. The current spectrum allocation picture has grown into a dense, disorganized quilt, the product of decades of Solomonic FCC judgments (see Figure 8.1). But still, the U.S. government stipulates what parts of the spectrum can be used for what purposes. It prevents users from interfering with each other and with government communications by demanding that they broadcast at limited power and only at their assigned frequencies. As long as there weren\u2019t many radio stations, the implied\u00a0promise in the Act of 1912 that licenses would be granted \u201cupon application therefor\u201d caused no problems. With the gossip of the pesky amateurs pushed into remote radio territory, there was plenty of spectrum for commercial, military, and safety use.\r\n\r\n[caption id=\"attachment_478\" align=\"aligncenter\" width=\"432\"]<img class=\"wp-image-478 size-full\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05164304\/Image_009.png\" alt=\"\" width=\"432\" height=\"316\" \/> Source: www.ntia.doc.gov\/osmhome\/allochrt.pdf. FIGURE 8.1 Frequency allocation of the U.S. radio spectrum. The spectrum from 3kHz to 300GHz is laid out from left to right and top to bottom, with the scale 10 times denser in each successive row. For example, the large block in the second row is the AM radio dial, about 1MHz wide. The same amount of spectrum would be about .00002 of an inch wide in the bottom row.[\/caption]\r\n\r\n<div>\r\n\r\nWithin a decade, that picture had changed dramatically. On November 2, 1920, a Detroit station broadcast the election of Warren Harding as President of the United States, relaying to its tiny radio audience the returns it was receiving by telegraph. Radio was no longer just point-to-point communication. A year later, a New York station broadcast the World Series between the Giants and the Yankees, pitch by pitch. Sports broadcasting was born with a broadcaster drearily repeating the ball and strike information telephoned by a newspaper reporter at the ballpark.\r\n\r\nPublic understanding of the possibilities grew rapidly. The first five radio stations were licensed for broadcasting in 1921. Within a year, there were 670. The number of radio receivers jumped in a year from less than 50,000 to more than 600,000, perhaps a million. Stations using the same frequency in the same city divided up the hours of the day. As radio broadcasting became a profitable business, the growth could not go on forever.\r\n\r\nOn November 12, 1921, the New York City broadcast license of Intercity Radio Co. expired. Herbert Hoover, then the Secretary of Commerce, refused to renew it, on the grounds that there was no frequency on which Intercity could broadcast in the city\u2019s airspace without interfering with government or other private stations. Intercity sued Hoover to have its license restored, and won. Hoover, said the court, could choose the frequency, but he had no discretion to deny the license. As the congressional committee proposing the 1912 Radio Act had put it, the licensing system was \u201csubstantially the same as that in use for the documenting upward of 25,000 merchant vessels.\u201d The implied metaphor was that Hoover should keep track of the stations like ships in the ocean. He could tell them what shipping lanes to use, but he couldn\u2019t keep them out of the water.\r\n\r\nThe radio industry begged for order. Hoover convened a National Radio Conference in 1922 in an attempt to achieve consensus on new regulations before chaos set in. The spectrum was \u201ca great national asset,\u201d he said, and \u201cit becomes of primary public interest to say who is to do the broadcasting, under what circumstances, and with what type of material.\u201d \u201c[T]he large mass of subscribers need protection as to the noises which fill their instruments,\u201d and the airwaves need \u201ca policeman\u201d to detect \u201chogs that are endangering the traffic.\u201d\r\n\r\nHoover divided the spectrum from 550kHz to 1350kHz in 10kHz bands\u2014 called \u201cchannels,\u201d consistent with the nautical metaphor\u2014to squeeze in more stations. Empty \u201cguard bands\u201d were left on each side of allocated bands\u00a0<span style=\"font-size: 1rem;text-align: initial\">because broadcast signals inevitably spread out, reducing the amount of usable spectrum. Persuasion and voluntary compliance helped Hoover limit interference. As stations became established, they found it advantageous to comply with Hoover\u2019s prescriptions. Start-ups had a harder time breaking in. Hoover convinced representatives of a religious group that to warn of the coming apocalypse, they should buy time on existing stations rather than build one of their own. After all, their money would go farther that way\u2014in six months, after the world had ended, they would have no further use for a transmitter. Hoover\u2019s effectiveness made Congress complacent\u2014the system was working well enough without laws.<\/span>\r\n\r\n<\/div>\r\nBut as the slicing got finer, the troubles got worse. WLW and WMH in Cincinnati broadcast on the same frequency in 1924 until Hoover brokered a deal for three stations to share two frequencies in rotating time slots. Finally, the system broke down. In 1925, Zenith Radio Corporation was granted a license to use 930kHz in Chicago, but only on Thursday nights, only from 10 p.m. to midnight, and only if a Denver station didn\u2019t wish to broadcast then. Without permission, Zenith started broadcasting at 910kHz, a frequency that was more open because it had been ceded by treaty to Canada. Hoover fined Zenith; Zenith challenged Hoover\u2019s authority to regulate frequencies, and won in court. The Secretary then got even worse news from the U.S. Attorney General: The 1912 Act, drafted before broadcasting was even a concept, was so ambiguous that it probably gave Hoover no authority to regulate anything about broadcast radio\u2014frequency, power, or time of day.\r\n\r\nHoover threw up his hands. Anyone could start a station and choose a frequency\u2014there were 600 applications pending\u2014but in doing so, they were \u201cproceeding entirely at their own risk.\u201d The result was the \u201cchaos in the air\u201d that Hoover had predicted. It was worse than before the 1912 Act because so many more transmitters existed and they were so much more powerful. Stations popped up, jumped all over the frequency spectrum in search of open air, and turned up their transmission power to the maximum to drown out competing signals. Radio became virtually useless, especially in cities. Congress finally was forced to act.\r\n<h2>The Spectrum Nationalized<\/h2>\r\nThe premises of the Radio Act of 1927 are still in force. The spectrum has been treated as a scarce national resource ever since, managed by the government.\r\n\r\nThe purpose of the Act was to maintain the control of the United States over all the channels of \u2026 radio transmission; and to provide for the use of such channels, but not the ownership thereof, by individuals, firms, or corporations, for limited periods of time, under licenses granted by Federal authority\u2026. The public could use the spectrum, under conditions stipulated by the government, but could not own it.\r\n\r\nA\u00a0new authority, the Federal Radio Commission (FRC), made licensing decisions. The public had a qualified expectation that license requests would be granted: The licensing authority, if public convenience, interest, or necessity will be served thereby, \u2026 shall grant to any applicant therefor a station license\u2026. The Act recognized that demand for licenses could exceed the supply of spectrum. In case of competition among applicants, the licensing\u00a0authority shall make such a distribution of licenses, bands of frequency\u2026, periods of time for operation, and of power among the different States and communities as to give fair, efficient, and equitable radio service to each\u2026.\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">\r\n<p style=\"text-align: center\"><strong>THE \u201cRADIO COMMISSION\u201d GROWS<\/strong><\/p>\r\n<span style=\"font-family: inherit;font-size: inherit\">In 1934, the FRC\u2019s name was changed to the Federal Communications Commission\u2014the FCC\u2014 when telephone and telegraph regulation came under the Commission\u2019s oversight. When a separate chunk of radio spectrum was allocated for television, the FCC assumed authority over video broadcasts as well.<\/span><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nThe language about \u201cpublic convenience, interest, or necessity\u201d echoes Hoover\u2019s 1922 speech about a \u201cnational asset\u201d and the \u201cpublic interest.\u201d It is also no accident that this law was drafted as the Teapot Dome Scandal was cresting. Oil reserves on federal land in Wyoming had been leased to Sinclair Oil in 1923 with the assistance of bribes paid to the Secretary of the Interior. It took several years for Congressional investigations and federal court cases to expose the wrongdoing; the Secretary was eventually imprisoned. By early 1927, the fair use of national resources in the public interest was a major concern in the United States.\r\n\r\nWith the passage of the Act of 1927, the radio spectrum became federal land. International treaties followed, to limit interference near national borders. But within the U.S., just as Hoover had asked five years earlier, the federal government took control over who would be allowed to broadcast, which radio waves they could use\u2014and even what they could say.\r\n<h2>Goat Glands and the First Amendment<\/h2>\r\nThe Radio Act of 1927 stipulated that the FRC could not abridge free speech over the radio. Nothing in this Act shall be understood or construed to give the licensing authority the power of censorship\u2026, and no regulation or condition \u2026 shall interfere with the right of free speech by means of radio communications. Inevitably, a case would arise exposing the implicit conflict: On the one hand, the Commission had to use a public interest standard when granting and renewing licenses. On the other, it had to avoid censorship. The pivotal case was over the license for KFKB radio, the station of the Kansas goat-gland doctor, John Romulus Brinkley (see Figure 8.2). The wrath brought down on CBS in 2004 for showing a flash of Janet Jackson\u2019s breast\u2014 and which the networks feared if they broadcast Saving Private Ryan on\u00a0Veterans\u2019 Day or President Bush muttering to Tony Blair\u2014descends from the FCC\u2019s action against this classic American charlatan.\r\n\r\n[caption id=\"attachment_479\" align=\"aligncenter\" width=\"432\"]<img class=\"wp-image-479 size-full\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05164308\/Image_012.png\" alt=\"\" width=\"432\" height=\"408\" \/> FIGURE 8.2 A planted newspaper article about \u201cDr.\u201d Brinkley\u2019s goat-gland clinic. The doctor himself is shown at the left, holding the first baby named \u201cBilly,\u201d of course conceived after a goat-gland transplant. New York Evening Journal, September 11, 1926. Microfilm courtesy of the Library of Congress.[\/caption]\r\n\r\n<div>\r\n\r\nBrinkley, born in 1885, became a \u201cdoctor\u201d licensed to practice in Kansas by buying a degree from the Eclectic Medical University in Kansas City. He worked briefly as a medic for Swift &amp; Co., the meatpackers. In 1917, he set up his medical practice in Milford, a tiny town about 70 miles west of Topeka. One day, a man came for advice about his failing virility, describing himself as a \u201cflat tire.\u201d Drawing on his memory of goat behavior from his days at the slaughterhouse, Brinkley said, \u201cYou wouldn\u2019t have any trouble if you had a pair of those buck glands in you.\u201d \u201cWell, why don\u2019t you put \u2018em in?\u201d the patient asked. Brinkley did the transplant in a back room, and a business was born. Soon he was performing 50 transplants a month, at $750 per surgery. In time, he discovered that promising sexual performance was even more lucrative than promising fertility.\r\n\r\nAs a young man, Brinkley had worked at a telegraph office, so he knew the promise of communication technology. In 1923, he opened Kansas\u2019s first radio station, KFKB\u2014\u201cKansas First, Kansas Best\u201d radio, or sometimes \u201cKansas Folks Know Best.\u201d The station broadcast a mixture of country music, fundamentalist preaching, and medical advice from Dr. Brinkley himself. Listeners sent in their complaints, and the advice was almost always to buy some of Dr. Brinkley\u2019s mail-order patent medicines. \u201cHere\u2019s one from Tillie,\u201d went a typical segment. \u201cShe says she had an operation, had some trouble 10 years ago. I think the operation was unnecessary, and it isn\u2019t very good sense to have an ovary removed with the expectation of motherhood resulting there- from. My advice to you is to use Women\u2019s Tonic No. 50, 67, and 61. This com- bination will do for you what you desire if any combination will, after three months persistent use.\u201d\r\n\r\nKFKB had a massively powerful transmitter, heard halfway across the Atlantic. In a national poll, it was the most popular station in America\u2014with four times as many votes as the runner-up. Brinkley was receiving 3,000 letters a day and was a sensation throughout the plains states. On a good day, 500 people might show up in Milford. But the American Medical Association\u2014prompted by a competing local radio station\u2014objected to his quackery. The FRC concluded that \u201cpublic interest, convenience, or necessity\u201d would not be served by renewing the license. Brinkley objected that the cancellation was nothing less than censorship.\r\n\r\nAn appeals court sided with the FRC in a landmark decision. Censorship, the court explained, was prior restraint, which was not at issue in Brinkley\u2019s case. The FRC had \u201cmerely exercised its undoubted right to take note of appellant\u2019s past conduct.\u201d An arguable point\u2014as Albert Gallatin said more than 200 years ago about prior restraint of the press, it was \u201cpreposterous to say, that to punish a certain act was not an abridgment of the liberty of doing that act.\u201d\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe court used the public land metaphor in justifying the FRC\u2019s action. \u201c[B]ecause the number of available broadcasting frequencies is limited,\u201d wrote the court, \u201cthe commission is necessarily called upon to consider the character and quality of the service to be rendered\u2026. Obviously, there is no room in the broadcast band for every business or school of thought.\u201d\r\n\r\n\u201cNecessarily\u201d and \u201cobviously.\u201d It is always wise to scrutinize arguments that proclaim loudly how self-evident they are. Judge Felix Frankfurter, in an opinion on a different case in 1943, restated the principle in a form that has often been quoted. \u201cThe plight into which radio fell prior to 1927 was attributable to certain basic facts about radio as a means of communication\u2014its facilities are limited; they are not available to all who may wish to use them; the radio spectrum simply is not large enough to accommodate everybody. There is a fixed natural limitation upon the number of stations that can operate without interfering with one another.\u201d\r\n\r\nThese were facts of the technology of the time. They were true, but they were contingent truths of engineering. They were never universal laws of physics, and are no longer limitations of technology. Because of engineering innovations over the past 20 years, there is no practically significant \u201cnatural limitation\u201d on the number of broadcast stations. Arguments from inevitable scarcity can no longer justify U.S. government denials of the use of the airwaves.\r\n\r\nThe vast regulatory infrastructure, built to rationalize use of the spectrum by much more limited radio technology, has adjusted slowly\u2014as it almost inevitably must: Bureaucracies don\u2019t move as quickly as technological innovators. The FCC tries to anticipate resource needs centrally and far in advance. But technology can cause abrupt changes in supply, and market forces can cause abrupt changes in demand. Central planning works no better for the FCC than it did for the Soviet Union.\r\n\r\nMoreover, plenty of stakeholders in old technology are happy to see the rules remain unchanged. Like tenants enjoying leases on public land, incumbent radio license holders have no reason to encourage competing uses of the assets they control. The more money that is at stake, the greater the leverage of the profitable ventures. Radio licenses had value almost from the beginning, and as scarcity increased, so did price. By 1925, a Chicago license was sold for $50,000. As advertising expanded and stations bonded into networks, transactions reached seven figures. After the 1927 Act, disputes between stations had to be settled by litigation, trips to Washington, and pressure by friendly Congressional representatives\u2014all more feasible for stations with deep pockets. At first, there were many university stations, but the FRC squeezed them as the value of the airwaves went up. As non-profits, these stations could not hold their ground. Eventually, most educational stations\u00a0<span style=\"font-size: 1rem;text-align: initial\">sold out to commercial broadcasters. De facto, as one historian put it, \u201cwhile talking in terms of the public interest, \u2026 the commission actually chose to further the ends of the commercial broadcasters.\u201d<\/span>\r\n\r\n<\/div>\r\n<div>\r\n<h2>The Path to Spectrum Deregulation<\/h2>\r\nWhen you push a button on your key fob and unlock your car doors, you are a radio broadcaster. The signal from the key fob uses a bit of the spectrum. The key fob signal obeys the same basic physical laws as WBZ\u2019s radio broad- casts in Boston, which have been going on continuously since WBZ became the first Eastern commercial station in 1921. But the new radio broadcasts are different in two critical respects. There are hundreds of millions of them going on every day. And while WBZ\u2019s broadcast power is 50,000 watts, a key fob\u2019s is less than .0002 of a watt.\r\n\r\nIf the government still had to license every radio transmitter\u2014as Congress authorized in the aftermath of the radio chaos of the 1920s\u2014neither radio key fobs nor any of hundreds of other innovative uses of low-power radio could have come about. The law and the bureaucracy it created would have snuffed this part of the digital explosion.\r\n\r\nAnother development also lay behind the wireless explosion. Technology had to change so that the available spectrum could be used more efficiently. Digitalization and miniaturization changed the communications world. The story of cell phones and wireless Internet and many conveniences as yet unimagined is a knot of politics, technology, and law. You can\u2019t understand the knot without understanding the strands, but in the future, the strands need not remain tied up in the same way as they are today.\r\n<h2>From a Few Bullhorns to Millions of Whispers<\/h2>\r\nThirty years ago, there were no cell phones. A handful of business executives had mobile phones, but the devices were bulky and costly. Miniaturization helped change the mobile phone from the perk of a few corporate bigwigs into the birthright of every American teenager. But the main advance was in spectrum allocation\u2014in rethinking the way the radio spectrum was used.\r\n\r\nIn the era of big, clunky mobile phones, the radio phone company had a big antenna and secured from the FCC the right to use a few frequencies in an urban area. The executive\u2019s phone was a little radio station, which broad- cast its call. The mobile phone had to be powerful enough to reach the company\u2019s antenna, wherever in the city the phone might be located. The number of simultaneous calls was limited to the number of frequencies allocated to\u00a0<span style=\"font-size: 1rem;text-align: initial\">the company. The technology was the same as broadcast radio stations used, except that the mobile phone radios were two-way. The scarcity of spectrum, still cited today in limiting the number of broadcast channels, then limited the number of mobile phones. Hoover understood this way back in 1922. \u201cObviously,\u201d he said, \u201cif 10,000,000 telephone subscribers are crying through the air for their mates \u2026 the ether will be filled with frantic chaos, with no communication of any kind possible.\u201d<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nCellular technology exploits Moore\u2019s Law. Phones have become faster, cheaper, and smaller. Because cell phone towers are only a mile or so apart, cell phones need only be powerful enough to send their signals less than a mile. Once received by an antenna, the signal is sent on to the cell phone company by \u201cwireline\u201d\u2014i.e., by copper or fiber optic cables on poles or under- ground. There need be only enough radio spectrum to handle the calls within the \u201ccell\u201d surrounding a tower, since the same frequencies can be used simultaneously to handle calls in other cells. A lot of fancy dancing has to be done to prevent a call from being dropped as an active phone is carried from cell to cell, but computers, including the little computers inside cell phones, are smart and fast enough to keep up with such rearrangements.\r\n\r\nCell phone technology illustrates an important change in the use of radio spectrum. Most radio communications are now over short distances. They are transmissions between cell phone towers and cell phones. Between wireless routers at Starbucks and the computers of coffee drinkers. Between cordless telephone handsets and their bases. Between highway toll booths and the transponders mounted on commuters\u2019 windshields. Between key fobs with buttons and the cars they unlock. Between Wii remotes and Wii game machines. Between iPod transmitters plugged into cars\u2019 cigarette lighters and the cars\u2019 FM radios.\r\n\r\nEven \u201csatellite radio\u201d transmissions often go from a nearby antenna to a customer\u2019s receiver, not directly from a satellite orbiting in outer space. In urban areas, so many buildings lie between the receiver and the satellite that the radio companies have installed \u201crepeaters\u201d\u2014antennas connected to each other by wireline. When you listen to XM or Sirius in your car driving around a city, the signal is probably coming to you from an antenna a few blocks away.\r\n\r\n<\/div>\r\n<div>\r\n\r\nThe radio spectrum is no longer mainly for long-range signaling. Spectrum policies were set when the major use of radio was for ship-to-shore transmissions, SOS signaling from great distances, and broadcast<span style=\"font-size: 1rem;text-align: initial\">ing over huge geographic areas. As the nation has become wired, most radio\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">signals travel only a few feet or a few hundred feet. Under these changed conditions, the old rules for spectrum management don\u2019t make sense.<\/span>\r\n\r\n<\/div>\r\n<h2>Can We Just Divide the Property Differently?<\/h2>\r\nSome innovations make better use of the spectrum without changing the fundamental allocation picture shown in Figure 8.1. For example, HD radio squeezes an unrelated low-power digital transmission alongside the analog AM and FM radio channels. (\u201cHD\u201d is a trademark. It doesn\u2019t stand for \u201chigh definition.\u201d) On AM HD radio, the HD transmission uses the guard bands on either side of an AM station for entirely different broadcast content (see Figure 8.3). Most AM radios filter out any signal in the channels adjacent to the one to which it is tuned, so the HD transmission is inaudible on an ordinary radio, even as noise. The HD radio broadcast can be heard only on a special radio designed to pick up and decode the digital transmission.\r\n\r\n[caption id=\"attachment_483\" align=\"aligncenter\" width=\"329\"]<img class=\"size-full wp-image-483\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05171006\/Radio-Bands.png\" alt=\"\" width=\"329\" height=\"356\" \/> FIGURE 8.3 HD radio uses guard bands to broadcast digital signals at low power. In the AM spectrum, the 10kHz bands on either side of the band allocated to an ordinary analog broadcast station may be used for an entirely independent digital broadcast, limited to low power so that it does not interfere with reception of the analog broadcast.[\/caption]\r\n\r\n<div>\r\n\r\nHD radio is a clever invention, and by opening the spectrum to HD broad- casts, the FCC has been able to squeeze in more broadcast stations\u2014at least for those willing to buy special radios. But it doesn\u2019t challenge the fundamental model that has been with us since the 1920s: Split up the spectrum and give a piece to each licensee.\r\n\r\nEven parts of the spectrum that are \u201callocated\u201d to licensees may be drastically underused in practice. A 2002 Federal Communications Committee Report puts it this way: \u201c\u2026 the shortage of spectrum is often a spectrum access problem. That is, the spectrum resource is available, but its use is compartmented by traditional policies based on traditional technologies.\u201d The committee came to this conclusion in part by listening to the air waves in various frequency blocks to test how often nothing at all was being transmitted. Most of the time, even in the dense urban settings of San Diego, Atlanta, and Chicago, important spectrum bands were nearly 100% idle. The public would be better served if others could use the otherwise idle spectrum.\r\n\r\nFor about ten years, the FCC has experimented with \u201csecondary spectrum marketing.\u201d Someone wanting some spectrum for temporary use may be able to lease it from a party who has a right to use it, but is willing to give it up in exchange for a payment. A university radio station, for example, may need the capacity to broadcast at high power only on a few Saturday afternoons to cover major football games. Perhaps such a station could make a deal with a business station that doesn\u2019t have a lot of use for its piece of the spectrum when the stock markets are closed. As another example, instead of reserving a band exclusively for emergency broadcasts, it could be made available to others, with the understanding\u2014enforced by codes wired into the transmitters\u2014that the frequency would be yielded on demand for public safety broadcasts.\r\n\r\nAs the example of eBay has shown, computerized auctions can result in very efficient distribution of goods. The use of particular pieces of the spectrum\u2014at particular times, and in particular geographic areas\u2014can create efficiencies if licensees of under-utilized spectrum bands had an incentive to sell some of their time to other parties.\r\n\r\nBut secondary markets don\u2019t change the basic model\u2014a frequency band belongs to one party at a time. Such auction ideas change the allocation scheme. Rather than having a government agency license spectrum statically to a single party with exclusive rights, several parties can divide it up and make trades. But these schemes retain the fundamental notion that spectrum is like land to be split up among those who want to use it.\r\n\r\n<\/div>\r\n<div>\r\n<h2>Sharing the Spectrum<\/h2>\r\nIn his 1943 opinion, Justice Frankfurter used an analogy that unintentionally pointed toward another way of thinking. Spectrum was inevitably scarce, he opined. \u201cRegulation of radio was therefore as vital to its development as traffic control was to the development of the automobile.\u201d\r\n\r\nJust as the spectrum is said to be, the roadways are a national asset. They are controlled by federal, state, and local governments, which set rules for their use. You can\u2019t drive too fast. Your vehicle can\u2019t exceed height and weight limits, which may depend on the road.\r\n\r\nBut everyone shares the roads. There aren\u2019t any special highways reserved for government vehicles. Trucking companies can\u2019t get licenses to use particular roads and keep out their competitors. Everybody shares the capacity of the roads to carry traffic.\r\n\r\nThe roads are what is known in law as a \u201ccommons\u201d (a notion introduced in Chapter 6). The ocean is also a commons, a shared resource subject to international fishing agreements. In theory at least, the ocean need not be a commons. Fishing boats could have exclusive fishing rights in separate sectors of the ocean\u2019s surface. If the regions were large enough, fishermen might be able to earn a good living under these conditions. But such an allocation of the resources of the ocean would be dreadfully inefficient for society as a whole. The oceans better satisfy human needs if they are treated as a commons and fishing boats move with the fish\u2014under agreed limits about the intensity of fishing.\r\n\r\nThe spectrum can be shared rather than split up into pieces. There is a precedent in electronic communications. The Internet is a digital commons. Everyone\u2019s packets get mixed with everyone else\u2019s on the fiber optics and satellite links of the Internet backbone. The packets are coded. Which packet belongs to whom is sorted out at the ends. Anything confidential can be encrypted.\r\n\r\nSomething similar can be done with broadcasts\u2014provided there is a basic rethinking of spectrum management. Two ideas are key: first, that using lots of bandwidth need not cause interference and can greatly increase transmission capacity; and second, that putting computers into radio receivers can greatly improve the utilization of the spectrum.\r\n\r\n<\/div>\r\n<h2>The Most Beautiful Inventor in the World<\/h2>\r\nSpread spectrum was discovered and forgotten several times and in several countries. Corporations (ITT, Sylvania, and Magnavox), universities (especially MIT), and government laboratories doing classified research all shared in giving birth to this key component of modern telecommunications\u2014and were often unaware of each other\u2019s activities.\r\n\r\nBy far the most remarkable precedent for spread spectrum was a patented invention by Hollywood actress Hedy Lamarr\u2014\u201cthe most beautiful woman in the world,\u201d in the words of movie mogul Louis Mayer\u2014and George Antheil, an avant-garde composer known as \u201cthe bad boy of music.\u201d\r\n\r\nLamarr made a scandalous name for herself in Europe by appearing nude in 1933, at the age of 19, in a Czech movie, Ecstasy. She became the trophy wife of Fritz Mandl, an Austrian munitions maker whose clients included both Hitler and Mussolini. In 1937, she disguised herself as a maid and escaped Mandl\u2019s house, fleeing first to Paris and then to London. There she met Mayer, who brought her to Hollywood. She became a star\u2014and the iconic beauty of her screen generation (see Figure 8.4).\r\n\r\nIn 1940, Lamarr arranged to meet Antheil. Her upper torso could use some enhancement, she thought, and she hoped Antheil could give her some advice. Antheil was a self-styled expert on female endocrinology, and had written a series of articles for Esquire magazine with titles such as \u201cThe Glandbook for the Questing Male.\u201d Antheil suggested glandular extracts. Their conversation then turned to other matters\u2014specifically, to torpedo warfare.\r\n\r\nA torpedo\u2014just a bomb with a propeller\u2014could sink a massive ship. Radio controlled torpedoes had been developed by the end of World War I, but were far from foolproof. An effective countermeasure was to jam the signal con- trolling the torpedo by broadcasting loud radio noise at the frequency of the control signal. The torpedo would go haywire and likely miss its target. From observing Mandl\u2019s business, Lamarr had learned about torpedoes and why it was hard to control them.\r\n\r\nLamarr had become fiercely pro-American and wished to help the Allied war effort. She conceived the idea of transmitting the torpedo control signal in short bursts at different frequencies. The code for the sequence of frequencies would be held identically within the torpedo and the controlling ship. Because the sequence would be unknown to the enemy, the transmission could not be jammed by flooding the airwaves with noise in any limited frequency band. Too much power would be required to jam all possible frequencies simultaneously.\r\n\r\n[caption id=\"attachment_480\" align=\"aligncenter\" width=\"300\"]<img class=\"wp-image-480 size-full\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05164312\/Image_0221.gif\" alt=\"\" width=\"300\" height=\"384\" \/> \u00a9 Bettmann\/CORBIS<br \/>FIGURE 8.4 Hedy Lamarr, at about the age when she and George Antheil made their spread spectrum discovery.[\/caption]\r\n\r\nAntheil\u2019s contribution was to control the frequency-hopping sequence by means of a player piano mechanism\u2014with which he was familiar because he had scored his masterpiece, Ballet M\u00e9canique, for synchronized player pianos. As he and Lamarr conceived the device (it was never built), the signal would therefore hop among 88 frequencies, like the 88 keys on a piano keyboard. The ship and the torpedo would have identical piano rolls\u2014in effect, encrypting the broadcast signal.\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">The story of Antheil and Lamarr, and the place of their invention in the history of spread spectrum, is told in <em>Spread Spectrum<\/em> by Rob Walters (Booksurge LLC, 2005).<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nIn 1941, Lamarr and Antheil assigned their patent (see Figure 8.5) to the Navy. A small item on the \u201cAmusements\u201d page of the New York Times quoted an army engineer as describing their invention as so \u201cred hot\u201d that he could not say what it did, except that it was \u201crelated to the remote control of apparatus employed in warfare.\u201d Nonetheless, the Navy seems to have done\u00a0nothing with the invention at the time. Instead, Lamarr went to work selling war bonds. Calling herself \u201cjust a plain gold-digger for Uncle Sam,\u201d she sold kisses, and once raised $4.5 million at a single lunch.The patent was ignored for more than a decade. Romuald Ireneus \u2019Scibor-Marchocki, who was an engineer for a Naval contractor in the mid-1950s, recalls being given a copy when he was put to work on a device for locating enemy submarines. He didn\u2019t recognize the patentee because she had not used her stage name.\r\n\r\n[caption id=\"attachment_481\" align=\"aligncenter\" width=\"433\"]<img class=\"size-full wp-image-481\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05164315\/Image_024.gif\" alt=\"\" width=\"433\" height=\"133\" \/> U.S. Patent Office.<br \/>FIGURE 8.5 Original spread spectrum patent by Hedy Lamarr (n\u00e9e Kiesler\u2014Gene Markey was her second husband, of six) and George Antheil. On the left, the beginning of the patent itself. On the right, a diagram of the player-piano mechanism included as an illustration in the patent.[\/caption]\r\n\r\n<div>\r\n\r\nAnd that, in a nutshell, is the strange story of serendipity, teamwork, vanity, and patriotism that led to the Lamarr-Antheil discovery of spread spectrum. The connection of these two to the discovery of spread spectrum was made only in the 1990s. By that time, the influence of their work had become entangled with various lines of classified military research. Whether Hedy Lamarr was more a Leif Erikson than a Christopher Columbus of this new conceptual territory, she was surely the most unlikely of its discoverers. In 1997, the Electronic Frontier Foundation honored her for her discovery; she welcomed the award by saying, \u201cIt\u2019s about time.\u201d When asked about her dual achievements, she commented, \u201cFilms have a certain place in a certain time period. Technology is forever.\u201d\r\n\r\n<\/div>\r\n<h2>Channel Capacity<\/h2>\r\nLamarr and Antheil had stumbled on a particular way of exploiting a broad frequency range\u2014\u201cspreading\u201d signals across the spectrum. The theoretical foundation for spread spectrum was one of the remarkable mathematical results of Claude Shannon in the late 1940s. Although no digital telephones or radios existed at the time, Shannon derived many of the basic laws by which they would have to operate. The Shannon-Hartley Theorem predicted spread spectrum in the same way that Maxwell\u2019s equations predicted radio waves.\r\n\r\nShannon\u2019s result (building on work by Ralph Hartley two decades earlier) implies that \u201cinterference\u201d is not the right concept for thinking about how much information can be carried in the radio spectrum. Signals can overlap in frequency and yet be pulled apart perfectly by sufficiently sophisticated radio receivers.\r\n\r\nEarly engineers assumed that communication errors were inevitable. Send bits down a wire, or through space using radio waves, and some of them would probably arrive incorrectly, because of noise. You could make the channel more reliable by slowing the transmission, they supposed, in the same way that people talk more slowly when they want to be sure that others understand them\u2014but you could never guarantee that a communication was errorless.\r\n\r\nShannon showed that communication channels actually behave quite differently. Any communication channel has a certain channel capacity\u2014a number of bits per second that it can handle. If your Internet connection is advertised as having a bit rate of 3Mbit\/sec (3 million bits per second), that number is the channel capacity of the particular connection between you and your Internet Service Provider (or should be\u2014not all advertisements tell the truth). If the connection is over telephone wiring and you switch to a service that runs over fiber optic cables, the channel capacity should increase.\r\n\r\nHowever large it is, the channel capacity has a remarkable property, which Shannon proved: Bits can be transmitted through the channel, from the source to the destination, with negligible probability of error as long as the transmission rate does not exceed the channel capacity. Any attempt to push bits down the channel at a rate higher than the channel capacity will inevitably result in data loss. With sufficient cleverness about the way data from the source is encoded before it is put in the channel, the error rate can be essentially zero, as long as the channel capacity is not exceeded. Only if the data rate exceeds the channel capacity do transmission errors become inevitable.\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">\r\n<p style=\"text-align: center\"><strong>ERRORS AND DELAYS<\/strong><\/p>\r\nAlthough transmission errors can be made unlikely, they are never impossible. However, errors can be made far less probable than, for example, the death of the intended recipient in an earthquake that just happens to occur while the bits are on their way (see the Appendix). Guaranteeing correctness requires adding redundant bits to the message\u2014in the same way that fragile postal shipments are protected by adding styrofoam packing material.\u00a0<span style=\"font-family: inherit;font-size: inherit\">Attaining data rates close to the \u201cShannon limit\u201d involves pre-processing the bits. That may increase latency\u2014the time delay between the start of the \u201cpacking\u201d process and the insertion of bits into the channel. Latency can be a problem in applications such as voice communication, where delays annoy the communicants. Happily, phone calls don\u2019t require error-free transmission\u2014we are all used to putting up with a little bit of static.<\/span><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<h2>Power, Signal, Noise, and Bandwidth<\/h2>\r\nThe capacity of a radio channel depends on the frequencies at which messages are transmitted and the amount of power used to transmit them. It\u2019s helpful to think about these two factors separately.\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">\r\n<p style=\"text-align: center\"><strong>BANDWIDTH<\/strong><\/p>\r\n<span style=\"font-family: inherit;font-size: inherit\">Because channel capacity depends on frequency bandwidth, the term \u201cbandwidth\u201d is used informally to mean \u201camount of information communicated per second.\u201d But technically, bandwidth is a term about electromagnetic communication, and even then is only one of the factors affecting the capacity to carry bits.<\/span><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nA radio broadcast is never \u201cat\u201d a single frequency. It always uses a range or band of frequencies to convey the actual sounds. The only sound that could be carried at a single, pure frequency would be an unvarying tone. The bandwidth of a broadcast is the size of the frequency band\u2014that is, the difference between the top frequency and the bottom frequency of the band. Hoover, to use this language, allotted 10kHz of bandwidth for each AM station.\r\n<div>\r\n\r\nIf you can transmit so many bits per second with a certain amount of bandwidth, you can transmit twice that many bits per second if you have twice as much bandwidth. The two trans- missions could simply go on side by side, not interacting with each other in any way. So, channel capacity is proportional to bandwidth.\r\n\r\nThe relation to signal power is more surprising. To use simple numbers for clarity, suppose you can transmit one bit, either 0 or 1, in one second. If you\u00a0<span style=\"font-size: 1rem;text-align: initial\">could use more power but no more time or bandwidth, how many bits could you transmit?<\/span>\r\n\r\n<\/div>\r\nOne way a radio transmission might distinguish between 0 and 1 is for the signals representing these two values to have different signal powers. To continue to oversimplify, assume that zero power represents 0, and a little more power, say 1 watt, represents 1. Then to distinguish a 1 from a 0, the radio receiver has to be sensitive enough to tell the difference between 1 watt and 0 watts. The uncontrollable noise\u2014radio waves arriving from sunspots, for example\u2014also must be weak enough that it does not distort a signal representing 0 so that it is mistaken for a signal representing 1.\r\n\r\nUnder these conditions, four times as much power would enable transmission of two bits at once, still in one second. Power level 0 could represent 00; 1 watt, 01; 2 watts, 10; and 3 watts could represent 11. Successive power levels have to be separated by at least a watt to be sure that one signal is not confused with another. If the power levels were closer together, the unchanged noise might make them impossible to distinguish reliably. To transmit three bits at a time, you\u2019d need eight times as much power, using levels 0 through 7 watts\u2014that is, the amount of power needed increases exponentially with the number of bits to be transmitted at once (see Figure 8.6).\r\n\r\n[caption id=\"attachment_484\" align=\"aligncenter\" width=\"537\"]<img class=\"size-full wp-image-484\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05173915\/signal-levels.png\" alt=\"\" width=\"537\" height=\"315\" \/> FIGURE 8.6 Shannon-Hartley. Signal levels must be far enough apart to be distinguishable in spite of the distortion caused by noise. Tripling the bit rate requires eight times as much power.[\/caption]\r\n\r\nSo the Shannon-Hartley result says that channel capacity depends on both bandwidth and signal power, but more bandwidth is exponentially more valuable than more signal power. You\u2019d have to get more than a thousand times more signal power to get the same increase in channel capacity as you could get from having just ten times more bandwidth (because 1024 = 210). Bandwidth is precious indeed.\r\n<h2>One Man\u2019s Signal Is Another Man\u2019s Noise<\/h2>\r\nThe consequences of the Shannon-Hartley result about the value of band- width are quite astonishing. If WBZ were transmitting digitally with its 50,000 watt transmitter, it could transmit the same amount of information (over shorter distances) using less power than a household light bulb\u2014if it could get 100kHz of bandwidth rather than the 10kHz the FCC has allowed it.\r\n\r\nOf course, no station could get exclusive use of 100kHz. Even giving each station 10kHz uses up the spectrum too quickly. The spectrum-spreading idea works only if the spectrum is regarded as a commons. And to see the consequences of many signals broadcasting in the same spectrum, one more crucial insight is needed.\r\n\r\nThe power level that affects the capacity of a radio channel is not actually the signal power, but the ratio of the signal power to the noise power\u2014the so-called signal-to-noise ratio. In other words, you could transmit at the same bit rate with one watt of power as with ten\u2014if you could also reduce the noise by a factor of ten. And \u201cnoise\u201d includes other people\u2019s signals. It really doesn\u2019t matter whether the interference is coming from other human broad- casts or from distant stars. All the interfering broadcasts can share the same spectrum band, to the extent they could coexist with the equivalent amount of noise.\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">A readable account of spread spectrum radio appeared in 1998: \u201cSpread-Spectrum Radio\u201d by David R. Hughes and DeWayne Hendricks (Scientific American, April 1998, 94\u201396).<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<div>\r\n\r\nA surprising consequence of Shannon-Hartley is that there is some channel capacity even if the noise (including other people\u2019s signals) is stronger than the signal. Think of a noisy party: You can pick out a conversation from the back- ground noise if you focus on a single voice, even if it is fainter than the rest of the noise. But the Shannon-Hartley result predicts even more: The channel can transmit bits flawlessly, if slowly, even if the noise is many times more powerful than the signal. And if you could get a lot of bandwidth, you could drastically reduce the signal power\u00a0<span style=\"font-size: 1rem;text-align: initial\">without lowering the bit rate at all (see Figure 8.7). What would seem to be just noise to anyone listening casually on a particular frequency would actually have a useful signal embedded within it.<\/span>\r\n\r\n<\/div>\r\nThe Shannon-Hartley Theorem is a mathematician\u2019s delight\u2014a tease that limits what is possible in theory and gives no advice about how to achieve it in practice. It is like Einstein\u2019s E = mc2\u00a0\u2014which at once says nothing, and everything, about nuclear reactors and atomic bombs. Hedy Lamarr\u2019s frequency hopping was one of the spread spectrum techniques that would eventually be practical, but other ingenious inventions, named by odd acronyms, would emerge in the late twentieth century.\r\n\r\nTwo major obstacles stood between the Shannon-Hartley result and usable spread spectrum devices. The first was engineering: computers had to become fast, powerful, and cheap enough to process bits for transmission of high- quality audio and video to consumers. That wouldn\u2019t happen until the 1980s. The other problem was regulatory. Here the problem was not mathematical or scientific. Bureaucracies change more slowly than the technologies they regulate.\r\n\r\n[caption id=\"attachment_485\" align=\"aligncenter\" width=\"483\"]<img class=\"size-full wp-image-485\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05174815\/spread-spectrum.png\" alt=\"\" width=\"483\" height=\"161\" \/> FIGURE 8.7 The spread spectrum principle. The same bit rate can be achieved at much lower power by using more bandwidth, and the signal power can even be less than the noise.[\/caption]\r\n\r\n<div>\r\n<h2>Spectrum Deregulated<\/h2>\r\nToday, every Starbucks has WiFi\u2014that is, wireless Internet access. Hotel rooms, college dormitories, and a great many households also have \u201cwireless.\u201d This happened because a tiny piece of the spectrum, a slice less than a millimeter wide in Figure 8.1, was deregulated and released for experimental use by creative engineers. It is an example of how deregulation can stimulate industrial innovations, and about how existing spectrum owners prefer a regulatory climate that maintains their privileged position. It is a story that could be repeated elsewhere in the spectrum, if the government makes wise decisions.\r\n\r\n<\/div>\r\n<div>\r\n\r\nMichael Marcus is an improbable revolutionary. An MIT-trained electrical engineer, he spent three years as an Air Force officer during the Vietnam war, designing communications systems for underground nuclear test detection at a time when the ARPANET\u2014the original, military-sponsored version of the Internet\u2014was first in use. After finishing active duty, he went to work at a Pentagon think tank, exploring potential military uses of emerging communications technologies.