>> Kim Ricketts: Good afternoon and welcome. My... along with Kirsten Wiley the Microsoft Research visiting speaker series.

advertisement
>> Kim Ricketts: Good afternoon and welcome. My name is Kim Ricketts and I manage
along with Kirsten Wiley the Microsoft Research visiting speaker series.
Today we welcome Jonathan Zittrain here to discuss with us his rather dire prediction -see the train wreck on the cover -- of where the Internet is going. And it's a place that
puts both innovation and personal freedom in jeopardy.
The Internet and the PCs that connect to it are generative: They can be changed by
anyone, anywhere. This quality has fuelled some of the incredible innovations that we've
all been enjoying and enriching our lives, such as Wikipedia, Facebook, YouTube and
others. Yet, the very qualities that make generative technologies amazing also make
them at risk, and frustrated users are seeking the safety and reliability of controlled
devices where only the creator of the device can change the features. The Internet is on
the path to an appliancized lockdown. But must we choose -- have to choose between
security and freedom in the Net world or can we have both.
Jonathan Zittrain holds the Chair in Internet Governance and Regulation at Oxford
University and is a principal of the Oxford Internet Institute. He's also the Jack N. and
Lillian R. Berkman Visiting Professor for Entrepreneurial Legal Studies at Harvard Law
School where he cofounded Harvard's Berkman Center for the Internet & Society in
1996.
With students, he began Chilling Effects, a website that tracks and archives legal threats
made to Internet content providers. His research interests include battles for control of
digital property and content, cryptography, electronic privacy, the roles of intermediaries
within Internet architecture, and useful and unobtrusive deployment of technology in
education.
So please join me in welcoming Jonathan Zittrain to Microsoft Research.
(Applause.)
>> Jonathan Zittrain: Thank you so much, Kim. Thank you for arranging this whirlwind
visit. And, really, you guys did not have to call out the Blue Angels for me yesterday.
That was really appreciated, though. And the fire boats with the -- it was just lovely. So
I should come out more often.
So I thought I would give you a bit from the book, but if you've read the book, I didn't
want to just tell you what was in the book, and if you haven't read the book, then you
won't know the difference anyway.
So what I was thinking I would do is -- I'm aware that we're in the political season now,
so I've been thinking about what it means to be political and in a polity and in a
democracy. So I thought I would talk a little bit about civic technologies and give you
sort of examples of what I see as civic and noncivic technologies and why we should care
about it and why in the crucible here in Redmond, Washington, where so much software
is born, the decisions that are made here could have a huge impact on just how civic our
society is because how civic our technology is.
Now, when I think of examples of civic technologies, a great starting example would be
the Internet itself. It is a truly unlikely beast. These are three of the Internet's founders.
They were classmates together at the same high school in suburban Los Angeles. And I
guess they just had like a "let's start a network club" instead of a debate club. And you
can see their pictured here for their 25th anniversary retrospective in Newsweek, Jon
Postel and Steve Crocker and Vint Cerf. And they're showing that you can build a
network out of just about anything. It's a little puzzling that the network doesn't work. It
goes from his ear to his ear and his mouth to his mouth, which Vint swears is an inside
joke rather than that the framers of the Internet do not know how to string tin cans
together.
But this is so evocative because this is actually the original chart of the ARPANET that
they reproduced for the photo. And it reflects a huge constraint that they had building it.
The constraint was that they didn't have a whole lot of money. It wasn't like Fred Smith
with FedEx where it was like, okay, we're going to make it so that a package can go from
anywhere to anywhere overnight, and that requires some startup costs to get that going;
rather, it's we're going to come up with some protocols that would say how you might
build a network and there'll be protocols that reflect the fact that nobody has a whole lot
of money, so it will primarily be cobbling together other networks, and it may well
involve piggybacking. So if Utah wants to get online, maybe they just piggyback with
somebody already online.
That ability, a child of constraint is also a child of freedom, because it turns out that they
didn't have to make any money with this. There was no business plan. The purpose
wasn't to make money, which already makes it sound insane. But the purpose was just
kind of to goof around and to experiment with network protocols and maybe to be able to
then exchange files themselves. And that meant, though, that because they didn't need a
business model they didn't have to figure out whom to charge and when, which meant
that you could have Utah piggybacking on top of SRI because it wouldn't matter; you're
not trying to charge people, so who cares whose bits are whose at this level. That made it
very easy to build in this unusual way.
