The Laws of Cyberspace Larry Lessig Introductory Story • Before Russian Revolution Tsar had system of internal passports which marked estate you came from and determined places you could go – Also who you could associate with and what you could be • They were like badges that granted or barred access Story 2 • Bolsheviks promised to change this • Abolition of internal passport symbolized freedom for Russian people • Democratization of citizenship in Russia • Not to last though, ~15 years later, starving peasants flooded cities looking for food • Stalin brought back system of internal passports • Peasants again tied to rural land – lasted throughout 70’s Four Constraints on Behavior • Law – a prominent regulator of behavior because if you fail to follow the law their can be consequences • Social Norms are a second constraint on behavior – understandings or expectations of how I ought to behave – These can regulate behavior in a far wider array of contexts than any law • The third is Market – it regulates by price, by pricing goods, the market sets my opportunities, and through this range of opportunities it regulates • The fourth is nature or what he calls architecture – The constraint of the world as it is – I can’t see through walls, a constraint on my ability to know what is happening on the other side – No wheel chair ramp can constrain access to a library for a wheel chair bound individual Regulation through the Four Constraints • To understand a regulation we must understand the sum of the four constraints operating together • Any one cannot represent the effect of the four together Cyberspace Hype • • • • Cyberspace is unavoidable Cyberspace is unregulable No nation can live without it No nation will be able to control behavior in it • A place where individuals are inherently free from the control of real space sovereigns His attack against the Hype • He has a different view • Now entering a world where freedom is not assured • Cyberspace has the potential to be the most fully and extensively regulated space that we have ever known • Unless we understand this we are likely to miss the transition from freedom into control Connecting Cyberspace to Bolshevik Russia • Similar to the real world, behavior in cyberspace is regulated by four types of constraints • Again, Law is one of those constraints – copyright law, defamation law, sexual harassment law – In spite of the hype that cyberspace is wide open, these laws constrain behavior similarly to how behaviors are constrained in real space • There are also Norms in cyberspace as there are in real space • When norms are not followed, punishments are meted out Cyberspace and Bolshevik Russia 2 • The market also constrains cyberspace as in real space – change the price of access and constraints on access differ • Architecture, the fourth, is most significant of the four – He calls this CODE - meaning the SW and HW which constitute cyberspace – the set of protocols implemented or codified in the SW of cyberspace that determine how people interact, or exist in the space – It sets the terms upon which we enter or exist in cyberspace, just like the architecture of the real space How Architecture(CODE) constrains Behavior • Sometimes one must enter a password, othertimes they don’t • Some transactions produce link back to individual, othertimes they don’t • Sometimes encryption is an option, sometimes it isn’t • These differences are created by code by programmers, they constrain some behavior while allowing others possible • They are like architecture of real space regulating behavior in cyberspace Real Space and CyberSpace • In real space architecture, market, norms, and law regulate behavior • In cyberspace code, market, norms, and law regulate behavior • As with real space, in cyberspace we need to look at how the four work together to constrain behavior Example - Regulation of Indecency on the Net • Concern sharply grew in 1995 • Kids using net more frequently mixed with availability of “porn” • Article cites controversial and flawed study in Georgetown Law Review reported that the new was “awash with porn.” • Time and Newsweek ran cover articles about its availability • Senators and Congressman bombarded with demands to do something to regulate cybersmut Why the Outcry? • Author writes - more indecent materials exist in real space than in cyberspace • Most kids don’t have access to cyberspace, so why the outcry? • Look at it differently, what regulates indecent materials in real space? Why (U.S. View) • 1) US laws regulate distribution of indecent materials to kids – ID checks to check age of buyers – Laws requiring these businesses to be far from kids • 2) Norms - possibly more important than laws – Norms constrain adults not to sell this to kids • 3) Market Norms - To buy this costs money and most kids do not have money • 4) Architecture - difficult in real space to hide the fact that you are a kid • So, constraints on being a kid are effective in real space Cyberspace is Different Though • In real space hard to hide that you are a kid, in cyberspace the default is anonymity • Easy to hide who one is • Practically impossible for the same laws and norms to apply in cyberspace • Key difference is the regulability of cyberspace, the