\r\n\r\nIn the summer of 1979, Marcus attended an Army electronic warfare workshop. As was typical at Army events, attendees were seated alphabetically. Marcus\u2019s neighbor was Steve Lukasik, the FCC\u2019s chief scientist. Lukasik had been Director of ARPA during the development of the ARPANET and then an ARPANET visionary at Xerox. He came to the FCC, not generally considered a technologically adventurous agency, because Carter administration officials were toying with the idea that existing federal regulations might be stifling innovation. Lukasik asked Marcus what he thought could stimulate growth in radio communications. Marcus answered, among other things, \u201cspread spectrum.\u201d His engineering was sound, but not his politics. People would not like this idea.\r\n\r\nThe military\u2019s uses of spread spectrum were little known to civilians, since the Army likes to keep its affairs secret. The FCC prohibited all civil use of spread spectrum, since it would require, in the model the Commission had used for decades, trespassing on spectrum bands of which incumbents had been guaranteed exclusive use. Using lots of bandwidth, even at low power levels, was simply not possible within FCC regulations. Lukasik invited Marcus to join the FCC, to champion the development of spread spectrum and other innovative technologies. That required changing the way the FCC had worked for years.\r\n\r\nShortly after the birth of the Federal Radio Commission, the U.S. plum- meted into the worst depression it had ever experienced. In the 1970s, the FCC was still living with the culture of the 1930s, when national economic policies benevolently reined in free-market capitalism. As a general rule, innovators hate regulation, and incumbent stakeholders love it\u2014when it protects their established interests. In the radio world, where spectrum is a limited, indispensable, government-controlled raw material, this dynamic can be powerfully stifling.\r\n\r\nIncumbents, such as existing radio and TV stations and cell phone companies, have spectrum rights granted by the FCC in the past, perhaps decades ago, and renewed almost automatically. Incumbents have no incentive to allow use of \u201ctheir\u201d spectrum for innovations that may threaten their business. Innovators can\u2019t get started without a guarantee from regulators that\u00a0<span style=\"font-size: 1rem;text-align: initial\">they will be granted use of spectrum, since investors won\u2019t fund businesses reliant on resources the government controls and may decide not to provide. Regulators test proposals to relax their rules by inviting public comment, and the parties they hear from most are the incumbents\u2014who have the resources to send teams to lobby against change. Their complaints predict disaster if the rules are relaxed. In fact, their doomsday scenarios are often exaggerated in the hope the regulators will exclude competition. Eventually, the regulators lose sight of their ultimate responsibility, which is to the public good and not to the good of the incumbents. It is just easier to leave things alone. They can legitimately claim to be responding to what they are being told, however biased by the huge costs of travel and lobbying. Regulatory powers meant to prevent electromagnetic interference wind up preventing\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">competition instead.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nAnd then there is the revolving door. Most communications jobs are in the private sector. FCC employees know that their future lies in the commercial use of the spectrum. Hundreds of FCC staff and officials, including all eight past FCC chairmen, have gone to work for or represented the businesses they regulated. These movements from government to private employment violate no government ethics rules. But FCC officials can be faced with a choice between angering a large incumbent that is a potential employer, and disappointing a marginal start-up or a public interest non-profit. It is not surprising that they remember that they will have to earn a living after leaving the FCC.\r\n\r\nIn 1981, Marcus and his colleagues invited comment on a proposal to allow low-power transmission in broad frequency bands. The incumbents who were using those bands almost universally howled. The FCC beat a retreat and attempted, in order to break the regulatory logjam, to find frequency bands where there could be few complaints about possible interference with other uses. They hit on the idea of deregulating three \u201cgarbage bands,\u201d so called because they were used only for \u201cindustrial, scientific, and medical\u201d (ISM) purposes. Microwave ovens, for example, cook food by pummeling it with 2.450GHz electromagnetic radiation. There should have been no complaints\u2014microwave ovens were unaffected by \u201cinterference\u201d from radio signals, and the telecommunications industry did not use these bands. RCA and GE complained anyway about possible low-power interference, but their objections were determined to be exaggerated. This spectrum band was opened to experimentation in 1985, on the proviso that frequency hopping or a similar technique be used to limit interference.\r\n\r\nMarcus did not know what might develop, but engineers were waiting to take advantage of the opportunity. Irwin Jacobs founded QUALCOMM a few\u00a0<span style=\"font-size: 1rem;text-align: initial\">months later, and by 1990, the company\u2019s cell phone technology was in wide-spread use, using a spread spectrum technique called CDMA. A few years later, Apple Computer and other manufacturers agreed with the FCC on standards to use spread spectrum for radio local area networks\u2014\u201cwireless routers,\u201d for which Apple\u2019s trademarked device is called the Airport. In 1997, when the FCC approved the 802.11 standard and the spectrum bands were finally avail<\/span><span style=\"font-size: 1rem;text-align: initial\">able for use, the press barely noticed. Within three years, wireless networking was everywhere, and virtually all personal computers now come ready for WiFi.<\/span>\r\n\r\n<\/div>\r\nFor his efforts, Marcus was sent into internal exile within the FCC for seven years but emerged in the Clinton era and returned to spectrum policy work. He is now retired and working as a consultant in the private sector.\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">Michael Marcus\u2019s web site, <a href=\"http:\/\/www.marcus-spectrum.com\/\">www.marcus-spectrum.com, <\/a>has interesting materials, and opinions, about spectrum deregulation and spread spectrum history.<\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\nThe success of WiFi has opened the door to discussion of more radical spectrum-spreading proposals. The most extreme is UWB\u2014\u201cultra wide band\u201d radio. UWB returns, in a sense, to Hertz\u2019s sparks, splattering radiation all across the frequencies of the radio spectrum. There are two important differences, however. First, UWB uses extremely low power\u2014feasible because of the very large bandwidth. Power usage is so low that UWB will not interfere with any conventional radio receiver. And second, UWB pulses are extremely short and precisely timed, so that the time between pulses can symbolically encode a transmitted digital message. Even at extremely low power, which would limit the range of UWB transmissions to a few feet, UWB has the potential to carry vast amounts of information in short periods of time. Imagine connecting your high definition TV, cable box, and DVD player without cables. Imagine downloading your library of digital music from your living room audio system to your car while it is parked in your garage. Imagine wireless video phones that work better than wired audio phones. The possibilities are endless, if the process of regulatory relaxation continues.\r\n<h2>What Does the Future Hold for Radio?<\/h2>\r\nIn the world of radio communications, as everywhere in the digital explosion, time has not stopped. In fact, digital communications have advanced less far than computer movie-making or voice recognition or weather prediction, because only in radio does the weight of federal regulation retard the explosive increase in computational power. The deregulation that is possible has only begun to happen.\r\n<div>\r\n<h2>What If Radios Were Smart?<\/h2>\r\nSpread spectrum is a way of making better use of the spectrum. Another dramatic possibility comes with the recognition that ordinary radios are extremely stupid by comparison\u00a0<span style=\"font-size: 1rem;text-align: initial\">with what is computationally possible today. If taken back in time, today\u2019s radios could receive the broadcasts of 80 years ago, and the AM radios of 80 years ago would work as receivers of today\u2019s broadcasts. To achieve such total\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">\u201cbackward compatibility,\u201d a great deal of efficiency must be sacrificed. The reason for such backward compatibility is not that many 80-year-old radios are still in service. It\u2019s that at any moment in time, the incumbents have a strong interest in retaining their market share, and therefore, in lobbying against efforts to make radios \u201csmarter\u201d so more stations can be accommodated.<\/span>\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">\r\n<p style=\"text-align: center\"><strong>WHAT DOES \u201cSMART\u201d MEAN?<\/strong><\/p>\r\n\u201cIntelligent\u201d or \u201csmart\u201d radio goes by various technical names. The two most commonly used terms are \u201csoftware-defined radio\u201d (SDR) and \u201ccognitive radio.\u201d Software-defined radio refers to radios capable of being reprogrammed to change characteristics usually implemented in hardware today (such as whether they recognize AM, FM, or some other form of modulation).\u00a0<span style=\"font-family: inherit;font-size: inherit\">Cognitive radio refers to radios that use artificial intelligence to increase the efficiency of their spectrum utilization.<\/span><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<div>\r\n\r\nIf radios were intelligent and active, rather than dumb and passive, vastly more information could be made available through the air- waves. Rather than broadcasting at high power so that signals could travel great distances to reach passive receivers, low-power radios could pass signals on to each other. A request for a particular piece of information could be transmitted from radio to radio, and the information could be passed back. The radios could cooperate with each other to increase the information flux received by all of them. Or multiple weak transmitters could occasionally synchronize to produce a single powerful beam for long-range communication.\r\n\r\nSuch \u201ccooperation gains\u201d are already being exploited in wireless sensor networking. Small, low-power, radio-equipped computers are equipped with sensors for temperature or seismic activity, for example. These devices can be scattered in remote areas with hostile environments, such as the rim of a\u00a0<span style=\"font-size: 1rem;text-align: initial\">smoldering volcano, or the Antarctic nesting grounds of endangered penguins. At far lower cost and greater safety than human observers could achieve, the devices can exchange information with their neighbors and eventually pass on a summary to a single high-power transmitter.<\/span>\r\n\r\n<\/div>\r\n<div>\r\n\r\nThere are vast opportunities to use \u201csmart\u201d radios to increase the number of broadcast information options\u2014if the regulatory stranglehold on the industry can be loosened and the incentives for innovation increased.\r\n\r\nRadios can become \u201csmarter\u201d in another respect. Even under the \u201cnarrow- band\u201d model for spectrum allocation, where one signal occupies only a small range of frequencies, cheap computation can make a difference. The very notion that it is the government\u2019s job to prevent \u201cinterference,\u201d enshrined in legislation since the 1912 Radio Act, is now anachronistic.\r\n\r\nRadio waves don\u2019t really \u201cinterfere,\u201d the way people in a crowd interfere with each other\u2019s movements. The waves don\u2019t bounce off each other; they pass right through each other. If two different waves pass through the antenna of a dumb old radio, neither signal can be heard clearly.\r\n\r\nTo see what might be possible in the future, ask a man and a woman to stand behind you, reading from different books at about the same voice level. If you don\u2019t focus, you will hear an incoherent jumble. But if you concentrate on one of the voices, you can understand it and block out the other. If you shift your focus to the other voice, you can pick that one out. This is possible because your brain performs sophisticated signal processing. It knows something about male and female voices. It knows the English language and tries to match the sounds it is hearing to a lexicon of word-sounds it expects English speakers to say. Radios could do the same thing\u2014if not today, then soon, when computers become a bit more powerful.\r\n\r\nBut there is a chicken-and-egg cycle. No one will buy a \u201csmart\u201d radio unless there is something to listen to. No one can undertake a new form of broadcasting without raising some capital. No investor will put up money for a project that is dependent on uncertain deregulation decisions by the FCC. Dumb radios and inefficient spectrum use protect the incumbents from com- petition, so the incumbents lobby against deregulation.\r\n\r\nMoreover, the incumbent telecommunications and entertainment industries are among the leading contributors to congressional election campaigns. Members of Congress often pressure the FCC to go against the public interest and in favor of the interests of the existing stakeholders. This problem was apparent even in the 1930s, when an early history of radio regulation stated, \u201cno quasi-judicial body was ever subject to so much congressional pressure as the Federal Radio Commission.\u201d The pattern has not changed.\r\n\r\nIn other technologies, such as the personal computer industry, there is no such cycle. Anyone who wants to innovate needs to raise money. Investors\u00a0<span style=\"font-size: 1rem;text-align: initial\">are inhibited by the quality of the technology and the market\u2019s expected reaction to it\u2014but not by the reactions of federal regulators. Overextended copyright protections have chilled creativity, as was dis- cussed in Chapter 6, but lawmakers are to blame for that problem, not unelected commissioners.<\/span>\r\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\" border=\"1\">\r\n<tbody>\r\n<tr>\r\n<td style=\"width: 100%\">\r\n<p style=\"text-align: center\"><strong>TV, ENTERTAINMENT, AND CONGRESS<\/strong><\/p>\r\n<span style=\"font-family: inherit;font-size: inherit\">In the 2006 election campaigns, the TV, movie, and music industries contributed more than $12 million to the re-election campaigns of incumbents, more than the oil and gas industry. The three biggest contributors were Comcast Corp., Time Warner, and the National Cable and Telecommunications Association.<\/span><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>\r\n<\/div>\r\n<div>\r\n\r\nFrom cell phones to wireless routers to keychain auto locks, wire- less innovations are devoured by the public, when they can be brought to market at all. To foster innovation, the regulatory stranglehold needs to be broken throughout the wireless arena, including broadcast technologies. The regulations are now the source of the scarcity that is used to justify the regulations!\r\n\r\n<\/div>\r\n<div>\r\n<h2>But Do We Want the Digital Explosion?<\/h2>\r\nTechnologies converge. In 1971, Anthony Oettinger foresaw the line blurring between computing and communications. He called the emerging single technology \u201ccompunication.\u201d Today\u2019s computer users don\u2019t even think about the fact that their data is stored thousands of miles away\u2014until their Internet connection fails. Telephones were first connected using copper wires, and television stations first broadcast using electromagnetic waves, but today most telephone calls go through the air and most television signals go through wires.\r\n\r\nLaws, regulations, and bureaucracies change much more slowly than the technologies they govern. The FCC still has separate \u201cWireless\u201d and \u201cWire- line\u201d bureaus. Special speech codes apply to \u201cbroadcast\u201d radio and television, although \u201cbroadcasting\u201d is an engineering anachronism.\r\n\r\nThe silo organization of the legal structures inhibits innovation in today\u2019s layered technologies. Regulation of the content layer should not be driven by an outdated understanding of the engineering limits of the physical layer. Investments made in developing the physical layer should not enable the same companies to control the content layer. The public interest is in innovation and efficiency; it is not in the preservation of old technologies and revolving doors between regulators and the incumbents of the regulated industry.\r\n\r\n<\/div>\r\n<div>\r\n\r\nBut if the spectrum is freed up\u2014used vastly more efficiently than it now is, and made available for innovative wireless inventions and far more \u201cbroad- cast\u201d channels\u2014will we like the result?\r\n\r\nThere are general economic and social benefits from innovations in wire- less technology. Garage door openers, Wiis, and toll booth transponders do not save lives, but wireless fire detectors and global positioning systems do. The story of WiFi illustrates how rapidly an unforeseen technology can become an essential piece of both business and personal infrastructure.\r\n\r\nBut what about television and radio? Would we really be better off with a million channels than we were in the 1950s with 13, or are today with a few hundred on satellite and cable? Won\u2019t this profusion of sources cause a general lowering of content quality, and a societal splintering as de facto authoritative information channels wither? And won\u2019t it become impossible to keep out the smut, which most people don\u2019t want to see, whatever the rights of a few?\r\n\r\nAs a society, we simply have to confront the reality that our mindset about radio and television is wrong. It has been shaped by decades of the scarcity argument. That argument is now brain-dead, kept breathing on artificial life support by institutions that gain from the speech control it rationalizes. Without the scarcity argument, TV and radio stations become less like private leases on public land, or even shipping lanes, and more like \u2026 books.\r\n\r\nThere will be a period of social readjustment as television becomes more like a library. But the staggering\u2014even frightening\u2014diversity of published literature is not a reason not to have libraries. To be sure, there should be deter- mined efforts to minimize the social cost of getting the huge national investment in old TV sets retired in favor of million-channel TV sets. But we know how to do that sort of thing. There is always a chicken-and-egg problem when a new technology comes along, such as FM radios or personal computers.\r\n\r\nWhen market forces govern what gets aired, we may not be happy with the results, however plentiful. But if what people want is assurance about what they won\u2019t see, then the market will develop channels without dirty words and technologies to lock out the others. The present system stays in place because of the enormous financial and political influence of the incumbents\u2014 and because the government likes speech control.\r\n<h2>How Much Government Regulation Is Needed?<\/h2>\r\nCertainly, where words end and actions begin, people need government protection. Dr. Brinkley lost his medical license, which was right then, and would be right today.\r\n\r\n<\/div>\r\n<span style=\"font-size: 1rem;text-align: initial\">In the new wireless world, government needs to enforce the rules for spectrum sharing\u2014technologies that can work only if everyone respects power and bandwidth restraints. The government has to ensure that manufactured devices obey the rules, and that rogues don\u2019t violate them. The government also has to help develop and endorse standards for \u201csmart\u201d radios.<\/span>\r\n<div>\r\n\r\nIt also has the ultimate responsibility for deciding if the dire warnings of incumbents about the risks imposed by new technologies are scientifically valid, and if valid, of sufficiently great social importance to block the advancement of engineering. A typical caution was the one issued in the fall of 2007 by the National Association of Broadcasters as it rolled out a national advertising campaign to block a new technology to locate unused parts of the TV spectrum for Internet service: \u201cWhile our friends at Intel, Google, and Microsoft may find system errors, computer glitches, and dropped calls tolerable, broadcasters do not.\u201d Scientific questions about interference should be settled by science, not by advertisements or Congressional meddling. We will always need an independent body, like the FCC, to make these judgments rationally and in the public interest.\r\n\r\nIf all that happens, the scarcity problem will disappear. At that point, government authority over content should\u2014and constitutionally must\u2014drop back to the level it is at for other non-scarce media, such as newspapers and books. Obscenity and libel laws would remain in place for wireless communication as for other media. So would any other lawful restrictions Congress might adopt, perhaps for reasons of national security.\r\n\r\nOther regulation of broadcast words and images should end. Its legal foundation survives no longer in the newly engineered world of information. There are too many ways for the information to reach us. We need to take responsibility for what we see, and what our children are allowed to see. And they must be educated to live in a world of information plenty.\r\n\r\nThere is no reason to re-establish a \u201cFairness Doctrine,\u201d like that which until 1987 required stations to present multiple points of view. If there were more channels, the government would not have any need, or authority, to second-guess the editorial judgment of broadcasters. Artificial spectrum scarcity has, in the words of Justice William O. Douglas, enabled \u201cadministration after administration to toy with TV or radio in order to serve its sordid or its benevolent ends.\u201d Justice Frankfurter\u2019s claim that \u201cthere is no room in the broadcast band for every business or school of thought\u201d is now false.\r\n\r\n<\/div>\r\n<div>\r\n\r\nBits are bits, whether they represent movies, payrolls, expletives, or poems. Bits are bits, whether they are moved as electrons in copper wire, light pulses in glass fiber, or modulations in radio waves. Bits are bits, whether they are stored in gigantic data warehouses, on DVDs sent through the mail, or on flash drives on keychains. The regulation of free speech on broadcast radio and television is but one example of the lingering social effects of historical accidents of technology. There are many others\u2014in telephony, for example. Laws and policies regulating information developed around the technologies in which that information was embodied.\r\n\r\nThe digital explosion has reduced all information to its lowest common denominator, sequences of 0s and 1s. There are now adapters at all the junctions in the world-wide networks of information. A telephone call, a personal letter, and a television show all reach you\u00a0<span style=\"font-size: 1rem;text-align: initial\">through the same mixture of media. The bits are shunted between radio antennas, fiber-optic switching stations, and telephone wiring many times before they reach you.<\/span>\r\n\r\n<\/div>\r\nThe universality of bits gives mankind a rare opportunity. We are in a position to decide on an overarching view of information. We can be bound in the future by first principles, not historical contingencies. In the U.S., the digital explosion has blown away much of the technological wrapping obscuring the First Amendment. Knowing that information is just bits, all societies will be faced with stark questions about where information should be open, where it should be controlled, and where it should be banned.","rendered":"<div>\n<p style=\"text-align: center\"><strong>Blown to Bits<\/strong><\/p>\n<p style=\"text-align: center\"><em>Your <\/em><em>Life, Liberty, and Happiness After the Digital Explosion<\/em><\/p>\n<h3 style=\"text-align: center\">Hal Abelson Ken Ledeen Harry Lewis<\/h3>\n<p>&nbsp;<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-457\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04142913\/Image_001.png\" alt=\"\" width=\"148\" height=\"19\" \/><\/p>\n<p style=\"text-align: center\">Upper Saddle River, NJ \u2022 Boston \u2022 Indianapolis \u2022 San Francisco New York \u2022 Toronto \u2022 Montreal \u2022 London \u2022 Munich \u2022 Paris \u2022 Madrid \u2022 Cape Town \u2022 Sydney \u2022 Tokyo \u2022 Singapore \u2022 Mexico City<\/p>\n<\/div>\n<div>\n<p>Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks. Where those designations appear in this book, and the publisher was aware of a trademark claim, the designations have been printed with initial capital letters or in all capitals.<\/p>\n<p>The authors and publisher have taken care in the preparation of this book, but make no expressed or implied warranty of any kind and assume no responsibility for errors or omissions. No liability is assumed for incidental or consequential damages in connection with or arising out of the use of the information or programs contained herein.<\/p>\n<p>The publisher offers excellent discounts on this book when ordered in quantity for bulk purchases or special sales, which may include electronic versions and\/or custom covers and content particular to your business, training goals, marketing focus, and branding interests. For more information, please contact:<\/p>\n<p>U.S. Corporate and Government Sales (800) 382-3419 <a href=\"mailto:corpsales@pearsontechgroup.com\">corpsales@pearsontechgroup.com<\/a><\/p>\n<p>For sales outside the United States, please contact:<\/p>\n<p>International Sales <a href=\"mailto:international@pearson.com\">international@pearson.com<\/a><\/p>\n<p>Visit us on the Web: <a href=\"http:\/\/www.informit.com\/aw\">www.informit.com\/aw<\/a><\/p>\n<p><em>Library of Congress Cataloging-in-Publication Data:<\/em><\/p>\n<p>Abelson, Harold.<\/p>\n<p>Blown to bits : your life, liberty, and happiness after the digital explosion \/ Hal Abelson, Ken Ledeen, Harry Lewis.p. cm.<\/p>\n<p>ISBN 0-13-713559-9 (hardback : alk. paper) 1. Computers and civilization. 2. Information technology\u2014Technological innovations. 3. Digital media. I. Ledeen, Ken, 1946- II. Lewis, Harry R. III. Title.<\/p>\n<p>QA76.9.C66A245 2008 303.48\u201933\u2014dc222008005910<\/p>\n<p>Copyright \u00a9 2008 Hal Abelson, Ken Ledeen, and Harry Lewis<\/p>\n<p>This work is licensed under the Creative Commons Attribution-Noncommercial-Share Alike<\/p>\n<p>3.0\u00a0 United States License. To view a copy of this license visit <a href=\"http:\/\/creativecommons.org\/licenses\/by-nc-sa\/3.0\/us\/\">http:\/\/creativecommons.org\/licenses\/by-nc-sa\/3.0\/us\/<\/a> or send a letter to Creative Commons 171 Second Street, Suite 300, San Francisco, California, 94105, USA.<\/p>\n<p>For information regarding permissions, write to: Pearson Education, Inc.<\/p>\n<p>Rights and Contracts Department 501 Boylston Street, Suite 900<\/p>\n<p>Boston, MA 02116<\/p>\n<p>Fax (617) 671 3447<\/p>\n<\/div>\n<div>\n<p>ISBN-13: 978-0-13-713559-2<\/p>\n<p>ISBN-10: 0-13-713559-9<\/p>\n<p>Text printed in the United States on recycled paper at RR Donnelley in Crawfordsville, Indiana. Third printing December 2008<\/p>\n<p><strong>This Book Is Safari Enabled<\/strong><\/p>\n<p>The Safari\u00ae Enabled icon on the cover of your favorite technology book means the book is available through Safari Bookshelf. When you buy this book, you get free access to the online edition for 45 days.<\/p>\n<p>Safari Bookshelf is an electronic reference library that lets you easily search thousands of technical books, find code samples, download chapters, and access technical information whenever and wherever you need it.<\/p>\n<p>To gain 45-day Safari Enabled access to this book:<\/p>\n<p>\u2022\u00a0\u00a0 Go to <a href=\"http:\/\/www.informit.com\/onlineedition\">http:\/\/www.informit.com\/onlineedition<\/a><\/p>\n<p>\u2022\u00a0\u00a0 Complete the brief registration form<\/p>\n<p>\u2022\u00a0\u00a0 Enter the coupon code 9SD6-IQLD-ZDNI-AGEC-AG6L<\/p>\n<p>If you have difficulty registering on Safari Bookshelf or accessing the online edition, please e-mail <a href=\"mailto:customer-service@safaribooksonline.com\">customer-service@safaribooksonline.com.<\/a><\/p>\n<\/div>\n<div>\n<p><b>Editor<\/b><strong>\u00a0in Chief<\/strong><\/p>\n<p>Mark Taub<\/p>\n<p><strong>Acquisitions Editor<\/strong><\/p>\n<p>Greg Doench<\/p>\n<p><strong>Development Editor<\/strong><\/p>\n<p>Michael Thurston<\/p>\n<p><strong>Managing\u00a0 Editor<\/strong><\/p>\n<p>Gina Kanouse<\/p>\n<p><strong>Senior Project Editor<\/strong><\/p>\n<p>Kristy Hart<\/p>\n<p><strong>Copy Editor<\/strong><\/p>\n<p>Water Crest Publishing, Inc.<\/p>\n<p><strong>Indexer<\/strong><\/p>\n<p>Erika Millen<\/p>\n<p><strong>Proofreader<\/strong><\/p>\n<p>Williams Woods Publishing Services<\/p>\n<p><strong>Publishing Coordinator<\/strong><\/p>\n<p>Michelle Housley<\/p>\n<p><strong>Interior Designer and Composition<\/strong><\/p>\n<p>Nonie Ratcliff<\/p>\n<p><strong>Cover Designer<\/strong><\/p>\n<p>Chuti Prasertsith<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<p style=\"text-align: center\">CHAPTER 2<\/p>\n<p style=\"text-align: center\"><strong>Naked in the Sunlight<\/strong><\/p>\n<p style=\"text-align: center\"><strong><em>Privacy Lost, Privacy Abandoned<\/em><\/strong><\/p>\n<p><strong><em>\u00a0<\/em><\/strong><span style=\"font-size: 1em\">1984 Is Here, and We Like It<\/span><\/p>\n<p>On July 7, 2005, London was shaken as suicide bombers detonated four explosions, three on subways and one on a double-decker bus. The attack on the transit system was carefully timed to occur at rush hour, maximizing its destructive impact. 52 people died and 700 more were injured.<\/p>\n<p>Security in London had already been tight. The city was hosting the G8 Summit, and the trial of fundamentalist cleric Abu Hamza al-Masri had just begun. Hundreds of thousands of surveillance cameras hadn\u2019t deterred the terrorist act, but the perpetrators were caught on camera. Their pictures were sent around the world instantly. Working from 80,000 seized tapes, police were able to reconstruct a reconnaissance trip the bombers had made two weeks earlier.<\/p>\n<p>George Orwell\u2019s <em>1984 <\/em>was published in 1948. Over the subsequent years, the book became synonymous with a world of permanent surveillance, a soci- ety devoid of both privacy and freedom:\u2026there seemed to be no color in anything except the posters that were plastered everywhere. The black-mustachio\u2019d face gazed down from every commanding corner. There was one on the house front immedi- ately opposite. BIG BROTHER IS WATCHING YOU \u2026<\/p>\n<p>The real 1984 came and went nearly a quarter century ago. Today, Big Brother\u2019s two-way telescreens would be amateurish toys. Orwell\u2019s imagined\u00a0<span style=\"font-size: 1rem;text-align: initial\">London had cameras everywhere. His actual city now has at least half a million. Across the UK, there is one surveillance camera for every dozen people. The average Londoner is photographed hundreds of times a day by electronic eyes on the sides of buildings and on utility poles.<\/span><\/p>\n<\/div>\n<div>\n<p>Yet there is much about the digital world that Orwell did not imagine. He did not anticipate that cameras are far from the most pervasive of today\u2019s tracking technologies. There are dozens of other kinds of data sources, and the data they produce is retained and analyzed. Cell phone companies know not only what numbers you call, but where you have carried your phone. Credit card companies know not only where you spent your money, but what you spent it on. Your friendly bank keeps electronic records of your transactions not only to keep your balance right, but because it has to tell the government if you make huge withdrawals. The digital explosion has scattered the bits of our lives everywhere: records of the clothes we wear, the soaps we wash with, the streets we walk, and the cars we drive and where we drive them. And although Orwell\u2019s Big Brother had his cameras, he didn\u2019t have search engines to piece the bits together, to find the needles in the haystacks. Wherever we go, we leave digital footprints, while computers of staggering capacity reconstruct our movements from the tracks. Computers re-assemble the clues to form a comprehensive image of who we are, what we do, where we are doing it, and whom we are discussing it with.<\/p>\n<p>Perhaps none of this would have surprised Orwell. Had he known about electronic miniaturization, he might have guessed that we would develop an astonishing array of tracking technologies. Yet there is something more fundamental that distinguishes the world of <em>1984 <\/em>from the actual world of today. We have fallen in love with this always-on world. We accept our loss of privacy in exchange for efficiency, convenience, and small price discounts. According to a 2007 Pew\/Internet Project report, \u201c60% of Internet users say they are not worried about how much information is available about them online.\u201d Many of us publish and broadcast the most intimate moments of our lives for all the world to see, even when no one requires or even asks us to do so. 55% of teenagers and 20% of adults have created profiles on social networking web sites. A third of the teens with profiles, and half the adults, place no restrictions on who can see them.<\/p>\n<p>In Orwell\u2019s imagined London, only O\u2019Brien and other members of the Inner Party could escape the gaze of the telescreen. For the rest, the constant gaze was a source of angst and anxiety. Today, we willingly accept the gaze. We either don\u2019t think about it, don\u2019t know about it, or feel helpless to avoid it except by becoming hermits. We may even judge its benefits to outweigh its risks. In Orwell\u2019s imagined London, like Stalin\u2019s actual Moscow, citizens spied on their fellow citizens. Today, we can all be Little Brothers, using our search\u00a0<span style=\"font-size: 1rem;text-align: initial\">engines to check up on our children, our spouses, our neighbors, our col- leagues, our enemies, and our friends. More than half of all adult Internet users have done exactly that.\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">The explosive growth in digital technologies has radically altered our expectations about what will be private and shifted our thinking about what <\/span><em style=\"font-size: 1rem;text-align: initial\">should <\/em><span style=\"font-size: 1rem;text-align: initial\">be private. Ironically, the notion of privacy has become fuzzier at the same time as the secrecy-enhancing technology of encryption has become widespread.<\/span><\/p>\n<\/div>\n<div>\n<p>Indeed, it is remarkable that we no longer blink at intrusions that a decade ago would have seemed shocking. Unlike the story of secrecy, there was no single technological event that caused the change, no privacy-shattering breakthrough\u2014only a steady advance on several technological fronts that ultimately passed a tipping point. Many devices got cheaper, better, and smaller. Once they became useful consumer goods, we stopped worrying about their uses as surveillance devices. For example, if the police were the only ones who had cameras in their cell phones, we would be alarmed. But as long as we have them too, so we can send our friends funny pictures from parties, we don\u2019t mind so much that others are taking pictures of us. The social evolution that was supported by consumer technologies in turn made us more accepting of new enabling technologies; the social and technological evolutions have proceeded hand in hand. Meanwhile, international terrorism has made the public in most democracies more sympathetic to intrusive measures intended to protect our security. With corporations trying to make money from us and the government trying to protect us, civil libertarians are a weak third voice when they warn that we may not want others to know so much about us.<\/p>\n<p>So we tell the story of privacy in stages. First, we detail the enabling technologies, the devices and computational processes that have made it easy and convenient for us to lose our privacy\u2014some of them familiar technologies, and some a bit more mysterious. We then turn to an analysis of how we have lost our privacy, or simply abandoned it. Many privacy-shattering things have happened to us, some with our cooperation and some not. As a result, the sense of personal privacy is very different today than it was two decades ago. Next, we discuss the social changes that have occurred cultural shifts\u00a0<span style=\"font-size: 1rem;text-align: initial\">that were facilitated by the technological diffusion, which in turn made new technologies easier to deploy. And finally we turn to the big question: What does privacy even mean in the digitally exploded world? Is there any hope of keeping anything private when everything is bits, and the bits are stored, copied, and moved around the world in an instant? And if we can\u2019t\u2014or won\u2019t\u2014keep our personal information to ourselves anymore, how can we make ourselves less vulnerable to the downsides of living in such an exposed world? Standing naked in the sunlight, is it still possible to protect ourselves against ills and evils from which our privacy used to protect us?<\/span><\/p>\n<\/div>\n<div>\n<p>Footprints and FingerprintsAs we do our daily business and lead our private lives, we leave footprints and fingerprints. We can see our footprints in mud on the floor and in the sand and snow outdoors. We would not be surprised that anyone who went to the trouble to match our shoes to our footprints could determine, or guess, where we had been. Fingerprints are different. It doesn\u2019t even occur to us that we are leaving them as we open doors and drink out of tumblers. Those who have guilty consciences may think about fingerprints and worry about where they are leaving them, but the rest of us don\u2019t.<\/p>\n<p>In the digital world, we all leave both electronic footprints and electronic fingerprints data trails we leave intentionally, and data trails of which we are unaware or unconscious. The identifying data may be useful for forensic purposes. Because most of us don\u2019t consider ourselves criminals, however, we tend not to worry about that. What we don\u2019t think about is that the various small smudges we leave on the digital landscape may be useful to someone else\u2014someone who wants to use the data we left behind to make money or to get something from us. It is therefore important to understand how and where we leave these digital footprints and fingerprints.<\/p>\n<p>Smile While We Snap!Big Brother had his legions of cameras, and the City of London has theirs today. But for sheer photographic pervasiveness, nothing beats the cameras in the cell phones in the hands of the world\u2019s teenagers. Consider the alleged misjudgment of Jeffrey Berman. In early December 2007, a man about\u00a0<span style=\"font-size: 1rem;text-align: initial\">60 years old committed a series of assaults on the Boston public transit system, groping girls and exposing himself. After one of the assaults, a victim took out her cell phone. Click! Within hours, a good head shot was up on the Web and was shown on all the Boston area television stations. Within a day, Berman was under arrest and charged with several crimes. \u201cObviously we, from time to time, have plainclothes officers on the trolley, but that\u2019s a very difficult job to do,\u201d said the chief of the Transit Police. \u201cThe fact that this girl had the wherewithal to snap a picture to identify him was invaluable.\u201d<\/span><\/p>\n<\/div>\n<div>\n<p>That is, it would seem, a story with a happy ending, for the victim at least. But the massive dissemination of cheap cameras coupled with universal access to the Web also enables a kind of vigilante justice\u2014a ubiquitous Little- Brotherism, in which we can all be detectives, judges, and corrections officers. Mr. Berman claims he is innocent; perhaps the speed at which the teenager\u2019s snapshot was disseminated unfairly created a presumption of his guilt. Bloggers can bring global disgrace to ordinary citizens.<\/p>\n<p>In June 2005, a woman allowed her dog to relieve himself on a Korean subway, and subsequently refused to clean up his mess, despite offers from others to help. The incident was captured by a fellow passenger and posted online. She soon became known as \u201cgae-ttong-nyue\u201d (Korean for \u201cpuppy poo girl\u201d). She was identified along with her family, was shamed, and quit school. There is now a Wikipedia entry about the incident. Before the digital explosion before bits made it possible to convey information instantaneously,everywhere her actions would have been embarrassing and would have been known to those who were there at the time. It is unlikely that the story would have made it around the world, and that it would have achieved such notoriety and permanence.<\/p>\n<p>Still, in these cases, at least someone thought someone did something wrong. The camera just happened to be in the right hands at just the right moment. But looking at images on the Web is now a leisure activity that any- one can do at any time, anywhere in the world. Using Google Street View, you can sit in a caf\u00e9 in Tajikistan and identify a car that was parked in my drive- way when Google\u2019s camera came by (perhaps months ago). From Seoul, you can see what\u2019s happening right now, updated every few seconds, in Picadilly Circus or on the strip in Las Vegas. These views were always available to the public, but cameras plus the Web changed the meaning of \u201cpublic.\u201d<\/p>\n<\/div>\n<div>\n<p>And an electronic camera is not just a camera. <em>Harry Potter and the Deathly Hallows <\/em>is, as far as anyone knows, the last book in the Harry Potter series. Its arrival was eagerly awaited, with lines of anxious Harry fans stretching around the block at bookstores everywhere. One fan got a pre- release copy, painstakingly photographed every page, and posted the entire book online before the official release. A labor of love, no doubt, but a blatant copyright violation as well. He doubtless figured he was just posting the pixels, which could not be traced back to him. If that was his presumption, he was wrong. His digital fingerprints were all over the images.<\/p>\n<p>Digital cameras encode metadata along with the image. This data, known as the Exchangeable Image File Format (EXIF), includes camera settings (shutter speed, aperture, compression, make, model, orientation), date and time, and, in the case of our Harry Potter fan, the make, model, and serial number of his camera (a Canon Rebel 350D, serial number 560151117). If he registered his camera, bought it with a credit card, or sent it in for service, his identity could be known as well.<\/p>\n<p>Knowing Where You AreGlobal Position Systems (GPSs) have improved the marital lives of count- less males too stubborn to ask directions. Put a Garmin or a Tom Tom in a car, and it will listen to precisely timed signals from satellites reporting their positions in space. The GPS calculates its own location from the satellites\u2019 locations and the times their signals are received. The 24 satellites spinning 12,500 miles above the earth enable your car to locate itself within 25 feet, at a price that makes these systems popular birthday presents.<\/p>\n<p>If you carry a GPS-enabled cell phone, your friends can find you, if that its what you want. If your GPS-enabled rental car has a radio transmitter, you can be found whether you want it or not. In 2004, Ron Lee rented a car from Payless in San Francisco. He headed east to Las Vegas, then back to Los Angeles, and finally home. He was expecting to pay $150 for his little vaca- tion, but Payless made him pay more\u2014$1,400, to be precise. Mr. Lee forgot to read the fine print in his rental contract. He had not gone too far; his con- tract was for unlimited mileage. He had missed the fine print that said, \u201cDon\u2019t leave California.\u201d When he went out of state, the unlimited mileage clause was invalidated. The fine print said that Payless would charge him $1 per Nevada mile, and that is exactly what the company did. They knew where he was, every minute he was on the road.<\/p>\n<p>A GPS will locate you anywhere on earth; that is why mountain climbers carry them. They will locate you not just on the map but in three dimensions, telling you how high up the mountain you are. But even an ordinary cell phone will serve as a rudimentary positioning system. If you are traveling in\u00a0<span style=\"font-size: 1rem;text-align: initial\">settled territory\u2014any place where you can get cell phone coverage\u2014the signals from the cell phone towers can be used to locate you. That is how Tanya Rider was found (see Chapter 1 for details). The location is not as precise as that supplied by a GPS\u2014only within ten city blocks or so\u2014but the fact that it is possible at all means that photos can be stamped with identifying information about where they were shot, as well as when and with what camera.<\/span><\/p>\n<\/div>\n<div>\n<p>Knowing Even Where Your Shoes AreA Radio Frequency Identification tag\u2014RFID, for short\u2014can be read from a distance of a few feet. Radio Frequency Identification is like a more elaborate version of the familiar bar codes that identify products. Bar codes typically identify what kind of thing an item is\u2014the make and model, as it were. Because RFID tags have the capacity for much larger numbers, they can provide a unique serial number for each item: not just \u201cCoke, 12 oz. can\u201d but \u201cCoke can #12345123514002.\u201d And because RFID data is transferred by radio waves rather than visible light, the tags need not be visible to be read, and the sensor need not be visible to do the reading.<\/p>\n<p>RFIDs are silicon chips, typically embedded in plastic. They can be used to tag almost anything (see Figure 2.1). \u201cProx cards,\u201d which you wave near a sensor to open a door, are RFID tags; a few bits of information identifying you are transmitted from the card to the sensor. Mobil\u2019s \u201cSpeedpass\u201d is a little RFID on a keychain; wave it near a gas pump and the pump knows whom to charge for the gasoline. For a decade, cattle have had RFIDs implanted in their flesh, so individual animals can be tracked. Modern dairy farms log the milk production of individual cows, automatically relating the cow\u2019s identity to its daily milk output. Pets are commonly RFID-tagged so they can be reunited with their owners if the animals go missing for some reason. The possibility of tagging humans is obvious, and has been proposed for certain high-security applications, such as controlling access to nuclear plants.<\/p>\n<p>But the interesting part of the RFID story is more mundane\u2014putting tags in shoes, for example. RFID can be the basis for powerful inventory tracking systems.<\/p>\n<p>RFID tags are simple devices. They store a few dozen bits of information, usually unique to a particular tag. Most are passive devices, with no batteries, and are quite small. The RFID includes a tiny electronic chip and a small coil, which acts as a two-way antenna. A weak\u00a0<span style=\"font-size: 1rem;text-align: initial\">current flows through the coil when the RFID passes through an electromagnetic field\u2014for example, from a scanner in the frame of a store, under the car- pet, or in someone\u2019s hand. This feeble current is just strong enough to power the chip and induce it to transmit the identifying information. Because RFIDs are tiny and require no connected power source, they are easily hidden. We see them often as labels affixed to products; the one in Figure 2.1 was between the pages of a book bought from a bookstore. They can be almost undetectable.<\/span><\/p>\n<table style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 50%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-451\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04134759\/Image_009.gif\" alt=\"\" width=\"210\" height=\"148\" \/><\/td>\n<td style=\"width: 50%\"><img loading=\"lazy\" decoding=\"async\" class=\"alignnone size-full wp-image-452\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04134801\/Image_010.gif\" alt=\"\" width=\"204\" height=\"140\" \/><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<p><strong>FIGURE 2.1 <\/strong>An RFID found between the pages of a book. A bookstore receiving a box of RFID-tagged books can check the incoming shipment against the order without opening the carton. If the books and shelves are scanned during stocking, the cash register can identify the section of the store from which each purchased copy was sold.