Also, the way that the routing takes place -- I don't know if this analogy is great, but I've
used it before. This is the formal way of describing it: hourglass architecture,
ecumenical about what physical media is used to attach to the network. And up here very
broad because they don't care what application you're going to do on the network. We
don't care. Our only thing we care about, the only thing we care about is here, not
intellectual property, oddly enough, but Internet protocol. And here there's some basic
rules of the road that don't involve -- very quickly, we're still, to some people's chagrin,
using IP version 4, which is getting a little long in the tooth, but it's awfully hard to get
people to change it because it works so damn well. And in the meantime, what happens
up here and down here? We're just going to leave it to the imagination of everybody else
and have faith that they will have something useful to do on this network.
And in the meantime with these routing protocols, here is the more simple analogy: it's
like a big mosh pit. If I wanted to get this laser pointer to the back of the room, the
FedEx way, which is to say the same way, would be to hire somebody to move the laser
pointer and get a receipt and I get a status update and it moves and I pay money and then
it gets to where it's going. And if it doesn't, I know whom to blame.
The Internet way to do it is to say that we are the ones we've been waiting for and I can
just label it for the nice woman in the back of the room, hand it to you and you'll hand it
to him and he'll hand it to him. Why? Because you're just all some nice people. And for
all you know, the laser pointer might be for you. And when you get it, you're like, oh,
not Christmas yet, and you hand it back just because it's a neighborly thing to do.
You could do the U.S. Postal Service this way without a single letter carrier. Just go to
your front mailbox, check your mail. Some of it's for people to the west of you, you walk
that one house to your left; some of it's for people east of you, you walk it one house to
your right; the rest is for you, you take that inside and throw it away. That would work.
And it would eventually get to where it's going probably more quickly than third-class
mail. But that's an insane way to think about moving the mail, and yet that's exactly how
the Internet works.
There were other alternatives to the Net that were more sane, that were more FedEx-like.
This is the lovely CompuServe Information Service probably from the early 1990s. You
log in and here's everything you might want to do, and it's provided by CompuServe.
You click on the different buttons and you'll see different menus, different content. Now,
CompuServe may not be able to do everything, in which case it cuts deals, business
relationships with other content providers, and you pay it money. So it actually has a
sane plan of sustainability. And in competition with AOL and Prodigy and MCI Mail
and the Source, they vie to be attractive enough to have you pay them money. And yet
they're all subsumed, overwhelmed by the Internet, which has no main menu, no CEO, no
business plan, just this kind of faith that people are willing to move the laser pointer to
where it's going and will come up with stuff.
Best effort's routing. That's what they call it, right? Otherwise known as send it and pray
or every packet an adventure. A weird way to have a network compared to this much
more rational model. I mean, it's so weird that the Internet engineers who themselves are
not incorporated -- there's no president, their motto, if they had one, is: we reject kings,
presidents, and voting; we believe in rough consensus and running code -- they say their
mascot, if they had one, would be the bumblebee because the fur to wingspan ratio of the
bee is clearly far too large for the bee to be able to fly. And yet somehow the bee flies.
And as late as 1992, IBM was telling people there's no way you can build a corporate
network using Internet protocol. It's clearly just too crazy. And yet the bee flies.
I'm proud to say that thanks to a large infusion of government money, scientists have
finally figured out how bees fly. It turns out they flap their wins very quickly.
(Laughter.)
So I define a civic technology as one which is often incomplete at the time that the
vendor or maker of the technology makes it available to the public, that solicits the public
to come in and help make it a success by designing uses for it, by actually helping
implement it the way that routing is asking favors of people along the way. And that is a
participatory thing that is unlikely that it would work, but when it works, it works really
well and can outcompete the noncivic technologies that are much more cash and carry:
pay me money, I'll give you a service. Nothing civic about it; it's called business. And it
works.
So as these civic technologies get successful, they require sometimes a form of civic
defense. Because at some point somebody along the path of the laser pointer might just
say like, why am I doing this? Right? They have an existential moment where they're
like, this is ridiculous; pay me a dime or something like that in order to keep it going. If
there's value getting created -- sort of like that scene in Reservoir Dogs where they're all
pointing guns at each other. At some point there's enough reverberating doubt that
somebody wants to reach for the money and start to get it.
