Computer Decency Act Essay, Research Paper
Computer ScienceGovernment Intervention of the InternetDuring the past decade, our society has become based solely on the ability to movelarge amounts of information across large distances quickly. Computerization hasinfluenced everyone’s life. The natural evolution of computers and this need forultra-fast communications has caused a global network of interconnected computers to develop. This global net allows a person to send E-mail across the world in mere fractions of a second, and enables even the common person to access information world-wide. With advances such as software that allows users with a sound card to use the Internet as a carrier for long distance voice calls and video conferencing, this network is key to the future of the knowledge society. At present, this net is the epitome of the first amendment: free speech. It is a place where people can speak their mind without being reprimanded for what they say, or how they choose to say it. The key to the world-wide success of the Internet is its protection of free speech, not only in America, but in other countries where free speech is not protected by a constitution. To be found on the Internet is a huge collection of obscene graphics, Anarchists’ cookbooks and countless other things that offend some people. With over 30 million Internet users in the U.S. alone (only 3 million of which surf the net from home), everything is bound to offend someone. The newest wave of laws floating through law making bodies around the world threatens to stifle this area of spontaneity. Recently, Congress has been considering passing laws that will make it a crime punishable by jail to send “vulgar” language over the net, and to export encryption software. No matter how small, any attempt at government intervention in the Internet will stifle the greatest communication innovation of this century. The government wants to maintain control over this new form of communication, and they are trying to use the protection of children as a smoke screen to pass laws that will allow them to regulate and censor the Internet, while banning techniques that could eliminate the need for regulation. Censorship of the Internet threatens to destroy its freelance atmosphere, while wide spread encryption could help prevent the need for government intervention. The current body of laws existing today in America does not apply well to the Internet. Is the Internet like a bookstore, where servers cannot be expected to review every title? Is it like a phone company who must ignore what it carries because of privacy? Is it like a broadcasting medium, where the government monitors what is broadcast? The trouble is that the Internet can be all or none ofthese things depending on how it’s used. The Internet cannot be viewed as one type of transfer medium under current broadcast definitions. The Internet differs from broadcasting media in that one cannot just happen upon avulgar site without first entering a complicated address, or following a link fromanother source. “The Internet is much more like going into a book store andchoosing to look at adult magazines.” (Miller 75). Jim Exon, a democratic senator from Nebraska, wants to pass a decency billregulating the Internet. If the bill passes, certain commercial servers that postpictures of unclad beings, like those run by Penthouse or Playboy, would of coursebe shut down immediately or risk prosecution. The same goes for any amateurweb site that features nudity, sex talk, or rough language. Posting any dirty wordsin a Usenet discussion group, which occurs routinely, could make one liable for a$50,000 fine and six months in jail. Even worse, if a magazine that commonly runssome of those nasty words in its pages, The New Yorker for instance, decided topost its contents on-line, its leaders would be held responsible for a $100,000 fineand two years in jail. Why does it suddenly become illegal to post something thathas been legal for years in print? Exon’s bill apparently would also “criminalize private mail,” … “I can call my brother on the phone and say anything–but if I sayit on the Internet, it’s illegal” (Levy 53). Congress, in their pursuit of regulations, seems to have overlooked the fact that themajority of the adult material on the Internet comes from overseas. Although manyU.S. government sources helped fund Arpanet, the predecessor to the Internet,they no longer control it. Many of the new Internet technologies, including theWorld Wide Web, have come from overseas. There is no clear boundary betweeninformation held in the U.S. and information stored in other countries. Data held inforeign computers is just as accessible as data in America, all it takes is the click ofa mouse to access. Even if our government tried to regulate the Internet, we haveno control over what is posted in other countries, and we have no practical way tostop it. The Internet’s predecessor was originally designed to uphold communications aftera nuclear attack by rerouting data to compensate for destroyed telephone lines andservers. Today’s Internet still works on a similar design. The very nature thisdesign allows the Internet to overcome any kind of barriers put in its way. If amajor line between two servers, say in two countries, is cut, then the Internet userswill find another way around this obstacle. This obstacle avoidance makes itvirtually impossible to separate an entire nation from indecent information in othercountries. If it was physically possible to isolate America’s computers from the restof the world, it would be devastating to our economy. Recently, a major university attempted to regulate what types of Internet access itsstudents had, with results reminiscent of a 1960’s protest. A research associate atCarnegie Mellon University conducted a study of pornography on the school’scomputer networks. Martin Rimm put together quite a large picture collection(917,410 images) and he also tracked how often each image had been downloaded(a total of 6.4 million). Pictures of similar content had recently been declaredobscene by a local court, and the school feared they might be held responsible forthe content of its network. The school administration quickly removed access to allthese pictures, and to the newsgroups where most of this obscenity is suspected tocome from. A total of 80 newsgroups were removed, causing a large disturbanceamong the student body, the American Civil Liberties Union, and the ElectronicFrontier Foundation, all of whom felt this was unconstitutional. After only half aweek, the college had backed down, and restored the newsgroups. This is a tinyexample of what may happen if the government tries to impose censorship(Elmer-Dewitt 102). Currently, there is software being released that promises to block children’s accessto known X-rated Internet newsgroups