<\/p>\n<p>RFIDs are generally used to improve record-keeping, not for snooping. Manufacturers and merchants want to get more information, more reliably, so they naturally think of tagging merchandise. But only a little imagination is required to come up with some disturbing scenarios. Suppose, for example, that you buy a pair of red shoes at a chain store in New York City, and the shoes have an embedded RFID. If you pay with a credit card, the store knows your name, and a good deal more about you from your purchasing history. If you wear those shoes when you walk into a branch store in Los Angeles a month later, and that branch has an RFID reader under the rug at the entrance, the clerk could greet you by name. She might offer you a scarf to match the shoes\u2014or to match anything else you bought recently from any other branch of the store. On the other hand, the store might know that you have a habit of returning almost everything you buy\u2014in that case, you might find yourself having trouble finding anyone to wait on you!<\/p>\n<\/div>\n<div>\n<p>The technology is there to do it. We know of no store that has gone quite this far, but in September 2007, the Galeria Kaufhof in Essen, Germany equipped the dressing rooms in the men\u2019s clothing department with RFID readers. When a customer tries on garments, a screen informs him of avail- able sizes and colors. The system may be improved to offer suggestions about accessories. The store keeps track of what items are tried on together and what combinations turn into purchases. The store will remove the RFID tags from the clothes after they are purchased\u2014if the customer asks; otherwise, they remain unobtrusively and could be scanned if the garment is returned to the store. Creative retailers everywhere dream of such ways to use devices to make money, to save money, and to give them small advantages over their competitors. Though Galeria Kaufhof is open about its high-tech men\u2019s department, the fear that customers won\u2019t like their clever ideas sometimes holds back retailers\u2014and sometimes simply causes them to keep quiet about what they are doing.<\/p>\n<p>Black Boxes Are Not Just for Airplanes AnymoreOn April 12, 2007, John Corzine, Governor of New Jersey, was heading back to the governor\u2019s mansion in Princeton to mediate a discussion between Don Imus, the controversial radio personality, and the Rutgers University women\u2019s basketball team.<\/p>\n<p>His driver, 34-year-old state trooper Robert Rasinski, headed north on the Garden State Parkway. He swerved to avoid another car and flipped the Governor\u2019s Chevy Suburban. Governor Corzine had not fastened his seatbelt, and broke 12 ribs, a femur, his collarbone, and his sternum. The details of exactly what happened were unclear. When questioned, Trooper Rasinski said he was not sure how fast they were going\u2014but we <em>do <\/em>know. He was going 91 in a 65 mile per hour zone. There were no police with radar guns around; no human being tracked his speed. We know his exact speed at the moment of impact because his car, like 30 million cars in America, had a black box\u2014an \u201cevent data recorder\u201d (EDR) that captured every detail about what was going on just before the crash. An EDR is an automotive \u201cblack box\u201d like the ones recovered from airplane crashes. EDRs started appearing in cars around 1995. By federal law, they will be mandatory in the United States beginning in 2011. If you are driving a new GM, Ford, Isuzu, Mazda, Mitsubishi, or Subaru, your car has one\u2014whether anyone told you that or not. So do about half of new Toyotas. Your insurance company is probably entitled to its data if you have an accident. Yet most people do not realize that they exist.<\/p>\n<\/div>\n<div>\n<p>EDRs capture information about speed, braking time, turn signal status, seat belts: things needed for accident reconstruction, to establish responsibil- ity, or to prove innocence. CSX Railroad was exonerated of all liability in the death of the occupants of a car when its EDR showed that the car was stopped on the train tracks when it was hit. Police generally obtain search warrants before downloading EDR data, but not always; in some cases, they do not have to. When Robert Christmann struck and killed a pedestrian on October 18, 2003, Trooper Robert Frost of the New York State Police downloaded data from the car at the accident scene. The EDR revealed that Christmann had been going 38 MPH in an area where the speed limit was 30. When the data was introduced at trial, Christmann claimed that the state had violated his Fourth Amendment rights against unreasonable searches and seizures, because it had not asked his permission or obtained a search warrant before retrieving the data. That was not necessary, ruled a New York court. Taking bits from the car was not like taking something out of a house, and no search warrant was necessary.<\/p>\n<p>Bits mediate our daily lives. It is almost as hard to avoid leaving digital footprints as it is to avoid touching the ground when we walk. Yet even if we live our lives without walking, we would unsuspectingly be leaving fingerprints anyway.<\/p>\n<\/div>\n<div>\n<blockquote>\n<h4>It is almost as hard to avoid leaving digital footprints as it is to avoid touching the ground when we walk.<\/h4>\n<\/blockquote>\n<p>Some of the intrusions into our privacy come because of the unexpected, unseen side effects of things we do quite voluntarily. We painted the hypothetical picture of the shopper with the RFID- tagged shoes, who is either welcomed or\u00a0<span style=\"font-size: 1rem;text-align: initial\">shunned on her subsequent visits to the store, depending on her shopping his<\/span><span style=\"font-size: 1rem;text-align: initial\">tory. Similar surprises can lurk almost anywhere that bits are exchanged. That is, for practical purposes, pretty much everywhere in daily life.<\/span><\/p>\n<\/div>\n<div>\n<p>Tracing PaperIf I send an email or download a web page, it should come as no surprise that I\u2019ve left some digital footprints. After all, the bits have to get to me, so some part of the system knows where I am. In the old days, if I wanted to be anony- mous, I could write a note, but my handwriting might be recognizable, and I might leave fingerprints (the oily kind) on the paper. I might have typed, but Perry Mason regularly solved crimes by matching a typewritten note with the unique signature of the suspect\u2019s typewriter. More fingerprints.<\/p>\n<\/div>\n<div>\n<p>So, today I would laserprint the letter and wear gloves. But even that may not suffice to disguise me. Researchers at Purdue have developed techniques for matching laser-printed output to a particular printer. They analyze printed sheets and detect unique characteristics of each manufacturer and each individual printer\u2014fingerprints that can be used, like the smudges of old type- writer hammers, to match output with source. It may be unnecessary to put the microscope on individual letters to identify what printer produced a page. The Electronic Frontier Foundation has demonstrated that many color printers secretly encode the printer serial number, date, and time on every page that they print (see Figure 2.2). Therefore, when you print a report, you should not assume that no one can tell who printed it.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-453\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04134806\/Image_012.gif\" alt=\"\" width=\"338\" height=\"228\" \/><\/p>\n<p>Source: Laser fingerprint. Electronic Frontier Foundation. <a href=\"http:\/\/w.2.eff.org\/Privacy\/printers\/\">http:\/\/w.2.eff.org\/Privacy\/printers\/<\/a> docucolor\/.<\/p>\n<p><strong>FIGURE 2.2 <\/strong>Fingerprint left by a Xerox DocuColor 12 color laser printer. The dots are very hard to see with the naked eye; the photograph was taken under blue light. The dot pattern encodes the date (2005-05-21), time (12:50), and the serial number of the printer (21052857).<\/p>\n<p>There was a sensible rationale behind this technology. The government wanted to make sure that office printers could not be used to turn out sets of hundred dollar bills. The technology that was intended to frustrate counterfeiters makes it possible to trace every page printed on color laser printers back to the source. Useful technologies often have unintended consequences.<\/p>\n<\/div>\n<div>\n<p>Many people, for perfectly legal and valid reasons, would like to protect their anonymity. They may be whistle blowers or dissidents. Perhaps they are merely railing against injustice in their workplace. Will technologies that undermine anonymity in political discourse also stifle free expression? A measure of anonymity is essential in a healthy democracy\u2014and in the U.S., has been a weapon used to advance free speech since the time of the Revolution. We may regret a complete abandonment of anonymity in favor of communication technologies\u00a0 that\u00a0leave fingerprints.\u00a0The problem is not just the existence of fingerprints, but that no one told us that we are creating them.<\/p>\n<\/div>\n<div>\n<blockquote>\n<h4>The problem is not just the existence of fingerprints, but that no one told us that we are creating them.<\/h4>\n<\/blockquote>\n<p>&nbsp;<\/p>\n<\/div>\n<div>\n<p>The Parking Garage Knows More Than You ThinkOne day in the spring of 2006, Anthony and his wife drove to Logan Airport to pick up some friends. They took two cars, which they parked in the garage. Later in the evening, they paid at the kiosk inside the terminal, and left or tried to. One car got out of the garage without a problem, but Anthony\u2019s was held up for more than an hour, in the middle of the night, and was not allowed to leave. Why? Because his ticket did not match his license plate.<\/p>\n<p>It turns out that every car entering the airport garage has its license plate photographed at the same time as the ticket is being taken. Anthony had held both tickets while he and his wife were waiting for their friends, and then he gave her back one\u2014the \u201cwrong\u201d one, as it turned out. It was the one he had taken when he drove in. When he tried to leave, he had the ticket that matched his wife\u2019s license plate number. A no-no.<\/p>\n<p>Who knew that if two cars arrive and try to leave at the same time, they may not be able to exit if the tickets are swapped? In fact, who knew that every license plate is photographed as it enters the garage?<\/p>\n<p>There is a perfectly sensible explanation. People with big parking bills sometimes try to duck them by picking up a second ticket at the end of their trip. When they drive out, they try to turn in the one for which they would have to pay only a small fee. Auto thieves sometimes try the same trick. So the system makes sense, but it raises many questions. Who else gets access to the license plate numbers? If the police are looking for a particular car, can they search the scanned license plate numbers of the cars in the garage? How long is the data retained? Does it say anywhere, even in the fine print, that your visit to the garage is not at all anonymous?<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<p>All in Your PocketThe number of new data sources\u2014and the proliferation and interconnection of old data sources\u2014is part of the story of how the digital explosion shattered privacy. But the other part of the technology story is about how all that data is put together.<\/p>\n<p>On October 18, 2007, a junior staff member at the British national tax agency sent a small package to the government\u2019s auditing agency via TNT, a private delivery service. Three weeks later, it had not arrived at its destination and was reported missing. Because the sender had not used TNT\u2019s \u201cregistered mail\u201d option, it couldn\u2019t be traced, and as of this writing has not been found. Perhaps it was discarded by mistake and never made it out of the mail- room; perhaps it is in the hands of criminals.<\/p>\n<p>The mishap rocked the nation. As a result of the data loss, every bank and millions of individuals checked account activity for signs of fraud or identity theft. On November 20, the head of the tax agency resigned. Prime Minister Gordon Brown apologized to the nation, and the opposition party accused the Brown administration of having \u201cfailed in its first duty to protect the public.\u201d<\/p>\n<p>The package contained two computer disks. The data on the disks included names, addresses, birth dates, national insurance numbers (the British equiv- alent of U.S. Social Security Numbers), and bank account numbers of 25 mil- lion people\u2014nearly 40% of the British population, and almost every child in the land. The tax office had all this data because every British child receives weekly government payments, and most families have the money deposited directly into bank accounts. Ten years ago, that much data would have required a truck to transport, not two small disks. Fifty years ago, it would have filled a building.<\/p>\n<p>This was a preventable catastrophe. Many mistakes were made; quite ordinary mistakes. The package should have been registered. The disks should have been encrypted. It should not have taken three weeks for someone to speak up. But those are all age-old mistakes. Offices have been sending pack- ages for centuries, and even Julius Caesar knew enough to encrypt information if he had to use intermediaries to deliver it. What happened in 2007 that could not have happened in 1984 was the assembly of such a massive data- base in a form that allowed it to be easily searched, processed, analyzed, connected to other databases, transported and \u201clost.\u201d<\/p>\n<p>Exponential growth in storage size, processing speed, and communication speed\u2014have changed the same old thing into something new. Blundering, stupidity, curiosity, malice, and thievery are not new. The fact that sensitive data\u00a0<span style=\"font-size: 1rem;text-align: initial\">about everyone in a nation could fit on a laptop <\/span><em style=\"font-size: 1rem;text-align: initial\">is <\/em><span style=\"font-size: 1rem;text-align: initial\">new. The ability to search for a needle in the haystack of the Internet <\/span><em style=\"font-size: 1rem;text-align: initial\">is <\/em><span style=\"font-size: 1rem;text-align: initial\">new. Easily connecting \u201cpublic\u201d data sources that used to be stored in file drawers in Albuquerque and Atlanta, but are now both electronically accessible from Algeria\u2014<\/span><em style=\"font-size: 1rem;text-align: initial\">that <\/em><span style=\"font-size: 1rem;text-align: initial\">is new too.<\/span><\/p>\n<\/div>\n<div>\n<p>Training, laws, and software all can help. But the truth of the matter is that as a society, we don\u2019t really know how to deal with these consequences of the digital explosion. The technology revolution is outstripping society\u2019s capacity to adjust to the changes in what can be taken for granted. The Prime Minister had to apologize to the British nation because among the things that have been blown to bits is the presumption that no junior staffer could do that much damage by mailing a small parcel.<\/p>\n<p>Connecting the DotsThe way we leave fingerprints and footprints is only part of what is new. We have always left a trail of information behind us, in our tax records, hotel reservations, and long distance telephone bills. True, the footprints are far clearer and more complete today than ever before. But something else has changed\u2014the harnessing of computing power to correlate data, to connect the dots, to put pieces together, and to create cohesive, detailed pictures from what would otherwise have been meaningless fragments. The digital explosion does not just blow things apart. Like the explosion at the core of an atomic bomb, it blows things together as well. Gather up the details, connect the dots, assemble the parts of the puzzle, and a clear picture will emerge.<\/p>\n<p>Computers can sort through databases too massive and too boring to be examined with human eyes. They can assemble colorful pointillist paintings out of millions of tiny dots, when any few dots would reveal nothing. When a federal court released half a million Enron emails obtained during the cor- ruption trial, computer scientists quickly identified the subcommunities, and perhaps conspiracies, among Enron employees, using no data other than the pattern of who was emailing whom (see Figure 2.3). The same kinds of clustering algorithms work on patterns of telephone calls. You can learn a lot by knowing who is calling or emailing whom, even if you don\u2019t know what they are saying to each other\u2014especially if you know the time of the communica- tions and can correlate them with the time of other events.<\/p>\n<p>Sometimes even public information is revealing. In Massachusetts, the Group Insurance Commission (GIC) is responsible for purchasing health insurance for state employees. When the premiums it was paying jumped one year, the GIC asked for detailed information on every patient encounter. And\u00a0<span style=\"font-size: 1rem;text-align: initial\">for good reason: All kinds of health care costs had been growing at prodigious rates. In the public interest, the state had a responsibility to understand how it was spending taxpayer money. The GIC did not want to know patients\u2019 names; it did not want to track individuals, and it did not want people to <\/span><em style=\"font-size: 1rem;text-align: initial\">think <\/em><span style=\"font-size: 1rem;text-align: initial\">they were being tracked. Indeed, tracking the medical visits of individuals would have been illegal.<\/span><\/p>\n<\/div>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-454\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04134810\/Image_014.gif\" alt=\"\" width=\"403\" height=\"409\" \/><\/p>\n<p>Source: Enron, Jeffrey Heer. Figure 3 from <a href=\"http:\/\/jheer.org\/enron\/v1\/\">http:\/\/jheer.org\/enron\/v1\/.<\/a><\/p>\n<p><strong>FIGURE 2.3\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>Diagram showing clusters of Enron emailers, indicating which employees carried on heavy correspondence with which others. The evident \u201cblobs\u201d may be the outlines of conspiratorial cliques.<\/p>\n<p>So, the GIC data had no names, no addresses, no Social Security Numbers, no telephone numbers\u2014nothing that would be a \u201cunique identifier\u201d enabling a mischievous junior staffer in the GIC office to see who exactly had a\u00a0<span style=\"font-size: 1rem;text-align: initial\">particular ailment or complaint. To use the official lingo, the data was \u201cde-identified\u201d; that is, stripped of identifying information. The data did include the gender, birth date, zip code, and similar facts about individuals making medical claims, along with some information about why they had sought medical attention. That information was gathered not to challenge any particular person, but to learn about patterns\u2014if the truckers in Worcester are having lots of back injuries, for example, maybe workers in that region need better training on how to lift heavy items. Most states do pretty much the same kind of analysis of de-identified data about state workers.<\/span><\/p>\n<\/div>\n<div>\n<p>Now this was a valuable data set not just for the Insurance Commission, but for others studying public health and the medical industry in Massachusetts. Academic researchers, for example, could use such a large inventory of medical data for epidemiological studies. Because it was all de-identified, there was no harm in letting others see it, the GIC figured. In fact, it was such good data that private industry\u2014for example, businesses in the health management sec- tor\u2014might pay money for it. And so the GIC sold the data to businesses. The taxpayers might even benefit doubly from this decision: The data sale would provide a new revenue source to the state, and in the long run, a more informed health care industry might run more efficiently. But how de-identified really was the material?<\/p>\n<p>Latanya Sweeney was at the time a researcher at MIT (she went on to become a computer science professor at Carnegie Mellon University). She wondered how hard it would be for those who had received the deidentified data to \u201cre-identify\u201d the records and learn the medical problems of a particular state employee\u2014for example, the governor of the Commonwealth.<\/p>\n<p>Governor Weld lived, at that time, in Cambridge, Massachusetts. Cambridge, like many municipalities, makes its voter lists publicly available, for a charge of $15, and free for candidates and political organizations. If you know the precinct, they are available for only $.75. Sweeney spent a few dollars and got the voter lists for Cambridge. Anyone could have done the same. According to the Cambridge voter registration list, there were only six people in Cambridge with Governor Weld\u2019s birth date, only three of those were men, and only one of those lived in Governor Weld\u2019s five-digit zip code. Sweeney could use that combination of factors, birth date, gender, and zip code to recover the Governor\u2019s medical records\u2014and also those for members of his family, since the data was organized by employee. This type of re-identification is straightforward. In Cambridge, in fact, birth date alone was sufficient to identify more than 10% of the population. Nationally, gender, zip code, and date of birth are all it takes to identify 87% of the U.S. population uniquely.<\/p>\n<\/div>\n<div>\n<p>The data set contained far more than gender, zip code, and birth date. In fact, any of the 58 individuals who received the data in 1997 could have identified any of the 135,000 people in the database. \u201cThere is no patient con- fidentiality,\u201d said Dr. Joseph Heyman, president of the Massachusetts Medical Society. \u201cIt\u2019s gone.\u201d It is easy to read a story like this and scream, \u201cHeads should roll!.\u201d But it is actually quite hard to figure out <em>who, if anyone, made a mistake<\/em>. Certainly collecting the information was the right thing to do, given that health costs are a major expense for all businesses and institutions. The GIC made an hon- est effort to deidentify the data before releasing it. Arguably the GIC might not have released the data to other state agencies, but that would be like saying that every department of govern<span style=\"font-size: 1rem;text-align: initial\">ment should acquire its heating oil independently. Data is a valuable resource, and once someone has collected it, the government is entirely correct in wanting it used for the public good. Some might object to selling<\/span><\/p>\n<\/div>\n<div>\n<blockquote>\n<h4>It is easy to read a story like this and scream, \u201cHeads should roll!.\u201d But it is actually quite hard to figure out who, if anyone, made a mistake.<\/h4>\n<\/blockquote>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<p>the data to an outside business, but only in retrospect; had the data really been better de-identified, whoever made the decision to sell the data might well have been rewarded for helping to hold down the cost of government.<\/p>\n<p>Perhaps the mistake was the ease with which voter lists can be obtained. However, it is a tradition deeply engrained in our system of open elections that the public may know who is eligible to vote, and indeed who has voted. And voter lists are only one source of public data about the U.S. population. How many 21-year-old male Native Hawaiians live in Middlesex County, Massachusetts? In the year 2000, there were four. Anyone can browse the U.S. Census data, and sometimes it can help fill in pieces of a personal picture: Just go to factfinder.census.gov.<\/p>\n<p>The mistake was thinking that the GIC data was truly deidentified, when it was not. But with so many data sources available, and so much computing power that could be put to work connecting the dots, it is very hard to know just how much information has to be discarded from a database to make it truly anonymous. Aggregating data into larger units certainly helps releasing data by five-digit zip codes reveals less than releasing it by nine-digit zip codes. But the coarser the data, the less it reveals also of the valuable information for which it was made available. How can we solve a problem that results from many developments, no one of which is really a problem in itself?<\/p>\n<\/div>\n<div>\n<p>Why We Lost Our Privacy, or Gave It AwayInformation technology did not cause the end of privacy, any more than automotive technology caused teen sex. Technology creates opportunities and risks, and people, as individuals and as societies, decide how to live in the changed landscape of new possibilities. To understand why we have less pri- vacy today than in the past, we must look not just at the gadgets. To be sure, we should be wary of spies and thieves, but we should also look at those who protect us and help us and we should also take a good look in the mirror.<\/p>\n<p>We are most conscious of our personal information winding up in the hands of strangers when we think about data loss or theft. Reports like the one about the British tax office have become fairly common. The theft of information about 45 million customers of TJX stores, described in Chapter 5, \u201cSecret Bits,\u201d was even larger than the British catastrophe. In 2003, Scott Levine, owner of a mass email business named Snipermail, stole more than a billion personal information records from Acxiom. Millions of Americans are victimized by identity theft every year, at a total cost in the tens of billions of dollars annually. Many more of us harbor daily fears that just \u201ca little bit\u201d of our financial information has leaked out, and could be a personal time bomb if it falls into the wrong hands.<\/p>\n<p>Why can\u2019t we just keep our personal information to ourselves? Why do so many other people have it in the first place, so that there is an opportunity for it to go astray, and an incentive for creative crooks to try to steal it?<\/p>\n<p>We lose control of our personal information because of things we do to ourselves, and things others do to us. Of things we do to be ahead of the curve, and things we do because everyone else is doing them. Of things we do to save money, and things we do to save time. Of things we do to be safe from our enemies, and things we do because we feel invulnerable. Our loss of privacy is a problem, but there is no one answer to it, because there is no one reason why it is happening. It is a messy problem, and we first have to think about it one piece at a time. We give away information about ourselves voluntarily leave visible foot- prints of our daily lives\u2014because we judge, perhaps without thinking about it very much, that the benefits outweigh the costs. To be sure, the benefits are many.<\/p>\n<p>Saving TimeFor commuters who use toll roads or bridges, the risk-reward calculation is not even close. Time is money, and time spent waiting in a car is also anxiety and\u00a0<span style=\"font-size: 1rem;text-align: initial\">frustration. If there is an option to get a toll booth transponder, many com- muters will get one, even if the device costs a few dollars up front. Cruising past the cars waiting to pay with dollar bills is not just a relief; it actually brings the driver a certain satisfied glow.\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">The transponder, which the driver attaches to the windshield from inside the car, is an RFID, powered with a battery so identifying information can be sent to the sensor several feet away as the driver whizzes past. The sensor can be mounted in a constricted travel lane, where a toll booth for a human toll- taker might have been. Or it can be mounted on a boom above traffic, so the driver doesn\u2019t even need to change lanes or slow down.\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">And what is the possible harm? Of course, the state is recording the fact that the car has passed the sensor; that is how the proper account balance can be debited to pay the toll. When the balance gets too low, the driver\u2019s credit card may get billed automatically to replenish the balance. All that only makes the system better\u2014no fumbling for change or doing anything else to pay for your travels.<\/span><\/p>\n<\/div>\n<div>\n<p>The monthly bill\u2014for the Massachusetts Fast Lane, for example\u2014shows where and when you got on the highway\u2014when, accurate to the second. It also shows where you got off and how far you went. Informing you of the mileage is another useful service, because Massachusetts drivers can get a refund on certain fuel taxes, if the fuel was used on the state toll road. Of course, you do not need a PhD to figure out that the state also knows when you got off the road, to the second, and that with one subtraction and one division, its computers could figure out if you were speeding. Technically, in fact, it would be trivial for the state to print the appropriate speeding fine at the bottom of the statement, and to bill your credit card for that amount at the same time as it was charging for tolls. That would be taking convenience a bit too far, and no state does it, yet.<\/p>\n<p>What does happen right now, however, is that toll transponder records are introduced into divorce and child custody cases. You\u2019ve never been within five miles of that lady\u2019s house? Really? Why have you gotten off the high- way at the exit near it so many times? You say you can be the better custodial parent for your children, but the facts suggest otherwise. As one lawyer put it, \u201cWhen a guy says, \u2018Oh, I\u2019m home every day at five and I have dinner with my kids every single night,\u2019 you subpoena his E-ZPass and you find out he\u2019s crossing that bridge every night at 8:30. Oops!\u201d These records can be subpoenaed, and have been, hundreds of times, in family law cases. They have also been used in employment cases, to prove that the car of a worker who said he was working was actually far from the workplace. But most of us aren\u2019t planning to cheat on our spouses or our bosses, so the loss of privacy seems like no loss at all, at least compared to the time\u00a0<span style=\"font-size: 1rem;text-align: initial\">saved. Of course, if we actually <\/span><em style=\"font-size: 1rem;text-align: initial\">were <\/em><span style=\"font-size: 1rem;text-align: initial\">cheating, we <\/span><em style=\"font-size: 1rem;text-align: initial\">would <\/em><span style=\"font-size: 1rem;text-align: initial\">be in a big hurry, and might take some risks to save a few minutes!<\/span><\/p>\n<\/div>\n<div>\n<p>Saving MoneySometimes it\u2019s money, not time, which motivates us to leave footprints. Such is the case with supermarket loyalty cards. If you do not want Safeway to keep track of the fact that you bought the 12-pack of Yodels despite your recent cholesterol results, you can make sure it doesn\u2019t know. You simply pay the \u201cprivacy tax\u201d\u2014the surcharge for customers not presenting a loyalty card. The purpose of loyalty cards is to enable merchants to track individual item purchases. (Item-level transactions are typically not tracked by credit card companies, which do not care if you bought Yodels instead of granola, so long as you pay the bill.) With loyalty cards, stores can capture details of cash transactions as well. They can process all the transaction data, and draw inferences about shoppers\u2019 habits. Then, if a lot of people who buy Yodels also buy Bison Brew Beer, the store\u2019s automated cash register can automatically spit out a discount coupon for Bison Brew as your Yodels are being bagged. A \u201cdiscount\u201d for you, and more sales for Safeway. Everybody wins. Don\u2019t they?<\/p>\n<p>As grocery stores expand their web-based business, it is even easier for them to collect personal information about you. Reading the fine print when you sign up is a nuisance, but it is worth doing, so you understand what you are giving and what you are getting in return. Here are a few sentences of Safeway\u2019s privacy policy for customers who use its web site:<\/p>\n<p>Safeway may use personal information to provide you with news- letters, articles, product or service alerts, new product or service announcements, saving awards, event invitations, personally tailored coupons, program and promotional information and offers, and other information, which may be provided to Safeway by other companies.\u2026 We may provide personal information to our partners and suppliers for customer support services and processing of personal information on behalf of Safeway. We may also share personal information with our affiliate companies, or in the course of an actual or potential sale, re-organization, consolidation, merger, or amalgamation of our business or businesses.<\/p>\n<p>Dreary reading, but the language gives Safeway lots of leeway. Maybe you don\u2019t care about getting the junk mail. Not everyone thinks it is junk, and the\u00a0<span style=\"font-size: 1rem;text-align: initial\">company does let you \u201copt out\u201d of receiving it (although in general, few people bother to exercise opt-out rights). But Safeway has lots of \u201caffiliates,\u201d and who knows how many companies with which it <\/span><em style=\"font-size: 1rem;text-align: initial\">might <\/em><span style=\"font-size: 1rem;text-align: initial\">be involved in a merger or sale of part of its business. Despite privacy concerns voiced by groups like C.A.S.P.I.A.N. (Consumers Against Supermarket Privacy Invasion and Numbering, www.nocards.org), most shoppers readily agree to have the data collected. The financial incentives are too hard to resist, and most consumers just don\u2019t worry about marketers knowing their purchases. But when- ever purchases can be linked to your name, there is a record, somewhere in a huge database, of whether you use regular or super tampons, lubricated or unlubricated condoms, and whether you like regular beer or lite. You have authorized the company to share it, and even if you hadn\u2019t, the company could lose it accidentally, have it stolen, or have it subpoenaed.<\/span><\/p>\n<\/div>\n<div>\n<p>Convenience of the CustomerThe most obvious reason not to worry about giving information to a company is that you do business with them, and it is in your interest to see that they do their business with you better. You have no interest in whether they make more money from you, but you do have a strong interest in making it easier and faster for you to shop with them, and in cutting down the amount of stuff they may try to sell you that you would have no interest in buying. So your interests and theirs are, to a degree, aligned, not in opposition. Safeway\u2019s privacy policy states this explicitly: \u201cSafeway Club Card information and other information may be used to help make Safeway\u2019s products, services, and programs more useful to its customers.\u201d Fair enough.<\/p>\n<p>No company has been more progressive in trying to sell customers what they might want than the online store Amazon. Amazon suggests products to repeat customers, based on what they have bought before or what they have simply looked at during previous visits to Amazon\u2019s web site. The algorithms are not perfect; Amazon\u2019s computers are drawing inferences from data, not being clairvoyant. But Amazon\u2019s guesses are pretty good, and recommending the wrong book every now and then is a very low-cost mistake. If Amazon does it too often, I might switch to Barnes and Noble, but there is no injury to me. So again: Why should anyone care that Amazon knows so much about me? On the surface, it seems benign. Of course, we don\u2019t want the credit card information to go astray, but who cares about knowing what books I have looked at online?<\/p>\n<p>Our indifference is another marker of the fact that we are living in an exposed world, and that it feels very different to live here. In 1988, when a<\/p>\n<\/div>\n<div>\n<blockquote><p><strong>H<\/strong><strong>OW <\/strong><strong>S<\/strong><strong>ITES <\/strong><strong>K<\/strong><strong>NOW <\/strong><strong>W<\/strong><strong>HO <\/strong><strong>Y<\/strong><strong>OU <\/strong><strong>A<\/strong><strong>RE<\/strong><\/p>\n<p>1.\u00a0\u00a0\u00a0 <strong>You <\/strong><strong>tell them<\/strong>. Log in to Gmail, Amazon, or eBay, and you are letting them know exactly who you are.<\/p>\n<p>2.\u00a0\u00a0\u00a0 <strong>They\u2019ve left cookies on one of your previous visits<\/strong>. A <em>cookie <\/em>is a small text file stored on your local hard drive that contains information that a particular web site wants to have available during your current session (like your shopping cart), or from one session to the next. Cookies give sites persistent information for tracking and personalization. Your browser has a command for showing cookies\u2014you may be surprised how many web sites have left them!<\/p>\n<p>3.\u00a0\u00a0\u00a0 <strong>They have your IP address<\/strong>. The web server has to know where you are so that it can ship its web pages to you. Your IP address is a number like 66.82.9.88 that locates your computer in the Internet (see the Appendix for details). That address may change from one day to the next. But in a residential setting, your Internet Service Provider (your <em>ISP<\/em>\u2014typically your phone or cable company) knows who was assigned each IP address at any time. Those records are often subpoenaed in court cases.<\/p>\n<p>If you are curious about who is using a particular IP address, you can check the American Registry of Internet Numbers (www.arin.net). Services such as whatismyip.com, whatismyip.org, and ipchicken.com also allow you to check your own IP address. And <a href=\"http:\/\/www.whois.net\/\">www.whois.net <\/a>allows you to check who owns a domain name such as harvard.com\u2014which turns out to be the Harvard Bookstore, a privately owned bookstore right across the street from the university. Unfortunately, that information won\u2019t reveal who is sending you spam, since spammers routinely forge the source of email they send you.<\/p><\/blockquote>\n<p>videotape rental store clerk turned over Robert Bork\u2019s movie rental records to a Washington, DC newspaper during Bork\u2019s Supreme Court confirmation hearings, Congress was so outraged that it quickly passed a tough privacy protection bill, The Video Privacy Protection Act. Videotape stores, if any still exist, can be fined simply for keeping rental records too long. Twenty years later, few seem to care much what Amazon does with its millions upon millions of detailed, fine-grained views into the brains of all its customers.<\/p>\n<p>It\u2019s Just Fun to Be ExposedSometimes, there can be no explanation for our willing surrender of our privacy except that we take joy in the very act of exposing ourselves to public\u00a0<span style=\"font-size: 1rem;text-align: initial\">view. Exhibitionism is not a new phenomenon. Its practice today, as in the past, tends to be in the province of the young and the drunk, and those wish- ing to pretend they are one or the other. That correlation is by no means perfect, however. A university president had to apologize when an image of her threatening a Hispanic male with a stick leaked out from her MySpace page, with a caption indicating that she had to \u201cbeat off the Mexicans because they were constantly flirting with my daughter.\u201d<\/span><\/p>\n<\/div>\n<div>\n<p>And there is a continuum of outrageousness. The less wild of the party photo postings blend seamlessly with the more personal of the blogs, where the bloggers are chatting mostly about their personal feelings. Here there is not exuberance, but some simpler urge<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<blockquote>\n<h4>Bits don\u2019t fade and they don\u2019t yellow. Bits are forever. And we don\u2019t know how to live with that.<\/h4>\n<\/blockquote>\n<p>for human connectedness. That passion, too, is not new. What <em>is <\/em>new is that a photo or video or diary entry, once posted, is visible to the entire world, and that there is no taking it\u00a0<span style=\"font-size: 1rem;text-align: initial\">back. Bits don\u2019t fade and they don\u2019t yellow. Bits are forever. And we don\u2019t know how to live with that.<\/span><\/p>\n<\/div>\n<div>\n<p>For example, a blog selected with no great design begins:<\/p>\n<p>This is the personal web site of Sarah McAuley. \u2026 I think sharing my life with strangers is odd and narcissistic, which of course is why I\u2019m addicted to it and have been doing it for several years now. Need more? You can read the \u201cAbout Me\u201d section, drop me an email, or you know, just read the drivel that I pour out on an almost-daily basis.<\/p>\n<p>No thank you, but be our guest. Or consider that there is a Facebook group just for women who want to upload pictures of themselves uncontrollably drunk. Or the Jennicam, through which Jennifer Kay Ringley opened her life to the world for seven years, setting a standard for exposure that many since have surpassed in explicitness, but few have approached in its endless ordinariness. We are still experimenting, both the voyeurs and viewed.<\/p>\n<p>Because You Can\u2019t Live Any Other WayFinally, we give up data about ourselves because we don\u2019t have the time, patience, or single-mindedness about privacy that would be required to live our daily lives in another way. In the U.S., the number of credit, debit, and bank cards is in the billions. Every time one is used, an electronic handshake records a few bits of information about who is using it, when, where, and for what. It is now virtually unheard of for people to make large purchases of\u00a0<span style=\"font-size: 1rem;text-align: initial\">ordinary consumer goods with cash. Personal checks are going the way of cassette tape drives, rendered irrelevant by newer technologies. Even if you could pay cash for everything you buy, the tax authorities would have you in their databases anyway. There even have been proposals to put RFIDs in currency notes, so that the movement of cash could be tracked.<\/span><\/p>\n<\/div>\n<div>\n<p>Only sects such as the Amish still live without electricity. It will soon be almost that unusual to live without Internet connectivity, with all the finger- prints it leaves of your daily searches and logins and downloads. Even the old dumb TV is rapidly disappearing in favor of digital communications. Digital TV will bring the advantages of video on demand\u2014no more trips to rent movies or waits for them to arrive in the mail\u2014at a price: Your television service provider will record what movies you have ordered. It will be so attractive to be able to watch what we want when we want to watch it, that we won\u2019t miss either the inconvenience or the anonymity of the days when all the TV stations washed your house with their airwaves. You couldn\u2019t pick the broadcast times, but at least no one knew which waves you were grabbing out of the air.<\/p>\n<p>Little Brother Is WatchingSo far, we have discussed losses of privacy due to things for which we could, in principle anyway, blame ourselves. None of us really needs a loyalty card, we should always read the fine print when we rent a car, and so on. We would all be better off saying \u201cno\u201d a little more often to these privacy-busters, but few of us would choose to live the life of constant vigilance that such res- olute denial would entail. And even if we were willing to make those sacri- fices, there are plenty of other privacy problems caused by things others do to us.<\/p>\n<p>The snoopy neighbor is a classic American stock figure the busybody who watches how many liquor bottles are in your trash, or tries to figure out whose Mercedes is regularly parked in your driveway, or always seems to know whose children were disorderly last Saturday night. But in Cyberspace, we are all neighbors. We can all check up on each other, without even opening the curtains a crack.<\/p>\n<p>Public Documents Become VERY PublicSome of the snooping is simply what anyone could have done in the past by paying a visit to the Town Hall. Details that were always public\u2014but inacces- sible\u2014are quite accessible now.\u00a0<span style=\"font-size: 1rem;text-align: initial\">In 1975, Congress created the Federal Election Commission to administer the Federal Election Campaign Act. Since then, all political contributions have been public information. There is a difference, though, between \u201cpublic\u201d and \u201creadily accessible.\u201d Making public data available on the Web shattered the veil of privacy that came from inaccessibility. <\/span><span style=\"font-size: 1rem;text-align: initial\">Want to know who gave money to Al Franken for Senate? Lorne Michaels from Saturday Night Live, Leonard Nimoy, Paul Newman, Craig Newmark (the \u201ccraig\u201d of craigslist.com), and Ginnie W., who works with us and may not have wanted us to know her political leanings. Paul B., and Henry G., friends of ours, covered their bases by giving to both Obama and Clinton.<\/span><\/p>\n<\/div>\n<div>\n<p>The point of the law was to make it easy to look up big donors. But since data is data, what about checking on your next-door neighbors? Ours defi- nitely leaned toward Obama over Clinton, with no one in the Huckabee camp. Or your clients? One of ours gave heartily to Dennis Kucinich. Or your daugh- ter\u2019s boyfriend? You can find out for yourself, at <a href=\"http:\/\/www.fec.gov\/\">www.fec.gov <\/a>or fundrace.huffingtonpost.com. We\u2019re not telling about our own.<\/p>\n<p>Hosts of other facts are now available for armchair browsing facts that in the past were nominally public but required a trip to the Registrar of Deeds. If you want to know what you neighbor paid for their house, or what it\u2019s worth today, many communities put all of their real estate tax rolls online. It was always public; now it\u2019s accessible. It was never wrong that people could get this information, but it feels very different now that people can browse through it from the privacy of their home. If you are curious about someone, you can try to find him or her on Facebook, MySpace, or just using an ordinary search engine. A college would not peek at the stupid Facebook page of an applicant, would it? Absolutely not, says the Brown Dean of Admissions, \u201cunless someone says there\u2019s some- thing we should look at.\u201d<\/p>\n<p>New participatory websites create even bigger opportunities for information-sharing. If you are about to go on a blind date, there are special sites just for that. Take a look at <a href=\"http:\/\/www.dontdatehimgirl.com\/\">www.dontdatehimgirl.com, <\/a>a social networking site with a self-explanatory focus. When we checked, this warning about one man had just been posted, along with his name and photograph: \u201cCompulsive womanizer, liar, internet cheater; pathological liar who can\u2019t be trusted as a friend much less a boyfriend. Total creep! Twisted and sick\u2014needs mental help. Keep your daughter away from this guy!\u201d Of course, such information may be worth exactly what we paid for it. There is a similar site, <a href=\"http:\/\/www.platewire.com\/\">www.platewire.com, <\/a>for reports about bad drivers. If you are not dating or driving, perhaps you\u2019d like to check out a neighborhood before you move in, or just register a public warning about the obnoxious revelers who live next door to you. If so, <a href=\"http:\/\/www.rottenneighbor.com\/\">www.rottenneighbor.com <\/a>is the site for you. When we\u00a0<span style=\"font-size: 1rem;text-align: initial\">typed in the zip code in which one of us lives, a nice Google map appeared with a house near ours marked in red. When we clicked on it, we got this report on our neighbor: <\/span><span style=\"font-size: 1rem;text-align: initial\">you\u2019re a pretty blonde, slim and gorgeous. hey, i\u2019d come on to you if i weren\u2019t gay. you probably have the world handed to you like most pretty women. is that why you think that you are too good to pick up after your dog? you know that you are breaking the law as well as being disrespectful of your neighbors. well, i hope that you step in your own dogs poop on your way to work, or on your way to dinner. i hope that the smell of your self importance follows you all day.