And there's an example of this in the Internet space. In February Pakistan asked its
Internet service providers to block YouTube to Pakistanis. This is the kind of request that
we study at the OpenNet Initiative at Harvard, and we chart Internet filtering around the
world. It's routine. It happens from a lot of countries: about 40 worldwide routinely ask
to have different sites blocked by their ISPs.
But the way that one particular Pakistani ISP decided to implement the block is pretty
amazing. They did a parlor trick. The way Internet routing works is not only do you
agree to move the packets from one place to another, but knowing where they're
supposed to go. There is no centralized map of the Internet. All there are are entities
who have limited vision. They can only see basically their immediate vicinity and they
report to those near them: Here's what I can see to my left; here's what I can see to my
right. And the people to the left then say, well, here's what I can see to my left, and like
dominoes outward you have a distributed map called routing tables.
So this Pakistani ISP made a stunning discovery. They said, you know what? We just
looked down and we saw YouTube right here. We're sitting on top of YouTube and we
didn't even know it. We are zero hops away from YouTube, which means if you have
your tired, your poor, your hungry packets yearning to see cats flushing toilets, send them
to me and you'll be happy because we're right on top of YouTube. You get the packets
and then you throw them away. That's how you filter.
So that's what it starts doing. Which meant that it advertised one layer out that it was
right next to YouTube, which meant that every router one layer out started sending
packets to them and advertising a layer out from them, hey, we're only one click from
YouTube, and so on and so on. Within a matter of minutes, YouTube is blocked around
the world. ISPs around the world are sending their data to Pakistan because one router
advertised that it was on top of YouTube. YouTube is one of the most popular Web sites
in the world owned by one of the most powerful companies in the world and there was
nothing individually they could do about it.
So why is it that we're still then able to use YouTube just fine and we don't even really
know about this incident? It kind of has -- this is also, I guess, a topical reference -- a
Batman kind of quality to it. The bat signal goes up, there's trouble in Gotham, and who
comes to the rescue but NANOG, the North American Network Operators Group, a
bunch of people who live in windowless rooms and their idea of fun is to watch the
NANOG list and to participate on it.
Nobody runs NANOG, per se. It's not like they're The League of Extraordinary
Gentlemen or something. It's just people who have nothing better to do but look at
NANOG and often have posts at various ISPs or are parked at one place or another. So
the word goes out, hmm, it looks like YouTube has been hijacked, and then they start
sharing, well, what are you going to do about it, here's how to fix it, here's how to
manually tweak your routers so that you ignore some or all of Pakistan. And within a
little while things go back up again. But it's almost like Santa's elves came to the rescue
here rather than that YouTube had some contract for security that took care of it, or
certainly that any government came in and made it all better.
Now, two questions to think about real quick: one is, what if NANOG got a life and the
people doing NANOG right now decided to go play Frisbee? That could be a problem
the next time something like this comes up. And, secondly, what if about 20 ISPs around
the world decided not to pollute the routing table for one destination but for the top
20,000 destinations on the Net. You would have a kind of digital pandemonium for
which this very ad hoc way of dealing with it might not be up to the task. But at least -this is what I call a civic defense model because it relies on just the goodwill of people
who aren't paid to do it but think that it's a good thing to do to keep things running
smoothly.
Another civic technology with a civic defense model: Wikipedia. Right? If a guy name
Jimbo came up to you in 2001 and was like, I got a great idea: we'll start with seven
articles and then anybody can edit anything at any time, and then we'll have a great
encyclopedia. Huh? Right? That is a crazy idea. That's not even like a bee. Right?
That's a brick. You're like, that's not gonna fly. Right? It's a stupid -- it's a profoundly
stupid idea. So stupid that even Jimbo never had it. Jimbo had the idea for Newpedia,
which was a more standard encyclopedia in which charitable donations, largely from
Jimbo, would pay experts to write articles that would then be given away to the world.
The Wiki was just throne in as an afterthought to allow the articles to be worked through
before they went to the public, and suddenly the Wiki took over the whole project and
Jimbo himself was as surprised as anybody else. And now you have this kind of
Wikipedia with hundreds of thousands of articles including in such languages as Klingon
and Volapuk, which is the new Esperanto. There was a brief scandal because somebody
took the Volapuk Wikipedia and wrote a robot that translated a number of other
Wikipedia articles into Volapuk, vaulting it into the 100,000-plus category of Wikipedii
and the Esperanto people were livid because it just didn't seem fair. But we digress.