and sites. However, since most adults relyon their computer literate children to setup these programs, the children will be ableto find ways around them. This mimics real life, where these children would surelybe able to get their hands on an adult magazine. Regardless of what types ofsoftware or safeguards are used to protect the children of the Information age,there will be ways around them. This necessitates the education of the children todeal with reality. Altered views of an electronic world translate easily into alteredviews of the real world. “When it comes to our children, censorship is a far lessimportant issue than good parenting. We must teach our kids that the Internet is aextension and a reflection of the real world, and we have to show them how toenjoy the good things and avoid the bad things. This isn’t the government’sresponsibility. It’s ours (Miller 76).” Not all restrictions on electronic speech are bad. Most of the major on-linecommunication companies have restrictions on what their users can “say.” Theymust respect their customer’s privacy, however. Private E-mail content is off limitsto them, but they may act swiftly upon anyone who spouts obscenities in a publicforum. Self regulation by users and servers is the key to avoiding government imposedintervention. Many on-line sites such as Playboy and Penthouse have started toregulated themselves. Both post clear warnings that adult content lies ahead andlists the countries where this is illegal. The film and videogame industries subjectthemselves to ratings, and if Internet users want to avoid government imposedregulations, then it is time they begin to regulate themselves. It all boils down toprotecting children from adult material, while protecting the first amendment rightto free speech between adults. Government attempts to regulate the Internet are not just limited to obscenity andvulgar language, it also reaches into other areas, such as data encryption. By nature, the Internet is an insecure method of transferring data. A single E-mailpacket may pass through hundreds of computers from its source to destination. Ateach computer, there is the chance that the data will be archived and someone mayintercept that data. Credit card numbers are a frequent target of hackers.Encryption is a means of encoding data so that only someone with the proper”key” can decode it. “Why do you need PGP (encryption)? It’s personal. It’s private. And it’s no one’sbusiness but yours. You may be planning a political campaign, discussing ourtaxes, or having an illicit affair. Or you may be doing something that you feelshouldn’t be illegal, but is. Whatever it is, you don’t want your private electronicmail (E-mail) or confidential documents read by anyone else. There’s nothingwrong with asserting your privacy. Privacy is as apple-pie as the Constitution. Perhaps you think your E-mail is legitimate enough that encryption is unwarranted.If you really are a law-abiding citizen with nothing to hide, then why don’t youalways send your paper mail on postcards? Why not submit to drug testing ondemand? Why require a warrant for police searches of your house? Are you tryingto hide something? You must be a subversive or a drug dealer if you hide your mailinside envelopes. Or maybe a paranoid nut. Do law-abiding citizens have any needto encrypt their E-mail? What if everyone believed that law-abiding citizens should use postcards for theirmail? If some brave soul tried to assert his privacy by using an envelope for hismail, it would draw suspicion. Perhaps the authorities would open his mail to seewhat he’s hiding. Fortunately, we don’t live in that kind of world, because everyoneprotects most of their mail with envelopes. So no one draws suspicion by assertingtheir privacy with an envelope. There’s safety in numbers. Analogously, it wouldbe nice if everyone routinely used encryption for all their E-mail, innocent or not,so that no one drew suspicion by asserting their E-mail privacy with encryption.Think of it as a form of solidarity (Zimmerman).” Until the development of the Internet, the U.S. government controlled most newencryption techniques. With the development of faster home computers and aworldwide web, they no longer hold control over encryption. New algorithms havebeen discovered that are reportedly uncrackable even by the FBI and the NSA.This is a major concern to the government because they want to maintain theability to conduct wiretaps, and other forms of electronic surveillance into thedigital age. To stop the spread of data encryption software, the U.S. governmenthas imposed very strict laws on its exportation. One very well known example of this is the PGP (Pretty Good Privacy) scandal.PGP was written by Phil Zimmerman, and is based on “public key” encryption.This system uses complex algorithms to produce two codes, one for encoding andone for decoding. To send an encoded message to someone, a copy of that person’s “public” key is needed. The sender uses this public key to encrypt thedata, and the recipient uses their “private” key to decode the message. AsZimmerman was finishing his program, he heard about a proposed Senate bill toban cryptography. This prompted him to release his program for free, hoping that itwould become so popular that its use could not be stopped. One of the originalusers of PGP posted it to an Internet site, where anyone from any country coulddownload it, causing a feder
Emler-Dewitt, Philip. “Censoring Cyberspace: Carnegie Mellon’s Attempt to BanSex from it’s Campus Computer Network Sends A Chill Along the Info Highway.”Time 21 Nov. 1994; 102-105. Lehrer, Dan. “The Secret Sharers: Clipper Chips and Cypherpunks.” The Nation10 Oct. 1994; 376-379. “Let the Internet Backlash Begin.” Advertising Age 7 Nov. 1994; 24. Levy, Steven. “The Encryption Wars: is Privacy Good or Bad?” Newsweek 24Apr. 1995; 55-57. Miller, Michael. “Cybersex Shock.” PC Magazine 10 Oct. 1995; 75-76. Wilson, David. “The Internet goes Crackers.” Education Digest May 1995; 33-36. Zimmerman, Phil. (1995). Pretty Good Privacy v2.62, [Online]. Available Ftp:net-dist.mit.edu Directory: pub/pgp/dist File: Pgp262dc.zip
Proposition 198 would allow:
all persons who are entitled to vote in primary elections, including those not affiliated with a political party, to vote for any candidate regardless of the candidate’s political party affiliation. Thus, voters in primary elections would be allowed to vote for candidates across political party lines. Furthermore, the initiative provides that county election officials prepare only one ballot for all voters. The candidates for an office would be listed randomly on the ballot and not grouped by political party affiliation. The candidate of each political party who receives the most votes for a state elective office becomes the nominee of that party at the next general election.