<\/span><\/p>\n<\/div>\n<div>\n<p>For a little money, you can get a lot more information. In January 2006, John Aravosis, creator of Americablog.com, purchased the detailed cell phone records of General Wesley Clark. For $89.95, he received a listing of all of Clark\u2019s calls for a three-day period. There are dozens of online sources for this kind of information. You might think you\u2019d have to be in the police or the FBI to find out who people are calling on their cell phones, but there are handy services that promise to provide anyone with that kind of information for a modest fee. The <em>Chicago Sun Times <\/em>decided to put those claims to a test, so it paid $110 to locatecell.com and asked for a month\u2019s worth of cell phone records of one Frank Main, who happened to be one of its own reporters. The <em>Sun Times <\/em>did it all with a few keystrokes\u2014provided the telephone number, the dates, and a credit card number. The request went in on Friday of a long weekend, and on Tuesday morning, a list came back in an email. The list included 78 telephone numbers the reporter had called\u2014 sources in law enforcement, people he was writing stories about, and editors in the newspaper. It was a great service for law enforcement\u2014except that criminals can use it too, to find out whom the detectives are calling. These incidents stimulated passage of the Telephone Records and Privacy Act of 2006, but in early 2008, links on locatecell.com were still offering to help \u201cfind cell phone records in seconds,\u201d and more.<\/p>\n<p>If cell phone records are not enough information, consider doing a proper background check. For $175, you can sign up as an \u201cemployer\u201d with ChoicePoint and gain access to reporting services including criminal records, credit history, motor vehicle records, educational verification, employment verification, Interpol, sexual offender registries, and warrants searchers\u2014they are all there to be ordered, with <em>a la carte <\/em>pricing. Before we moved from paper to bits, this information was publicly available, but largely inaccessible. Now, all it takes is an Internet connection and a credit card. This is one\u00a0<span style=\"font-size: 1rem;text-align: initial\">of the most important privacy transformations. Information that was previously available only to professionals with specialized access or a legion of local workers is now available to everyone.<\/span><\/p>\n<\/div>\n<div>\n<p>Then there is real spying. Beverly O\u2019Brien suspected her husband was having an affair. If not a physical one, at a minimum she thought he was engaging in inappropriate behavior online. So, she installed some monitoring software. Not hard to do on the family computer, these packages are promoted as \u201cparental control software\u201d a tool to monitor your child\u2019s activities, along with such other uses as employee monitoring, law enforcement, and to \u201ccatch a cheating spouse.\u201d Beverly installed the software, and discovered that her hapless hubby, Kevin, was chatting away while playing Yahoo! Dominoes. She was an instant spy, a domestic wire-tapper. The marketing materials for her software neglected to tell her that installing spyware that intercepts communications traffic was a direct violation of Florida\u2019s Security of Communications Act, and the trial court refused to admit any of the evidence in their divorce proceeding. The legal system worked, but that didn\u2019t change the fact that spying has become a relatively commonplace activity, the domain of spouses and employers, jilted lovers, and business competitors.<\/p>\n<p>Idle CuriosityThere is another form of Little Brother-ism, where amateurs can sit at a computer connected to the Internet and just look for something interesting not about their neighbors or husbands, but about anyone at all. With so much data out there, anyone can discover interesting personal facts, with the\u00a0<span style=\"font-size: 1rem;text-align: initial\">investment of a little time and a little imagination. To take a different kind of example, imagine having your family\u2019s medical history re-identified from a paper in an online medical journal.<\/span><\/p>\n<\/div>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-455\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04134813\/Image_021.gif\" alt=\"\" width=\"208\" height=\"352\" \/><\/p>\n<p>Figure 2.4 shows a map of the incidence of a disease, let\u2019s say syphilis, in a part of Boston. The \u201csyphilis epidemic\u201d in this illustration is actually a sim- ulation. The data was just made up, but maps exactly like this have been common in journals for decades. Because the area depicted is more than 10 square kilometers, there is no way to figure out which house corresponds to a dot, only which neighborhood.<\/p>\n<p>Source: John S. Brownstein, Christopher A. Cassa, Kenneth D. Mandl, No place to hide\u2014reverse identification of patients from published maps, <em>New England Journal of Medicine<\/em>, 355:16, October 19, 2007, 1741-1742.<\/p>\n<p><strong>FIGURE 2.4\u00a0\u00a0\u00a0\u00a0\u00a0\u00a0 <\/strong>Map of part of Boston as from a publication in a medical journal, showing where a disease has occurred. (Simulated data.)<\/p>\n<p>At least that was true in the days when journals were only print documents. Now journals are available online, and authors have to submit their\u00a0<span style=\"font-size: 1rem;text-align: initial\">figures as high-resolution JPEGs. Figure 2.5 shows what happens if you download the published journal article from the journal\u2019s web site, blow up a small part of the image, and superimpose it on an easily available map of the corresponding city blocks. For each of the seven disease locations, there is only a single house to which it could correspond. Anyone could figure out where the people with syphilis live.<\/span><\/p>\n<\/div>\n<div>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-456 size-full\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/04134816\/Image_022.gif\" alt=\"\" width=\"376\" height=\"229\" \/><\/p>\n<p>Source: John S. Brownstein, Christopher A. Cassa, Kenneth D. Mandl, No place to hide\u2014reverse identification of patients from published maps, <em>New England Journal of Medicine<\/em>, 355:16, October 19, 2007, 1741-1742.<\/p>\n<p><strong>FIGURE 2.5 <\/strong>Enlargement of Figure 2.4 superimposed on a housing map of a few blocks of the city, showing that individual households can be identified to online readers, who have access to the high-resolution version of the epidemiology map.<\/p>\n<p>This is a re-identification problem, like the one Latanya Sweeney noted when she showed how to get Governor Weld\u2019s medical records. There are things that can be done to solve this one. Perhaps the journal should not use such high-resolution images (although that could cause a loss of crispness, or even visibility\u2014one of the nice things about online journals is that the visually impaired can magnify them, to produce crisp images at a very large scale). Perhaps the data should be \u201cjittered\u201d or \u201cblurred\u201d so what appears on the screen for illustrative purposes is intentionally incorrect in its fine details. There are always specific policy responses to specific re-identification scenarios. Every scenario is a little different, however, and it is often hard to articulate sensible principles to describe what should be fixed.<\/p>\n<\/div>\n<div>\n<p>In 2001, four MIT students attempted to re-identify Chicago homicide victims for a course project. They had extremely limited resources: no proprietary databases such as the companies that check credit ratings possess, no access to government data, and very limited computing power. Yet they were able to identify nearly 8,000 individuals from a target set of 11,000.<\/p>\n<p>The source of the data was a free download from the Illinois Criminal Justice Authority. The primary reference data source was also free. The Social Security Administration provides a comprehensive death index including name, birth date, Social Security Number, zip code of last residence, date of death, and more. Rather than paying the nominal fee for the data (after all, they were students), these researchers used one of the popular genealogy web sites, RootsWeb.com, as a free source for the Social Security Death Index (SSDI) data. They might also have used municipal birth and death records, which are also publicly available.<\/p>\n<p>The SSDI did not include gender, which was important to completing an accurate match. But more public records came to the rescue. They found a database published by the census bureau that enabled them to infer gender from first names\u2014most people named \u201cRobert\u201d are male, and most named \u201cSusan\u201d are female. That, and some clever data manipulation, was all it took. It is far from clear that it was wrong for any particular part of these data sets to be publicly available, but the combination revealed more than was intended.<\/p>\n<p>The more re-identification problems we see, and the more <em>ad hoc <\/em>solutions we develop, the more we develop a deep-set fear that our problems may never end. These problems arise because there is a great deal of public data, no one piece of which is problematic, but which creates privacy violations in combination. It is the opposite of what we know about salt\u2014that the component elements, sodium and chlorine, are both toxic, but the compound itself is safe. Here we have toxic compounds arising from the clever combination of harm- less components. What can possibly be done about <em>that?<\/em><\/p>\n<p>Big Brother, Abroad and in the U.S.Big Brother really is watching today, and his job has gotten much easier because of the digital explosion. In China, which has a long history of tracking individuals as a mechanism of social control, the millions of residents of Shenzhen are being issued identity cards, which record far more than the bearer\u2019s name and address. According to a report in the <em>New York Times<\/em>, the cards will document the individual\u2019s work history, educational background,\u00a0<span style=\"font-size: 1rem;text-align: initial\">religion, ethnicity, police record, medical insurance status, landlord\u2019s phone number, and reproductive history. Touted as a crime-fighting measure, the new technology\u2014developed by an American company\u2014will come in handy in case of street protests or any individual activity deemed suspicious by the authorities. The sort of record-keeping that used to be the responsibility of local authorities is becoming automated and nationalized as the country prospers and its citizens become increasingly mobile. The technology makes it easier to know where everyone is, and the government is taking advantage of that opportunity. Chinese tracking is far more detailed and pervasive than Britain\u2019s ubiquitous surveillance cameras.<\/span><\/p>\n<\/div>\n<div>\n<p>You Pay for the Mike, We\u2019ll Just Listen InPlanting tiny microphones where they might pick up conversations of under- world figures used to be risky work for federal authorities. There are much safer alternatives now that many people carry their own radio-equipped microphones with them all the time.<\/p>\n<p>Many cell phones can be reprogrammed remotely so that the microphone is always on and the phone is transmitting, even if you think you have pow- ered it off. The FBI used this technique in 2004 to listen to John Tomero\u2019s con- versations with other members of his organized crime family. A federal court ruled that this \u201croving bug,\u201d installed after due authorization, constituted a legal from of wiretapping. Tomero could have prevented it by removing the battery, and now some nervous business executives routinely do exactly that. The microphone in a General Motors car equipped with the OnStar system can also be activated remotely, a feature that can save lives when OnStar operators contact the driver after receiving a crash signal. OnStar warns, \u201cOnStar will cooperate with official court orders regarding criminal investigations from law enforcement and other agencies,\u201d and indeed, the FBI has used this method to eavesdrop on conversations held inside cars. In one case, a federal court ruled against this way of collecting evidence\u2014but not on privacy grounds. The roving bug disabled the normal operation of OnStar, and the court simply thought that the FBI had interfered with the vehicle owner\u2019s contractual right to chat with the OnStar operators!<\/p>\n<p>Identifying Citizens\u2014Without ID CardsIn the age of global terrorism, democratic nations are resorting to digital surveillance to protect themselves, creating hotly contested conflicts with traditions of individual liberty. In the United States, the idea of a national\u00a0<span style=\"font-size: 1rem;text-align: initial\">identification card causes a furious libertarian reaction from parties not usu- ally outspoken in defense of individual freedom. Under the REAL ID act of 2005, uniform federal standards are being implemented for state-issued drivers\u2019 licenses. Although it passed through Congress without debate, the law is opposed by at least 18 states. Resistance pushed back the implementation timetable first to 2009, and then, in early 2008, to 2011. Yet even fully implemented, REAL ID would fall far short of the true national ID preferred by those charged with fighting crime and preventing terrorism.<\/span><\/p>\n<\/div>\n<div>\n<p>As the national ID card debate continues in the U.S., the FBI is making it irrelevant by exploiting emerging technologies. There would be no need for anyone to carry an ID card if the govern-<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<blockquote>\n<h4>As the national ID card debate continues in the U.S., the FBI is making it irrelevant by exploiting emerging technologies.<\/h4>\n<\/blockquote>\n<p>ment had enough biometric data on Americans\u2014that is, detailed records of their fingerprints, irises, voices, walking gaits, facial features, scars, and the shape of their earlobes. Gather a combination of measurements on individuals walking in\u00a0<span style=\"font-size: 1rem;text-align: initial\">public places, consult the databases, connect the dots, and\u2014bingo!\u2014their names pop up on the computer screen. No need for them to carry ID cards; the combination of biometric data would pin them down perfectly.<\/span><\/p>\n<\/div>\n<div>\n<p>Well, only imperfectly at this point, but the technology is improving. And the data is already being gathered and deposited in the data vault of the FBI\u2019s Criminal Justice Information Services database in Clarksburg, West Virginia. The database already holds some 55 million sets of fingerprints, and the FBI processes 100,000 requests for matches every day. Any of 900,000 federal, state, and local law enforcement officers can send a set of prints and ask the FBI to identify it. If a match comes up, the individual\u2019s criminal history is there in the database too.<\/p>\n<p>But fingerprint data is hard to gather; mostly it is obtained when people are arrested. The goal of the project is to get identifying information on nearly everyone, and to get it without bothering people too much. For example, a simple notice at airport security could advise travelers that, as they pass through airport security, a detailed \u201csnapshot\u201d will be taken as they enter the secure area. The traveler would then know what is happening, and could have refused (and stayed home). As an electronic identification researcher puts it, \u201cThat\u2019s the key. You\u2019ve chosen it. You have chosen to say, \u2018Yeah, I want this place to recognize me.\u2019\u201d No REAL ID controversies, goes the theory; all the data being gathered would, in some sense at least, be offered voluntarily.<\/p>\n<\/div>\n<div>\n<p>Friendly Cooperation Between Big SiblingsIn fact, there are two Big Brothers, who often work together. And we are, by and large, glad they are watching, if we are aware of it at all. Only occasion- ally are we alarmed about their partnership.<\/p>\n<p>The first Big Brother is Orwell\u2019s\u2014the government. And the other Big Brother is the industry about which most of us know very little: the business of aggregating, consolidating, analyzing, and reporting on the billions of individual transactions, financial and otherwise, that take place electronically every day. Of course, the commercial data aggregation companies are not in the spying business; none of their data reaches them illicitly. But they do know a lot about us, and what they know can be extremely valuable, both to businesses and to the government.<\/p>\n<p>The new threat to privacy is that computers can extract significant information from billions of apparently uninteresting pieces of data, in the way that mining technology has made it economically feasible to extract precious metals from low-grade ore. Computers can correlate databases on a massive level, linking governmental data sources together with private and commercial ones, creating comprehensive digital dossiers on millions of people. With their massive data storage and processing power, they can make connections in the data, like the clever connections the MIT students made with the Chicago homicide data, but using brute force rather than ingenuity. And the computers can discern even very faint traces in the data\u2014traces that may help track payments to terrorists, set our insurance rates, or simply help us be sure that our new babysitter is not a sex offender. And so we turn to the story of the government and the aggregators.<\/p>\n<p>Acxiom is the country\u2019s biggest customer data company. Its business is to aggregate transaction data from all those swipes of cards in card readers all over the world\u2014in 2004, this amounted to more than a billion transactions a day. The company uses its massive data about financial activity to support the credit card industry, banks, insurers, and other consumers of information about how people spend money. Unsurprisingly, after the War on Terror began, the Pentagon also got interested in Acxiom\u2019s data and the ways they gather and analyze it. Tracking how money gets to terrorists might help find the terrorists and prevent some of their attacks.<\/p>\n<p>ChoicePoint is the other major U.S. data aggregator. ChoicePoint has more than 100,000 clients, which call on it for help in screening employment candidates, for example, or determining whether individuals are good insurance risks. Acxiom and ChoicePoint are different from older data analysis operations, simply because of the scale of their operations. Quantitative differences have\u00a0<span style=\"font-size: 1rem;text-align: initial\">qualitative effects, as we said in Chapter 1; what has changed is not the technology, but rather the existence of rich data sources. Thirty years ago, credit cards had no magnetic stripes. Charging a purchase was a mechanical operation; the raised numerals on the card made an impression through carbon paper so you could have a receipt, while the top copy went to the company that issued the card. Today, if you charge something using your CapitalOne card, the bits go instantly not only to CapitalOne, but to Acxiom or other aggregators. The ability to search through huge commercial data sources\u2014 including not just credit card transaction data, but phone call records, travel tickets, and banking transactions, for example\u2014is another illustration that more of the same can create something new.<\/span><\/p>\n<\/div>\n<div>\n<p>Privacy laws do exist, of course. For a bank, or a data aggregator, to post your financial data on its web site would be illegal. Yet privacy is still devel- oping as an area of the law, and it is connected to commercial and govern- ment interests in uncertain and surprising ways.<\/p>\n<p>A critical development in privacy law was precipitated by the presidency of Richard Nixon. In what is generally agreed to be an egregious abuse of presidential power, Nixon used his authority as president to gather informa- tion on those who opposed him\u2014in the words of his White House Counsel at the time, to \u201cuse the available federal machinery to screw our political ene- mies.\u201d Among the tactics Nixon used was to have the Internal Revenue Service audit the tax returns of individuals on an \u201cenemies list,\u201d which included congressmen, journalists, and major contributors to Democratic causes. Outrageous as it was to use the IRS for this purpose, it was not ille- gal, so Congress moved to ban it in the future.<\/p>\n<p>The Privacy Act of 1974 established broad guidelines for when and how the Federal Government can assemble dossiers on citizens it is not investigat- ing for crimes. The government has to give public notice about what infor- mation it wants to collect and why, and it has to use it only for those reasons. The Privacy Act limits what the government can do to gather information about individuals and what it can do with records it holds. Specifically, it states, \u201cNo agency shall disclose any record which is contained in a system of records by any means of communication to any person, or to another agency, except pursuant to a written request by, or with the prior written con- sent of, the individual to whom the record pertains, unless \u2026.\u201d If the govern- ment releases information inappropriately, even to another government agency, the affected citizen can sue for damages in civil court. The protections provided by the Privacy Act are sweeping, although not as sweeping as they may seem. Not every government office is in an \u201cagency\u201d; the courts are not, for example. The Act requires agencies to give public notice of the uses to which they will put the information, but the notice can be buried in the<\/p>\n<\/div>\n<div>\n<p>Federal Register where the public probably won\u2019t see it unless news media happen to report it. Then there is the \u201cunless\u201d clause, which includes significant exclusions. For example, the law does not apply to disclosures for statistical, archival, or historical purposes, civil or criminal law enforcement activities, Congressional investigations, or valid Freedom of Information Act requests.<\/p>\n<p>In spite of its exclusions, government practices changed significantly because of this law. Then, a quarter century later, came 9\/11. <em>Law enforcement <\/em><em>should have seen it all coming<\/em>, was the constant refrain as investigations revealed how many unconnected dots were in the hands of different govern ment agencies. <em>It all could have been prevented if the investigative fiefdoms had been talking to each other. They should have been able to connect the dots<\/em>. But they could not in part because the Privacy Act restricted inter-agency data transfers. A response was badly needed. The Department of Homeland Security was created to ease some of the interagency communication problems, but that government reorganization was only a start.<\/p>\n<p>In January 2002, just a few months after the World Trade Center attack, the Defense Advanced Research Projects Agency (DARPA) established the Information Awareness Office (IAO) with a mission to:<\/p>\n<p>imagine, develop, apply, integrate, demonstrate, and transition information technologies, components and prototype, closed-loop, information systems that will counter asymmetric threats by achieving total information awareness useful for preemption; national security warning; and national security decision making. The most serious asymmetric threat facing the United States is terrorism, a threat characterized by collections of people loosely organized in shadowy net- works that are difficult to identify and define. IAO plans to develop technology that will allow understanding of the intent of these net- works, their plans, and potentially define opportunities for disrupting or eliminating the threats. To effectively and efficiently carry this out, we must promote sharing, collaborating, and reasoning to convert nebulous data to knowledge and actionable options.<\/p>\n<p>Vice Admiral John Poindexter directed the effort that came to be known as \u201cTotal Information Awareness\u201d (TIA). The growth of enormous private data repositories provided a convenient way to avoid many of the prohibitions of the Privacy Act. The Department of Defense can\u2019t get data from the Internal Revenue Service, because of the 1974 Privacy Act. <em>But they can both buy it from private data aggregators! <\/em>In a May 2002 email to Adm. Poindexter, Lt. Col Doug Dyer discussed negotiations with Acxiom.<\/p>\n<\/div>\n<div>\n<p>Acxiom\u2019s Jennifer Barrett is a lawyer and chief privacy officer. She\u2019s testified before Congress and offered to provide help. One of the key suggestions she made is that people will object to Big Brother, wide- coverage databases, but they don\u2019t object to use of relevant data for specific purposes that we can all agree on. Rather than getting all the data for any purpose, we should start with the goal, tracking terrorists to avoid attacks, and then identify the data needed (although we can\u2019t define all of this, we can say that our templates and models of terror- ists are good places to start). Already, this guidance has shaped my thinking.<\/p>\n<p>Ultimately, the U.S. may need huge databases of commercial transactions that cover the world or certain areas outside the U.S. This information provides economic utility, and thus provides two reasons why foreign countries would be interested. Acxiom could build this mega- scale database.<\/p>\n<p>The <em>New York Times <\/em>broke the story in October 2002. As Poindexter had explained in speeches, the government had to \u201cbreak down the stovepipes\u201d separating agencies, and get more sophisticated about how to create a big picture out of a million details, no one of which might be meaningful in itself. The <em>Times <\/em>story set off a sequence of reactions from the Electronic Privacy Information Center and civil libertarians. Congress defunded the office in 2003. Yet that was not the end of the idea.<\/p>\n<p>The key to TIA was data mining, looking for connections across disparate data repositories, finding patterns, or \u201csignatures,\u201d that might identify terror- ists or other undesirables. The General Accountability Office report on Data Mining (GAO-04-548) reported on their survey of 128 federal departments. They described 199 separate data mining efforts, of which 122 used personal information.<\/p>\n<p>Although IAO and TIA went away, Project ADVISE at the Department of Homeland Security continued with large-scale profiling system development. Eventually, Congress demanded that the privacy issues concerning this pro- gram be reviewed as well. In his June 2007 report (OIG-07-56), Richard Skinner, the DHS Inspector General, stated that \u201cprogram managers did not address privacy impacts before implementing three pilot initiatives,\u201d and a few weeks later, the project was shut down. But ADVISE was only one of twelve data-mining projects going on in DHS at the time. Similar privacy concerns led to the cancellation of the Pentagon\u2019s TALON database project. That project sought to compile a database of reports of\u00a0<span style=\"font-size: 1rem;text-align: initial\">suspected threats to defense facilities as part of a larger program of domestic counterintelligence.\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">The Transportation Security Administration (TSA) is responsible for airline passenger screening. One proposed system, CAPPS II, which was ultimately terminated over privacy concerns, sought to bring together disparate data sources to determine whether a particular individual might pose a transportation threat. Color-coded assessment tags would determine whether you could board quickly, be subject to further screening, or denied access to air travel. The government creates projects, the media and civil liberties groups raise serious privacy concerns, the projects are cancelled, and new ones arise to take their place. The cycle seems to be endless. In spite of Americans\u2019 traditional suspicions about government surveillance of their private lives, the cycle seems to be almost an inevitable consequence of Americans\u2019 concerns about their security, and the responsibility that government officials feel to use the best available technologies to protect the nation. Corporate databases often contain the best information on the people about whom the govern<\/span><span style=\"font-size: 1rem;text-align: initial\">ment is curious.<\/span><\/p>\n<\/div>\n<div>\n<p>Technology Change and Lifestyle ChangeNew technologies enable new kinds of social interactions. There were no sub- urban shopping malls before private automobiles became cheap and widely used. Thirty years ago, many people getting off an airplane reached for cigarettes; today, they reach for cell phones. As Heraclitus is reported to have said 2,500 years ago, \u201call is flux\u201d\u2014everything keeps changing. The reach-for- your-cell phone gesture may not last much longer, since airlines are starting to provide onboard cell phone coverage.<\/p>\n<p>The more people use a new technology, the more useful it becomes. (This is called a \u201cnetwork effect\u201d; see Chapter 4, \u201cNeedles in the Haystack.\u201d) When one of us got the email address lewis@harvard as a second-year graduate student, it was a vainglorious joke; all the people he knew who had email addresses were students in the same office with him. Email culture could not develop until a lot of people had email, but there wasn\u2019t much point in hav- ing email if no one else did.<\/p>\n<p>Technology changes and social changes reinforce each other. Another way of looking at the technological reasons for our privacy loss is to recognize that the social institutions enabled by the technology are now more important than the practical uses for which the technology was originally conceived. Once a lifestyle change catches on, we don\u2019t even think about what it depends on.<\/p>\n<\/div>\n<div>\n<p>Credit Card CultureThe usefulness of the data aggregated by Acxiom and its kindred data aggre- gation services rises as the number of people in their databases goes up, and as larger parts of their lives leave traces in those databases. When credit cards were mostly short-term loans taken out for large purchases, the credit card data was mostly useful for determining your creditworthiness. It is still use- ful for that, but now that many people buy virtually everything with credit cards, from new cars to fast-food hamburgers, the credit card transaction database can be mined for a detailed image of our lifestyles. The information is there, for example, to determine if you usually eat dinner out, how much traveling you do, and how much liquor you tend to consume. Credit card companies do in fact analyze this sort of information, and we are glad they do. If you don\u2019t seem to have been outside Montana in your entire life and you turn up buying a diamond bracelet in Rio de Janeiro, the credit card com- pany\u2019s computer notices the deviation from the norm, and someone may call to be sure it is really you.<\/p>\n<p>The credit card culture is an economic problem for many Americans, who accept more credit card offers than they need, and accumulate more debt than they should. But it is hard to imagine the end of the little plastic cards, unless even smaller RFID tags replace them. Many people carry almost no cash today, and with every easy swipe, a few more bits go into the databases.<\/p>\n<p>Email CultureEmail is culturally in between telephoning and writing a letter. It is quick, like telephoning (and instant messaging is even quicker). It is permanent, like a letter. And like a letter, it waits for the recipient to read it. Email has, to a great extent, replaced both of the other media for person-to-person communication, because it has advantages of both. But it has the problems that other communication methods have, and some new ones of its own.<\/p>\n<p>Phone calls are not intended to last forever, or to be copied and redistributed to dozens of other people, or to turn up in court cases. When we use email as though it were a telephone, we tend to forget about what else might happen to it, other than the telephone-style use, that the recipient will read it and throw it away. Even Bill Gates probably wishes that he had written his corporate emails in a less telephonic voice. After testifying in an antitrust lawsuit that he had not contemplated cutting a deal to divide the web browser market with a competitor, the government produced a candid email he had sent, seeming to contradict his denial: \u201cWe could even pay them money as part of the deal, buying a piece of them or something.\u201d<\/p>\n<\/div>\n<div>\n<p>&nbsp;<\/p>\n<blockquote>\n<h4>Email is as public as postcards, unless it is encrypted, which it usually is not.<\/h4>\n<\/blockquote>\n<p>Email is bits, traveling within an ISP and through the Internet, using email software that may keep copies, filter it for spam, or submit it to any other form of inspection the ISP may choose. If your email service provider is Google, the point of the inspection is to attach some\u00a0<span style=\"font-size: 1rem;text-align: initial\">appropriate advertising. If you are working within a financial services corporation, your emails are probably logged\u2014even the ones to your grandmother because the company has to be able to go back and do a thorough audit if something inappropriate happens.<\/span><\/p>\n<\/div>\n<div>\n<p>Email is as public as postcards, unless it is encrypted, which it usually is not. Employers typically reserve the right to read what is sent through com- pany email. Check the policy of your own employer; it may be hard to find, and it may not say what you expect. Here is Harvard\u2019s policy, for example:<\/p>\n<p>Employees must have no expectation or right of privacy in anything they create, store, send, or receive on Harvard\u2019s computers, networks, or telecommunications systems. \u2026. Electronic files, e-mail, data files, images, software, and voice mail may be accessed at any time by management or by other authorized personnel for any business purpose. Access may be requested and arranged through the system(s) user, however, this is not required.<\/p>\n<p>Employers have good reason to retain such sweeping rights; they have to be able to investigate wrongdoing for which the employer would be liable. As a result, such policies are often less important than the good judgment and ethics of those who administer them. Happily, Harvard\u2019s are generally good. But as a general principle, the more people who have the authority to snoop, the more likely it is that someone will succumb to the temptation.<\/p>\n<p>Commercial email sites can retain copies of messages even after they have been deleted. And yet, there is very broad acceptance of public, free, email ser- vices such as Google\u2019s Gmail, Yahoo! Mail, or Microsoft\u2019s Hotmail. The technology is readily available to make email private: whether you use encryption tools, or secure email services such as Hushmail, a free, web-based email service that incorporates PGP-based encryption (see Chapter 5). The usage of these services, though, is an insignificant fraction of their unencrypted counterparts. Google gives us free, reliable email service and we, in return, give up some space on our computer screen for ads. Convenience and cost trump privacy. By and large, users don\u2019t worry that Google, or its competitors, have all their mail. It\u2019s a bit like letting the post office keep a copy of every letter you send, but we are so used to it, we don\u2019t even think about it.<\/p>\n<\/div>\n<div>\n<p>Web CultureWhen we send an email, we think at least a <em>little <\/em>bit about the impression we are making, because we are sending it to a human being. We may well say things we would not say face-to-face, and live to regret that. Because we can\u2019t see anyone\u2019s eyes or hear anyone\u2019s voice, we are more likely to over- react and be hurtful, angry, or just too smart for our own good. But because email is directed, we don\u2019t send email thinking that no one else will ever read what we say.<\/p>\n<p>The Web is different. Its social sites inherit their communication culture not from the letter or telephone call, but from the wall in the public square, littered with broadsides and scribbled notes, some of them signed and some not. Type a comment on a blog, or post a photo on a photo album, and your action can be as anonymous as you wish it to be\u2014you do not know to whom your message is going. YouTube has millions of personal videos. Photo- archiving sites are the shoeboxes and photo albums of the twenty-first cen- tury. Online backup now provides easy access to permanent storage for the contents of our personal computers. We entrust commercial entities with much of our most private information, without apparent concern. The gener- ation that has grown up with the Web has embraced social networking in all its varied forms: MySpace, YouTube, LiveJournal, Facebook, Xanga, Classmates.com, Flickr, dozens more, and blogs of every shape and size. More than being taken, personal privacy has been given away quite freely, because everyone else is doing it\u2014the surrender of privacy is more than a way to social connectedness, it is a social institution in its own right. There are 70 million bloggers sharing everything from mindless blather to intimate per- sonal details. Sites like <a href=\"http:\/\/www.loopt.com\/\">www.loopt.com<\/a> let you find your friends, while twitter.com lets you tell the entire world where you are and what you are doing. The Web is a confused, disorganized, chaotic realm, rich in both gold and garbage.<\/p>\n<p>The \u201cold\u201d web, \u201cWeb 1.0,\u201d as we now refer to it, was just an information resource. You asked to see something, and you got to see it. Part of the dis- inhibition that happens on the new \u201cWeb 2.0\u201d social networking sites is due to the fact that they still allow the movie-screen illusion\u2014that we are \u201cjust looking,\u201d or if we are contributing, we are not leaving footprints or finger- prints if we use pseudonyms. (See Chapter 4 for more on Web 1.0 and Web 2.0.)<\/p>\n<p>But of course, that is not really the way the Web ever worked. It is important to remember that even Web 1.0 was never anonymous, and even \u201cjust looking\u201d leaves fingerprints.<\/p>\n<\/div>\n<div>\n<p>In July 2006, a <em>New York Times <\/em>reporter called Thelma Arnold of Lilburn, Georgia. Thelma wasn\u2019t expecting the call. She wasn\u2019t famous, nor was she involved in anything particularly noteworthy. She enjoyed her hobbies, helped her friends, and from time to time looked up things on the Web\u2014stuff about her dogs, and her friends\u2019 ailments.<\/p>\n<p>Then AOL, the search engine she used, decided to release some \u201canonymous\u201d query data. Thelma, like most Internet users, may not have known that AOL had kept every single topic that she, and every other one of their users, had asked about. But it did. In a moment of unenlightened generosity, AOL released for research use a small sample: about 20 million queries from 658,000 different users. That is actually not a lot of data by today\u2019s standards. For example, in July 2007, there were about 5.6 billion search engine queries, of which roughly 340 million were AOL queries. So, 20 million queries comprise only a couple of days\u2019 worth of search queries. In an effort to protect their clients\u2019 privacy, AOL \u201cdeidentified\u201d the queries. AOL never mentioned anyone by name; they used random numbers instead. Thelma was 4417149. AOL mistakenly presumed that removing a single piece of personal identification would make it hard to figure out who the users were. It turned out that for some of the users, it wasn\u2019t hard at all.<\/p>\n<p>It didn\u2019t take much effort to match Thelma with her queries. She had searched for \u201clandscapers in Lilburn, GA\u201d and several people with the last name \u201cArnold,\u201d leading to the obvious question of whether there were any Arnolds in Lilburn. Many of Thelma\u2019s queries were not particularly useful for identifying her, but were revealing nonetheless: \u201cdry mouth,\u201d \u201cthyroid,\u201d \u201cdogs that urinate on everything,\u201d and \u201cswing sets.\u201d<\/p>\n<p>Thelma was not the only person to be identified. User 22690686 (Terri) likes astrology, and the Edison National Bank, Primerica, and Budweiser. 5779844 (Lawanna) was interested in credit reports, and schools. From what he searched for, user 356693 seems to have been an aide to Chris Shays, Congressman from Connecticut.<\/p>\n<p>One of the privacy challenges that we confront as we rummage through the rubble of the digital explosion is that information exists without context. Was Thelma Arnold suffering from a wide range of ailments? One might read- ily conclude that from her searches. The fact is that she often tried to help her friends by understanding their medical problems.<\/p>\n<p>Or consider AOL user 17556639, whose search history was released along with Thelma Arnold\u2019s. He searched for the following:<\/p>\n<\/div>\n<div>\n<p>how to kill your wife 23 Mar, 22:09 wife killer 23 Mar, 22:11<\/p>\n<p>poop 23 Mar, 22:12<\/p>\n<p>dead people 23 Mar, 22:13<\/p>\n<p>pictures of dead people 23 Mar, 22:15<\/p>\n<p>killed people 23 Mar, 22:16<\/p>\n<p>dead pictures 23 Mar, 22:17<\/p>\n<p>murder photo 23 Mar, 22:20<\/p>\n<p>steak and cheese 23 Mar, 22:22<\/p>\n<p>photo of death 23 Mar, 22:30<\/p>\n<p>death 23 Mar, 22:33<\/p>\n<p>dead people photos 23 Mar, 22:33<\/p>\n<p>photo of dead people 23 Mar, 22:35<\/p>\n<p><a href=\"http:\/\/www.murderdpeople.com\/\">www.murderdpeople.com <\/a>23 Mar, 22:37<\/p>\n<p>decapitated photos 23 Mar, 22:39<\/p>\n<p>car crashes3 23 Mar, 22:40<\/p>\n<p>car crash photo 23 Mar, 22:41<\/p>\n<p>Is this AOL user a potential criminal? Should AOL have called the police? Is 17556639 about to kill his wife? Is he (or she) a researcher with a spelling problem and an interest in Philly cheese steak? Is reporting him to the police doing a public service, or is it an invasion of privacy?<\/p>\n<p>There is no way to tell just from these queries if this user was contemplat- ing some heinous act or doing research for a novel that involves some grisly scenes. When information is incomplete and decontextualized, it is hard to judge meaning and intent.<\/p>\n<p>In this particular case, we happen to know the answer. The user, Jason from New Jersey, was just fooling around, trying to see if Big Brother was watching. He wasn\u2019t planning to kill his wife at all. Inference from incom- plete data has the problem of false positives\u2014thinking you have something that you don\u2019t, because there are other patterns that fit the same data.<\/p>\n<p>Information without context often leads to erroneous conclusions. Because our digital trails are so often retrieved outside the context within which they were created, they sometimes suggest incorrect interpretations. Data interpretation comes with balanced social responsibilities, to protect society when there is evidence of criminal behavior or intent, and also to protect the individual when such evidence is too limited to be reliable. Of course, for every example of misleading and ambiguous data, someone will want to solve the problems it creates by collecting more data, rather than less.<\/p>\n<\/div>\n<div>\n<p>Beyond PrivacyThere is nothing new under the sun, and the struggles to define and enforce privacy are no exception. Yet history shows that our concept of privacy has evolved, and the law has evolved with it. With the digital explosion, we have arrived at a moment where further evolution will have to take place rather quickly.<\/p>\n<p>Leave Me AloneMore than a century ago, two lawyers raised the alarm about the impact technology and the media were having on personal privacy:<\/p>\n<p>Instantaneous photographs and newspaper enterprise have invaded the sacred precincts of private and domestic life; and numerous mechanical devices threaten to make good the prediction that \u201cwhat is whispered in the closet shall be proclaimed from the house-tops.\u201d<\/p>\n<p>This statement is from the seminal law review article on privacy, published in 1890 by Boston attorney Samuel Warren and his law partner, Louis Brandeis, later to be a justice of the U.S. Supreme Court. Warren and Brandeis went on, \u201cGossip is no longer the resource of the idle and of the vicious, but has become a trade, which is pursued with industry as well as effrontery. To sat- isfy a prurient taste the details of sexual relations are spread broadcast in the columns of the daily papers. To occupy the indolent, column upon column is filled with idle gossip, which can only be procured by intrusion upon the domestic circle.\u201d New technologies made this garbage easy to produce, and then \u201cthe supply creates the demand.\u201d And those candid photographs and gossip columns were not merely taste- less; they were bad. Sounding like modern critics of mindless reality TV, Warren and Brandeis raged that society was going to hell in a handbasket because of all that stuff that was being spread about.<\/p>\n<p>Even gossip apparently harmless, when widely and persistently circulated, is potent for evil. It both belittles and perverts. It belittles by inverting the relative importance of things, thus dwarfing the thoughts and aspirations of a people. When personal gossip attains the dignity of print, and crowds the space available for matters of\u00a0<span style=\"font-size: 1rem;text-align: initial\">real interest to the community, what wonder that the ignorant and thoughtless mistake its relative importance. Easy of comprehension, appealing to that weak side of human nature which is never wholly cast down by the misfortunes and frailties of our neighbors, no one can be surprised that it usurps the place of interest in brains capable of other things. Triviality destroys at once robustness of thought and delicacy of feeling. No enthusiasm can flourish, no generous impulse can survive under its blighting influence.<\/span><\/p>\n<\/div>\n<div>\n<p>The problem they perceived was that it was hard to say just why such inva- sions of privacy should be unlawful. In individual cases, you could say some- thing sensible, but the individual legal decisions were not part of a general regime. The courts had certainly applied legal sanctions for defamation\u2014 publishing malicious gossip that was false\u2014but then what about malicious gossip that was true? Other courts had imposed penalties for publishing an individual\u2019s private letters\u2014but on the basis of property law, just as though the individual\u2019s horse had been stolen rather than the words in his letters. That did not seem to be the right analogy either. No, they concluded, such rationales didn\u2019t get to the nub. When something private is published about you, something has been taken from you, you are a victim of theft\u2014but the thing stolen from you is part of your identity as a person. In fact, privacy was a right, they said, a \u201cgeneral right of the individual to be let alone<em>.<\/em>\u201d That right had long been in the background of court decisions, but the new technologies had brought this matter to a head. In articulating this new right, Warren and Brandeis were, they asserted, grounding it in the principle of \u201cinviolate personhood,\u201d the sanctity of individual identity.<\/p>\n<p>Privacy and FreedomThe Warren-Brandeis articulation of privacy as a right to be left alone was influential, but it was never really satisfactory. Throughout the twentieth century, there were simply too many good reasons for <em>not <\/em>leaving people alone, and too many ways in which people <em>preferred <\/em>not to be left alone. And in the U.S., First Amendment rights stood in the way of privacy rights. As a general rule, the government simply cannot stop me from saying <em>anything<\/em>. In particular, it usually cannot stop me from saying what I want about your private affairs. Yet the Warren-Brandeis definition worked well enough for a long time, because, as Robert Fano put it, \u201cThe pace of technological progress was for a long time sufficiently slow as to enable society to learn pragmatically how to exploit new technology and prevent its abuse, with society maintain- ing its equilibrium most of the time.\u201d By the late 1950s, the emerging\u00a0<span style=\"font-size: 1rem;text-align: initial\">electronic technologies, both computers and communication, had destroyed that balance. Society could no longer adjust pragmatically, because surveil- lance technologies were developing too quickly.<\/span><\/p>\n<\/div>\n<div>\n<p>The result was a landmark study of privacy by the Association of the Bar of the City of New York, which culminated in the publication, in 1967, of a book by Alan Westin, entitled <em>Privacy and Freedom. <\/em>(Fano was reviewing Westin\u2019s book when he painted the picture of social disequilibrium caused by rapid technological change.) Westin proposed a crucial shift of focus.<\/p>\n<p>Brandeis and Warren had seen a loss of privacy as a form of personal injury, which might be so severe as to cause \u201cmental pain and distress, far greater than could be inflicted by mere bodily injury.