The fact is Wikipedia is now so ubiquitous that you can find it on Chinese restaurant
menus. Like that is a seriously ubiquitous phenomenon. I don't know about you, but I
prefer my Wikipedia stir-fried with pimentos. I have a theory on this, but I can share that
later if you want.
But the fact is that when Wikipedia gets attacked, which is one of the first things anybody
actually evaluating the brick of the idea would say, it's like, well, wait, anybody can edit
it at any time, what's to stop anybody from making an article, just say George Bush is a
poopy-head? The answer is, well, nothing. You're like, well, that's why the idea is
stupid. And yet Wikipedia evolves within the Wiki a Wiki for administrators, who are
often just self-proclaimed people who live in windowless rooms and have nothing better
to do but edit Wikipedia all day long. Apologies to any Wikipedia administrators in the
room.
They have the notice board. And the notice board is a Wiki page that you can edit to say
that there's a problem on Wikipedia. This is the bat signal of Wikipedia. And literally it
reminds me of the definition of history that says that history is just one damn thing after
another. It's like, holy cow, right? Wikipedia? The problems are just one damn thing
after another, tendentious editing by user Andy V. Phil; an apparent delete/undelete bug,
user Yoshiko; Anon attacking me for reverting. A long story. I can't wait. Right?
What makes this work? What makes it work is that there are more obsessive-compulsive
people who are good-hearted reloading this page all the time and saying, I'll take number
one, I'll get number two and going through and dealing with the problems than there are
problems coming in the other end. At all times Wikipedia is approximately 45 minutes
away from utter destruction. If the Wikipedia editors here all took a lunch break at the
same time, the robots that are constantly hitting it trying to turn every single page into an
ad for a Rolex watch -- don't think that's not happening right now -- they would be
victorious. They would all go to lunch and they'd come back and find smoking ruins in
the wake.
But yet uncoordinated. It's not even like, well, it's two o'clock, good luck, Bill, not much
going on today. Hope there's no icebergs. There's no changing of the guard. It's just
there are enough of them, enough distributed at enough odd hours of the night that there's
always somebody at the helm keeping an eye on how things are going? Right? This is
insane. But it is a civic technology the way that a neighborhood watch when it works
rather than consists of several signs in the neighborhood that look like they haven't been
changed since 1948, this is the way a neighborhood watch actually works.
And occasionally you see people self-organizing informally, such as one of the gifts of
the show 24 has not only been a more lax attitude towards torture, but the
countervandalism unit has been formed using an anime woman with a mop and there are
people who believe in civility, maturity and responsibility. And, again, nobody appointed
them, of course; they're just there and they ban together and occasionally they might have
a meet up, right? Can you imagine the countervandalism unit meet up? Is it like -would it be at Denny's? Like would they tidy up after themselves? I don't know. But
that's the kind of thing that a generative, breathable civic technology at its best allows so
that it can survive its own success once there's a reason for some bad apples to try to
subvert it.
All right. So with that background, let's talk a little bit about the personal computer. I
bookend the beginning of the PC era as the West Coast Computer Fair in 1977. Images
from that time are blurry, but here's Steve Jobs in his first suit at age 21 introducing the
Apple II personal computer. For the first time in a convenient, single-plastic-molded
case without a soldering gun, you too could take home a box that when you turned it on
and attached it to a monitor would give you a blinking cursor. And you could be like 10,
print high, 20, go to 10, and be like, that's pretty cool. I don't know if you remember the
moment that you first did that. Or if you don't remember the moment and it's because
you never did it, somebody else did it and wrote other great software and then gave it or
sold it to you, and you were like, great, now I can use the Apple II as well. This thing
was intended as a hobbyist device, which is why it's at the West Coat Computer Fair
described as 10,000 walking, talking computer freaks. These are the people who would
rather build their own clock rather than buy one. It's like Heathkit types. Right? And we
know who we are, right? Then there's a small minority that are like I don't go to
Heathkit, I go to RadioShack and get the resistors myself.