ability of governments to regulate behavior there • Currently, cyberspace is less regulable than real space, less governments can do Why? • Key difference is the code that constitutes cyberspace • Its current architecture is essentially unregulable (at least in 1995) • The architecture of 1995 and 1996 essentially allowed anyone w/ access to roam w/o identifying who they were - Net95 was Bolshevik Russia • One’s identity was invisible to the net then • One could enter w/o credentials, w/o an internal passport • Users were fundamentally equal, essentially free Communications Decency Act (1996) • With Net95 as the architecture of the network at the time- this statute was declared unconstitutional • Because, at the time, any regulation attempting to zone kids from indecent materials would be a regulation that was too burdensome on speakers and listeners • As the net was then, regulation would be too burdensome • Key problem was that the court spoke as if this architecture, net95, was the only architecture that the net could have But... • We know that the net has no nature, no single architecture • Net 95 is a set of features or protocols that constituted the net at a particular period in time • Nothing requires it to always be that way (remember malleability?) • Court spoke as if it had discovered the nature of the net and was therefore deciding on the nature of any possible regulation of the net Univ of Chicago - Harvard Story • Author was professor at UoC, to gain access to net, just plug into a jack (located throughout Univ) • Any machine could do it and you would have full, anonymous, free access to the net • It was this way because of the administration • This policy established the architectural design of the UoC net @Harvard • One cannot connect one’s machine to the net unless the machine is registered – That is, licensed, approved, verified • Only members of the Univ community can register their machine • Once registered all transactions over the net are potentially monitored and identified to a particular machine • Anonymous speech on this net is not permitted • Access can be controlled based on who someone is, interactions can be traced Two Views • Controlling access is the ideal at Harvard • Facilitating access is the ideal at Univ of Chicago • These two views are common today at Univ’s across America • UoC is Net95 • Harvard is not an Internet but an Intranet architecture – within an intranet, identity is sufficiently established such that access can be controlled Philosophies • They both are built from TCP/IP but at Harvard you have Internet Plus, the plus means the power to control • They reflect two philosophies about access and reflect two sets of principles or values on how speech should be controlled • they parallel difference between political regimes of freedom and political regimes of control The Point • Nothing against Harvard or Chicago • Wants us to see that at the level of a nation, architecture is inherently political • In cyberspace, the selection of an architecture is as important as the choice of a constitution • The code of cyberspace is its constitution, it sets terms for access, sets the rules, controls their behavior, a sort of sovereignty competing with real space sovereigns in the regulation of behavior of real space citizens Supreme Error • Author feels that Supreme Court error is made by many • The error of thinking that the architecture as we have it is an architecture that we will always have • That the space will guarantee us freedom, liberty • He feels this is “profoundly mistaken.” • While we celebrate the “inherent” freedom of the net, its architecture is changing Architecture Shift • From an architecture of freedom to an architecture of control • As it becomes an architecture of control it becomes more regulable • US government is moving the architecture in these directions • How? The government can regulate the architectures in cyberspace so that behaviors in cyberspace become more regulable Two Examples • Encryption – Much of its history has been heavily regulated by American government p 141 – Consistently banned its export – Has proposed laws requiring manufacturers to assure that any encryption have built within it either a key recovery ability or an equivalent back door so that gov could get access to content of such communications 2nd Example • The first was regulation of code, our constitution offers very little control over government regulation like this • There is little the constitution offers against the government’s regulation of business • Second - Another use of encryption is identification - besides hiding, you can through digital certificates authenticate who sent something What is Achieved? • If both regulations went into effect • Since US is largest market for Internet products, and no product can really succeed unless it is successful in U.S. • The standards imposed in U.S. become standards for the world. • We would be exporting an architecture that facilitates control – Not just for us but for any government • Is this completely true? Where will it go? • The US then, would move itself from a symbol of freedom to a peddler of control • But, is it all bad? • Read bottom of p 142 and selected portions of 143 • End