\u201d Individuals had to take responsibility for protecting themselves. \u201cEach man is responsible for his own acts and omissions only.\u201d But the law had to provide the weapons with which to resist invasions of privacy.<\/p>\n<p>Westin recognized that the Brandeis-Warren formulation was too absolute, in the face of the speech rights of other individuals and society\u2019s legitimate data-gathering practices. Protection might come not from protective shields, but from control over the uses to which personal information could be put. \u201cPrivacy,\u201d wrote Westin, \u201cis the claim of individuals, groups, or institutions to determine for themselves when, how, and to what extent information about them is communicated to others.\u201d<\/p>\n<p>\u2026 what is needed is a structured and rational weighing process, with definite criteria that public and private authorities can apply in comparing the claim for disclosure or surveillance through new devices with the claim to privacy. The following are suggested as the basic steps of such a process: measuring the seriousness of the need to con- duct surveillance; deciding whether there are alternative methods to meet the need; deciding what degree of reliability will be required of the surveillance instrument; determining whether true consent to surveillance has been given; and measuring the capacity for limitation and control of the surveillance if it is allowed.<\/p>\n<p>So even if there were a legitimate reason why the government, or some other party, might know something about you, your right to privacy might limit what the knowing party could do with that information.<\/p>\n<p>This more nuanced understanding of privacy emerged from the important social roles that privacy plays. Privacy is not, as Warren and Brandeis had it, the right to be isolated from society\u2014privacy is a right that makes society work. Fano mentioned three social roles of privacy. First, \u201cthe right to maintain the privacy of one\u2019s personality can be regarded as part of the right of\u00a0<span style=\"font-size: 1rem;text-align: initial\">self-preservation\u201d\u2014the right to keep your adolescent misjudgments and personal conflicts to yourself, as long as they are of no lasting significance to your ultimate position in society. Second, privacy is the way society allows <\/span><span style=\"font-size: 1rem;text-align: initial\">deviations from prevailing social norms,<\/span><\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<blockquote>\n<h4 style=\"text-align: left\">Privacy is the way society allows deviations from prevailing social norms, given that social progress requires social experimentation.<\/h4>\n<\/blockquote>\n<p>given that no one set of social norms is universally and permanently satisfactory and indeed, given that social progress requires social experimentation. And third, privacy is essential to the development of independent thought it enables some decoupling of the individual from society, so that thoughts can be shared in limited\u00a0<span style=\"font-size: 1rem;text-align: initial\">circles and rehearsed before public exposure.<\/span><\/p>\n<\/div>\n<div>\n<p><em>Privacy and Freedom<\/em>, and the rooms full of disk drives that sprouted in government and corporate buildings in the 1960s, set off a round of soul- searching about the operational significance of privacy rights. What, in practice, should those holding a big data bank think about when collecting the data, handling it, and giving it to others?<\/p>\n<p>Fair Information Practice PrinciplesIn 1973, the Department of Health, Education, and Welfare issued \u201cFair Information Practice Principles\u201d (FIPP), as follows:<\/p>\n<p>\u2022\u00a0\u00a0 <strong>Openness. <\/strong>There must be no personal data record-keeping systems whose very existence is secret.<\/p>\n<p>\u2022\u00a0\u00a0 <strong>Disclosure. <\/strong>There must be a way for a person to find out what infor- mation about the person is in a record and how it is used.<\/p>\n<p>\u2022\u00a0\u00a0 <strong>Secondary use. <\/strong>There must be a way for a person to prevent informa- tion about the person that was obtained for one purpose from being used or made available for other purposes without the person\u2019s consent.<\/p>\n<p>\u2022\u00a0\u00a0 <strong>Correction. <\/strong>There must be a way for a person to correct or amend a record of identifiable information about the person.<\/p>\n<p>\u2022\u00a0\u00a0 <strong>Security. <\/strong>Any organization creating, maintaining, using, or dissemi- nating records of identifiable personal data must assure the reliability of the data for its intended use and must take precautions to prevent misuses of the data.<\/p>\n<\/div>\n<div>\n<p>These principles were proposed for U.S. medical data, but were never adopted. Nevertheless, they have been the foundation for many corporate privacy poli- cies. Variations on these principles have been codified in international trade agreements by the Organization of Economic Cooperation and Development (OECD) in 1980, and within the European Union (EU) in 1995. In the United States, echoes of these principles can be found in some state laws, but federal laws generally treat privacy on a case by case or \u201csectorial\u201d basis. The 1974 Privacy Act applies to interagency data transfers within the federal govern- ment, but places no limitations on data handling in the private sector. The Fair Credit Reporting Act applies only to consumer credit data, but does not apply to medical data. The Video Privacy Act applies only to videotape rentals, but not to \u201cOn Demand\u201d movie downloads, which did not exist when the Act was passed! Finally, few federal or state laws apply to the huge data banks in the file cabinets and computer systems of cities and towns. American government is decentralized, and authority over government data is decentralized as well.<\/p>\n<p>The U.S. is not lacking in privacy laws. But privacy has been legislated inconsistently and confusingly, and in terms dependent on technological contingencies. There is no national consensus on what should be protected, and how protections should be enforced. Without a more deeply informed collective judgment on the benefits and costs of privacy, the current legislative hodgepodge may well get worse in the United States.<\/p>\n<p>The discrepancy between American and European data privacy standards threatened U.S. involvement in international trade, because an EU directive would prohibit data transfers to nations, such as the U.S., that do not meet the European \u201cadequacy\u201d standard for privacy protection. Although the U.S. sectorial approach continues to fall short of European requirements, in 2000 the European Commission created a \u201csafe harbor\u201d for American businesses with multinational operations. This allowed individual corporations to establish their practices are adequate with respect to seven principles, covering notice, choice, onward transfer, access, security, data integrity, and enforcement.<\/p>\n<\/div>\n<div>\n<p>It is, unfortunately, too easy to debate whether the European omnibus approach is more principled than the U.S. piecemeal approach, when the real question is whether either approach accomplishes what we want it to achieve. The Privacy Act of 1974 assured us that obscure statements would be buried deep in the Federal Register, providing the required official notice about massive governmental data collection plans\u2014better than nothing, but providing \u201copenness\u201d only in a narrow and technical sense. Most large corporations doing business with the public have privacy notices, and virtually no one reads them. Only 0.3% of Yahoo! users read its privacy notice in 2002, for example. In the midst of massive negative publicity that year when Yahoo! changed its privacy policy to allow advertising messages, the number of users who accessed the privacy policy rose only to 1%. None of the many U.S. privacy laws prevented the warrantless wiretapping program instituted by the Bush administration, nor the cooperation with it by major U.S. telecommunications companies.<\/p>\n<p>Indeed, cooperation between the federal government and private industry seems more essential than ever for gathering information about drug trafficking and international terrorism, because of yet another technological development. Twenty years ago, most long-distance telephone calls spent at least part of their time in the air, traveling by radio waves between microwave antenna towers or between the ground and a communication satellite. Government eavesdroppers could simply listen in (see the discussion of Echelon in Chapter 5). Now many phone calls travel through fiber optic cables instead, and the government is seeking the capacity to tap this privately owned infrastructure.<\/p>\n<p>High privacy standards have a cost. They can limit the public usefulness of data. Public alarm about the release of personal medical information has led to major legislative remedies. The Health Information Portability and Accountability Act (HIPAA) was intended both to encourage the use of electronic data interchange for health information, and to impose severe penal- ties for the disclosure of \u201cProtected Health Information,\u201d a very broad category including not just medical histories but, for example, medical payments. The bill mandates the removal of anything that could be used to re-connect medical records to their source. HIPAA is fraught with problems in an environment of ubiquitous data and powerful computing. Connecting the dots by assembling disparate data sources makes it extremely difficult to achieve the level of anonymity that HIPAA sought to guarantee. But help is available, for a price, from a whole new industry of HIPAA-compliance advisors. If you search for HIPAA online, you will likely see advertisements for services that will help you protect your data, and also keep you out of jail.<\/p>\n<\/div>\n<div>\n<p>At the same time as HIPAA and other privacy laws have safeguarded our personal information, they are making medical research costly and sometimes impossible to conduct. It is likely that classic studies such as the Framingham Heart Study, on which much public policy about heart disease was founded, could not be repeated in today\u2019s environment of strengthened privacy rules. Dr. Roberta Ness, president of the American College of Epidemiology, reported that \u201cthere is a perception that HIPAA may even be having a negative effect on public health surveillance practices.\u201d<\/p>\n<p>The European reliance on the Fair Information Practice Principles is often no more useful, in practice, than the American approach. Travel through London, and you will see many signs saying \u201cWarning: CCTV in use\u201d to meet the \u201cOpenness\u201d requirement about the surveillance cameras. That kind of notice throughout the city hardly empowers the individual. After all, even Big Brother satisfied the FIPP Openness standard, with the ubiquitous notices that he was watching! And the \u201cSecondary Use\u201d requirement, that European citi- zens should be asked permission before data collected for one purpose is used for another, is regularly ignored in some countries, although compliance practices are a major administrative burden on European businesses and may cause European businesses at least to pause and think before \u201crepurposing\u201d data they have gathered. Sociologist Amitai Etzioni repeatedly asks European\u00a0<span style=\"font-size: 1rem;text-align: initial\">audiences if they have <\/span><em style=\"font-size: 1rem;text-align: initial\">ever <\/em><span style=\"font-size: 1rem;text-align: initial\">been asked for permission to re-use data collected about them, and has gotten only a single positive response\u2014and that was from a gentleman who had been asked by a U.S. company.<\/span><\/p>\n<\/div>\n<div>\n<p>The five FIPP principles, and the spirit of transparency and personal control that lay behind them, have doubtless led to better privacy practices. But they have been overwhelmed by the digital explosion, along with the insecurity of the world and all the social and cultural changes that have occurred in daily life. Fred H. Cate, a privacy scholar at the Indiana University, characterizes the FIPP principles as almost a complete bust:<\/p>\n<p>Modern privacy law is often expensive, bureaucratic, burdensome, and offers surprisingly little protection for privacy. It has substituted individual control of information, which it in fact rarely achieves, for privacy protection. In a world rapidly becoming more global through information technologies, multinational commerce, and rapid travel, data protection laws have grown more fractured and protectionist.<\/p>\n<p>Those laws have become unmoored from their principled basis, and the principles on which they are based have become so varied and procedural, that our continued intonation of the FIPPS mantra no longer obscures the fact that this emperor indeed has few if any clothes left.<\/p>\n<p>Privacy as a Right to Control InformationIt is time to admit that we don\u2019t even really know what we want. The bits are everywhere; there is simply no locking them down, and no one really wants to do that anymore. The meaning of pri-<\/p>\n<\/div>\n<div>\n<blockquote>\n<h4 style=\"text-align: left\">The bits are everywhere; there is simply no locking them down, and no one really wants to do<\/h4>\n<p style=\"text-align: left\"><em>that anymore.<\/em><\/p>\n<\/blockquote>\n<p>vacy has changed, and we do not have a good way of describing it. It is not the right to be left alone, because not even the most extreme measures will disconnect our digital selves from the rest of the world. It is not the right to keep our private information to ourselves, because the billions of\u00a0<span style=\"font-size: 1rem;text-align: initial\">atomic factoids don\u2019t any more lend themselves into binary classification, private or public.<\/span><\/p>\n<\/div>\n<div>\n<p>Reade Seligmann would probably value his privacy more than most Americans alive today. On Monday, April 17, 2006, Seligmann was indicted in connection with allegations that a 27-year-old performer had been raped at a party at a Duke fraternity house. He and several of his lacrosse teammates instantly became poster children for everything that is wrong with<\/p>\n<\/div>\n<div>\n<p>American society\u2014an example of national over-exposure that would leave even Warren and Brandeis breathless if they were around to observe it. Seligmann denied the charges, and at first it looked like a typical he-said, she-said scenario, which could be judged only on credibility and presumptions about social stereotypes.<\/p>\n<p>But during the evening of that fraternity party, Seligmann had left a trail of digital detritus. His data trail indicated that he could not have been at the party long enough, or at the right time, to have committed the alleged rape. Time-stamped photos from the party showed that the alleged victim of his rape was dancing at 12:02 AM. At 12:24 AM, he used his ATM card at a bank, and the bank\u2019s computers kept records of the event. Seligmann used his cell phone at 12:25 AM, and the phone company tracked every call he made, just as your phone company keeps a record of every call you make and receive. Seligmann used his prox card to get into his dormitory room at 12:46 AM, and the university\u2019s computer kept track of his comings and goings, just as other computers keep track of every card swipe or RFID wave you and I make in our daily lives. Even during the ordinary movements of a college student going to a fraternity party, every step along the way was captured in digital detail. If Seligmann had gone to the extraordinary lengths necessary to avoid leaving digital fingerprints\u2014not using a modern camera, a cell phone, or a bank, and living off campus to avoid electronic locks\u2014his defense would have lacked important exculpatory evidence.<\/p>\n<p>Which would we prefer\u2014the new world with digital fingerprints every- where and the constant awareness that we are being tracked, or the old world with few digital footprints and a stronger sense of security from prying eyes? And what is the point of even asking the question, when the world cannot be restored to its old information lock-down?<\/p>\n<p>In a world that has moved beyond the old notion of privacy as a wall around the individual, we could instead regulate those who would inappro- priately <em>use <\/em>information about us. If I post a YouTube video of myself dancing in the nude, I should expect to suffer some personal consequences. Ultimately, as Warren and Brandeis said, individuals have to take responsibility for their actions. But society has drawn lines in the past around which facts are relevant to certain decisions, and which are not. Perhaps, the border of privacy having become so porous, the border of relevancy could be stronger. As Daniel Weitzner explains:<\/p>\n<p>New privacy laws should emphasize usage restrictions to guard against unfair discrimination based on personal information, even if it\u2019s publicly available. For instance, a prospective employer might be able to find a video of a job applicant entering an AIDS clinic or a\u00a0<span style=\"font-size: 1rem;text-align: initial\">mosque. Although the individual might have already made such facts public, new privacy protections would preclude the employer from making a hiring decision based on that information and attach real penalties for such abuse.<\/span><\/p>\n<\/div>\n<div>\n<p>In the same vein, it is not intrinsically wrong that voting lists and political contributions are a matter of public record. Arguably, they are essential to the good functioning of the American democracy. Denying someone a promotion because of his or her political inclinations <em>would be <\/em>wrong, at least for most jobs. Perhaps a nuanced classification of the ways in which others are allowed to use information about us would relieve some of our legitimate fears about the effects of the digital explosion.<\/p>\n<p>In <em>The Transparent Society<\/em>, David Brin wrote:<\/p>\n<p>Transparency is not about eliminating privacy. It\u2019s about giving us the power to hold accountable those who would <em>violate <\/em>it. Privacy implies serenity at home and the right to be let alone. It may be irksome how much other people know about me, but I have no right to police their minds. On the other hand I care very deeply about what others <em>do <\/em>to me and to those I love. We all have a right to some place where we can feel safe.<\/p>\n<p>Despite the very best efforts, and the most sophisticated technologies, we can- not control the spread of our private information. And we often want infor- mation to be made public to serve our own, or society\u2019s purposes.<\/p>\n<p>Yet there can still be principles of accountability for the <em>misuse <\/em>of infor- mation. Some ongoing research is outlining a possible new web technology, which would help ensure that information is used appropriately even if it is known. Perhaps automated classification and reasoning tools, developed to help connect the dots in networked information systems, can be retargeted to limit inappropriate use of networked information. A continuing border war is likely to be waged, however, along an existing free speech front: the line sep- arating my right to tell the truth about you from your right not to have that information used against you. In the realm of privacy, the digital explosion has left matters deeply unsettled.<\/p>\n<\/div>\n<p>&nbsp;<\/p>\n<div>\n<p>Always OnIn <em>1984, <\/em>the pervasive, intrusive technology could be turned off:<\/p>\n<p>As O\u2019Brien passed the telescreen a thought seemed to strike him. He stopped, turned aside and pressed a switch on the wall. There was a sharp snap. The voice had stopped.<\/p>\n<p>Julia uttered a tiny sound, a sort of squeak of surprise. Even in the midst of his panic, Winston was too much taken aback to be able to hold his tongue.<\/p>\n<p>\u201cYou can turn it off!\u201d he said.<\/p>\n<p>\u201cYes,\u201d said O\u2019Brien, \u201cwe can turn it off. We have that privilege. \u2026Yes, everything is turned off. We are alone.\u201d<\/p>\n<p>Sometimes we can still turn it off today, and should. But mostly we don\u2019t want to. We don\u2019t want to be alone; we want to be connected. We find it con- venient to leave it on, to leave our footprints and fingerprints everywhere, so we will be recognized when we come back. We don\u2019t want to have to keep retyping our name and address when we return to a web site. We like it when the restaurant remembers our name, perhaps because our phone number showed up on caller ID and was linked to our record in their database. We appreciate buying grapes for $1.95\/lb instead of $3.49, just by letting the store know that we bought them. We may want to leave it on for ourselves because we know it is on for criminals. Being watched reminds us that they are watched as well. Being watched also means we are being watched over.<\/p>\n<p>And perhaps we don\u2019t care that so much is known about us because that is the way human society used to be\u2014kinship groups and small settlements, where knowing everything about everyone else was a matter of survival. Having it on all the time may resonate with inborn preferences we acquired millennia ago, before urban life made anonymity possible. Still today, privacy means something very different in a small rural town than it does on the Upper East Side of Manhattan.<\/p>\n<p>We cannot know what the cost will be of having it on all the time. Just as troubling as the threat of authoritarian measures to restrict personal liberty is the threat of voluntary conformity. As Fano astutely observed, privacy allows limited social experimentation\u2014the deviations from social norms that are much riskier to the individual in the glare of public exposure, but which can be, and often have been in the past, the leading edges of progressive social changes. With it always on, we may prefer not to try anything unconventional, and stagnate socially by collective inaction.<\/p>\n<\/div>\n<p>For the most part, it is too late, realistically, ever to turn it off. We may once have had the privilege of turning it off, but we have that privilege no more. We have to solve our privacy problems another way.<\/p>\n<h3 style=\"text-align: center\">\u2737<\/h3>\n<p>The digital explosion is shattering old assumptions about who knows what. Bits move quickly, cheaply, and in multiple perfect copies. Information that used to be public in principle\u2014for example, records in a courthouse, the price you paid for your house, or stories in a small-town newspaper\u2014is now available to everyone in the world. Information that used to be private and available to almost no one\u2014medical records and personal snapshots, for example\u2014can become equally widespread through carelessness or malice. The norms and business practices and laws of society have not caught up to the change.<\/p>\n<p>The oldest durable communication medium is the written document. Paper documents have largely given way to electronic analogs, from which paper copies are produced. But are electronic documents really like paper documents? Yes and no, and misunderstanding the document metaphor can be costly. That is the story to which we now turn.<\/p>\n<h1 style=\"text-align: center\">CHAPTER 7<br \/>\n<strong>You Can\u2019t Say That on the Internet<br \/>\n<\/strong><strong>Guarding the Frontiers of Digital Expression<\/strong><\/h1>\n<h2><strong>Do You Know Where Your Child Is on the Web Tonight?<\/strong><\/h2>\n<p>It was every parent\u2019s worst nightmare. Katherine Lester, a 16-year-old honors student from Fairgrove, Michigan, went missing in June 2006. Her parents had no idea what had happened to her; she had never given them a moment\u2019s worry. They called the police. Then federal authorities got involved. After three days of terrifying absence, she was found, safe\u2014in Amman, Jordan.<\/p>\n<div>\n<p>Fairgrove is too small to have a post office, and the Lesters lived in the last house on a dead-end street. In another time, Katherine\u2019s school, six miles away, might have been the outer limit of her universe. But through the Internet, her universe was\u2014the whole world. Katherine met a Palestinian man, Abdullah Jimzawi, from Jericho on the West Bank. She found his profile on the social networking web site, MySpace, and sent him a message: \u201cu r cute.\u201d They quickly learned everything about each other through online messages. Lester tricked her mother into getting her a passport, and then took off for the Middle East. When U.S. authorities met her plane in Amman, she agreed to return home, and apologized to her parents for the distress she had caused them.<\/p>\n<p>A month later, Representative Judy Biggert of Illinois rose in the House to co-sponsor the Deleting Online Predators Act (DOPA). \u201cMySpace.com and\u00a0<span style=\"font-size: 1rem;text-align: initial\">other networking web sites have become new hunting grounds for child predators,\u201d she said, noting that \u201cwe were all horrified\u201d by the story of Katherine Lester. \u201cAt least let\u2019s give parents some comfort that their children won\u2019t fall prey while using the Internet at schools and libraries that receive federal funding for Internet services.\u201d The law would require those institutions to prevent children from using on-location computers to access chat rooms and social networking web sites without adult supervision.<\/span><\/p>\n<\/div>\n<div>\n<p>Speaker after speaker rose in the House to stress the importance of protecting children from online predators, but not all supported the bill. The language was \u201coverbroad and ambiguous,\u201d said one. As originally drafted, it seemed to cover not just MySpace, but sites such as Amazon and Wikipedia. These sites possess some of the same characteristics as MySpace\u2014users can create personal profiles and continually share information with each other using the Web. Although the law might block children in schools and libraries from \u201cplaces\u201d where they meet friends (and sometimes predators), it would also prevent access to online encyclopedias and bookstores, which rely on content posted by users.<\/p>\n<p>Instead of taking the time to develop a sharper definition of what exactly was to be prohibited, DOPA\u2019s sponsors hastily redrafted the law to omit the definition, leaving it to the Federal Communications Commission to decide later just what the law would cover. Some murmured that the upcoming midterm elections were motivating the sponsors to put forward an ill- considered and showy effort to protect children\u2014an effort that would likely be ineffective and so vague as to be unconstitutional.<\/p>\n<p>Children use computers in lots of places; restricting what happens in schools and libraries would hardly discourage determined teenagers from sneaking onto MySpace. Only the most overbearing parents could honestly answer the question USA Today asked in its article about \u201ccyber-predators\u201d: \u201cIt\u2019s 11 p.m. Do you know where your child is on the Web tonight?\u201d<\/p>\n<p>The statistics about what can go wrong were surely terrifying. The Justice Department has made thousands of arrests for \u201ccyber enticement\u201d\u2014almost always older men using social networking web sites to lure teenagers into meetings, some of which end very badly. Yet, as the American Library Association stated in opposition to DOPA, education, not prohibition, is the \u201ckey to safe use of the Internet.\u201d Students have to learn to cooperate online, because network use, and all the human interactions it enables, are basic tools of the new, globally interconnected world of business, education, and citizenship.<\/p>\n<p>And perhaps even the globally interconnected world of true love. The tale of Katherine Lester took an unexpected turn. From the moment she was found in Jordan, Lester steadily insisted that she intended to marry Jimzawi.\u00a0<span style=\"font-size: 1rem;text-align: initial\">Jimzawi, who was 20 when he and Lester first made contact, claimed to be in love with her\u2014and his mother agreed. Jimzawi begged Lester to tell her parents the truth before she headed off to meet him, but she refused. Upon her return, authorities charged Lester as a runaway child and took her passport away from her. But on September 12, 2007, having attained legal independence by turning 18, she again boarded a plane to the Middle East, finally to meet her beloved face to face. The affair finally ended a few weeks later in an exchange of accusations and denials, and a hint that a third party had attracted Lester\u2019s attentions. There was no high-tech drama to the breakup\u2014 except that it was televised on Dr. Phil.<\/span><\/p>\n<p><span style=\"font-size: 1rem;text-align: initial\">The explosion in digital communications has confounded long-held assumptions about human relationships\u2014how people meet, how they come to know each other, and how they decide if they can trust each other. At the same time, the explosion in digital information, in the form of web pages and downloadable photographs, has put at the fingertips of millions material that only a few years ago no one could have found without great effort and expense. Political dissidents in Chinese Internet caf\u00e9s can (if they dare) read pro-democracy blogs. People all around the world who are ashamed about their illness, starved for information about their sexual identity, or eager to connect with others of their minority faith can find facts, opinion, advice, and companionship. And children too small to leave home by themselves can see lurid pornography on their families\u2019 home computers. Can societies anymore control what their members see and to whom they talk?<\/span><\/p>\n<\/div>\n<h2>Metaphors for Something Unlike Anything Else<\/h2>\n<div>\n<p>DOPA, which has not been passed into law, is the latest battle in a long war between conflicting values. On the one hand, society has an interest in keeping unwanted information away from children. On the other hand, society as a whole has an interest in maximizing open communication. The U.S. Constitution largely protects the freedom to speak and the right to hear. Over and over, society has struggled to find a metaphor for electronic communication that captures the ways in which it is the same as the media of the past and the ways in which it is different. Laws and regulations are built on traditions; only by understanding the analogies can the speech principles of the past be extended to the changed circumstances of the present or be consciously transcended.<\/p>\n<p>What laws should apply? The Internet is not exactly like anything else. If you put up a web site, that is something like publishing a book, so perhaps\u00a0<span style=\"font-size: 1rem;text-align: initial\">the laws about books should apply. But that was Web 1.0 a way for \u201cpublishers\u201d to publish and viewers to view. In the dynamic and participatory Web 2.0, sites such as MySpace change constantly in response to user postings. If you send an email, or contribute to a blog, that is something like placing a telephone call, or maybe a conference call, so maybe laws about telephones should be the starting point. Neither metaphor is perfect. Maybe television is a better analogy, since browsing the Web is like channel surfing except that the Internet is two-way, and there is no limit to the number of \u201cchannels.\u201d<\/span><\/p>\n<\/div>\n<div>\n<p>Underneath the web software and the email software is the Internet itself. The Internet just delivers packets of bits, not knowing or caring whether they are parts of books, movies, text messages, or voices, nor whether the bits will wind up in a web browser, a telephone, or a movie projector. John Perry Barlow, former lyricist for the Grateful Dead and co-founder of the Electronic Frontier Foundation, used a striking metaphor to describe the Internet as it burst into public consciousness in the mid-1990s. The world\u2019s regulation of the flow of information, he said, had long controlled the transport of wine bottles. In \u201cmeatspace,\u201d the physical world, different rules applied to books, postal mail, radio broadcasts, and telephone calls\u2014different kinds of bottles. Now the wine itself flowed freely through the network, nothing but bits freed from their packaging. Anything could be put in, and the same kind of thing would come out. But in between, it was all the same stuff\u2014just bits. What are the rules of Cyberspace\u2014what are the rules for the bits themselves?<\/p>\n<p>When information is transmitted between two parties, whether the information is spoken words, written words, pictures, or movies, there is a source and a destination. There may also be some intermediaries. In a lecture hall, the listeners hear the speaker directly, although whoever provided the hall also played an important role in making the communication possible. Books have authors and readers, but also publishers and booksellers in between. It is natural to ascribe similar roles to the various parties in an Internet communication, and, when things go wrong, to hold any and all of the parties responsible. For example, when Pete Solis contacted a 14-year-old girl (\u201cJane Doe\u201d) through her MySpace profile and allegedly sexually assaulted her when they met in person, the girl\u2019s parents sued MySpace for $30 million for enabling the assault.<\/p>\n<p>The Internet has a complex structure. The source and destination may be friends emailing each other, they may be a commercial web site and a residential customer, or they may be one office of a company sending a mockup of an advertising brochure to another office halfway around the world. The source and destination each has an ISP. Connecting the ISPs are routing switches, fiber optic cables, satellite links, and so on. A packet that flows through the Internet may pass through devices and communication links\u00a0<span style=\"font-size: 1rem;text-align: initial\">owned by dozens of different parties. For convenience (and in the style of Jonathan Zittrain), we\u2019ll call the collection of devices that connect the ISPs to each other the cloud. As shown in Figure 7.1, speech on the Internet goes from the source to an ISP, into the cloud, out of the cloud to another ISP, and to its destination (see the sidebar, \u201cCloud Computing,\u201d in Chapter 3 for additional information about this).<\/span><\/p>\n<div id=\"attachment_475\" style=\"width: 374px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-475\" class=\"wp-image-475 size-full\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05143221\/Image_005.png\" alt=\"\" width=\"364\" height=\"213\" \/><\/p>\n<p id=\"caption-attachment-475\" class=\"wp-caption-text\">FIGURE 7.1 Where to regulate the Internet? Based on figure by Jonathan Zittrain<\/p>\n<\/div>\n<p>If a government seeks to control speech, it can attack at several different points. It can try to control the speaker or the speaker\u2019s ISP, by criminalizing certain kinds of speech. But that won\u2019t work if the speaker isn\u2019t in the same country as the listener. It can try to control the listener, by prohibiting pos- session of certain kinds of materials. In the U.S., possession of copyrighted software without an appropriate license is illegal, as is possession of other copyrighted material with the intent to profit from redistributing it. If citizens have reasonable privacy rights, however, it is hard for the government to know what its citizens possess. In a society such as the U.S., where citizens have reasonable rights of due process, one-at-a-time prosecutions for possession are unwieldy. As a final alternative, the government can try to control the intermediaries.<\/p>\n<p>There are parallels in civil law. The parents of the Jane Doe sued MySpace because it was in the communication path between Mr. Solis and their daughter, even though MySpace was not the alleged assailant.<\/p>\n<\/div>\n<div>\n<div class=\"textbox shaded\">\n<p style=\"text-align: center\"><strong>DEFAMING PUBLIC FIGURES<\/strong><\/p>\n<p>Damaging statements about public figures, even if false, are not defamatory unless they were made with malicious intent. This extra clause protects news media against libel claims by celebrities who are offended by the way the press depicts them. It was not always so, however. The pivotal case was New York Times Co. v. Sullivan, 376 U.S. 254 (1964), in which the newspaper was sued by officials in Alabama on the basis of a pro-civil-rights advertisement it published. The story is detailed, along with a readable history of the First Amendment, in Make No Law by Anthony Lewis (Vintage Paperback, 1992). For a later account of First Amendment struggles, see Lewis\u2019s Freedom for the Thought That We Hate (Basic Books, 2008).<\/p>\n<\/div>\n<p>Very early, defamation laws had to adapt to the Internet. In the U.S., speech is defamatory if it is false, communicated to third parties, and dam- ages one\u2019s reputation.<\/p>\n<p>In the physical world, when the speaker defames someone, the intermediaries between the speaker and the listener sometimes share responsibility with the speaker\u2014and sometimes not. If we defame someone in this book, we may be sued, but so may the book\u2019s publisher, who might have known that what we were writing was false. On the other hand, the trucker who transported the book to the bookstore probably isn\u2019t liable, even though he too helped get our words from us to our readers. Are the various electronic intermediaries more like publishers, or truckers? Do the parents of Jane Doe have a case against MySpace?<\/p>\n<p>Society has struggled to identify the right metaphors to describe the parties to an electronic communication. To understand this part of the story of electronic information, we have to go back to pre-Internet electronic communication.<\/p>\n<h2>Publisher or Distributor?<\/h2>\n<div>\n<p>CompuServe was an early provider of computer services, including bulletin boards and other electronic communities users could join for a fee. One of these fora, Rumorville USA, provided a daily newsletter of reports about broadcast journalism and journalists. CompuServe didn\u2019t screen or even collect the rumors posted on Rumorville. It contracted with a third party, Don Fitzpatrick Associates (DFA), to provide the content. CompuServe simply posted whatever DFA provided without reviewing it. And for a long time, no one complained.<\/p>\n<\/div>\n<p>In 1990, a company called Cubby, Inc. started a competing service, Skuttlebut, which also reported gossip about TV and radio broadcasting. Items appeared on Rumorville describing Skuttlebut as a \u201cnew start-up scam\u201d and alleging that its material was being stolen from Rumorville. Cubby cried foul and went after CompuServe, claiming defamation. CompuServe acknowledged that the postings were defamatory, but claimed it was not acting as a publisher of the information\u2014just a distributor. It simply was sending on to subscribers what other people gave it. It wasn\u2019t responsible for the contents, any more than a trucker is responsible for libel that might appear in the magazines he handles.<\/p>\n<p>What was the right analogy? Was CompuServe more like a newspaper, or more like the trucker who transports the newspaper to its readers?<\/p>\n<p>More like the trucker, ruled the court. A long legal tradition held distributors blameless for the content of the publications they delivered. Distributors can\u2019t be expected to have read all the books on their trucks. Grasping for a better analogy, the court described CompuServe as \u201can electronic for-profit library.\u201d Distributor or library, CompuServe was independent of DFA and couldn\u2019t be held responsible for libelous statements in what DFA provided. The case of Cubby v. CompuServe was settled decisively in CompuServe\u2019s favor. Cubby might go after the source, but that wasn\u2019t CompuServe. CompuServe was a blameless intermediary. So was MySpace, years later, when Jane Doe\u2019s parents sought redress for Mr. Solis\u2019s alleged assault of their daughter. In a ruling building on the Cubby decision, MySpace was absolved of responsibility for what Solis had posted.<\/p>\n<p>When Cubby v. CompuServe was decided, providers of computer services everywhere exhaled. If the decision had gone the other way, electronic distribution of information might have become a risky business that few dared to enter. Computer networks created an information infrastructure unprecedented in its low overhead. A few people could connect tens of thousands, even millions, to each other at very low cost. If everything disseminated had to be reviewed by human readers before it was posted, to ensure that any damaging statements were truthful, its potential use for participatory democracy would be severely limited. For a time, a spirit of freedom ruled.<\/p>\n<h2>Neither Liberty nor Security<\/h2>\n<p>\u201cThe law often demands that we sacrifice some liberty for greater security. Sometimes, though, it takes away our liberty to provide us less security.\u201d So wrote law professor Eugene Volokh in the fall of 1995, commenting on a court case that looked similar to Cubby v. CompuServe, but wasn\u2019t.<\/p>\n<\/div>\n<table class=\"shaded alignleft\" style=\"border-collapse: collapse;width: 4.04335%;height: 141px\">\n<tbody>\n<tr>\n<td style=\"width: 100%\"><strong>Eugene Volokh has a blog, volokh.com, in which he comments regularly on information freedom issues and many other things<\/strong>.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Prodigy was a provider of computer services, much like CompuServe. But in the early 1990s, as worries began to rise about the sexual content of materials available online, Prodigy sought to distinguish itself as a fam<span style=\"font-size: 1rem;text-align: initial\">ily-oriented service. It pledged to exercise editorial control over the postings on its bulletin boards. \u201cWe make no apology,\u201d Prodigy stated, \u201cfor pursuing a value system that reflects the culture of the millions of American families we aspire to serve. Certainly no responsible newspaper does less\u2026.\u201d Prodigy\u2019s success in the market was due in no small measure to the security families felt in accessing its fora, rather than the anything-goes sites offered by other services.<\/span><\/p>\n<div>\n<p>One of Prodigy\u2019s bulletin boards, called \u201cMoney Talk,\u201d was devoted to financial services. In October 1994, someone anonymously posted comments on Money Talk about the securities investment firm Stratton Oakmont. The firm, said the unidentified poster, was involved in \u201cmajor criminal fraud.\u201d Its president was \u201csoon to be proven criminal.\u201d The whole company was a \u201ccult of brokers who either lie for a living or get fired.\u201d<\/p>\n<p>Stratton Oakmont sued Prodigy for libel, claiming that Prodigy should be regarded as the publisher of these defamatory comments. It asked for $200 million in damages. Prodigy countered that it had zero responsibility for what its posters said. The matter had been settled several years earlier by the CubbyCompuServe decision. Prodigy wasn\u2019t the publisher of the comments, just the distributor.<\/p>\n<p>In a decision that stunned the Internet community, a New York court ruled otherwise. By exercising editorial control in support of its family-friendly image, said the court, Prodigy became a publisher, with the attendant responsibilities and risks. Indeed, Prodigy had likened itself to a newspaper publisher, and could not at trial claim to be something less.<\/p>\n<p>It was all quite logical, as long as the choice was between two metaphors: distributor or newspaper. In reality, though, a service provider wasn\u2019t exactly like either. Monitoring for bad language was a pretty minor form of editorial work. That was a far cry from checking everything for truthfulness.<\/p>\n<p>Be that as it may, the court\u2019s finding undercut efforts to create safe districts in Cyberspace. After the decision, the obvious advice went out to bulletin board operators: Don\u2019t even consider editing or censoring. If you do, Stratton Oakmont v. Prodigy means you may be legally liable for any malicious false- hood that slips by your review. If you don\u2019t even try, Cubby v. CompuServe means you are completely immune from liability.<\/p>\n<\/div>\n<p>This was fine for the safety of the site operators, but what about the public interest? Freedom of expression was threatened, since fewer families would be willing to roam freely through the smut that would be posted. At the same time, security would not be improved, since defamers could always post their lies on the remaining services with their all-welcome policies.<\/p>\n<h2>The Nastiest Place on Earth<\/h2>\n<p>Every communication technology has been used to control, as well as to facilitate, the flow of ideas. Barely a century after the publication of the Gutenberg Bible, Pope Paul IV issued a list of 500 banned authors. In the United States, the First Amendment protects authors and speakers from government interference: Congress shall make no law \u2026 abridging the freedom of speech, or of the press \u2026. But First Amendment protections are not absolute. No one has the right to publish obscene materials. The government can destroy materials it judges to be obscene, as postal authorities did in 1918 when they burned magazines containing excerpts of James Joyce\u2019s Ulysses.<\/p>\n<p>What exactly counts as obscene has been a matter of much legal wrangling over the course of U.S. history. The prevailing standard today is the one the Supreme Court used in 1973 in deciding the case of Miller v. California, and is therefore called the Miller Test. To determine whether material is obscene, a court must consider the following:<\/p>\n<ol>\n<li>Whether the average person, applying contemporary community standards, would find that the work, taken as a whole, appeals to the prurient interest.<\/li>\n<li>Whether the work depicts or describes, in a patently offensive way, sexual conduct specifically defined by the applicable state law.<\/li>\n<li>Whether the work, taken as a whole, lacks serious literary, artistic, political, or scientific value.<\/li>\n<\/ol>\n<p>Only if the answer to each part is \u201cyes\u201d does the work qualify as obscene. The Miller decision was a landmark, because it established that there were no national standards for obscenity. There were only \u201ccommunity\u201d standards, which could be different in Mississippi than in New York City. But there were no computer networks in 1973. What is a \u201ccommunity\u201d in Cyberspace?<\/p>\n<p>In 1992, the infant World Wide Web was hardly world-wide, but many Americans were using dial-up connections to access information on centralized, electronic bulletin boards. Some bulletin boards were free and united communities of interest\u2014lovers of baseball or birds, for example. Others distributed free software. Bob and Carleen Thomas of Milpitas, California, ran a different kind of bulletin board, called Amateur Action. In their advertising, they described it as \u201cThe Nastiest Place on Earth.\u201d<\/p>\n<p>For a fee, anyone could download images from Amateur Action. The pictures were of a kind not usually shown in polite company, but readily available in magazines sold in the nearby cities of San Francisco and San Jose. The Thomases were raided by the San Jose police, who thought they might have been distributing obscene materials. After looking at their pictures, the police decided that the images were not obscene by local standards.<\/p>\n<p>Bob and Carleen were not indicted, and they added this notice to their bulletin board: \u201cThe San Jose Police Department as well as the Santa Clara County District Attorney\u2019s Office and the State of California agree that Amateur Action BBS is operating in a legal manner.\u201d<\/p>\n<p>Two years later, in February 1994, the Thomases were raided again, and their computer was seized. This time, the complaint came from Agent David Dirmeyer, a postal inspector\u2014in western Tennessee. Using an assumed name, Dirmeyer had paid $55 and had downloaded images to his computer in Memphis. Nasty stuff indeed, particularly for Memphis: bestiality, incest, and sado-masochism. The Thomases were arrested. They stood trial in Memphis on federal charges of transporting obscene material via common carrier, and via interstate commerce. They were convicted by a Tennessee jury, which concluded that their Milpitas bulletin board violated the community standards of Memphis. Bob was sentenced to 37 months incarceration and Carleen to 30.