But within two years this technology, civic in the sense that it is incomplete, just a
blinking cursor when it comes out, solicits outside contribution without any attempt to
really moderate the contribution or run interference on it. Within two years Dan Bricklin
and Bob Frankston invent VisiCalc, the first digital spreadsheet ever. And businesses
around the world are like, where have you been all our lives? And they're desperate for
VisiCalc, which means Apple II's start flying off the shelves, and Apple has no idea why.
They have to commission market research to figure out why their box has become so
popular. That's the kind of surprises that a civic generative technology welcoming
contribution from all corners can give even the vendor of the technology. And it turns
out the PC is ill-named. It's always great for work and for office and can even lead to the
ideal of a computer on every desk, in every home, and in every office.
And when I look at some of Jobs' contemporaries, here of course Bill Gates from his
traffic stop in Albuquerque, New Mexico, just around the time of the West Coat
Computer Fair. What I see in this picture first is somebody who's grinning from ear to
ear. I don't know that's because he thinks he'll buy and sell us all some day; I think it's
just because it's kind of funny: I got arrested for speeding. That's -- it's kind of funny.
This is a mischievous guy. And his sense of fashion has not changed significantly in 30
years. I'm allowed to say that, right?
But what I mean by this is these are happy-go-lucky, goofball, asocial, brilliant, poorly
dressed nerds. And they are the dark energy that powers these generative technologies,
these civic technologies and that believes in them even though you can't easily predict
that Internet routing is going to make sense, that Wikipedia is going to make sense, that a
PC that gives you a blinking cursor is going to have a market beyond the people who use
Heathkits. That's the kind of energy it is.
Dark energy in physics is the fact that the universe keeps expanding at every particular
point, it's just going outward. And I actually once talked to a cosmologist who said they
named it dark energy because that way they'd get funded by the Department of Energy;
that it's actually not energy at all, but like DOE now funds them because of the label,
which is great branding for this thing that they otherwise have no idea what it is. And
here it's a similar kind of difficult to capture in a bottle, but once you've got it, you start
seeing the kinds of advances that otherwise wouldn't shake out of the standard
competitive firm environment. And this box, which dates from, I don't know, 1995 or so,
how would we date it?
>>: Carbon data.
>> Jonathan Zittrain: Yeah, carbon data. That's somebody who works in materials. I
might instead look at the 66 light as was suggested here, which show the -- right? That
was the time of the turbo button if you wanted Prince of Persia to run faster kind of thing.
It would mean the hamsters inside would run on their wheels that much more madly.
They've actually just invented a hamster-powered paper shredder. The hamster runs on
the wheel and it shreds the paper here, and then the hamster can live in the paper after it
shreds it, which just shows you that reuse is a viable alternative to recycling. And this
was a the obligatory green message from the state of Washington.
So that machine which dates from '77 or '95 or 2007 has not changed significantly, and
the fundamental quality is you hand it code, it runs the code. No questions asked. And
part of the claim of the book is that for too long the free software versus proprietary
software wars obscured this point.
One of the central claims of the book is that for my purposes Windows is a
consummately civic and generative operating system, and I am indifferent to the fact that
the actual code of the OS is a black box, because you can build on top of it anything you
want, and there's no gatekeeping going on once I buy my Windows machine as to what
will run and what won't. And that completely, for these purposes, moots the free
software debate.
Now, it didn't have to be this way. Just like the Internet wasn't the only way to build a
network. This is a stupid, a silly, a weird way to think of building the kinds of
technologies that go beyond the geek and that go on people's desks.
What are the technologies that are supposed to be on people's desks? Things like this.
The Brother SmartWord processor from 1985. Right? We take everything you'd ever
want to do with something that looks like this and we put it on a main menu for you and
we look to the PC and say, great, that spreadsheet thing, that's pretty cool, we'll make that
number two. We can incorporate from the nerds and we can give you word processing
and all other sorts of stuff. But we give you a sensible, stable experience. This is the
information appliance that for years people thought was going to be the future of
consumer information technology.
