A headline in the USA Today earlier this week screamed, “Hello, Big Brother: Digital Sensors Are Watching Us.”  It opens with an all too typical techno-panic tone, replete with tales of impending doom:

Odds are you will be monitored today — many times over. Surveillance cameras at airports, subways, banks and other public venues are not the only devices tracking you. Inexpensive, ever-watchful digital sensors are now ubiquitous.
They are in laptop webcams, video-game motion sensors, smartphone cameras, utility meters, passports and employee ID cards. Step out your front door and you could be captured in a high-resolution photograph taken from the air or street by Google or Microsoft, as they update their respective mapping services. Drive down a city thoroughfare, cross a toll bridge, or park at certain shopping malls and your license plate will be recorded and time-stamped. Several developments have converged to push the monitoring of human activity far beyond what George Orwell imagined. Low-cost digital cameras, motion sensors and biometric readers are proliferating just as the cost of storing digital data is decreasing. The result: the explosion of sensor data collection and storage.

Oh my God! Dust off you copies of the Unabomber Manifesto and run for your shack in the hills!

No, wait, don’t. Let’s instead step back, take a deep breath and think about this. As the article goes on to note, there will certainly be many benefits to our increasing “sensor society.”  Advertising and retail activity will become more personalized and offer consumers more customized good and services.  I wrote about that here at greater length in my essay on “Smart-Sign Technology: Retail Marketing Gets Sophisticated, But Will Regulation Kill It First?”  More importantly, ubiquitous digital sensors and data collection/storage will also increase our knowledge of the world around us exponentially and do wonders for scientific, environmental, and medical research.

But that won’t soothe the fears of those who fear the loss of their privacy and the rise of a surveillance society in which our every move is watched or tracked. So, let’s talk about what those of you who feel that way want to do about it.

Continue reading →

Have we technophiles utterly deluded ourselves? Worse, instead of enjoying an Age of Innovation, are we actually stuck in a technological Dark Age? One that explains our stagnating living standards and general economic “disarray”? This is the possibility economist Tyler Cowen (George Mason, Marginal Rev, Mercatus) raises in The Great Stagnation, a pithy and provocative  new e-book essay. Here is my Forbes column on the topic: “Tyler Cowen’s Techno Slump.” I don’t know how much I agree with Cowen, but I think he’s given a big boost to an important conversation.

In response to civil unrest, the Egyptian government appears to have ordered service providers to shut down all international connections to the Internet. According to the blog post at the link just above, Egypt’s four main ISPs have cut off their connections to the outside world. Specifically, their “BGP routes were withdrawn.” The Border Gateway Protocol is what most Internet service providers use to establish routing between one another, so that Internet traffic flows among them. I anticipate we might have comments here that dig deeper into specifics.

An attack on BGP is one of few potential sources of global shock cited by an OECD report I noted recently. The report almost certainly imagined a technical attack by rogue actors but, assuming current reporting to be true, the source of this attack is a government exercising coercion over Internet service providers within its jurisdiction.

That is far from an impossibility in the United States. The U.S. government has proposed both directly and indirectly to centralize control over U.S. Internet service providers. C|Net’s Declan McCullagh reports that an “Internet kill switch” proposal championed by by Sens. Joseph Lieberman (I-Conn.) and Susan Collins (R-Maine) will be reintroduced in the new Congress very soon. The idea is to give “kill switch” authority to the government for use in responding to some kind of “cyberemergency.” We see here that a government with use “kill switch” power will use it when the “emergency” is a challenge to its authority.

When done in good faith, flipping an Internet “kill switch” would be stupid and self-destructive, tantamount to an auto-immune reaction that compounds the damage from a cybersecurity incident. The more likely use of “kill switch” authority would be bad faith, as the Egyptian government illustrates, to suppress speech and assembly rights.

In the person of the Federal Communications Commission, the U.S. government has also proposed to bring Internet service providers under a regulatory umbrella that it could turn to censorship or protest suppression in the future. Larry Downes has a five-part analysis of the government’s regulatory plan here on TLF (1, 2, 3, 4, 5). The intention of its proponents is in no way to give the government this kind of authority, but government power is not always used as intended, and there is plenty of scholarship to show that government agencies use their power to achieve goals that are non-statutory and even unconstitutional.

The D.C. area’s surfeit of recent weather caused the cancellation yesterday of a book event I was to participate in, discussing Evgeny Morozov’s The Net Delusion: The Dark Side of Internet Freedom. I don’t know that he makes the case overwhelmingly, but Morozov argues that governments are ably using the Internet to stifle freedom movements. (See Adam’s review, hear Jerry’s podcast.)

Events going on here in the United States right now could position the U.S. government to exercise the kind of authority we might look down our noses at Egypt for practicing. The lesson from the Egypt story—what we know of it so far—is that eternal vigilance is the price of freedom.

Data Privacy Day is January 28. And as Steve DelBianco writes at the NetChoice blog, now is an opportune time for it as Congress, the Commerce Department, and the Federal Trade Commission each have proposed new rights and rules for data privacy.

To appreciate Data Privacy Day you must first ignore the Euro-babble description of what is Data Privacy Day (“an international celebration of the dignity of the individual expressed through personal information”) and take it for what it really is: a prodding for Internet users to take a critical look at how they share and communicate information online.

Importantly, this is not a day for governments, but for users. As Steve writes, “the role for government should be in areas where users and business cannot act alone, including law enforcement, international data flows, and pre-empting a patchwork of state laws. Government should use is powers to pursue online fraud and criminal misuse of data, not to create rules that narrowly prescribe what and how data should be used.”