<\/p>\n<p>The Thomases appealed their conviction, on the grounds that they could not have known where the bits were going, and that the relevant community, if not San Jose, was a community of Cyberspace. The appeals court did not agree. Dirmeyer had supplied a Tennessee postal address when he applied for membership in Amateur Action. The Thomases had called him at his Memphis telephone number to give him the password\u2014they had known where he was. The Thomases, concluded the court, should have been more careful where they sent their bits, once they started selling them out of state. Shipping the bits was just like shipping a videotape by UPS (a charge of which the Thomases were also convicted). The laws of meatspace applied to Cyberspace\u2014and one city\u2019s legal standards sometimes applied thousands of miles away.<\/p>\n<h2>The Most Participatory Form of Mass Speech<\/h2>\n<div>\n<p>Pornography was part of the electronic world from the moment it was possible to store and transmit words and images. The Thomases learned that bits were like books, and the same obscenity standards applied.<\/p>\n<p>In the mid-1990s, something else happened. The spread of computers and networks vastly increased the number of digital images available and the number of people viewing them. Digital pornography became not just the same old thing in a new form\u2014it seemed to be a brand-new thing, because there was so much of it and it was so easy to get in the privacy of the home. Nebraska Senator James Exon attached an anti-Internet-pornography amendment to a telecommunications bill, but it seemed destined for defeat on civil liberties grounds. And then all hell broke loose.<\/p>\n<p>On July 3, 1995, Time Magazine blasted \u201cCYBERPORN\u201d across its cover. The accompanying story, based largely a single university report, stated:<\/p>\n<blockquote><p>What the Carnegie Mellon researchers discovered was: THERE\u2019S AN AWFUL LOT OF PORN ONLINE. In an 18-month study, the team surveyed 917,410 sexually explicit pictures, descriptions, short stories, and film clips. On those Usenet newsgroups where digitized images are stored, 83.5% of the pictures were pornographic.<\/p><\/blockquote>\n<p>The article later noted that this statistic referred to only a small fraction of all data traffic but failed to explain that the offending images were mostly on limited-access bulletin boards, not openly available to children or anyone else. It mentioned the issue of government censorship, and it quoted John Perry Barlow on the critical role of parents. Nonetheless, when Senator Grassley of Iowa read the Time Magazine story into the Congressional Record, attributing its conclusions to a study by the well-respected Georgetown University Law School, he called on Congress to \u201chelp parents who are under assault in this day and age\u201d and to \u201chelp stem this growing tide.\u201d<\/p>\n<p>Grassley\u2019s speech, and the circulation in the Capitol building of dirty pictures downloaded by a friend of Senator Exon, galvanized the Congress to save the children of America. In February 1996, the Communications Decency Act, or CDA, passed almost unanimously and was signed into law by President Clinton.<\/p>\n<\/div>\n<div>\n<p>The CDA made it a crime to use \u201cany interactive computer service to dis- play in a manner available to a person under 18 years of age, any comment, request, suggestion, proposal, image, or other communication that, in con- text, depicts or describes, in terms patently offensive as measured by contemporary community standards, sexual or excretory activities or organs.\u201d Criminal penalties would also fall on anyone who \u201cknowingly permits any telecommunications facility under such person\u2019s control to be used\u201d for such prohibited activities. And finally, it criminalized the transmission of materials that were \u201cobscene or indecent\u201d to persons known to be under 18.<\/p>\n<p>These \u201cdisplay provisions\u201d of the CDA vastly extended existing anti- obscenity laws, which already applied to the Internet. The dual prohibitions against making offensive images available to a person under 18, and against transmitting indecent materials to persons known to be under 18, were unlike anything that applied to print publications. \u201cIndecency,\u201d whatever it meant, was something short of obscenity, and only obscene materials had been illegal prior to the CDA. A newsstand could tell the difference between a 12-year-old customer and a 20-year-old, but how could anyone check ages in Cyberspace?<\/p>\n<p>When the CDA was enacted, John Perry Barlow saw the potential of the Internet for the free flow of information challenged. He issued a now-classic manifesto against the government\u2019s effort to regulate speech:<\/p>\n<blockquote><p>Governments of the Industrial World, you weary giants of flesh and steel, I come from Cyberspace, the new home of Mind. On behalf of the future, I ask you of the past to leave us alone. You have no sovereignty where we gather\u2026. We are creating a world that all may enter without privilege or prejudice accorded by race, economic power, military force, or station of birth. We are creating a world where anyone, anywhere may express his or her beliefs, no matter how singular, without fear of being coerced into silence or conformity\u2026. In our world, all the sentiments and expressions of humanity, from the debasing to the angelic, are parts of a seamless whole, the global conversation of bits\u2026. [Y]ou are trying to ward off the virus of liberty by erecting guard posts at the frontiers of Cyberspace.<\/p><\/blockquote>\n<p>Brave and stirring words, even if the notion of Cyberspace as a \u201cseamless whole\u201d had already been rendered doubtful. At a minimum, bits had to meet different obscenity standards in Memphis than in Milpitas, as the Thomases\u00a0<span style=\"font-size: 1rem;text-align: initial\">had learned. In fact, the entire metaphor of the Internet as a \u201cspace\u201d with \u201cfrontiers\u201d was fatally flawed, and misuse of that metaphor continues to plague laws and policies to this day.<\/span><\/p>\n<\/div>\n<p>Civil libertarians joined the chorus challenging the Communications Decency Act. In short order, a federal court and the U.S. Supreme Court ruled in the momentous case of ACLU v. Reno. The display provisions of the CDA were unconstitutional. \u201cThe Government may only regulate free speech for a compelling reason,\u201d wrote Judge Dalzell in the district court decision, \u201cand in the least restrictive manner.\u201d It would chill discourse unacceptably to demand age verification over the Internet from every person who might see material that any adult has a legal right to see.<\/p>\n<p>The government had argued that the authority of the Federal Communications Commission (FCC) to regulate the content of TV and radio broadcasts, which are required not to be \u201cindecent,\u201d provided an analogy for government oversight of Internet communications.<\/p>\n<p>The courts disagreed. The FCC analogy was wrong, they ruled, because the Internet was far more open than broadcast media. Different media required different kinds of laws, and the TV and radio laws were more restrictive than laws were for print media, or should be for the Internet. \u201cI have no doubt\u201d wrote Judge Dalzell, \u201cthat a Newspaper Decency Act, passed because Congress discovered that young girls had read a front page article in the New York Times on female genital mutilation in Africa, would be unconstitutional\u2026. The Internet may fairly be regarded as a never-ending worldwide conversation. The Government may not, through the CDA, interrupt that conversation. As the most participatory form of mass speech yet developed, the Internet deserves the highest protection from governmental intrusion.\u201d The CDA\u2019s dis- play provisions were dead.<\/p>\n<p>In essence, the court was unwilling to risk the entire Internet\u2019s promise as a vigorous marketplace of ideas to serve the narrow purpose of protecting children from indecency. Instead, it transferred the burden of blocking unwanted communications from source ISPs to the destination. The DOPA\u2019s proposed burden on libraries and schools is heir to the court\u2019s ruling over- turning the CDA. Legally, there seemed to be nowhere else to control speech except at the point where it came out of the cloud and was delivered to the listener.<\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<p style=\"text-align: center\"><strong>DEFENDING ELECTRONIC FREEDOMS<\/strong><\/p>\n<p><span style=\"font-family: inherit;font-size: inherit\">The Electronic Frontier Foundation, <\/span><a style=\"font-family: inherit;font-size: inherit\" href=\"http:\/\/www.eff.org\/\">www.eff.org, <\/a><span style=\"font-family: inherit;font-size: inherit\">is the leading public advocacy group defending First Amendment and other personal rights in Cyberspace. Ironically, it often finds itself in opposition with media and telecommunications companies. In principle, communications companies should have the greatest interest in unfettered exchange of information. In actual practice, they often benefit financially from policies that limit consumer choice or expand surveillance and data-gathering about private citizens. The EFF was among the plaintiffs bringing suit in the case that overturned the CDA.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Lost in the 1995\u201396 Internet indecency hysteria was the fact that the \u201cCarnegie Mellon report\u201d that started the legislative ball rolling had been discredited almost as soon as the Time Magazine story appeared. The report\u2019s author, Martin Rimm, was an Electrical Engineering undergraduate. His\u00a0study\u2019s methodology was flawed, and perhaps fraudulent. For example, he told adult bulletin board operators that he was studying how best to market pornography online, and that he would repay them for their cooperation by sharing his tips. His conclusions were unreliable. Why hadn\u2019t that been caught when his article was published? Because the article was not a product of Georgetown University, as Senator Grassley had said. Rather, it appeared in the Georgetown Law Review, a student publication that used neither peer nor professional reviewers. Three weeks after publishing the \u201cCyberporn\u201d article, Time acknowledged that Rimm\u2019s study was untrustworthy. In spite of this repudiation, Rimm salvaged something\u00a0from his efforts: He published a book called <em>The Pornographer\u2019s Handbook: How to Exploit Women, Dupe Men, &amp; Make Lots of Money.<\/em><\/p>\n<h2>Protecting Good Samaritans\u2014and a Few Bad Ones<\/h2>\n<div>\n<p>The Stratton Oakmont v. Prodigy decision, which discouraged ISPs from exer- cising any editorial judgment, had been handed down in 1995, just as Congress was preparing to enact the Communications Decency Act to protect children from Internet porn. Congress recognized that the consequences of Stratton Oakmont would be fewer voluntary efforts by ISPs to screen their sites for offensive content. So, the bill\u2019s sponsors added a \u201cGood Samaritan\u201d provision to the CDA.<\/p>\n<p>The intent was to allow ISPs to act as editors without running the risk that they would be held responsible for the edited content, thus putting themselves in the jam in which Prodigy had found itself. So the CDA included a provision absolving ISPs of liability on account of anything they did, in good faith,\u00a0<span style=\"font-size: 1rem;text-align: initial\">to filter out \u201cobscene, lewd, lascivious, filthy, excessively violent, harassing, or otherwise objectionable\u201d material. For good measure, the CDA pushed the Cubby court\u2019s \u201cdistributor\u201d metaphor to the limit, and beyond. ISPs should not be thought of as publishers, or as sources either. \u201cNo provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.\u201d This was the bottom line of \u00a7230 of the CDA, and it meant that there would be no more Stratton Oakmont v. Prodigy Catch-22s.<\/span><\/p>\n<\/div>\n<p>When the U.S. Supreme Court struck down the CDA in 1996, it negated only the display provisions, the clauses that threatened the providers of \u201cindecent\u201d content. The Good Samaritan clause was allowed to stand and remains the law today. ISPs can do as much as they want to filter or censor their content, without any risk that they will assume publishers\u2019 liabilities in the process.<\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<p style=\"text-align: center\"><strong>THE CDA AND DISCRIMINATION<\/strong><\/p>\n<p><span style=\"font-family: inherit;font-size: inherit\">The \u201cGood Samaritan\u201d clause envisioned a sharp line between \u201cservice providers\u201d (which got immunity) and \u201ccontent providers\u201d (which did not). But as the technology world evolved, the distinction became fuzzy. A room- mate-matching service was sued in California, on the basis that it invited users to discriminate by categorizing their roommate preferences (women only, for example). A court ruled that the operators of the web site were immune as service providers. An appeals court reversed the decision, on the basis that the web site became a content provider by filtering the information applicants provided\u2014people seeking female roommates would not learn about men looking for roommates. There was nothing wrong with that, but the principle that the roommate service had blanket protection, under the CDA, to filter as it wished would mean that with equal impunity, it could\u00a0 ask about racial preferences and honor them. That form of discrimination would be illegal in newspaper ads. \u201cWe doubt,\u201d wrote the appeals court judge, \u201cthis is what Congress had in mind when it passed the CDA.\u201d<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Or as little as they choose, as Ken Zeran learned to his sorrow a few years later.\u00a0The worst terrorist attack in history on U.S. soil prior to the 2001 destruction of New York\u2019s World Trade Center was the bombing of the Alfred P. Murrah Federal building in Oklahoma City on April 19, 1995. 168 people were killed, some of them children in a day care center. Hundreds more were injured when the building collapsed around them and glass and rubble rained down on the neighborhood. One man who made it out alive likened the event to the detonation of an atomic bomb.<\/p>\n<p>Less than a week later, someone with screen name \u201cKen ZZ03\u201d posted an advertisement on an America On Line (AOL) bulletin board. Ken had \u201cNaughty Oklahoma T-Shirts\u201d for sale. Among the available slogans were \u201cVisit Oklahoma\u2014it\u2019s a Blast\u201d and \u201cRack\u2019em, Stack\u2019em, and Pack\u2019em\u2014Oklahoma 1995.\u201d Others were even cruder and more tasteless. To get your T-shirt, said the ads, you should call Ken. The posting gave Ken\u2019s phone number.<\/p>\n<p>The number belonged to Ken Zeran, an artist and filmmaker in Seattle, Washington. Zeran had nothing to do with the posting on AOL. It was a hoax.<\/p>\n<p>Ken Zeran started to receive calls. Angry, insulting calls. Then death threats.<\/p>\n<p>Zeran called AOL and asked them to take down the posting and issue a retraction. An AOL employee promised to take down the original posting, but said retractions were against company policy.<\/p>\n<p>The next day, an anonymous poster with a slightly different screen name offered more T-shirts for sale, with even more offensive slogans.<\/p>\n<p>Call Ken. And by the way\u2014there\u2019s high demand. So if the phone is busy, call back.<\/p>\n<p>Zeran kept calling AOL to ask that the postings be removed and that further postings be prevented. AOL kept promising to close down the accounts and remove the postings, but didn\u2019t. By April 30, Ken was receiving a phone call every two minutes. Ken\u2019s art business depended on that phone number\u2014 he couldn\u2019t change it or fail to answer it, without losing his livelihood.<\/p>\n<p>About this time, Shannon Fullerton, the host of a morning drive-time radio talk show on KRXO in Seattle, received by email a copy of one of the postings. Usually his show was full of light-hearted foolishness, but after the bombing, Fullerton and his radio partner had devoted several shows to sharing community grief about the Oklahoma City tragedy. Fullerton read Ken\u2019s T-shirt slogans over the air. And he read Ken\u2019s telephone number and told his listeners to call Ken and tell him what they thought of him.<\/p>\n<p>Zeran got even more calls, and more death threats. Fearing for his safety, he obtained police surveillance of his home. Most callers were not interested\u00a0in hearing what Ken had to say when he answered the phone, but he managed to keep one on the line long enough to learn about the KRXO broadcast. Zeran contacted the radio station. KRXO issued a retraction, after which the number of calls Ken received dropped to fifteen per day. Eventually, a newspaper exposed the hoax. AOL finally removed the postings, after leaving them visible for a week. Ken\u2019s life began to return to normal.<\/p>\n<p>&nbsp;<\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<p style=\"text-align: center\"><strong>WAS THE RADIO STATION LIABLE?<\/strong><\/p>\n<p>Zeran sued the radio station separately, but failed in that effort as well. Much as he may have suffered, reasoned the court, it wasn\u2019t defamation, because none of the people who called him even knew who Ken Zeran was so his reputation couldn\u2019t possibly have been damaged when the radio station spoke ill of \u201cKen\u201d!<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>Zeran sued AOL, claiming defamation, among other things. By putting up the postings, and leaving them up long after it had been informed that they were false, AOL had damaged him severely.<\/p>\n<p>The decision went against Zeran, and the lower court\u2019s decision held up on appeal. AOL certainly had behaved like a publisher, by communicating the postings in the first place and by choosing not to remove them when informed that they were fraudulent. Unlike the defendant in the Cubby v. CompuServe case, AOL knew exactly what it was publishing. But the Good Samaritan provision of the CDA specifically stated that AOL should not legally be treated as a publisher. AOL had no liability for Zeran\u2019s woes.<\/p>\n<p>Zeran\u2019s only recourse was to identify the actual speaker, the pseudonymous Ken ZZ03 who made the postings. And AOL would not help him do that. Everyone felt sorry for Ken, but the system gave him no help.<\/p>\n<p>The posters could evade responsibility as long as they remained anonymous, as they easily could on the Internet. And Congress had given the ISPs a complete waiver of responsibility for the consequences of false and damaging statements, even when the ISP knew they were false. Had anyone in Congress thought through the implications of the Good Samaritan clause?<\/p>\n<div>\n<h2>Laws of Unintended Consequences<\/h2>\n<p>The Good Samaritan provision of the CDA has been the friend of free speech, and a great relief to Internet Service Providers. Yet its application has defied logical connection to the spirit that created it.<\/p>\n<\/div>\n<p>Sidney Blumenthal was a Clinton aide whose job it was to dish dirt on the president\u2019s enemies. On August 11, 1997, conservative online columnist Matt Drudge reported, \u201cSidney Blumenthal has a spousal abuse past that has been effectively covered up.\u201d The White House denied it, and the next day Drudge withdrew the claim. The Blumenthals sued AOL, which had a deal with Drudge. And had deeper pockets\u2014the Blumenthals asked for $630,000,021. AOL was as responsible for the libel as Drudge, claimed the Blumenthals, because AOL could edit what Drudge supplied. AOL could even insist that Drudge delete items AOL did not want posted. The court sided with AOL, and cited the Good Samaritan clause of the CDA. AOL couldn\u2019t be treated like a publisher, so it couldn\u2019t be held liable for Drudge\u2019s falsehoods. Case closed.<\/p>\n<p>Even\u00a0 more\u00a0 strangely, the Good\u00a0<span style=\"font-size: 1rem;text-align: initial\">Samaritan clause of the Communications Decency Act has been used to protect an ISP whose chat room was being used to peddle child pornography.<\/span><\/p>\n<div>\n<p>In 1998, Jane and John Doe, a mother and her minor son, sued AOL for harm inflicted on the son. The Does alleged that AOL chat rooms were used to sell porno<span style=\"font-size: 1rem;text-align: initial\">graphic images of the boy made when he was 11 years old. They claimed that in 1997, Richard Lee Russell had lured John and two other boys to engage in sexual activities with each other and with Russell. Russell then used AOL chat rooms to market photographs and videotapes of these sexual encounters.<\/span><\/p>\n<\/div>\n<div>\n<p>Jane Doe complained to AOL. Under the terms of its agreement with its users, AOL specifically reserved the right to terminate the service of anyone engaged in such improper activities. And yet AOL did not suspend Russell\u2019s service, or even warn him to stop what he was doing. The Does wanted compensation from AOL for its role in John Doe\u2019s sexual abuse.<\/p>\n<p>The Does lost. Citing the Good Samaritan clause, and the precedent of the Zeran decision, the Florida courts held AOL blameless. Online service providers who knowingly allow child pornography to be marketed on their bulletin boards could not be treated as though they had published ads for kiddie porn.<\/p>\n<p>The Does appealed and lost again. The decision in AOL\u2019s favor was 4-3 at the Florida Supreme Court. Judge J. Lewis fairly exploded in his dissenting opinion.<\/p>\n<blockquote><p>The Good Samaritan clause was an attempt to remove disincentives from the development of filtering and blocking technologies, which would assist parents in their efforts to protect children. \u201c[I]t is inconceivable that Congress intended the CDA to shield from potential liability an ISP alleged to have taken absolutely no actions to curtail illicit activities \u2026 while profiting\u00a0<span style=\"font-size: 1rem;text-align: initial\">from its customer\u2019s continued use of the service.\u201d The law had been transformed into one \u201cwhich both condones and exonerates a flagrant and reprehensible failure to act by an ISP in the face of \u2026 material unquestionably harmful to children.\u201d This made no sense. The sequence of decisions \u201cthrusts Congress into the unlikely position of having enacted legislation that encourages and protects the involvement of ISPs as silent partners in criminal enterprises for profit.\u201d<\/span><\/p><\/blockquote>\n<\/div>\n<p>The problem, as Judge Lewis saw it, was that it wasn\u2019t enough to say that ISPs were not like publishers. They really were more like distributors\u2014as Ken Zeran had tried to argue\u2014and distributors are not entirely without responsibility for what they distribute. A trucker who knows he is carrying child pornography, and is getting a cut of the profits, has some legal liability for his complicity in illegal commerce. His role is not that of a publisher, but it is not nothing either. The Zeran court had created a muddle by using the wrong analogy. Congress had made the muddle possible by saying nothing about the right analogy after saying that publishing was the wrong one.<\/p>\n<div>\n<h2>Can the Internet Be Like a Magazine Store?<\/h2>\n<p>After the display provision of the CDA was ruled unconstitutional in 1997, Congress went back to work to protect America\u2019s children. The Child Online Protection Act (COPA), passed into law in 1998, contained many of the key elements of the CDA, but sought to avoid the CDA\u2019s constitutional problems by narrowing it. It applied only to \u201ccommercial\u201d speech, and criminalized knowingly making available to minors \u201cmaterial harmful to minors.\u201d For the purposes of this law, a \u201cminor\u201d was anyone under 17. The statute extended the Miller Test for obscenity to create a definition of material that was not obscene but was \u201charmful to minors:\u201d<\/p>\n<blockquote><p>The term \u201cmaterial that is harmful to minors\u201d means any communication \u2026 that \u2014 (A) the average person, applying contemporary community standards, would find, taking the material as a whole and with respect to minors, is designed to appeal to \u2026 the prurient interest; (B) depicts, describes, or represents, in a manner patently offensive with respect to minors, \u2026 [a] sexual act, or a lewd exhibition of the genitals or post-pubescent female breast; and (C) taken as a whole, lacks serious literary, artistic, political, or scientific value for minors.<\/p><\/blockquote>\n<\/div>\n<div>\n<p>COPA was challenged immediately and never took effect. A federal judge enjoined the government from enforcing it, ruling that it was likely to be unconstitutional. The matter bounced between courts through two presidencies. The case started out as ACLU v. Reno, for a time was known as ACLU v. Ashcroft, and was decided as ACLU v. Gonzalez. The judges were uniformly sympathetic to the intent of Congress to protect children from material they should not see. But in March 2007, the ax finally fell on COPA. Judge Lowell A. Reed, Jr., of U.S. District Court for the Eastern District of Pennsylvania, confirmed that the law went too far in restricting speech.<\/p>\n<p>Part of the problem was with the vague definition of material \u201charmful to minors.\u201d The prurient interests of a 16-year-old were not the same as those of an 8-year-old; and what had literary value for a teenager might be value- less for a younger child. How would a web site designer know which standard he should use to avoid the risk of imprisonment?<\/p>\n<p>But there was an even more basic problem. COPA was all about keeping away from minors material that would be perfectly legal for adults to have. It put a burden on information distributors to ensure that recipients of such information were of age. COPA provided a \u201csafe harbor\u201d against prosecution for those who in good faith checked the ages of their customers. Congress imagined a magazine store where the clerks wouldn\u2019t sell dirty magazines to children who could not reach the countertop, and might ask for identification of any who appeared to be of borderline age. The law envisioned that some- thing similar would happen in Cyberspace:<\/p>\n<blockquote><p>It is an affirmative defense to prosecution under this section that the defendant, in good faith, has restricted access by minors to material that is harmful to minors (A) by requiring use of a credit card, debit account, adult access code, or adult personal identification number; (B) by accepting a digital certificate that verifies age; or (C) by any other reasonable measures that are feasible under available technology.<\/p><\/blockquote>\n<p>The big problem was that these methods either didn\u2019t work or didn\u2019t even exist. Not every adult has a credit card, and credit card companies don\u2019t want their databases used to check customers\u2019 ages. And if you don\u2019t know what is meant by an \u201cadult personal identification number\u201d or a \u201cdigital certificate that verifies age,\u201d don\u2019t feel badly\u2014neither do we. Clauses (B) and (C) were basically a plea from Congress for the industry to come up with some technical magic for determining age at a distance.<\/p>\n<\/div>\n<div>\n<p>In the state of the art, however, computers can\u2019t reliably tell if the party on the other end of a communications link is human or is another computer. For a computer to tell whether a human is over or under the age of 17, even imperfectly, would be very hard indeed. Mischievous 15-year-olds could get around any simple screening system that could be used in the home. The Internet just isn\u2019t like a magazine store.<\/p>\n<p>Even if credit card numbers or personal identification systems could distinguish children from adults, Judge Reed reasoned, such methods would intimidate computer users. Fearful of identity theft or government surveil- lance, many computer users would refuse interrogation and would not reveal personal identifying information as the price for visiting web sites deemed \u201charmful to minors.\u201d The vast electronic library would, in practice, fall into disuse and start to close down, just as an ordinary library would become use- less if everyone venturing beyond the children\u2019s section had to endure a background check.<\/p>\n<p>Congress\u2019s safe harbor recommendations, concluded Judge Reed, if they worked at all, would limit Internet speech drastically. Information adults had a right to see would, realistically, become unavailable to them. The filtering technologies noted when the CDA was struck down had improved, so the government could not credibly claim that limiting speech was the only possible approach to protecting children. And even if the free expression concerns were calmed or ignored, and even if everything COPA suggested worked perfectly, plenty of smut would still be available to children. The Internet was borderless, and COPA\u2019s reach ended at the U.S. frontier. COPA couldn\u2019t stop the flood of harmful bits from abroad.<\/p>\n<p>Summing up, Reed quoted the thoughts of Supreme Court Justice Kennedy about a flag-burning case. \u201cThe hard fact is that sometimes we must make decisions we do not like. We make them because they are right, right in the sense that the law and the Constitution, as we see them, compel the result.\u201d Much as he was sympathetic to the end of protecting children from harmful communications, Judge Reed concluded, \u201cperhaps we do the minors of this country harm if First Amendment protections, which they will with age inherit fully, are chipped away in the name of their protection.\u201d<\/p>\n<h2>Let Your Fingers Do the Stalking<\/h2>\n<p>Newsgroups for sharing sexual information and experiences started in the early 1980s. By the mid-90s, there were specialty sites for every orientation and inclination. So when a 28-year-old woman entered an Internet chat room\u00a0<span style=\"font-size: 1rem;text-align: initial\">in 1998 to share her sexual fantasies, she was doing nothing out of the ordinary. She longed to be assaulted, she said, and invited men reading her email to make her fantasy a reality. \u201cI want you to break down my door and rape me,\u201d she wrote.<\/span><\/p>\n<\/div>\n<div>\n<p>What was unusual was that she gave her name and address\u2014and instructions about how to get past her building\u2019s security system. Over a period of several weeks, nine men took up her invitation and showed up at her door, often in the middle of the night. When she sent them away, she followed up with a further email to the chat room, explaining that her rejections were just part of the fantasy.<\/p>\n<p>In fact, the \u201cwoman\u201d sending the emails was Gary Dellapenta, a 50-year- old security guard whose attentions the actual woman had rebuffed. The victim of this terrifying hoax did not even own a computer. Dellapenta was caught because he responded directly to emails sent to entrap him. He was convicted and imprisoned under a recently enacted California anti- \u201ccyber- stalking\u201d statute. The case was notable not because the events were unusual, but because it resulted in a prosecution and conviction. Most victims are not so successful in seeking redress. Most states lacked appropriate laws, and most victims could not identify their stalkers. Sometimes the stalker did not even know the victim\u2014but simply found her contact information somewhere in Cyberspace.<\/p>\n<p>Speeches and publications with frightening messages have long received First Amendment protections in the U.S., especially when their subject is political. Only when a message is likely to incite \u201cimminent lawless action\u201d (in the words of a 1969 Supreme Court decision) does speech become illegal\u2014 a test rarely met by printed words. This high threshold for government intervention builds on a \u201cclear and present danger\u201d standard explained most eloquently by Justice Louis Brandeis in a 1927 opinion. \u201cFear of serious injury cannot alone justify suppression of free speech \u2026. No danger flowing from speech can be deemed clear and present, unless the incidence of the evil apprehended is so imminent that it may befall before there is opportunity for full discussion.\u201d<\/p>\n<p>Courts apply the same standard to web sites. An anti-abortion group listed the names, addresses, and license plate numbers of doctors performing abortions on a web site called the \u201cNuremberg Files.\u201d It suggested stalking the doctors, and updated the site by graying out the names of those who had been wounded and crossing off those who had been murdered. The web site\u2019s creators acknowledged that abortion was legal, and claimed not to be threatening anyone, only collecting dossiers in the hope that the doctors could at some point in the future be held accountable for \u201ccrimes against humanity.\u201d<\/p>\n<\/div>\n<div>\n<p>The anti-abortion group was taken to court in a civil action. After a long legal process, the group was found liable for damages because \u201ctrue threats of violence were made with the intent to intimidate.\u201d<\/p>\n<p>The courts had a very difficult time with the question of whether the Nuremberg Files web site was threatening or not, but there was nothing intrinsic to the mode of publication that complicated that decision. In fact, the same group had issued paper \u201cWANTED\u201d posters, which were equally part of the materials at issue. Reasonable jurists could, and did, come to different conclusions about whether the text on the Nuremberg Files web site met the judicial threshold.<\/p>\n<p>But the situation of Dellapenta\u2019s victim, and other women in similar situations, seemed to be different. The scores being settled at their expense had no political dimensions. There were already laws against stalking and telephone harassment; the Internet was being used to recruit proxy stalkers and harassers. Following the lead of California and other states, Congress passed a federal anti-cyberstalking law.<\/p>\n<h2>Like an Annoying Telephone Call?<\/h2>\n<p>The \u201c2005 Violence Against Women and Department of Justice Reauthorization Act\u201d (signed into law in early 2006) assigned criminal penalties to any- one who \u201cutilizes any device or software that can be used to originate telecommunications or other types of communications that are transmitted, in whole or in part, by the Internet \u2026 without disclosing his identity and with intent to annoy, abuse, threaten, or harass any person\u2026.\u201d The clause was little noticed when the Act was passed in the House on a voice vote and in the Senate unanimously.<\/p>\n<p>Civil libertarians again howled, this time about a single word in the legislation. It was fine to outlaw abuse, threats, and harassment by Internet. Those terms had some legal history. Although it was not always easy to tell whether the facts fit the definitions, at least the courts had standards for judging what these words meant.<\/p>\n<p>But \u201cannoy\u201d? People put lots of annoying things on web sites and say lots of annoying things in chat rooms. There is even a web site, annoy.com, devoted to posting annoying political messages anonymously. Could Congress really have intended to ban the use of the Internet to annoy people?<\/p>\n<p>Congress had extended telephone law to the Internet, on the principle that harassing VoIP calls should not receive more protection than harassing land- line telephone calls. In using broad language for electronic communications,\u00a0<span style=\"font-size: 1rem;text-align: initial\">however, it created another in the series of legal muddles about the aptness of a metaphor.<\/span><\/p>\n<\/div>\n<div>\n<p>The Telecommunications Act of 1934 made it a criminal offense for any- one to make \u201ca telephone call, whether or not conversation ensues, without disclosing his identity and with intent to annoy, abuse, threaten, or harass any person at the called number.\u201d In the world of telephones, the ban posed no threat to free speech, because a telephone call is one-to-one communication. If the person you are talking to doesn\u2019t want to listen, your free speech rights are not infringed. The First Amendment gives you no right to be sure anyone in particular hears you. If your phone call is unwelcome, you can easily find another forum in which to be annoying. The CDA, in a clause that was not struck down along with the display provisions, extended the prohibition to faxes and emails\u2014still, basically, person-to-person communications. But harassing VoIP calls were not criminal under the Telecommunications Act. In an effort to capture all telephone-like technologies under the same regulation, the same clause was extended to all forms of electronic communication, including the vast \u201celectronic library\u201d and \u201cmost participatory form of mass speech\u201d that is the Internet.<\/p>\n<p>Defenders of the law assured alarmed bloggers that \u201cannoying\u201d sites would not be prosecuted unless they also were personally threatening, abusive, or harassing. This was an anti-cyberstalking provision, they argued, not a censorship law. Speech protected by the First Amendment would certainly be safe. Online publishers, on the other hand, were reluctant to trust prosecutors\u2019 judgment about where the broadly written statute would be applied. And based on the bizarre and unexpected uses to which the CDA\u2019s Good Samaritan provisions had been put, there was little reason for confidence that the legislative context for the law would restrict its application to one corner of Cyberspace.<\/p>\n<p>The law was challenged by The Suggestion Box, which describes itself as helping people send anonymous emails for reasons such as to \u201creport sensitive information to the media\u201d and to \u201csend crime tips to law enforcement agencies anonymously.\u201d The law, as the complaint argued, might criminalize the sort of employee whistle-blowing that Congress encouraged in the after- math of scandals about corporate accounting practices. The Suggestion Box dropped its challenge when the Government stated that mere annoyances would not be prosecuted, only communications meant \u201cto instill fear in the victim.\u201d So the law is in force, with many left wishing that Congress would be more precise with its language!<\/p>\n<p>Which brings us to the present. The \u201cannoyance\u201d clause of the Violence Against Women Act stands, but only because the Government says that it doesn\u2019t mean what it says. DOPA, with which this chapter began, remains\u00a0<span style=\"font-size: 1rem;text-align: initial\">stuck in Congress. Like the CDA and COPA, DOPA has worthy goals. The measures it proposes would, however, probably do more harm than good. In requiring libraries to monitor the computer use of children using sites such as MySpace, it would likely make those sites inaccessible through public libraries, while having little impact on child predators. The congressional sponsors have succumbed to a well-intentioned but misguided urge to control a social problem by restricting the technology that assists it.<\/span><\/p>\n<\/div>\n<h2>Digital Protection, Digital Censorship\u2014and Self-Censorship<\/h2>\n<p>The First Amendment\u2019s ban on government censorship complicates government efforts to protect the safety and security of U.S. citizens. Given a choice between protection from personal harm\u00a0and some fool\u2019s need to spout profanities, most of us would opt for safety. Security is immediate and freedom is long-term, and most people are short-range thinkers. And most people think of security as a personal thing, and gladly leave it to the government to worry about the survival of the nation.<\/p>\n<p>But in the words of one scholar, the bottom line on the First Amendment is that \u201cin a society pledged to self-government, it is never true that, in the long run, the security of the nation is endangered by the freedom of the people.\u201d The Internet censorship bills have passed Congress by wide margins because members of Congress dare not be on record as voting against the safety of their constituents\u2014and especially against the safety of children. Relatively isolated from political pressure, the courts have repeatedly undone speech-restricting legislation passed by elected officials.<\/p>\n<p>Free speech precedes the other freedoms enumerated in the Bill of Rights, but not just numerically. In a sense, it precedes them logically as well. In the words of Supreme Court Justice Benjamin Cardozo, it is \u201cthe matrix, the indispensable condition, of nearly every other form of freedom.\u201d<\/p>\n<p>For most governments, the misgivings about censoring electronic information are less profound.<\/p>\n<p>In Saudi Arabia, you can\u2019t get to <a href=\"http:\/\/www.sex.com\/\">www.sex.com. <\/a>In fact, every web access in Saudi Arabia goes through government computers to make sure the URL isn\u2019t on the government\u2019s blacklist. In Thailand, <a href=\"http:\/\/www.stayinvisible.com\/\">www.stayinvisible.com <\/a>is blocked; that\u2019s a source of information about Internet privacy and tools to assist in anonymous web surfing. The disparity of information freedom standards between the U.S. and other countries creates conflicts when electronic transactions involve two nations. As discussed in Chapter 4, China insists that Google not help its citizens get information the government does not want them to have. If you try to get to certain web sites from your hotel room in Shanghai, you suddenly lose your Internet connection, with no explanation. You might think there was a glitch in the network somewhere, except that you can reconnect and visit other sites\u00a0<span style=\"font-size: 1rem;text-align: initial\">with no problems.<\/span><\/p>\n<div>\n<p>Self-censorship by Internet com- panies is also increasing\u2014the price they pay for doing business in certain countries. Thailand and Turkey blocked the video-sharing site YouTube after it carried clips lampooning (and, as those governments saw it, insulting) their current or former rulers. A Google official described censor- ship as the company\u2019s \u201cNo. 1 barrier to trade.\u201d Stirred by the potential costs in lost business and legal battles, Internet companies have become outspoken information libertarians, even as they do what must be done to meet the requirements of foreign governments. Google has even hired a Washington lobbyist to seek help from the U.S. government in its efforts to resist censorship abroad.<\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<p style=\"text-align: center\"><strong>I<\/strong><strong>NTERNET <\/strong><strong>F<\/strong><strong>REEDOM<\/strong><\/p>\n<p>A great many organizations devote significant effort to maintaining the Internet\u2019s potential as a free marketplace of ideas. In addition to EFF, already mentioned earlier in this chapter, some others include: the Electronic Privacy Information Network, www.epic.org; The Free Expression Network, freeexpression.org, which is actually a coalition; the American Civil Liberties Union, www.aclu.org; and the Chilling Effects Clearinghouse, <a href=\"http:\/\/www.chillingeffects.org\/\">www.chillingeffects.org. <\/a>The OpenNet Initiative, opennet.net, monitors Internet censorship around the world. OpenNet\u2019s findings are presented in <em>Access Denied: The Practice and Policy of Global Internet Filtering<\/em>, by Ronald\u00a0<span style=\"font-family: inherit;font-size: inherit\">J. Deibert, John G. Palfrey, Rafal Rohozinski, and Jonathan Zittrain (eds.), MIT Press, 2008.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>It is easy for Americans to shrug their isolationist shoulders over such problems. As long as all the information is available in the U.S., one might reason, who cares what version of Google or YouTube runs in totalitarian regimes abroad? That is for those countries to sort out.\u00a0<span style=\"font-size: 1rem;text-align: initial\">But the free flow of information into the U.S. is threatened by the laws of other nations about the operation of the press. Consider the case of Joseph Gutnick and Barron\u2019s magazine.<\/span><\/p>\n<\/div>\n<div>\n<p>On October 30, 2000, the financial weekly Barron\u2019s published an article suggesting that Australian businessman Joseph Gutnick was involved in money-laundering and tax evasion. Gutnick sued Dow Jones Co., the publisher of Barron\u2019s, for defamation. The suit was filed in an Australian court. Gutnick maintained that the online edition of the magazine, available in Australia for a fee, was in effect published in Australia. Dow Jones countered that the place of \u201cpublication\u201d of the online magazine was New Jersey, where its web servers were located. The suit, it argued, should have been brought in a U.S. court and judged by the standards of U.S. libel law, which are far more favorable to the free speech rights of the press. The Australian court agreed with Gutnick, and the suit went forward. Gutnick ultimately won an apology from Dow Jones and $580,000 in fines and legal costs.<\/p>\n<p>The implications seem staggering. Americans on American soil expect to be able to speak very freely, but the Australian court claimed that the global Internet made Australia\u2019s laws applicable wherever the bits reaching Australian soil may have originated. The Amateur Action conundrum about what community standards apply to the borderless Internet had been translated to the world of global journalism. Will the freedom of the Internet press henceforth be the minimum applying to any of the nations of the earth? Is it possible that a rogue nation could cripple the global Internet press by extorting large sums of money from alleged defamers, or by imposing death sentences on reporters it claimed had insulted their leaders?<\/p>\n<p>The American press tends to fight hard for its right to publish the truth, but the censorship problems reach into Western democracies more insidiously for global corporations not in the news business. It is sometimes easier for American companies to meet the minimum \u201cworld\u201d standards of information freedom than to keep different information available in the U.S. There may even be reasons in international law and trade agreements that make such accommodations to censorship more likely. Consider the trials of Yahoo! France.<\/p>\n<p>In May 2000, the League Against Racism and Anti-Semitism (LICRA, in its French acronym) and the Union of French Jewish Students (UEJF) demanded to a French court that Yahoo! stop making Nazi paraphernalia available for online auction, stop showing pictures of Nazi memorabilia, and prohibit the dissemination of anti-Semitic hate speech on discussion groups available in France. Pursuant to the laws of France, where the sale and display of Nazi items is illegal, the court concluded that what Yahoo! was doing was an\u00a0<span style=\"font-size: 1rem;text-align: initial\">offense to the \u201ccollective memory\u201d of the country and a violation of Article R654 of the Penal Code. It told Yahoo! that the company was a threat to \u201cinternal public order\u201d and that it had to make sure no one in France could view such items.<\/span><\/p>\n<\/div>\n<p>Yahoo! removed the items from the yahoo.fr site ordinarily available in France. LICRA and UEJF then discovered that from within France, they could also get to the American site, yahoo.com, by slightly indirect means. Reaching across the ocean in a manner reminiscent of the Australian court\u2019s defamation action, the French court demanded that the offending items, images, and words be removed from the American web site as well.<\/p>\n<p>Yahoo! resisted for a time, claiming it couldn\u2019t tell where the bits were going\u2014an assertion somewhat lacking in credibility since the company tended to attach French-language advertising to web pages if they were dis- patched to locations in France. Eventually, Yahoo! made a drastic revision of its standards for the U.S. site. Hate speech was prohibited under Yahoo\u2019s revised service terms with its users, and most of the Nazi memorabilia disappeared. But Nazi stamps and coins were still available for auction on the U.S. site, as were copies of Mein Kampf. In November 2000, the French court affirmed and extended its order: Mein Kampf could not be offered for sale in France. The fines were adding up.<\/p>\n<p>Yahoo! sought help in U.S. courts. It had committed no crime in the U.S., it stated. French law could not leap the Atlantic and trump U.S. First Amendment protections. Enforcement of the French order would have a chilling effect on speech in the United States. A U.S. district court agreed, and the decision was upheld on appeal by a three-judge panel of the Court of Appeals for the Ninth Circuit (Northern California).