The only candidates immune from these provisions would be those candidates running for office in political party committees. These elections would still be restricted to voters affiliated with each party. The Legislative Analyst determined that Proposition 198 would have no fiscal impact on California, other than possible minor savings to counties, since they would not need to prepare and print as many ballots (1996 California Voter Guide).
Proponents of the measure argue that California’s closed primary election system results in political extremists being elected on both ends of the spectrum, because it limits voters’ choices to candidates within their own party, and excludes 1.5 million independent voters from voting in primary elections at all. This, they maintain, contributes to legislative gridlock, and stacks the deck against more moderate problem solvers.
They also contend that Proposition 198 would increase voter participation by giving voters a real choice and by forcing candidates to focus on issues, not just partisanship. By opening up the primary and giving independent voters and minority party voters a real say in who the candidates will be, supporters of the proposition claim that it would lead to the election of candidates with a broader base of voter support (1996 California Voter Guide).
Finally, those in favor of the proposition point out that the political parties have grown stronger and healthier in other states that have adopted an open primary system. Supporters of Proposition 198 included former state Senator Rebecca Morgan (R-Saratoga), Senator Lucy Killea (I-San Diego), former GOP sate controller Houston Flournoy and former Fair Political Practices Commision Chairman Dan Stanford (California Journal 2/96).
Those against Proposition 198 argue that the sole purpose of primary elections is for registered voters of each political party to select nominees from their party for the general election, and that an open primary would invite political mischief by allowing self-serving politicians and special interest groups to manipulate the system through the use of specialized targeting. Voters registered to one political party should not be allowed to interfere in the nominations of candidates of another party, they say, just as private clubs and organizations do not allow non-members to participate in their internal affairs.
The measure is unconstitutional, they add, citing a ruling by the United States Supreme Court that political parties have the right to determine who votes in their primaries (1996 California Voter Guide). Finally, opponents of the proposal suggest that rather than increasing voter choice, Proposition 198 would limit it, since outside interference would diminish the importance of joining a political party. Major opponents of Proposition 198 included the officials of both major political parties, as well as former GOP U.S. Senate candidate Bruce Herschensohn and former Democratic Attorney General John Van de Camp (California Journal 2/96).
Proposition 198 passed, with a total of 59.51 percent of the vote in favor of the proposition and 40.49 percent against. I have included a map, courtesy of the Secretary of State s web page, that shows the results broken down by county and percentage (Secretary of State).
I voted for Proposition 198 out of sheer frustration over the fact that none of the political parties adequately reflect my concerns. That is, I agree with some of the policies of each of the parties, yet I disagree with other policies of each party. Before the open primary went into effect, I found myself at odds over which party to affiliate myself with, since there was no way to vote for a candidate as an individual without registering and voting for that candidate s party. I mean, should I register Republican, since I believe in smaller government, less taxes, a strong military and the right of the unborn to live? Or do I register Democrat, because I belive in protecting the environment, supporting organized labor and helping the poor? Finally, thanks to the passage of Proposition 198, I can decline to affiliate myself with any particular party, and still vote for the individual candidate that I feel best represents my interests.
Others, however, do not seem to share my enthusiasm over the success of Proposition 198. According to Ted Radke, a political science instructor at Contra Costa College, open or blanket primaries tend to favor the rich, the media favorites, and those candidates with greater name recognition. Radke suggests that candidates who are given more media attention, and those who have enough money to make themselves well known (such as Al Checchi) will receive a disproportionate amount of the vote due simply to the fact that voters will recognize their names over those of other candidates. (Radke)
Mr. Radke makes a valid point. However, even in retrospect, I believe that I made the right decision. I feel that my right to vote inherently imparts to me the responsibility to be an informed voter. I read each of the candidates statements and listen to them carefully as they debate. I lend no credence to the mud-slinging and negative campaign ads that are so prevalent on television and radio. Therefore, when I mark my ballot, my choice has been made according to my honest judgment of the candidate s character and position on the issues of importance to me. I prefer the open primary system, and would vote yes on Proposition 198 again.