Also, check out the tech-friendly quotes from Obama’s State of the Union in Steve’s post.

(Follow the links for Part I, Part II, Part III and Part IV.)

In this final post on the FCC’s Dev. 23, 2010 Open Internet Report and Order, I’ll look briefly at the problematic legal foundation on which the FCC has built its new regulations on broadband Internet access.  That discussion need only be brief largely because the extended legal analysis has already been admirably detailed by FCC Commissioner Robert McDowell.  His dissent (see pages 145-177 of the Report and Order) calmly and systematically dismantles the case made by the majority (See ¶¶ 115-150).

This is no theoretical discussion of statutory interpretation.  Even before the rules have been published on the Federal Register, two broadband providers—Verizon and then MetroPCS—have already filed lawsuits in the D.C. Circuit Court of Appeals challenging the FCC’s authority to regulate.  (See Jim DeLong’s definitive deciphering of Verizon’s efforts to secure exclusive jurisdiction in the D.C. Circuit)  The arguments sketched out in Commissioner McDowell’s dissent are likely to mirror the complainants’ briefs in these and likely other Petitions for Review of the Order.

Continue reading →

Hosted by SMU’s Guildhall video game law graduate program, the Game::Business::Law summit is the leading conference in the field. Follow the discussion on the #GBL2011 hashtag. Here’s the make-up of my privacy panel:

Moderator Professor Xuan-Thao Nguyen, SMU Dedman School of Law Speakers Jennifer Archie, Partner, Latham & Watkins LLP Andrew S. Ehmke, Partner, Haynes and Boone, LLP Dr. Joshua Fairfield, Washington & Lee School of Law Berin Szoka, Founder, TechFreedom

This is an all-star cast. Prof. Nguyen is a big name in video game law field; I had the privilege to work with Jennifer Archie on Internet law when I practiced at Latham; and Josh Fairfield is one of the few law professors I find myself in perfect philosophical harmony with. Check out this summary of his excellent 2009 paper Virtual Parentalism. I only met Andy last night at the reception, but he’s a solid thinker on the law of gaming. As they say on postcards: Wish you were here!

Last week, it was my great honor to speak at the 2011 State of the Net 2011 event, where I participated in a panel discussion about the future of the online video marketplace.  In an earlier essay, I mentioned how some of the discussion that day revolved around the Comcast-NBCU merger, which had just been approved by the FCC, but with unprecedented strings being attached.  The heart of the panel discussion, however, was a debate about the future of online video and regulation of the video marketplace more generally. Also joining me on the panel were Susan Crawford of Cardozo Law School, William Lehr of MIT, Marvin Ammori of Nebraska Law School, and Richard Bennett of ITIF.

http://www.youtube.com/v/Och8X_8AYMQ?fs=1&hl=en_US

During my response time on the panel, which begins around 28:45 of the video, I made a couple of key points: Continue reading →

In previous posts, I’ve criticized the Federal Communications Commission for arbitrarily jacking up the speed in its definition of broadband (to 4 mbps download/1mbps upload) so that third generation wireless does not count as broadband. This makes broadband markets appear less competitive.  It also expands the “need” for universal service subsidies for broadband, since places that have 3G wireless but not wired broadband get counted as not having broadband.

The FCC’s definition is based on the speed necessary to support streaming video.  I rarely watch video on my computer. But tonight I had a chance to test the wisdom of the FCC’s definition.  I’m in rural southern Delaware with broadband access only via a 3G modem. I wanted to watch more State of the Union coverage than the broadcast channels out here carried. So, I fired up the old PC and watched things on CNN.com.  The video showed up fine and smooth, and it didn’t even burp when I opened another window to start working on this post.

So now I have not just analysis that questions the FCC’s definition of broadband, but that most precious of commodities in Washington regulatory debates: AN ANECDOTE!!!

TechFreedom launched last week with a half-day symposium dedicated to our first publication, The Next Digital Decade: Essays on the Future of the Internetincluding a fireside chat with FCC Commissioner Robert McDowell, three panels and a conversation about TechFreedom and its mission. Santa Clara Law Professor Eric Goldman, who has three essays in the book, provides a detailed write-up of the discussion on his blog.

Read a summary of the book here, or our Manifesto for TechFreedom. You can watch or download video from the event below (download links are at the bottom).

Fireside Chat: FCC Cmr. Robert McDowell & CNET’s Declan McCullagh

http://www.archive.org/flow/flowplayer.commercial-3.2.1.swf

On this week’s podcast, Sean Lawson, an assistant professor in the Department of Communication at the University of Utah and a contributor to the Forbes.com security blog, The Firewall, discusses his new Mercatus Center working paper, Beyond Cyber-Doom: Cyberattack Scenarios and the Evidence of History. Cyber security may be the new black, but it’s been a significant policy issue since the 1980s. Lawson talks about the current cyber security discourse, addressing conflation of diverse threats, overemphasis on hypothetical doom scenarios, and the resulting effects on policy proposals. He then looks to the history of disasters, including blackouts, the attacks of 9/11, and Hurricane Katrina, to help estimate impacts from potential cyber disasters. Lawson also discusses incorrect doomsday predictions about WWII aerial bombardment, and he offers a few conclusions and policy recommendations based on his research.

Related Links

To keep the conversation around this episode in one place, we’d like to ask you to comment at the web page for this episode on Surprisingly Free. Also, why not subscribe to the podcast on iTunes?