<\/p>\n<p>But in 2006, the full 11-member court of appeals reversed the decision and found against Yahoo!. The company had not suffered enough, according to the majority opinion, nor tried long enough to have the French change their\u00a0<span style=\"font-size: 1rem;text-align: initial\">minds, for appeal to First\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">Amendment protections to be appropriate. A dissenting opinion spoke plainly about what the court seemed to be doing. \u201cWe should not allow a foreign court order,\u201d wrote Judge William Fletcher, \u201cto be used as leverage to quash constitution- ally protected speech\u2026.\u201d<\/span><\/p>\n<div>\n<p>Such conflicts will be more common in the future, as more bits flow\u00a0<span style=\"font-size: 1rem;text-align: initial\">across national borders. The laws, trade agreements, and court decisions of the next few years, many of them regulating the flow of \u201cintellectual property,\u201d will shape the world of the future. It would be a sad irony if information liberty, so stoutly defended for centuries in the U.S., would fall in the twenty-first century to a combination of domestic child protection laws and international money-making opportunities. But as one British commentator said when the photo-hosting site Flickr removed photos to conform with orders from Singapore, Germany, Hong Kong, and Korea, \u201cLibertarianism is all very well when you\u2019re a hacker. But business is business.\u201d<\/span><\/p>\n<\/div>\n<p>Information freedom on the Internet is a tricky business. Technological changes happen faster than legal changes. When a technology shift alarms the populace, legislators respond with overly broad laws. By the time challenges have worked their way through the courts, another cycle of technology changes has happened, and the slow heartbeat of lawmaking pumps out another poorly drafted statute.<\/p>\n<p>The technology of radio and television has also challenged the legislative process, but in a different way. In the broadcast world, strong commercial forces are arrayed in support of speech-restricting laws that have long since outgrown the technology that gave birth to them. We now turn to those changes in the radio world.<\/p>\n<p>&nbsp;<\/p>\n<h1 style=\"text-align: center\">CHAPTER 8<br \/>\nBits in the Air<br \/>\n<em>Old Metaphors, New Technologies, and Free Speech<\/em><\/h1>\n<div>\n<p>Censoring the President<\/p>\n<p>On July 17, 2006, U.S. President George Bush and British Prime Minister Tony Blair were chatting at the G-8 summit in St. Petersburg, Russia. The event was a photo opportunity, but the two leaders did not realize that a microphone was on. They were discussing what the UN might do to quell the conflict between Israel and militant forces in Lebanon. \u201cSee the irony is,\u201d said Bush, \u201cwhat they need to do is get Syria to get Hezbollah to stop doing this shit and it\u2019s over.\u201d<\/p>\n<p>The cable network CNN carried the clip in full and posted it on the Web, but most broadcast stations bleeped out the expletive. They were aware of the fines, as much as $325,000, that the Federal Communications Commission might impose for airing the word \u201cshit.\u201d<\/p>\n<p>The FCC had long regulated speech over the public airways, but had raised its decency standards after the 2002 \u201cGolden Globes\u201d awards presentation. Singer Bono had won the \u201cBest Original Song\u201d award. In his acceptance speech, broadcast live on NBC, he said, \u201cThis is really, really, fucking brilliant.\u201d The FCC ruled that this remark was \u201cpatently offensive under contemporary community standards for the broadcast medium.\u201d It promised to fine and even pull the licenses of stations broadcasting such remarks.<\/p>\n<p>In 2006, the Commission extended the principle from the F-word to the S-word. Nicole Richie, referring to a reality TV show on which she had done some farm work, said to Paris Hilton, \u201cWhy do they even call it The Simple Life? Have you ever tried to get cow shit out of a Prada purse? It\u2019s not so fucking simple.\u201d The FCC\u2019s ruling on Richie\u2019s use of the excrement metaphor implied that Bush\u2019s use would be \u201cpresumptively profane\u201d in the eyes of the FCC.<\/p>\n<\/div>\n<p>A federal court reversed the FCC\u2019s policy against such \u201cfleeting\u201d expletives\u2014an expansion of indecency policies that had been in place for decades. Congress quickly introduced legislation to restore the FCC\u2019s new and strict standard, and the whole matter was to be argued before the U.S. Supreme Court in the spring of 2008. The FCC had adopted its new standards after complaints about broadcast indecency rose from fewer than 50 to about 1.4 million in the period from 2000 to 2004. Congress may have thought that the new speech code reflected a public mandate.<\/p>\n<p>Under the First Amendment, the government is generally not in the speech-restricting business. It can\u2019t force its editorial judgments on news- papers, even to increase the range of information available to readers. The Supreme Court struck down as unconstitutional a Florida law assuring political candidates a simple \u201cright to reply\u201d to newspaper attacks on them.<\/p>\n<p>Nonetheless, in 2006, an agency of the federal government was trying to keep words off television, using rules that \u201cpresumptively\u201d covered even a candid conversation about war and peace between leaders of the free world. Dozens of newspapers printed Bush\u2019s remark in full, and anyone with an Internet connection could hear the audio. In spite of the spike in indecency complaints to the FCC, Americans are generally opposed to having the government nanny their television shows.<\/p>\n<h2>How Broadcasting Became Regulated<\/h2>\n<p>The FCC gained its authority over what is said on radio and TV broadcasts when there were fewer ways to distribute information. The public airways were scarce, went the theory, and the government had to make sure they were used in the public interest. As radio and television became universally accessible, a second rationale emerged for government regulation of broadcast speech. Because the broadcast media have \u201ca uniquely pervasive presence in the lives of all Americans,\u201d as the Supreme Court put it in 1978, the government had a special interest in protecting a defenseless public from objection- able radio and television content.<\/p>\n<p>The explosion in communications technologies has confused both rationales. In the digital era, there are far more ways for bits to reach the consumer, so broadcast radio and television are hardly unique in their pervasiveness.<span style=\"font-size: 1rem;text-align: initial\">With minimal technology, anyone can sit at home or in Starbucks and choose from among billions of web pages and tens of millions of blogs. Shock jock Howard Stern left broadcast radio for satellite radio, where the FCC has no authority to regulate what he says.<\/span><\/p>\n<div>\n<p>More than 90% of American televi<span style=\"font-size: 1rem;text-align: initial\">sion viewers get their TV signal through similarly unregulated cable or satellite, not through broadcasts from rooftop antennas. RSS feeds supply up-to-date information to millions of on-the-go cell phone<\/span><span style=\"font-size: 1rem;text-align: initial\">users. Radio stations and television channels are today neither scarce nor uniquely pervasive.<\/span><\/p>\n<\/div>\n<p>For the government to protect children from all offensive information arriving through any communication medium, its authority would have to be expanded greatly and updated continuously. Indeed, federal legislation has been introduced to do exactly that\u2014to extend FCC indecency regulations for broadcast media to satellite and cable television as well.<\/p>\n<p>The explosion in communications raises another possibility, however. If almost anyone can now send information that many people can receive, per- haps the government\u2019s interest in restricting transmissions should be less than what it once was, not greater. In the absence of scarcity, perhaps the government should have no more authority over what gets said on radio and TV than it does over what gets printed in newspapers. In that case, rather than expanding the FCC\u2019s censorship authority, Congress should eliminate it entirely, just as the Supreme Court ended Florida\u2019s regulation of newspaper content.<\/p>\n<p>Parties who already have spots on the radio dial and the TV channel lineup respond that the spectrum\u2014the public airwaves\u2014should remain a limited resource, requiring government protection. No one is making any more radio spectrum, goes the theory, and it needs to be used in the public interest.<\/p>\n<p>But look around you. There are still only a few stations on the AM and FM radio dials. But thousands, maybe tens of thousands, of radio communications are passing through the air around you. Most Americans walk around with two-way radios in their pockets\u2014devices we call cell phones\u2014and most of the nation\u2019s teenagers seem to be talking on them simultaneously. Radios and television sets could be much, much smarter than they now are and could make better use of the airwaves, just as cell phones do.<\/p>\n<p>Engineering developments have vitiated the government\u2019s override of the First Amendment on radio and television. The Constitution demands, under these changed circumstances, that the government stop its verbal policing.<\/p>\n<p>As a scientific argument, the claim that the spectrum is necessarily scarce is now very weak. Yet that view is still forcefully advanced by the very industry that is being regulated. The incumbent license holders\u2014existing broadcast stations and networks\u2014have an incentive to protect their \u201cturf\u201d in the spectrum against any risk, real or imagined, that their signals might be corrupted. By deterring technological innovation, incumbents can limit competition and avoid capital investments. These oddly intertwined strands\u2014the government\u2019s interest in artificial scarcity to justify speech regulation\u00a0and the incumbents\u2019 interest in artificial scarcity to limit competition and costs\u2014today impair both cultural and technological creativity, to the detriment of society.<\/p>\n<p>To understand the confluent forces that have created the world of today\u2019s radio and television censorship, we have to go back to the inventors of the technology.<\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<p style=\"text-align: center\"><strong>S<\/strong><strong>URVIVING\u00a0 ON <\/strong><strong>W<\/strong><strong>IRELESS<\/strong><\/p>\n<p>A dramatic example of the pervasiveness of wireless networks, in spite of the limits on spectrum where they are allowed to operate, was provided in the aftermath of the destruction of the World Trade Center on September 11, 2001.<span style=\"font-family: inherit;font-size: inherit\">Lower Manhattan communicated for several days largely on the strength of wireless. Something similar happened after the December 2006 earthquake that severed undersea communications cables in southeast Asia.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span style=\"color: #077fab;font-size: 1.15em;font-weight: 600\">From Wireless Telegraph to Wireless Chaos<\/span><\/p>\n<div>\n<p>Red, orange, yellow, green, blue\u2014the colors of the rainbow\u2014are all different and yet are all the same. Any child with a crayon box knows that they are all different. They are the same because they are all the result of electromagnetic radiation striking our eyes. The radiation travels in waves that oscillate very quickly. The only physical difference between red and blue is that red waves oscillate around 450,000,000,000,000 times per second, and blue waves about 50% faster.<\/p>\n<p>Because the spectrum of visible light is continuous, an infinity of colors exists between red and blue. Mixing light of different frequencies creates other colors\u2014for example, half blue waves and half red creates a shade of pink known as magenta, which does not appear in the rainbow.<\/p>\n<p>In the 1860s, British physicist James Clerk Maxwell realized that light consists of electromagnetic waves. His equations predicted that there might be waves of other frequencies\u2014waves that people couldn\u2019t sense. Indeed, such\u00a0<span style=\"font-size: 1rem;text-align: initial\">waves have been passing right through us from the beginning of time. They shower down invisibly from the sun and the stars, and they radiate when lightning strikes. No one suspected they existed until Maxwell\u2019s equations said they should. Indeed, there should be a whole spectrum of invisible waves of different frequencies, all traveling at the same great speed as visible light. In 1887, the radio era began with a demonstration by Henrich Hertz. He bent a wire into a circle, leaving a small gap between the two ends. When he set off a big electric spark a few feet away, a tiny spark jumped the gap of the almost-completely-circular wire. The big spark had set off a shower of unseen electromagnetic waves, which had traveled through space and caused electric current to flow in the other wire. The tiny spark was the current completing the circuit. Hertz had created the first antenna, and had revealed the radio waves that struck it. The unit of frequency is named in his honor: One cycle per second is 1 hertz, or Hz for short. A kHz (kilohertz) is a thousand cycles per second, and a MHz (megahertz) is a million cycles per second. These are the units on the AM and FM radio dials.<\/span><\/p>\n<\/div>\n<div>\n<p>Gugliemo Marconi was neither a mathematician nor a scientist. He was an inventive tinkerer. Only 13 years old at the time of Hertz\u2019s experiment, Marconi spent the next decade developing, by trial and error, better ways of creating bursts of radio waves, and antennas for detecting them over greater distances.<\/p>\n<p>In 1901, Marconi stood in Newfoundland and received a single Morse code letter transmitted from England. On the strength of this success, the Marconi Wireless Telegraph Company was soon enabling ships to communicate with each other and with the shore. When the Titanic left on its fateful voyage in 1912, it was equipped with Marconi equipment. The main job of the ship\u2019s radio operators was to relay personal messages to and from passengers, but they also received at least 20 warnings from other ships about the icebergs that lay ahead.<\/p>\n<p>The words \u201cWireless Telegraph\u201d in the name of Marconi\u2019s company suggest the greatest limitation of early radio. The technology was conceived as a device for point-to-point communication. Radio solved the worst problem of telegraphy. No calamity, sabotage, or war could stop wireless transmissions by severing cables. But there was a compensating disadvantage: Anyone could listen in. The enormous power of broadcasting to reach thousands of people at once was at first seen as a liability. Who would pay to send a message to another person when anyone could hear it?<\/p>\n<p>As wireless telegraphy became popular, another problem emerged\u2014one that has shaped the development of radio and television ever since. If several people were transmitting simultaneously in the same geographic area, their\u00a0<span style=\"font-size: 1rem;text-align: initial\">signals couldn\u2019t be kept apart. The Titanic disaster demonstrated the confusion that could result. The morning after the ship hit the iceberg, American newspapers reported excitedly that all passengers had been saved and the ship was being towed to shore. The mistake resulted from a radio operator\u2019s garbled merger of two unrelated segments of Morse code. One ship inquired if \u201call Titanic passengers safe?\u201d A completely different ship reported that it was \u201c300 miles west of the Titanic and towing an oil tank to Halifax.\u201d All the ships had radios and radio operators. But there were no rules or conventions about whether, how, or when to use them.<\/span><\/p>\n<\/div>\n<div>\n<p>Listeners to Marconi\u2019s early transmitters were easily confused because they had no way to \u201ctune in\u201d a particular communication. For all of Marconi\u2019s genius in extending the range of transmission, he was using essentially Hertz\u2019s method for generating radio waves: big sparks. The sparks splattered electromagnetic energy across the radio spectrum. The energy could be stopped and started to turn it into dots and dashes, but there was nothing else to control. One radio operator\u2019s noise was like any other\u2019s. When several transmitted simultaneously, chaos resulted.<\/p>\n<p>The many colors of visible light look white if all blended together. A color filter lets through some frequencies of visible light but not others. If you look at the world through a red filter, everything is a lighter or darker shade of red, because only the red light comes through. What radio needed was something similar for the radio spectrum: a way to produce radio waves of a single frequency, or at least a narrow range of frequencies, and a receiver that could let through those frequencies and screen out the rest. Indeed, that technology already existed.<\/p>\n<p>In 1907, Lee De Forest patented a key technology for the De Forest Radio Telephone Company\u2014dedicated to sending voice and even music over the radio waves. When he broadcast Enrico Caruso from the Metropolitan Opera House on January 13, 1910, the singing reached ships at sea. Amateurs huddled over receivers in New York and New Jersey. The effect was sensational. Hundreds of amateur broadcasters sprang into action over the next few years, eagerly saying whatever they wanted, and playing whatever music they could, to anyone who happened to be listening.<\/p>\n<p>But with no clear understanding\u00a0<span style=\"font-size: 1rem;text-align: initial\">about what frequencies to use, radio communication was a hit-or-miss affair. Even what the New York Times described as the \u201chomeless song waves\u201d of the Caruso broadcast clashed with\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">another station that, \u201cdespite all entreaties,\u201d insisted on broadcasting at the identical 350kHz frequency. Some people could \u201ccatch the ecstasy\u201d of Caruso\u2019s voice, but others got only some annoying Morse code: \u201cI took a beer just now.\u201d<\/span><\/p>\n<\/div>\n<h2>Radio Waves in Their Channels<\/h2>\n<p>The emerging radio industry could not grow under such conditions. Commercial interests complemented the concerns of the U.S. Navy about amateur interference with its ship communications. The Titanic disaster, although it owed little to the failures of radio, catalyzed government action. On May 12, 1912, William Alden Smith called for radio regulation on the floor of the U.S. Senate. \u201cWhen the world weeps together over a common loss\u2026,\u201d proclaimed the Senator, \u201cwhy should not the nations clear the sea of its conflicting idioms and wisely regulate this new\u00a0servant of humanity?\u201d<\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<p style=\"text-align: center\"><strong>H<\/strong><strong>IGH <\/strong><strong>F<\/strong><strong>REQUENCIES<\/strong><\/p>\n<p>Over the years, technological improvements have made it possible to use higher and higher frequencies. Early TV was broadcast at what were then considered \u201cVery High Frequencies\u201d (VHF) because they were higher than AM radio. Technology improved again, and more stations appeared at \u201cUltra High Frequencies\u201d (UHF). The high- est frequency in commercial use today is 77GHz\u201477 gigahertz, that is, 77,000MHz. In general, high frequency signals fade with distance more than low signals, and are therefore mainly useful for localized or urban environments.\u00a0<span style=\"font-family: inherit;font-size: inherit\">Short waves correspond to high frequencies because all radio waves travel at the same speed, which is the speed of light.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div>\n<p>The Radio Act of 1912 limited broadcasting to license holders. Radio licenses were to be \u201cgranted by the Secretary of Commerce and Labor upon application therefor.\u201d In granting the license, the Secretary would stipulate the frequencies \u201cauthorized for use by the station for the prevention of interference and the hours for which the station is licensed for work.\u201d The Act reserved for government use the choice frequencies between about 200 and 500kHz, which permitted the clearest communications over long distances. Amateurs were pushed off to \u201cshort wave\u201d frequencies above 1500kHz, considered useless for technological reasons. The frequency 1000kHz was reserved for distress calls, and licensed stations were required to listen to it every 15 minutes (the one provision that\u00a0<span style=\"font-size: 1rem;text-align: initial\">might have helped the Titanic, since the radio operators of a nearby ship had gone off-duty and missed the Titanic\u2019s rescue pleas). The rest of the spectrum the Secretary could assign to commercial radio stations and private businesses. Emphasizing the nature of radio as \u201cwireless telegraphy,\u201d the Act made it a crime for anyone hearing a radio message to divulge it to anyone except its intended recipient.<\/span><\/p>\n<\/div>\n<p>Much has changed since 1912. The uses of radio waves have become more varied, the allocation of spectrum blocks has changed, and the range of usable frequencies has grown. The current spectrum allocation picture has grown into a dense, disorganized quilt, the product of decades of Solomonic FCC judgments (see Figure 8.1). But still, the U.S. government stipulates what parts of the spectrum can be used for what purposes. It prevents users from interfering with each other and with government communications by demanding that they broadcast at limited power and only at their assigned frequencies. As long as there weren\u2019t many radio stations, the implied\u00a0promise in the Act of 1912 that licenses would be granted \u201cupon application therefor\u201d caused no problems. With the gossip of the pesky amateurs pushed into remote radio territory, there was plenty of spectrum for commercial, military, and safety use.<\/p>\n<div id=\"attachment_478\" style=\"width: 442px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-478\" class=\"wp-image-478 size-full\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05164304\/Image_009.png\" alt=\"\" width=\"432\" height=\"316\" \/><\/p>\n<p id=\"caption-attachment-478\" class=\"wp-caption-text\">Source: www.ntia.doc.gov\/osmhome\/allochrt.pdf. FIGURE 8.1 Frequency allocation of the U.S. radio spectrum. The spectrum from 3kHz to 300GHz is laid out from left to right and top to bottom, with the scale 10 times denser in each successive row. For example, the large block in the second row is the AM radio dial, about 1MHz wide. The same amount of spectrum would be about .00002 of an inch wide in the bottom row.<\/p>\n<\/div>\n<div>\n<p>Within a decade, that picture had changed dramatically. On November 2, 1920, a Detroit station broadcast the election of Warren Harding as President of the United States, relaying to its tiny radio audience the returns it was receiving by telegraph. Radio was no longer just point-to-point communication. A year later, a New York station broadcast the World Series between the Giants and the Yankees, pitch by pitch. Sports broadcasting was born with a broadcaster drearily repeating the ball and strike information telephoned by a newspaper reporter at the ballpark.<\/p>\n<p>Public understanding of the possibilities grew rapidly. The first five radio stations were licensed for broadcasting in 1921. Within a year, there were 670. The number of radio receivers jumped in a year from less than 50,000 to more than 600,000, perhaps a million. Stations using the same frequency in the same city divided up the hours of the day. As radio broadcasting became a profitable business, the growth could not go on forever.<\/p>\n<p>On November 12, 1921, the New York City broadcast license of Intercity Radio Co. expired. Herbert Hoover, then the Secretary of Commerce, refused to renew it, on the grounds that there was no frequency on which Intercity could broadcast in the city\u2019s airspace without interfering with government or other private stations. Intercity sued Hoover to have its license restored, and won. Hoover, said the court, could choose the frequency, but he had no discretion to deny the license. As the congressional committee proposing the 1912 Radio Act had put it, the licensing system was \u201csubstantially the same as that in use for the documenting upward of 25,000 merchant vessels.\u201d The implied metaphor was that Hoover should keep track of the stations like ships in the ocean. He could tell them what shipping lanes to use, but he couldn\u2019t keep them out of the water.<\/p>\n<p>The radio industry begged for order. Hoover convened a National Radio Conference in 1922 in an attempt to achieve consensus on new regulations before chaos set in. The spectrum was \u201ca great national asset,\u201d he said, and \u201cit becomes of primary public interest to say who is to do the broadcasting, under what circumstances, and with what type of material.\u201d \u201c[T]he large mass of subscribers need protection as to the noises which fill their instruments,\u201d and the airwaves need \u201ca policeman\u201d to detect \u201chogs that are endangering the traffic.\u201d<\/p>\n<p>Hoover divided the spectrum from 550kHz to 1350kHz in 10kHz bands\u2014 called \u201cchannels,\u201d consistent with the nautical metaphor\u2014to squeeze in more stations. Empty \u201cguard bands\u201d were left on each side of allocated bands\u00a0<span style=\"font-size: 1rem;text-align: initial\">because broadcast signals inevitably spread out, reducing the amount of usable spectrum. Persuasion and voluntary compliance helped Hoover limit interference. As stations became established, they found it advantageous to comply with Hoover\u2019s prescriptions. Start-ups had a harder time breaking in. Hoover convinced representatives of a religious group that to warn of the coming apocalypse, they should buy time on existing stations rather than build one of their own. After all, their money would go farther that way\u2014in six months, after the world had ended, they would have no further use for a transmitter. Hoover\u2019s effectiveness made Congress complacent\u2014the system was working well enough without laws.<\/span><\/p>\n<\/div>\n<p>But as the slicing got finer, the troubles got worse. WLW and WMH in Cincinnati broadcast on the same frequency in 1924 until Hoover brokered a deal for three stations to share two frequencies in rotating time slots. Finally, the system broke down. In 1925, Zenith Radio Corporation was granted a license to use 930kHz in Chicago, but only on Thursday nights, only from 10 p.m. to midnight, and only if a Denver station didn\u2019t wish to broadcast then. Without permission, Zenith started broadcasting at 910kHz, a frequency that was more open because it had been ceded by treaty to Canada. Hoover fined Zenith; Zenith challenged Hoover\u2019s authority to regulate frequencies, and won in court. The Secretary then got even worse news from the U.S. Attorney General: The 1912 Act, drafted before broadcasting was even a concept, was so ambiguous that it probably gave Hoover no authority to regulate anything about broadcast radio\u2014frequency, power, or time of day.<\/p>\n<p>Hoover threw up his hands. Anyone could start a station and choose a frequency\u2014there were 600 applications pending\u2014but in doing so, they were \u201cproceeding entirely at their own risk.\u201d The result was the \u201cchaos in the air\u201d that Hoover had predicted. It was worse than before the 1912 Act because so many more transmitters existed and they were so much more powerful. Stations popped up, jumped all over the frequency spectrum in search of open air, and turned up their transmission power to the maximum to drown out competing signals. Radio became virtually useless, especially in cities. Congress finally was forced to act.<\/p>\n<h2>The Spectrum Nationalized<\/h2>\n<p>The premises of the Radio Act of 1927 are still in force. The spectrum has been treated as a scarce national resource ever since, managed by the government.<\/p>\n<p>The purpose of the Act was to maintain the control of the United States over all the channels of \u2026 radio transmission; and to provide for the use of such channels, but not the ownership thereof, by individuals, firms, or corporations, for limited periods of time, under licenses granted by Federal authority\u2026. The public could use the spectrum, under conditions stipulated by the government, but could not own it.<\/p>\n<p>A\u00a0new authority, the Federal Radio Commission (FRC), made licensing decisions. The public had a qualified expectation that license requests would be granted: The licensing authority, if public convenience, interest, or necessity will be served thereby, \u2026 shall grant to any applicant therefor a station license\u2026. The Act recognized that demand for licenses could exceed the supply of spectrum. In case of competition among applicants, the licensing\u00a0authority shall make such a distribution of licenses, bands of frequency\u2026, periods of time for operation, and of power among the different States and communities as to give fair, efficient, and equitable radio service to each\u2026.<\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<p style=\"text-align: center\"><strong>THE \u201cRADIO COMMISSION\u201d GROWS<\/strong><\/p>\n<p><span style=\"font-family: inherit;font-size: inherit\">In 1934, the FRC\u2019s name was changed to the Federal Communications Commission\u2014the FCC\u2014 when telephone and telegraph regulation came under the Commission\u2019s oversight. When a separate chunk of radio spectrum was allocated for television, the FCC assumed authority over video broadcasts as well.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The language about \u201cpublic convenience, interest, or necessity\u201d echoes Hoover\u2019s 1922 speech about a \u201cnational asset\u201d and the \u201cpublic interest.\u201d It is also no accident that this law was drafted as the Teapot Dome Scandal was cresting. Oil reserves on federal land in Wyoming had been leased to Sinclair Oil in 1923 with the assistance of bribes paid to the Secretary of the Interior. It took several years for Congressional investigations and federal court cases to expose the wrongdoing; the Secretary was eventually imprisoned. By early 1927, the fair use of national resources in the public interest was a major concern in the United States.<\/p>\n<p>With the passage of the Act of 1927, the radio spectrum became federal land. International treaties followed, to limit interference near national borders. But within the U.S., just as Hoover had asked five years earlier, the federal government took control over who would be allowed to broadcast, which radio waves they could use\u2014and even what they could say.<\/p>\n<h2>Goat Glands and the First Amendment<\/h2>\n<p>The Radio Act of 1927 stipulated that the FRC could not abridge free speech over the radio. Nothing in this Act shall be understood or construed to give the licensing authority the power of censorship\u2026, and no regulation or condition \u2026 shall interfere with the right of free speech by means of radio communications. Inevitably, a case would arise exposing the implicit conflict: On the one hand, the Commission had to use a public interest standard when granting and renewing licenses. On the other, it had to avoid censorship. The pivotal case was over the license for KFKB radio, the station of the Kansas goat-gland doctor, John Romulus Brinkley (see Figure 8.2). The wrath brought down on CBS in 2004 for showing a flash of Janet Jackson\u2019s breast\u2014 and which the networks feared if they broadcast Saving Private Ryan on\u00a0Veterans\u2019 Day or President Bush muttering to Tony Blair\u2014descends from the FCC\u2019s action against this classic American charlatan.<\/p>\n<div id=\"attachment_479\" style=\"width: 442px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-479\" class=\"wp-image-479 size-full\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05164308\/Image_012.png\" alt=\"\" width=\"432\" height=\"408\" \/><\/p>\n<p id=\"caption-attachment-479\" class=\"wp-caption-text\">FIGURE 8.2 A planted newspaper article about \u201cDr.\u201d Brinkley\u2019s goat-gland clinic. The doctor himself is shown at the left, holding the first baby named \u201cBilly,\u201d of course conceived after a goat-gland transplant. New York Evening Journal, September 11, 1926. Microfilm courtesy of the Library of Congress.<\/p>\n<\/div>\n<div>\n<p>Brinkley, born in 1885, became a \u201cdoctor\u201d licensed to practice in Kansas by buying a degree from the Eclectic Medical University in Kansas City. He worked briefly as a medic for Swift &amp; Co., the meatpackers. In 1917, he set up his medical practice in Milford, a tiny town about 70 miles west of Topeka. One day, a man came for advice about his failing virility, describing himself as a \u201cflat tire.\u201d Drawing on his memory of goat behavior from his days at the slaughterhouse, Brinkley said, \u201cYou wouldn\u2019t have any trouble if you had a pair of those buck glands in you.\u201d \u201cWell, why don\u2019t you put \u2018em in?\u201d the patient asked. Brinkley did the transplant in a back room, and a business was born. Soon he was performing 50 transplants a month, at $750 per surgery. In time, he discovered that promising sexual performance was even more lucrative than promising fertility.<\/p>\n<p>As a young man, Brinkley had worked at a telegraph office, so he knew the promise of communication technology. In 1923, he opened Kansas\u2019s first radio station, KFKB\u2014\u201cKansas First, Kansas Best\u201d radio, or sometimes \u201cKansas Folks Know Best.\u201d The station broadcast a mixture of country music, fundamentalist preaching, and medical advice from Dr. Brinkley himself. Listeners sent in their complaints, and the advice was almost always to buy some of Dr. Brinkley\u2019s mail-order patent medicines. \u201cHere\u2019s one from Tillie,\u201d went a typical segment. \u201cShe says she had an operation, had some trouble 10 years ago. I think the operation was unnecessary, and it isn\u2019t very good sense to have an ovary removed with the expectation of motherhood resulting there- from. My advice to you is to use Women\u2019s Tonic No. 50, 67, and 61. This com- bination will do for you what you desire if any combination will, after three months persistent use.\u201d<\/p>\n<p>KFKB had a massively powerful transmitter, heard halfway across the Atlantic. In a national poll, it was the most popular station in America\u2014with four times as many votes as the runner-up. Brinkley was receiving 3,000 letters a day and was a sensation throughout the plains states. On a good day, 500 people might show up in Milford. But the American Medical Association\u2014prompted by a competing local radio station\u2014objected to his quackery. The FRC concluded that \u201cpublic interest, convenience, or necessity\u201d would not be served by renewing the license. Brinkley objected that the cancellation was nothing less than censorship.<\/p>\n<p>An appeals court sided with the FRC in a landmark decision. Censorship, the court explained, was prior restraint, which was not at issue in Brinkley\u2019s case. The FRC had \u201cmerely exercised its undoubted right to take note of appellant\u2019s past conduct.\u201d An arguable point\u2014as Albert Gallatin said more than 200 years ago about prior restraint of the press, it was \u201cpreposterous to say, that to punish a certain act was not an abridgment of the liberty of doing that act.\u201d<\/p>\n<\/div>\n<div>\n<p>The court used the public land metaphor in justifying the FRC\u2019s action. \u201c[B]ecause the number of available broadcasting frequencies is limited,\u201d wrote the court, \u201cthe commission is necessarily called upon to consider the character and quality of the service to be rendered\u2026. Obviously, there is no room in the broadcast band for every business or school of thought.\u201d<\/p>\n<p>\u201cNecessarily\u201d and \u201cobviously.\u201d It is always wise to scrutinize arguments that proclaim loudly how self-evident they are. Judge Felix Frankfurter, in an opinion on a different case in 1943, restated the principle in a form that has often been quoted. \u201cThe plight into which radio fell prior to 1927 was attributable to certain basic facts about radio as a means of communication\u2014its facilities are limited; they are not available to all who may wish to use them; the radio spectrum simply is not large enough to accommodate everybody. There is a fixed natural limitation upon the number of stations that can operate without interfering with one another.\u201d<\/p>\n<p>These were facts of the technology of the time. They were true, but they were contingent truths of engineering. They were never universal laws of physics, and are no longer limitations of technology. Because of engineering innovations over the past 20 years, there is no practically significant \u201cnatural limitation\u201d on the number of broadcast stations. Arguments from inevitable scarcity can no longer justify U.S. government denials of the use of the airwaves.<\/p>\n<p>The vast regulatory infrastructure, built to rationalize use of the spectrum by much more limited radio technology, has adjusted slowly\u2014as it almost inevitably must: Bureaucracies don\u2019t move as quickly as technological innovators. The FCC tries to anticipate resource needs centrally and far in advance. But technology can cause abrupt changes in supply, and market forces can cause abrupt changes in demand. Central planning works no better for the FCC than it did for the Soviet Union.<\/p>\n<p>Moreover, plenty of stakeholders in old technology are happy to see the rules remain unchanged. Like tenants enjoying leases on public land, incumbent radio license holders have no reason to encourage competing uses of the assets they control. The more money that is at stake, the greater the leverage of the profitable ventures. Radio licenses had value almost from the beginning, and as scarcity increased, so did price. By 1925, a Chicago license was sold for $50,000. As advertising expanded and stations bonded into networks, transactions reached seven figures. After the 1927 Act, disputes between stations had to be settled by litigation, trips to Washington, and pressure by friendly Congressional representatives\u2014all more feasible for stations with deep pockets. At first, there were many university stations, but the FRC squeezed them as the value of the airwaves went up. As non-profits, these stations could not hold their ground. Eventually, most educational stations\u00a0<span style=\"font-size: 1rem;text-align: initial\">sold out to commercial broadcasters. De facto, as one historian put it, \u201cwhile talking in terms of the public interest, \u2026 the commission actually chose to further the ends of the commercial broadcasters.\u201d<\/span><\/p>\n<\/div>\n<div>\n<h2>The Path to Spectrum Deregulation<\/h2>\n<p>When you push a button on your key fob and unlock your car doors, you are a radio broadcaster. The signal from the key fob uses a bit of the spectrum. The key fob signal obeys the same basic physical laws as WBZ\u2019s radio broad- casts in Boston, which have been going on continuously since WBZ became the first Eastern commercial station in 1921. But the new radio broadcasts are different in two critical respects. There are hundreds of millions of them going on every day. And while WBZ\u2019s broadcast power is 50,000 watts, a key fob\u2019s is less than .0002 of a watt.<\/p>\n<p>If the government still had to license every radio transmitter\u2014as Congress authorized in the aftermath of the radio chaos of the 1920s\u2014neither radio key fobs nor any of hundreds of other innovative uses of low-power radio could have come about. The law and the bureaucracy it created would have snuffed this part of the digital explosion.<\/p>\n<p>Another development also lay behind the wireless explosion. Technology had to change so that the available spectrum could be used more efficiently. Digitalization and miniaturization changed the communications world. The story of cell phones and wireless Internet and many conveniences as yet unimagined is a knot of politics, technology, and law. You can\u2019t understand the knot without understanding the strands, but in the future, the strands need not remain tied up in the same way as they are today.<\/p>\n<h2>From a Few Bullhorns to Millions of Whispers<\/h2>\n<p>Thirty years ago, there were no cell phones. A handful of business executives had mobile phones, but the devices were bulky and costly. Miniaturization helped change the mobile phone from the perk of a few corporate bigwigs into the birthright of every American teenager. But the main advance was in spectrum allocation\u2014in rethinking the way the radio spectrum was used.<\/p>\n<p>In the era of big, clunky mobile phones, the radio phone company had a big antenna and secured from the FCC the right to use a few frequencies in an urban area. The executive\u2019s phone was a little radio station, which broad- cast its call. The mobile phone had to be powerful enough to reach the company\u2019s antenna, wherever in the city the phone might be located. The number of simultaneous calls was limited to the number of frequencies allocated to\u00a0<span style=\"font-size: 1rem;text-align: initial\">the company. The technology was the same as broadcast radio stations used, except that the mobile phone radios were two-way. The scarcity of spectrum, still cited today in limiting the number of broadcast channels, then limited the number of mobile phones. Hoover understood this way back in 1922. \u201cObviously,\u201d he said, \u201cif 10,000,000 telephone subscribers are crying through the air for their mates \u2026 the ether will be filled with frantic chaos, with no communication of any kind possible.\u201d<\/span><\/p>\n<\/div>\n<div>\n<p>Cellular technology exploits Moore\u2019s Law. Phones have become faster, cheaper, and smaller. Because cell phone towers are only a mile or so apart, cell phones need only be powerful enough to send their signals less than a mile. Once received by an antenna, the signal is sent on to the cell phone company by \u201cwireline\u201d\u2014i.e., by copper or fiber optic cables on poles or under- ground. There need be only enough radio spectrum to handle the calls within the \u201ccell\u201d surrounding a tower, since the same frequencies can be used simultaneously to handle calls in other cells. A lot of fancy dancing has to be done to prevent a call from being dropped as an active phone is carried from cell to cell, but computers, including the little computers inside cell phones, are smart and fast enough to keep up with such rearrangements.<\/p>\n<p>Cell phone technology illustrates an important change in the use of radio spectrum. Most radio communications are now over short distances. They are transmissions between cell phone towers and cell phones. Between wireless routers at Starbucks and the computers of coffee drinkers. Between cordless telephone handsets and their bases. Between highway toll booths and the transponders mounted on commuters\u2019 windshields. Between key fobs with buttons and the cars they unlock. Between Wii remotes and Wii game machines. Between iPod transmitters plugged into cars\u2019 cigarette lighters and the cars\u2019 FM radios.<\/p>\n<p>Even \u201csatellite radio\u201d transmissions often go from a nearby antenna to a customer\u2019s receiver, not directly from a satellite orbiting in outer space. In urban areas, so many buildings lie between the receiver and the satellite that the radio companies have installed \u201crepeaters\u201d\u2014antennas connected to each other by wireline. When you listen to XM or Sirius in your car driving around a city, the signal is probably coming to you from an antenna a few blocks away.<\/p>\n<\/div>\n<div>\n<p>The radio spectrum is no longer mainly for long-range signaling. Spectrum policies were set when the major use of radio was for ship-to-shore transmissions, SOS signaling from great distances, and broadcast<span style=\"font-size: 1rem;text-align: initial\">ing over huge geographic areas. As the nation has become wired, most radio\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">signals travel only a few feet or a few hundred feet. Under these changed conditions, the old rules for spectrum management don\u2019t make sense.<\/span><\/p>\n<\/div>\n<h2>Can We Just Divide the Property Differently?<\/h2>\n<p>Some innovations make better use of the spectrum without changing the fundamental allocation picture shown in Figure 8.1. For example, HD radio squeezes an unrelated low-power digital transmission alongside the analog AM and FM radio channels. (\u201cHD\u201d is a trademark. It doesn\u2019t stand for \u201chigh definition.\u201d) On AM HD radio, the HD transmission uses the guard bands on either side of an AM station for entirely different broadcast content (see Figure 8.3). Most AM radios filter out any signal in the channels adjacent to the one to which it is tuned, so the HD transmission is inaudible on an ordinary radio, even as noise. The HD radio broadcast can be heard only on a special radio designed to pick up and decode the digital transmission.<\/p>\n<div id=\"attachment_483\" style=\"width: 339px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-483\" class=\"size-full wp-image-483\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05171006\/Radio-Bands.png\" alt=\"\" width=\"329\" height=\"356\" \/><\/p>\n<p id=\"caption-attachment-483\" class=\"wp-caption-text\">FIGURE 8.3 HD radio uses guard bands to broadcast digital signals at low power. In the AM spectrum, the 10kHz bands on either side of the band allocated to an ordinary analog broadcast station may be used for an entirely independent digital broadcast, limited to low power so that it does not interfere with reception of the analog broadcast.<\/p>\n<\/div>\n<div>\n<p>HD radio is a clever invention, and by opening the spectrum to HD broad- casts, the FCC has been able to squeeze in more broadcast stations\u2014at least for those willing to buy special radios. But it doesn\u2019t challenge the fundamental model that has been with us since the 1920s: Split up the spectrum and give a piece to each licensee.<\/p>\n<p>Even parts of the spectrum that are \u201callocated\u201d to licensees may be drastically underused in practice. A 2002 Federal Communications Committee Report puts it this way: \u201c\u2026 the shortage of spectrum is often a spectrum access problem. That is, the spectrum resource is available, but its use is compartmented by traditional policies based on traditional technologies.\u201d The committee came to this conclusion in part by listening to the air waves in various frequency blocks to test how often nothing at all was being transmitted. Most of the time, even in the dense urban settings of San Diego, Atlanta, and Chicago, important spectrum bands were nearly 100% idle. The public would be better served if others could use the otherwise idle spectrum.<\/p>\n<p>For about ten years, the FCC has experimented with \u201csecondary spectrum marketing.\u201d Someone wanting some spectrum for temporary use may be able to lease it from a party who has a right to use it, but is willing to give it up in exchange for a payment. A university radio station, for example, may need the capacity to broadcast at high power only on a few Saturday afternoons to cover major football games. Perhaps such a station could make a deal with a business station that doesn\u2019t have a lot of use for its piece of the spectrum when the stock markets are closed. As another example, instead of reserving a band exclusively for emergency broadcasts, it could be made available to others, with the understanding\u2014enforced by codes wired into the transmitters\u2014that the frequency would be yielded on demand for public safety broadcasts.<\/p>\n<p>As the example of eBay has shown, computerized auctions can result in very efficient distribution of goods. The use of particular pieces of the spectrum\u2014at particular times, and in particular geographic areas\u2014can create efficiencies if licensees of under-utilized spectrum bands had an incentive to sell some of their time to other parties.<\/p>\n<p>But secondary markets don\u2019t change the basic model\u2014a frequency band belongs to one party at a time. Such auction ideas change the allocation scheme. Rather than having a government agency license spectrum statically to a single party with exclusive rights, several parties can divide it up and make trades. But these schemes retain the fundamental notion that spectrum is like land to be split up among those who want to use it.