And yet just the way that CompuServe with its same style of main menu got subsumed by
the Internet, we see this get subsumed by the PC. And you end up now today in all sorts
of environments, including very serious ones. Like a battleship, running not battleship
software -- by that I don't mean the game, I mean like a real battleship software -- instead
it's running stuff for which there's tons of code running side by side. And, again, I don't
care what platform we're talking about here. Any generative platform is going to have
this characteristic. And we have no idea what this stuff does. And for a while, who
cares? Just like it's not like we need a security model for Internet routing. At least until
Pakistan got clever, we didn't. Just like we didn't need a huge countervandalism unit for
Wikipedia until Wikipedia got that popular. Well, guess what, the PC has gotten very
popular. And now it turns out there's all sorts of reasons for one of these pieces of code
running on the machine to do stuff that is bad for the user.
Now, it's true that if any one of them had something that said delete the hard drive, that
would be bad. That hasn't been seen in a while. We haven't seen something diabolically
crude, like go into spreadsheets and reverse some of the numbers that you see and then go
back to sleep. Can you imagine doing payroll several weeks later and nothing adds up
and you have no idea why and your backups are looking the same way and now you can't
trust any spreadsheets because you don't know what the virus has touched and what it
hasn't? Haven't seen that happen yet either.
Although, there's nothing in particular standing in the way of somebody who sneaks
some code onto your machine -- either through the front door, because you think it's
going to do one thing but does another, or the back door through a vulnerability of some
kind -- from doing it. Instead we see things like the unholy alliance, which is only a
couple years old, between spammers and virus makers.
Remember the first time you heard about a virus that once it infects the machine, sets up
the machine as a mail server and starts sending spam from your machine? You're like
that's pretty clever. But evil. But clever. And then you see stuff like this that's like truly
a discarded script from 24 from the usually staid network world of last year. Strom worm
is fighting back against the researchers. It retaliates against them by launching denial of
service attacks, shutting down their access for days. As you try to investigate, it knows
and it punishes. They're afraid. I've never seen this before.
It's like, come on, how cliched is that? But wait a minute, this is real? Like, you're
telling me this is real? What is our defense against this? Our defense against this is for
users to get smarter, which is a strange basket in which to put eggs. I can't help but share
with you Microsoft's first immutable law of security. Apologies if you're the person in
the room that wrote this law. There's a nice analogy between running a program and
eating a sandwich. If a stranger walked up to you and handed you a sandwich, would you
eat it? I agree. Probably not. How about if your best friend gave you a sandwich. I
guess maybe I would, maybe I wouldn't. I would first say, Did you make it or did you
find this lying in the street? And that would be material to my decision. So here's the
critical thing. Just apply the same critical thought to a program that you would to a
sandwich and you'll usually be safe.
So, all right, I should take the millions years of Darwinian Evolution whose sole purpose
is to help me sniff something and know if I should ingest it and apply that to software.
Lift the lid of the software, take a tentative smell, and if that software doesn't smell right
or if it was found lying on the street, don't run that software.
Now, again, apologies to the fellow who -- or gal who wrote this. You know what they're
trying to get at, but this does have the feeling of a Band-Aid over a huge
wound-staunching-blood kind of thing. Here's a more simple version, just to tweak my
own institution. At Harvard Law School: Dear HLS faculty and staff, lately there's been
an insurgence of fraudulent e-mails at the law school. And you have to realize, they're
somebody from a different planet. This is a world in which, that's right, if you open the
wrong e-mail, you lose. You open an e-mail, that's it. Imagine if your television set were
such that it starts going crazy and you call Sony the next day; they're like, Were you
watching Channel 6 last night? Like, Yes. Like, Well, that's your problem. You should
never have been watching Channel 6. There was a virus on that channel and now your
TV is fried. Like that's what can happen with these e-mails. So there's a huge pile of
advice about what you should do to avoid getting infected. My favorite element of which
is be weary of e-mails that have misspellings, poor grammar or odd characters because
they're a red flag for fraud. I wrote back to the IT department. I was like, I think I got
one. They got me a one-way ticket to Oxford.
Or how about this: I was once at a conference at Fordham and bored to tears. And I saw
there was wi-fi so I connect to the access point. And it says please give me your
Fordham ID and password. I turn to the student next to me and, hey, would you mind, a
little social engineering. He puts in his name, his password, says, okay, you're a Fordham
student, but you are not running the Smart Enforcer. We won't let you on the network
because we care about security. You must run the Smart Enforcer before you get any
bits. All right. Fine. I'm desperate. I download the Smart Enforcer, and here's the
wizard as I follow it through: Start here, now Smart Enforcer gets a little crazy and it
says "install the Symantec Client Security System." Right? I don't know what this is.
I've heard of Symantec. I'm not sure I like what I know, but I'm desperate. So I'm going
to install it. And, by the way, you have 55 minutes left. So all right. It's like a 24
scenario: I download Symantec, I get it installed. Fine, fine, fine. It's in. I see my
carefully structured registry getting completely melted down. And then it says no, no, no,
you didn't update your definitions and you have 8 minutes left. Update. All right. I
update all my definitions. Finally Symantec has taken complete control of my machine.
What's the first thing Symantec tells me? It says Smart Enforcer is trying to access the
Internet. You really ought to block it.
And it just shows that the kind of belt-and-suspenders approach to security ends up with a
very Keystone Cops kinds of attitude that these are noncivic responses to the problems
that arise with a civic technology. And that failure to mesh the solution to the problem
means it's not going to be very effective.
One of the most contestable, and therefore interesting to me, claims of the book is that if
we don't come up with a civic defense architecture for the PC, we're going to say
good-bye to it. We will see the end of the PC as we know it. And we see it more and
more in corporate environments, in libraries, in schools, in cyber cafes. You can't just
add new software to the PC anymore. It's been reconfigured so that you need permission
from the local administrator to add any new code. Sometimes you do that to yourself
because you know you can't be trusted. So like Ulysses tied to the mast, you're like
Jessica Simpson screen saver. I really want it. And thank God you can't because it
comes with a bunch of spyware. At that point you're like, well, spyware, Jessica Simpson
screen saver; I want the screen saver actually.
And this is creating the demise of the PC, not just as it gets locked down, but as we see a
movement away from the last great shared hallucination Internet application: e-mail. If
you ask the kids today how they're sending messages to each other, they're not using
e-mail. They're using Facebook messaging, they're using instant messaging, and it ain't
IRC; it's stuff for which there is an intermediary who just keeps everything going
smoothly. And if somebody starts spamming, they get kicked off. There's nobody to
kick anybody off of e-mail if it doesn't work because it's just a shared hallucination
application. It's like a coyote running off the cliff that runs really far, and at some point
he looks down, he's like, this should not be working. And guess what? It's not working.
It's over.
So we see a movement away from these civic technologies and towards a new round of
gated communities. In the case of the network, it may be like Facebook Messaging or
instant messaging. In the case of the hardware, it's moving towards things like the TiVo
or the Sky Plus. TiVo has Linux inside screaming to get out. But it's not generative,
even though it's free software inside because you can only control it with a remote unless
you're willing to pull out a soldering gun.
The same is true of the BlackBerry, of many mobile phones. What an interesting space to
be looking at these days. But until recently this is the kind of thing you would see when
you would open up your Cingular mobile phone. And guess what? It looks just like the
main menu of the Brother SmartWord processer. It's exactly the same business model
and technological configuration. It's true of the Kindell (phonetic), of the iPod pictured
here in it's native Naugahyde pink coating. And it's true of this glorious, seductive
device: the iPhone.
Now, I look at the iPhone and I see the CompuServe main menu circa 1995. It's like wait
a minute, I've been here before. And Steve Jobs is like, that's right, except now there's a
clown fish. But we define everything on the phone, and that's what you want because the
last thing you want is this crazy civic environment where anybody can come on your
front lawn and pee on it, or worse, and you don't get to make a call anymore. That's why
we're going to make this more like an information appliance.
Now, you may respond to that: But wait a minute, Steve Jobs opened up the iPhone. He
got religion and now it turns out there can be a software development kit for the iPhone;
let the dark energy be attracted to making new apps. This is not a real Newsweek cover,
just for -- it's a very slow week, if so.
But there are many, many exceptions to the way the iPhone store works. So, for one
thing, yes, we're celebrating now that it's the apps that are really cool, but it turns out the
environment is one in which to get an app from me, a developer, to you, an iPhone
holder, I can't just give it to you? I can't give you a floppy disk, a USB key? I can't
nuzzle the two phones together and move the app? No. The app must go through the
iPhone app store run by Apple. And if I want to charge for the app, Apple takes a cut.
Wow, why didn't Microsoft think of that in 1990? Because people have been like, how
dare you? Like, no, you don't take a cut of every app that comes through the door.
And if he doesn't like the app for some reason, it's not going to show up in the store.