<\/p>\n<\/div>\n<div>\n<h2>Sharing the Spectrum<\/h2>\n<p>In his 1943 opinion, Justice Frankfurter used an analogy that unintentionally pointed toward another way of thinking. Spectrum was inevitably scarce, he opined. \u201cRegulation of radio was therefore as vital to its development as traffic control was to the development of the automobile.\u201d<\/p>\n<p>Just as the spectrum is said to be, the roadways are a national asset. They are controlled by federal, state, and local governments, which set rules for their use. You can\u2019t drive too fast. Your vehicle can\u2019t exceed height and weight limits, which may depend on the road.<\/p>\n<p>But everyone shares the roads. There aren\u2019t any special highways reserved for government vehicles. Trucking companies can\u2019t get licenses to use particular roads and keep out their competitors. Everybody shares the capacity of the roads to carry traffic.<\/p>\n<p>The roads are what is known in law as a \u201ccommons\u201d (a notion introduced in Chapter 6). The ocean is also a commons, a shared resource subject to international fishing agreements. In theory at least, the ocean need not be a commons. Fishing boats could have exclusive fishing rights in separate sectors of the ocean\u2019s surface. If the regions were large enough, fishermen might be able to earn a good living under these conditions. But such an allocation of the resources of the ocean would be dreadfully inefficient for society as a whole. The oceans better satisfy human needs if they are treated as a commons and fishing boats move with the fish\u2014under agreed limits about the intensity of fishing.<\/p>\n<p>The spectrum can be shared rather than split up into pieces. There is a precedent in electronic communications. The Internet is a digital commons. Everyone\u2019s packets get mixed with everyone else\u2019s on the fiber optics and satellite links of the Internet backbone. The packets are coded. Which packet belongs to whom is sorted out at the ends. Anything confidential can be encrypted.<\/p>\n<p>Something similar can be done with broadcasts\u2014provided there is a basic rethinking of spectrum management. Two ideas are key: first, that using lots of bandwidth need not cause interference and can greatly increase transmission capacity; and second, that putting computers into radio receivers can greatly improve the utilization of the spectrum.<\/p>\n<\/div>\n<h2>The Most Beautiful Inventor in the World<\/h2>\n<p>Spread spectrum was discovered and forgotten several times and in several countries. Corporations (ITT, Sylvania, and Magnavox), universities (especially MIT), and government laboratories doing classified research all shared in giving birth to this key component of modern telecommunications\u2014and were often unaware of each other\u2019s activities.<\/p>\n<p>By far the most remarkable precedent for spread spectrum was a patented invention by Hollywood actress Hedy Lamarr\u2014\u201cthe most beautiful woman in the world,\u201d in the words of movie mogul Louis Mayer\u2014and George Antheil, an avant-garde composer known as \u201cthe bad boy of music.\u201d<\/p>\n<p>Lamarr made a scandalous name for herself in Europe by appearing nude in 1933, at the age of 19, in a Czech movie, Ecstasy. She became the trophy wife of Fritz Mandl, an Austrian munitions maker whose clients included both Hitler and Mussolini. In 1937, she disguised herself as a maid and escaped Mandl\u2019s house, fleeing first to Paris and then to London. There she met Mayer, who brought her to Hollywood. She became a star\u2014and the iconic beauty of her screen generation (see Figure 8.4).<\/p>\n<p>In 1940, Lamarr arranged to meet Antheil. Her upper torso could use some enhancement, she thought, and she hoped Antheil could give her some advice. Antheil was a self-styled expert on female endocrinology, and had written a series of articles for Esquire magazine with titles such as \u201cThe Glandbook for the Questing Male.\u201d Antheil suggested glandular extracts. Their conversation then turned to other matters\u2014specifically, to torpedo warfare.<\/p>\n<p>A torpedo\u2014just a bomb with a propeller\u2014could sink a massive ship. Radio controlled torpedoes had been developed by the end of World War I, but were far from foolproof. An effective countermeasure was to jam the signal con- trolling the torpedo by broadcasting loud radio noise at the frequency of the control signal. The torpedo would go haywire and likely miss its target. From observing Mandl\u2019s business, Lamarr had learned about torpedoes and why it was hard to control them.<\/p>\n<p>Lamarr had become fiercely pro-American and wished to help the Allied war effort. She conceived the idea of transmitting the torpedo control signal in short bursts at different frequencies. The code for the sequence of frequencies would be held identically within the torpedo and the controlling ship. Because the sequence would be unknown to the enemy, the transmission could not be jammed by flooding the airwaves with noise in any limited frequency band. Too much power would be required to jam all possible frequencies simultaneously.<\/p>\n<div id=\"attachment_480\" style=\"width: 310px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-480\" class=\"wp-image-480 size-full\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05164312\/Image_0221.gif\" alt=\"\" width=\"300\" height=\"384\" \/><\/p>\n<p id=\"caption-attachment-480\" class=\"wp-caption-text\">\u00a9 Bettmann\/CORBIS<br \/>FIGURE 8.4 Hedy Lamarr, at about the age when she and George Antheil made their spread spectrum discovery.<\/p>\n<\/div>\n<p>Antheil\u2019s contribution was to control the frequency-hopping sequence by means of a player piano mechanism\u2014with which he was familiar because he had scored his masterpiece, Ballet M\u00e9canique, for synchronized player pianos. As he and Lamarr conceived the device (it was never built), the signal would therefore hop among 88 frequencies, like the 88 keys on a piano keyboard. The ship and the torpedo would have identical piano rolls\u2014in effect, encrypting the broadcast signal.<\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">The story of Antheil and Lamarr, and the place of their invention in the history of spread spectrum, is told in <em>Spread Spectrum<\/em> by Rob Walters (Booksurge LLC, 2005).<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>In 1941, Lamarr and Antheil assigned their patent (see Figure 8.5) to the Navy. A small item on the \u201cAmusements\u201d page of the New York Times quoted an army engineer as describing their invention as so \u201cred hot\u201d that he could not say what it did, except that it was \u201crelated to the remote control of apparatus employed in warfare.\u201d Nonetheless, the Navy seems to have done\u00a0nothing with the invention at the time. Instead, Lamarr went to work selling war bonds. Calling herself \u201cjust a plain gold-digger for Uncle Sam,\u201d she sold kisses, and once raised $4.5 million at a single lunch.The patent was ignored for more than a decade. Romuald Ireneus \u2019Scibor-Marchocki, who was an engineer for a Naval contractor in the mid-1950s, recalls being given a copy when he was put to work on a device for locating enemy submarines. He didn\u2019t recognize the patentee because she had not used her stage name.<\/p>\n<div id=\"attachment_481\" style=\"width: 443px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-481\" class=\"size-full wp-image-481\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05164315\/Image_024.gif\" alt=\"\" width=\"433\" height=\"133\" \/><\/p>\n<p id=\"caption-attachment-481\" class=\"wp-caption-text\">U.S. Patent Office.<br \/>FIGURE 8.5 Original spread spectrum patent by Hedy Lamarr (n\u00e9e Kiesler\u2014Gene Markey was her second husband, of six) and George Antheil. On the left, the beginning of the patent itself. On the right, a diagram of the player-piano mechanism included as an illustration in the patent.<\/p>\n<\/div>\n<div>\n<p>And that, in a nutshell, is the strange story of serendipity, teamwork, vanity, and patriotism that led to the Lamarr-Antheil discovery of spread spectrum. The connection of these two to the discovery of spread spectrum was made only in the 1990s. By that time, the influence of their work had become entangled with various lines of classified military research. Whether Hedy Lamarr was more a Leif Erikson than a Christopher Columbus of this new conceptual territory, she was surely the most unlikely of its discoverers. In 1997, the Electronic Frontier Foundation honored her for her discovery; she welcomed the award by saying, \u201cIt\u2019s about time.\u201d When asked about her dual achievements, she commented, \u201cFilms have a certain place in a certain time period. Technology is forever.\u201d<\/p>\n<\/div>\n<h2>Channel Capacity<\/h2>\n<p>Lamarr and Antheil had stumbled on a particular way of exploiting a broad frequency range\u2014\u201cspreading\u201d signals across the spectrum. The theoretical foundation for spread spectrum was one of the remarkable mathematical results of Claude Shannon in the late 1940s. Although no digital telephones or radios existed at the time, Shannon derived many of the basic laws by which they would have to operate. The Shannon-Hartley Theorem predicted spread spectrum in the same way that Maxwell\u2019s equations predicted radio waves.<\/p>\n<p>Shannon\u2019s result (building on work by Ralph Hartley two decades earlier) implies that \u201cinterference\u201d is not the right concept for thinking about how much information can be carried in the radio spectrum. Signals can overlap in frequency and yet be pulled apart perfectly by sufficiently sophisticated radio receivers.<\/p>\n<p>Early engineers assumed that communication errors were inevitable. Send bits down a wire, or through space using radio waves, and some of them would probably arrive incorrectly, because of noise. You could make the channel more reliable by slowing the transmission, they supposed, in the same way that people talk more slowly when they want to be sure that others understand them\u2014but you could never guarantee that a communication was errorless.<\/p>\n<p>Shannon showed that communication channels actually behave quite differently. Any communication channel has a certain channel capacity\u2014a number of bits per second that it can handle. If your Internet connection is advertised as having a bit rate of 3Mbit\/sec (3 million bits per second), that number is the channel capacity of the particular connection between you and your Internet Service Provider (or should be\u2014not all advertisements tell the truth). If the connection is over telephone wiring and you switch to a service that runs over fiber optic cables, the channel capacity should increase.<\/p>\n<p>However large it is, the channel capacity has a remarkable property, which Shannon proved: Bits can be transmitted through the channel, from the source to the destination, with negligible probability of error as long as the transmission rate does not exceed the channel capacity. Any attempt to push bits down the channel at a rate higher than the channel capacity will inevitably result in data loss. With sufficient cleverness about the way data from the source is encoded before it is put in the channel, the error rate can be essentially zero, as long as the channel capacity is not exceeded. Only if the data rate exceeds the channel capacity do transmission errors become inevitable.<\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<p style=\"text-align: center\"><strong>ERRORS AND DELAYS<\/strong><\/p>\n<p>Although transmission errors can be made unlikely, they are never impossible. However, errors can be made far less probable than, for example, the death of the intended recipient in an earthquake that just happens to occur while the bits are on their way (see the Appendix). Guaranteeing correctness requires adding redundant bits to the message\u2014in the same way that fragile postal shipments are protected by adding styrofoam packing material.\u00a0<span style=\"font-family: inherit;font-size: inherit\">Attaining data rates close to the \u201cShannon limit\u201d involves pre-processing the bits. That may increase latency\u2014the time delay between the start of the \u201cpacking\u201d process and the insertion of bits into the channel. Latency can be a problem in applications such as voice communication, where delays annoy the communicants. Happily, phone calls don\u2019t require error-free transmission\u2014we are all used to putting up with a little bit of static.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Power, Signal, Noise, and Bandwidth<\/h2>\n<p>The capacity of a radio channel depends on the frequencies at which messages are transmitted and the amount of power used to transmit them. It\u2019s helpful to think about these two factors separately.<\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<p style=\"text-align: center\"><strong>BANDWIDTH<\/strong><\/p>\n<p><span style=\"font-family: inherit;font-size: inherit\">Because channel capacity depends on frequency bandwidth, the term \u201cbandwidth\u201d is used informally to mean \u201camount of information communicated per second.\u201d But technically, bandwidth is a term about electromagnetic communication, and even then is only one of the factors affecting the capacity to carry bits.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>A radio broadcast is never \u201cat\u201d a single frequency. It always uses a range or band of frequencies to convey the actual sounds. The only sound that could be carried at a single, pure frequency would be an unvarying tone. The bandwidth of a broadcast is the size of the frequency band\u2014that is, the difference between the top frequency and the bottom frequency of the band. Hoover, to use this language, allotted 10kHz of bandwidth for each AM station.<\/p>\n<div>\n<p>If you can transmit so many bits per second with a certain amount of bandwidth, you can transmit twice that many bits per second if you have twice as much bandwidth. The two trans- missions could simply go on side by side, not interacting with each other in any way. So, channel capacity is proportional to bandwidth.<\/p>\n<p>The relation to signal power is more surprising. To use simple numbers for clarity, suppose you can transmit one bit, either 0 or 1, in one second. If you\u00a0<span style=\"font-size: 1rem;text-align: initial\">could use more power but no more time or bandwidth, how many bits could you transmit?<\/span><\/p>\n<\/div>\n<p>One way a radio transmission might distinguish between 0 and 1 is for the signals representing these two values to have different signal powers. To continue to oversimplify, assume that zero power represents 0, and a little more power, say 1 watt, represents 1. Then to distinguish a 1 from a 0, the radio receiver has to be sensitive enough to tell the difference between 1 watt and 0 watts. The uncontrollable noise\u2014radio waves arriving from sunspots, for example\u2014also must be weak enough that it does not distort a signal representing 0 so that it is mistaken for a signal representing 1.<\/p>\n<p>Under these conditions, four times as much power would enable transmission of two bits at once, still in one second. Power level 0 could represent 00; 1 watt, 01; 2 watts, 10; and 3 watts could represent 11. Successive power levels have to be separated by at least a watt to be sure that one signal is not confused with another. If the power levels were closer together, the unchanged noise might make them impossible to distinguish reliably. To transmit three bits at a time, you\u2019d need eight times as much power, using levels 0 through 7 watts\u2014that is, the amount of power needed increases exponentially with the number of bits to be transmitted at once (see Figure 8.6).<\/p>\n<div id=\"attachment_484\" style=\"width: 547px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-484\" class=\"size-full wp-image-484\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05173915\/signal-levels.png\" alt=\"\" width=\"537\" height=\"315\" \/><\/p>\n<p id=\"caption-attachment-484\" class=\"wp-caption-text\">FIGURE 8.6 Shannon-Hartley. Signal levels must be far enough apart to be distinguishable in spite of the distortion caused by noise. Tripling the bit rate requires eight times as much power.<\/p>\n<\/div>\n<p>So the Shannon-Hartley result says that channel capacity depends on both bandwidth and signal power, but more bandwidth is exponentially more valuable than more signal power. You\u2019d have to get more than a thousand times more signal power to get the same increase in channel capacity as you could get from having just ten times more bandwidth (because 1024 = 210). Bandwidth is precious indeed.<\/p>\n<h2>One Man\u2019s Signal Is Another Man\u2019s Noise<\/h2>\n<p>The consequences of the Shannon-Hartley result about the value of band- width are quite astonishing. If WBZ were transmitting digitally with its 50,000 watt transmitter, it could transmit the same amount of information (over shorter distances) using less power than a household light bulb\u2014if it could get 100kHz of bandwidth rather than the 10kHz the FCC has allowed it.<\/p>\n<p>Of course, no station could get exclusive use of 100kHz. Even giving each station 10kHz uses up the spectrum too quickly. The spectrum-spreading idea works only if the spectrum is regarded as a commons. And to see the consequences of many signals broadcasting in the same spectrum, one more crucial insight is needed.<\/p>\n<p>The power level that affects the capacity of a radio channel is not actually the signal power, but the ratio of the signal power to the noise power\u2014the so-called signal-to-noise ratio. In other words, you could transmit at the same bit rate with one watt of power as with ten\u2014if you could also reduce the noise by a factor of ten. And \u201cnoise\u201d includes other people\u2019s signals. It really doesn\u2019t matter whether the interference is coming from other human broad- casts or from distant stars. All the interfering broadcasts can share the same spectrum band, to the extent they could coexist with the equivalent amount of noise.<\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">A readable account of spread spectrum radio appeared in 1998: \u201cSpread-Spectrum Radio\u201d by David R. Hughes and DeWayne Hendricks (Scientific American, April 1998, 94\u201396).<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<div>\n<p>A surprising consequence of Shannon-Hartley is that there is some channel capacity even if the noise (including other people\u2019s signals) is stronger than the signal. Think of a noisy party: You can pick out a conversation from the back- ground noise if you focus on a single voice, even if it is fainter than the rest of the noise. But the Shannon-Hartley result predicts even more: The channel can transmit bits flawlessly, if slowly, even if the noise is many times more powerful than the signal. And if you could get a lot of bandwidth, you could drastically reduce the signal power\u00a0<span style=\"font-size: 1rem;text-align: initial\">without lowering the bit rate at all (see Figure 8.7). What would seem to be just noise to anyone listening casually on a particular frequency would actually have a useful signal embedded within it.<\/span><\/p>\n<\/div>\n<p>The Shannon-Hartley Theorem is a mathematician\u2019s delight\u2014a tease that limits what is possible in theory and gives no advice about how to achieve it in practice. It is like Einstein\u2019s E = mc2\u00a0\u2014which at once says nothing, and everything, about nuclear reactors and atomic bombs. Hedy Lamarr\u2019s frequency hopping was one of the spread spectrum techniques that would eventually be practical, but other ingenious inventions, named by odd acronyms, would emerge in the late twentieth century.<\/p>\n<p>Two major obstacles stood between the Shannon-Hartley result and usable spread spectrum devices. The first was engineering: computers had to become fast, powerful, and cheap enough to process bits for transmission of high- quality audio and video to consumers. That wouldn\u2019t happen until the 1980s. The other problem was regulatory. Here the problem was not mathematical or scientific. Bureaucracies change more slowly than the technologies they regulate.<\/p>\n<div id=\"attachment_485\" style=\"width: 493px\" class=\"wp-caption aligncenter\"><img loading=\"lazy\" decoding=\"async\" aria-describedby=\"caption-attachment-485\" class=\"size-full wp-image-485\" src=\"https:\/\/s3-us-west-2.amazonaws.com\/courses-images\/wp-content\/uploads\/sites\/3323\/2018\/07\/05174815\/spread-spectrum.png\" alt=\"\" width=\"483\" height=\"161\" \/><\/p>\n<p id=\"caption-attachment-485\" class=\"wp-caption-text\">FIGURE 8.7 The spread spectrum principle. The same bit rate can be achieved at much lower power by using more bandwidth, and the signal power can even be less than the noise.<\/p>\n<\/div>\n<div>\n<h2>Spectrum Deregulated<\/h2>\n<p>Today, every Starbucks has WiFi\u2014that is, wireless Internet access. Hotel rooms, college dormitories, and a great many households also have \u201cwireless.\u201d This happened because a tiny piece of the spectrum, a slice less than a millimeter wide in Figure 8.1, was deregulated and released for experimental use by creative engineers. It is an example of how deregulation can stimulate industrial innovations, and about how existing spectrum owners prefer a regulatory climate that maintains their privileged position. It is a story that could be repeated elsewhere in the spectrum, if the government makes wise decisions.<\/p>\n<\/div>\n<div>\n<p>Michael Marcus is an improbable revolutionary. An MIT-trained electrical engineer, he spent three years as an Air Force officer during the Vietnam war, designing communications systems for underground nuclear test detection at a time when the ARPANET\u2014the original, military-sponsored version of the Internet\u2014was first in use. After finishing active duty, he went to work at a Pentagon think tank, exploring potential military uses of emerging communications technologies.<\/p>\n<p>In the summer of 1979, Marcus attended an Army electronic warfare workshop. As was typical at Army events, attendees were seated alphabetically. Marcus\u2019s neighbor was Steve Lukasik, the FCC\u2019s chief scientist. Lukasik had been Director of ARPA during the development of the ARPANET and then an ARPANET visionary at Xerox. He came to the FCC, not generally considered a technologically adventurous agency, because Carter administration officials were toying with the idea that existing federal regulations might be stifling innovation. Lukasik asked Marcus what he thought could stimulate growth in radio communications. Marcus answered, among other things, \u201cspread spectrum.\u201d His engineering was sound, but not his politics. People would not like this idea.<\/p>\n<p>The military\u2019s uses of spread spectrum were little known to civilians, since the Army likes to keep its affairs secret. The FCC prohibited all civil use of spread spectrum, since it would require, in the model the Commission had used for decades, trespassing on spectrum bands of which incumbents had been guaranteed exclusive use. Using lots of bandwidth, even at low power levels, was simply not possible within FCC regulations. Lukasik invited Marcus to join the FCC, to champion the development of spread spectrum and other innovative technologies. That required changing the way the FCC had worked for years.<\/p>\n<p>Shortly after the birth of the Federal Radio Commission, the U.S. plum- meted into the worst depression it had ever experienced. In the 1970s, the FCC was still living with the culture of the 1930s, when national economic policies benevolently reined in free-market capitalism. As a general rule, innovators hate regulation, and incumbent stakeholders love it\u2014when it protects their established interests. In the radio world, where spectrum is a limited, indispensable, government-controlled raw material, this dynamic can be powerfully stifling.<\/p>\n<p>Incumbents, such as existing radio and TV stations and cell phone companies, have spectrum rights granted by the FCC in the past, perhaps decades ago, and renewed almost automatically. Incumbents have no incentive to allow use of \u201ctheir\u201d spectrum for innovations that may threaten their business. Innovators can\u2019t get started without a guarantee from regulators that\u00a0<span style=\"font-size: 1rem;text-align: initial\">they will be granted use of spectrum, since investors won\u2019t fund businesses reliant on resources the government controls and may decide not to provide. Regulators test proposals to relax their rules by inviting public comment, and the parties they hear from most are the incumbents\u2014who have the resources to send teams to lobby against change. Their complaints predict disaster if the rules are relaxed. In fact, their doomsday scenarios are often exaggerated in the hope the regulators will exclude competition. Eventually, the regulators lose sight of their ultimate responsibility, which is to the public good and not to the good of the incumbents. It is just easier to leave things alone. They can legitimately claim to be responding to what they are being told, however biased by the huge costs of travel and lobbying. Regulatory powers meant to prevent electromagnetic interference wind up preventing\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">competition instead.<\/span><\/p>\n<\/div>\n<div>\n<p>And then there is the revolving door. Most communications jobs are in the private sector. FCC employees know that their future lies in the commercial use of the spectrum. Hundreds of FCC staff and officials, including all eight past FCC chairmen, have gone to work for or represented the businesses they regulated. These movements from government to private employment violate no government ethics rules. But FCC officials can be faced with a choice between angering a large incumbent that is a potential employer, and disappointing a marginal start-up or a public interest non-profit. It is not surprising that they remember that they will have to earn a living after leaving the FCC.<\/p>\n<p>In 1981, Marcus and his colleagues invited comment on a proposal to allow low-power transmission in broad frequency bands. The incumbents who were using those bands almost universally howled. The FCC beat a retreat and attempted, in order to break the regulatory logjam, to find frequency bands where there could be few complaints about possible interference with other uses. They hit on the idea of deregulating three \u201cgarbage bands,\u201d so called because they were used only for \u201cindustrial, scientific, and medical\u201d (ISM) purposes. Microwave ovens, for example, cook food by pummeling it with 2.450GHz electromagnetic radiation. There should have been no complaints\u2014microwave ovens were unaffected by \u201cinterference\u201d from radio signals, and the telecommunications industry did not use these bands. RCA and GE complained anyway about possible low-power interference, but their objections were determined to be exaggerated. This spectrum band was opened to experimentation in 1985, on the proviso that frequency hopping or a similar technique be used to limit interference.<\/p>\n<p>Marcus did not know what might develop, but engineers were waiting to take advantage of the opportunity. Irwin Jacobs founded QUALCOMM a few\u00a0<span style=\"font-size: 1rem;text-align: initial\">months later, and by 1990, the company\u2019s cell phone technology was in wide-spread use, using a spread spectrum technique called CDMA. A few years later, Apple Computer and other manufacturers agreed with the FCC on standards to use spread spectrum for radio local area networks\u2014\u201cwireless routers,\u201d for which Apple\u2019s trademarked device is called the Airport. In 1997, when the FCC approved the 802.11 standard and the spectrum bands were finally avail<\/span><span style=\"font-size: 1rem;text-align: initial\">able for use, the press barely noticed. Within three years, wireless networking was everywhere, and virtually all personal computers now come ready for WiFi.<\/span><\/p>\n<\/div>\n<p>For his efforts, Marcus was sent into internal exile within the FCC for seven years but emerged in the Clinton era and returned to spectrum policy work. He is now retired and working as a consultant in the private sector.<\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">Michael Marcus\u2019s web site, <a href=\"http:\/\/www.marcus-spectrum.com\/\">www.marcus-spectrum.com, <\/a>has interesting materials, and opinions, about spectrum deregulation and spread spectrum history.<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>The success of WiFi has opened the door to discussion of more radical spectrum-spreading proposals. The most extreme is UWB\u2014\u201cultra wide band\u201d radio. UWB returns, in a sense, to Hertz\u2019s sparks, splattering radiation all across the frequencies of the radio spectrum. There are two important differences, however. First, UWB uses extremely low power\u2014feasible because of the very large bandwidth. Power usage is so low that UWB will not interfere with any conventional radio receiver. And second, UWB pulses are extremely short and precisely timed, so that the time between pulses can symbolically encode a transmitted digital message. Even at extremely low power, which would limit the range of UWB transmissions to a few feet, UWB has the potential to carry vast amounts of information in short periods of time. Imagine connecting your high definition TV, cable box, and DVD player without cables. Imagine downloading your library of digital music from your living room audio system to your car while it is parked in your garage. Imagine wireless video phones that work better than wired audio phones. The possibilities are endless, if the process of regulatory relaxation continues.<\/p>\n<h2>What Does the Future Hold for Radio?<\/h2>\n<p>In the world of radio communications, as everywhere in the digital explosion, time has not stopped. In fact, digital communications have advanced less far than computer movie-making or voice recognition or weather prediction, because only in radio does the weight of federal regulation retard the explosive increase in computational power. The deregulation that is possible has only begun to happen.<\/p>\n<div>\n<h2>What If Radios Were Smart?<\/h2>\n<p>Spread spectrum is a way of making better use of the spectrum. Another dramatic possibility comes with the recognition that ordinary radios are extremely stupid by comparison\u00a0<span style=\"font-size: 1rem;text-align: initial\">with what is computationally possible today. If taken back in time, today\u2019s radios could receive the broadcasts of 80 years ago, and the AM radios of 80 years ago would work as receivers of today\u2019s broadcasts. To achieve such total\u00a0<\/span><span style=\"font-size: 1rem;text-align: initial\">\u201cbackward compatibility,\u201d a great deal of efficiency must be sacrificed. The reason for such backward compatibility is not that many 80-year-old radios are still in service. It\u2019s that at any moment in time, the incumbents have a strong interest in retaining their market share, and therefore, in lobbying against efforts to make radios \u201csmarter\u201d so more stations can be accommodated.<\/span><\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<p style=\"text-align: center\"><strong>WHAT DOES \u201cSMART\u201d MEAN?<\/strong><\/p>\n<p>\u201cIntelligent\u201d or \u201csmart\u201d radio goes by various technical names. The two most commonly used terms are \u201csoftware-defined radio\u201d (SDR) and \u201ccognitive radio.\u201d Software-defined radio refers to radios capable of being reprogrammed to change characteristics usually implemented in hardware today (such as whether they recognize AM, FM, or some other form of modulation).\u00a0<span style=\"font-family: inherit;font-size: inherit\">Cognitive radio refers to radios that use artificial intelligence to increase the efficiency of their spectrum utilization.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<p>If radios were intelligent and active, rather than dumb and passive, vastly more information could be made available through the air- waves. Rather than broadcasting at high power so that signals could travel great distances to reach passive receivers, low-power radios could pass signals on to each other. A request for a particular piece of information could be transmitted from radio to radio, and the information could be passed back. The radios could cooperate with each other to increase the information flux received by all of them. Or multiple weak transmitters could occasionally synchronize to produce a single powerful beam for long-range communication.<\/p>\n<p>Such \u201ccooperation gains\u201d are already being exploited in wireless sensor networking. Small, low-power, radio-equipped computers are equipped with sensors for temperature or seismic activity, for example. These devices can be scattered in remote areas with hostile environments, such as the rim of a\u00a0<span style=\"font-size: 1rem;text-align: initial\">smoldering volcano, or the Antarctic nesting grounds of endangered penguins. At far lower cost and greater safety than human observers could achieve, the devices can exchange information with their neighbors and eventually pass on a summary to a single high-power transmitter.<\/span><\/p>\n<\/div>\n<div>\n<p>There are vast opportunities to use \u201csmart\u201d radios to increase the number of broadcast information options\u2014if the regulatory stranglehold on the industry can be loosened and the incentives for innovation increased.<\/p>\n<p>Radios can become \u201csmarter\u201d in another respect. Even under the \u201cnarrow- band\u201d model for spectrum allocation, where one signal occupies only a small range of frequencies, cheap computation can make a difference. The very notion that it is the government\u2019s job to prevent \u201cinterference,\u201d enshrined in legislation since the 1912 Radio Act, is now anachronistic.<\/p>\n<p>Radio waves don\u2019t really \u201cinterfere,\u201d the way people in a crowd interfere with each other\u2019s movements. The waves don\u2019t bounce off each other; they pass right through each other. If two different waves pass through the antenna of a dumb old radio, neither signal can be heard clearly.<\/p>\n<p>To see what might be possible in the future, ask a man and a woman to stand behind you, reading from different books at about the same voice level. If you don\u2019t focus, you will hear an incoherent jumble. But if you concentrate on one of the voices, you can understand it and block out the other. If you shift your focus to the other voice, you can pick that one out. This is possible because your brain performs sophisticated signal processing. It knows something about male and female voices. It knows the English language and tries to match the sounds it is hearing to a lexicon of word-sounds it expects English speakers to say. Radios could do the same thing\u2014if not today, then soon, when computers become a bit more powerful.<\/p>\n<p>But there is a chicken-and-egg cycle. No one will buy a \u201csmart\u201d radio unless there is something to listen to. No one can undertake a new form of broadcasting without raising some capital. No investor will put up money for a project that is dependent on uncertain deregulation decisions by the FCC. Dumb radios and inefficient spectrum use protect the incumbents from com- petition, so the incumbents lobby against deregulation.<\/p>\n<p>Moreover, the incumbent telecommunications and entertainment industries are among the leading contributors to congressional election campaigns. Members of Congress often pressure the FCC to go against the public interest and in favor of the interests of the existing stakeholders. This problem was apparent even in the 1930s, when an early history of radio regulation stated, \u201cno quasi-judicial body was ever subject to so much congressional pressure as the Federal Radio Commission.\u201d The pattern has not changed.<\/p>\n<p>In other technologies, such as the personal computer industry, there is no such cycle. Anyone who wants to innovate needs to raise money. Investors\u00a0<span style=\"font-size: 1rem;text-align: initial\">are inhibited by the quality of the technology and the market\u2019s expected reaction to it\u2014but not by the reactions of federal regulators. Overextended copyright protections have chilled creativity, as was dis- cussed in Chapter 6, but lawmakers are to blame for that problem, not unelected commissioners.<\/span><\/p>\n<table class=\"shaded\" style=\"border-collapse: collapse;width: 100%\">\n<tbody>\n<tr>\n<td style=\"width: 100%\">\n<p style=\"text-align: center\"><strong>TV, ENTERTAINMENT, AND CONGRESS<\/strong><\/p>\n<p><span style=\"font-family: inherit;font-size: inherit\">In the 2006 election campaigns, the TV, movie, and music industries contributed more than $12 million to the re-election campaigns of incumbents, more than the oil and gas industry. The three biggest contributors were Comcast Corp., Time Warner, and the National Cable and Telecommunications Association.<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<\/div>\n<div>\n<p>From cell phones to wireless routers to keychain auto locks, wire- less innovations are devoured by the public, when they can be brought to market at all. To foster innovation, the regulatory stranglehold needs to be broken throughout the wireless arena, including broadcast technologies. The regulations are now the source of the scarcity that is used to justify the regulations!<\/p>\n<\/div>\n<div>\n<h2>But Do We Want the Digital Explosion?<\/h2>\n<p>Technologies converge. In 1971, Anthony Oettinger foresaw the line blurring between computing and communications. He called the emerging single technology \u201ccompunication.\u201d Today\u2019s computer users don\u2019t even think about the fact that their data is stored thousands of miles away\u2014until their Internet connection fails. Telephones were first connected using copper wires, and television stations first broadcast using electromagnetic waves, but today most telephone calls go through the air and most television signals go through wires.<\/p>\n<p>Laws, regulations, and bureaucracies change much more slowly than the technologies they govern. The FCC still has separate \u201cWireless\u201d and \u201cWire- line\u201d bureaus. Special speech codes apply to \u201cbroadcast\u201d radio and television, although \u201cbroadcasting\u201d is an engineering anachronism.<\/p>\n<p>The silo organization of the legal structures inhibits innovation in today\u2019s layered technologies. Regulation of the content layer should not be driven by an outdated understanding of the engineering limits of the physical layer. Investments made in developing the physical layer should not enable the same companies to control the content layer. The public interest is in innovation and efficiency; it is not in the preservation of old technologies and revolving doors between regulators and the incumbents of the regulated industry.<\/p>\n<\/div>\n<div>\n<p>But if the spectrum is freed up\u2014used vastly more efficiently than it now is, and made available for innovative wireless inventions and far more \u201cbroad- cast\u201d channels\u2014will we like the result?<\/p>\n<p>There are general economic and social benefits from innovations in wire- less technology. Garage door openers, Wiis, and toll booth transponders do not save lives, but wireless fire detectors and global positioning systems do. The story of WiFi illustrates how rapidly an unforeseen technology can become an essential piece of both business and personal infrastructure.<\/p>\n<p>But what about television and radio? Would we really be better off with a million channels than we were in the 1950s with 13, or are today with a few hundred on satellite and cable? Won\u2019t this profusion of sources cause a general lowering of content quality, and a societal splintering as de facto authoritative information channels wither? And won\u2019t it become impossible to keep out the smut, which most people don\u2019t want to see, whatever the rights of a few?<\/p>\n<p>As a society, we simply have to confront the reality that our mindset about radio and television is wrong. It has been shaped by decades of the scarcity argument. That argument is now brain-dead, kept breathing on artificial life support by institutions that gain from the speech control it rationalizes. Without the scarcity argument, TV and radio stations become less like private leases on public land, or even shipping lanes, and more like \u2026 books.<\/p>\n<p>There will be a period of social readjustment as television becomes more like a library. But the staggering\u2014even frightening\u2014diversity of published literature is not a reason not to have libraries. To be sure, there should be deter- mined efforts to minimize the social cost of getting the huge national investment in old TV sets retired in favor of million-channel TV sets. But we know how to do that sort of thing. There is always a chicken-and-egg problem when a new technology comes along, such as FM radios or personal computers.<\/p>\n<p>When market forces govern what gets aired, we may not be happy with the results, however plentiful. But if what people want is assurance about what they won\u2019t see, then the market will develop channels without dirty words and technologies to lock out the others. The present system stays in place because of the enormous financial and political influence of the incumbents\u2014 and because the government likes speech control.<\/p>\n<h2>How Much Government Regulation Is Needed?<\/h2>\n<p>Certainly, where words end and actions begin, people need government protection. Dr. Brinkley lost his medical license, which was right then, and would be right today.<\/p>\n<\/div>\n<p><span style=\"font-size: 1rem;text-align: initial\">In the new wireless world, government needs to enforce the rules for spectrum sharing\u2014technologies that can work only if everyone respects power and bandwidth restraints. The government has to ensure that manufactured devices obey the rules, and that rogues don\u2019t violate them. The government also has to help develop and endorse standards for \u201csmart\u201d radios.<\/span><\/p>\n<div>\n<p>It also has the ultimate responsibility for deciding if the dire warnings of incumbents about the risks imposed by new technologies are scientifically valid, and if valid, of sufficiently great social importance to block the advancement of engineering. A typical caution was the one issued in the fall of 2007 by the National Association of Broadcasters as it rolled out a national advertising campaign to block a new technology to locate unused parts of the TV spectrum for Internet service: \u201cWhile our friends at Intel, Google, and Microsoft may find system errors, computer glitches, and dropped calls tolerable, broadcasters do not.\u201d Scientific questions about interference should be settled by science, not by advertisements or Congressional meddling. We will always need an independent body, like the FCC, to make these judgments rationally and in the public interest.<\/p>\n<p>If all that happens, the scarcity problem will disappear. At that point, government authority over content should\u2014and constitutionally must\u2014drop back to the level it is at for other non-scarce media, such as newspapers and books. Obscenity and libel laws would remain in place for wireless communication as for other media. So would any other lawful restrictions Congress might adopt, perhaps for reasons of national security.<\/p>\n<p>Other regulation of broadcast words and images should end. Its legal foundation survives no longer in the newly engineered world of information. There are too many ways for the information to reach us. We need to take responsibility for what we see, and what our children are allowed to see. And they must be educated to live in a world of information plenty.<\/p>\n<p>There is no reason to re-establish a \u201cFairness Doctrine,\u201d like that which until 1987 required stations to present multiple points of view. If there were more channels, the government would not have any need, or authority, to second-guess the editorial judgment of broadcasters. Artificial spectrum scarcity has, in the words of Justice William O. Douglas, enabled \u201cadministration after administration to toy with TV or radio in order to serve its sordid or its benevolent ends.\u201d Justice Frankfurter\u2019s claim that \u201cthere is no room in the broadcast band for every business or school of thought\u201d is now false.<\/p>\n<\/div>\n<div>\n<p>Bits are bits, whether they represent movies, payrolls, expletives, or poems. Bits are bits, whether they are moved as electrons in copper wire, light pulses in glass fiber, or modulations in radio waves. Bits are bits, whether they are stored in gigantic data warehouses, on DVDs sent through the mail, or on flash drives on keychains. The regulation of free speech on broadcast radio and television is but one example of the lingering social effects of historical accidents of technology. There are many others\u2014in telephony, for example. Laws and policies regulating information developed around the technologies in which that information was embodied.<\/p>\n<p>The digital explosion has reduced all information to its lowest common denominator, sequences of 0s and 1s. There are now adapters at all the junctions in the world-wide networks of information. A telephone call, a personal letter, and a television show all reach you\u00a0<span style=\"font-size: 1rem;text-align: initial\">through the same mixture of media. The bits are shunted between radio antennas, fiber-optic switching stations, and telephone wiring many times before they reach you.<\/span><\/p>\n<\/div>\n<p>The universality of bits gives mankind a rare opportunity. We are in a position to decide on an overarching view of information. We can be bound in the future by first principles, not historical contingencies. In the U.S., the digital explosion has blown away much of the technological wrapping obscuring the First Amendment. Knowing that information is just bits, all societies will be faced with stark questions about where information should be open, where it should be controlled, and where it should be banned.<\/p>\n\n\t\t\t <section class=\"citations-section\" role=\"contentinfo\">\n\t\t\t <h3>Candela Citations<\/h3>\n\t\t\t\t\t <div>\n\t\t\t\t\t\t <div id=\"citation-list-450\">\n\t\t\t\t\t\t\t <div class=\"licensing\"><div class=\"license-attribution-dropdown-subheading\">CC licensed content, Specific attribution<\/div><ul class=\"citation-list\"><li>Blown to Bits  Your Life, Liberty, and Happiness After the Digital Explosion. <strong>Authored by<\/strong>: Hal Abelson Ken Ledeen Harry Lewis. <strong>Located at<\/strong>: <a target=\"_blank\" href=\"http:\/\/www.bitsbook.com\/\">http:\/\/www.bitsbook.com\/<\/a>. <strong>License<\/strong>: <em><a target=\"_blank\" rel=\"license\" href=\"https:\/\/creativecommons.org\/licenses\/by\/4.0\/\">CC BY: Attribution<\/a><\/em><\/li><\/ul><\/div>\n\t\t\t\t\t\t <\/div>\n\t\t\t\t\t <\/div>\n\t\t\t <\/section>","protected":false},"author":15008,"menu_order":17,"template":"","meta":{"_candela_citation":"[{\"type\":\"cc-attribution\",\"description\":\"Blown to Bits  Your Life, Liberty, and Happiness After the Digital Explosion\",\"author\":\"Hal Abelson Ken Ledeen Harry Lewis\",\"organization\":\"\",\"url\":\"http:\/\/www.bitsbook.com\/\",\"project\":\"\",\"license\":\"cc-by\",\"license_terms\":\"\"}]","CANDELA_OUTCOMES_GUID":"","pb_show_title":"on","pb_short_title":"","pb_subtitle":"","pb_authors":[],"pb_section_license":""},"chapter-type":[],"contributor":[],"license":[],"class_list":["post-450","chapter","type-chapter","status-publish","hentry"],"part":406,"_links":{"self":[{"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/chapters\/450","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/chapters"}],"about":[{"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/wp\/v2\/types\/chapter"}],"author":[{"embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/wp\/v2\/users\/15008"}],"version-history":[{"count":5,"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/chapters\/450\/revisions"}],"predecessor-version":[{"id":486,"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/chapters\/450\/revisions\/486"}],"part":[{"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/parts\/406"}],"metadata":[{"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/chapters\/450\/metadata\/"}],"wp:attachment":[{"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/wp\/v2\/media?parent=450"}],"wp:term":[{"taxonomy":"chapter-type","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/pressbooks\/v2\/chapter-type?post=450"},{"taxonomy":"contributor","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/wp\/v2\/contributor?post=450"},{"taxonomy":"license","embeddable":true,"href":"https:\/\/courses.lumenlearning.com\/ivytech-informationliteracy-1\/wp-json\/wp\/v2\/license?post=450"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}