What limitations? Illegal, malicious, privacy, porn, bandwidth hog, and my favorite:
unforeseen. Can't having anything unforeseen happening on the iPhone. And that's why
as you start to do this bottleneck you see a bunch of developers waiting up to six months
to be able to be approved to code for the iPhone. And you start to see things like just last
week this device, which let's you take your iPhone and connect it to your computer so
that you can now surf the Net using your iPhone's Wide-Area Network connection. This
suddenly disappears from the iPhone store and the makers of the app are like, huh. Like
we don't know why. But we know that maybe sometimes people aren't supposed to do
this. That's not part of the business model of the iPhone. So maybe that's why they killed
it.
Or just this morning you see this application which allows you to look at nearby movies
and their ratings. The box office app: Gone. Out of the store. We're not sure why. The
developer is like, well, we haven't heard from Apple, we've e-mailed them. They're just
waiting to see. Because (inaudible) speculates that maybe there's something under the
surface, an undiscovered security flaw, maybe.
Now, again, just think back. Could you imagine if Microsoft was like, We're sorry to
announce -- or maybe we won't announce it; you'll just discover it -- that Netscape will
no longer operate on our machines. There might be an undiscovered security flaw. I
mean, never in a million years would in the public eye the famously proprietary
Microsoft have done that. And yet here you see Apple doing it, and there's like -- I don't
know. You'll have to help me when we hit question and answer. Tell me what you think
the difference is between this emerging platform and the one we've had. It used to be the
Apple platform before Apple dropped computer from its name since 1977.
Now, it's not just our client-side apps, like at the iPhone, that are experiencing this shift to
a vender-mediated, ongoing intervention the way the technology works. Cool stuff that is
also attracting nerds, like the Facebook Platform, has all sorts of requirements and
limitations in the fine print that say, We reserve the right to kill your code running on
Facebook for any reason. So you develop some app, it goes great on Facebook, and then
Facebook can just shut it down. Or we reserve the right at a later date to start charging
for that app to continue to survive.
And, again, I hate to keep making the analogy, but it's so effective to my mind. Bill
Gates comes up to Intuit one Wednesday morning, is like, You guys have had a great run.
Quicken is really popular on these Windows machines. So, anyway, I'd like a million
dollars, and if I can have it by Friday, that would work for me. It's totally up to you. You
can give me the check or we can kill Intuit. Just let me know your decision.
That wouldn't fly. And it's exactly what Facebook and Google reserve the right to do on
their new Web 2.0 software as service platforms. And now what you see is Facebook
saying, amid complaints that, surprise, surprise, some apps on Facebook are crappy, it's
like who would have thought there'd be gambling going on in this establishment? Right?
Reminded of Theodore Sturgeon, the science fiction author, who was approached kind of
provocatively at a convention by somebody who said, you know, 90 percent of science
fiction is crap. He was like, 90 percent of everything is crap. It's like, you know, that's
kind of true. That's now known as Sturgeon's law.
So, right, Facebook is going to have the new great apps program. Those applications will
get higher visibility on the surface, be able to work more closely with Facebook. They
want to evolve to a place where the right companies get funded. They launch more
ambitious features. It's also (inaudible) another level of certification called the Facebook
Verification Program for applications that are trustworthy and they'll get added visibility
and a graphical badge.
So now you see more refined means of control. It's not just are you on the bus or off the
bus, but where on the bus are you sitting kind of thing that is a very different landscape
than the free-for-all that we have come to know.
All right. Let me race through a couple thoughts about noncivic technologies and then
what to do about it and then we'll break.
I've been talking about the benefits of civic technologies and some of the worries of the
ways those technologies are getting closed off or becoming contingent. But to really nail
it, let's look at a couple of examples of technologies that aren't civic to begin with and see
the ways in which in a new networked world they're being used.
And my anchor analogy for this is the simple toaster. We all know what a toaster is and
what it does. It's the consummate product. Okay. So imagine the Web 2.0 toaster. And
I still mean a physical box. You come down for breakfast one morning and there's a sign
on it that says: Congratulations. You've just received the summer update. You now
have a third slot. You look at it, like, wow, there's a third slot in the toaster, pretty cool,
nice update. Then later in the afternoon you come back and you see it's back to 2 and
there's a note on it that says: There was a bug in the summer update, we've reverted, we
apologize for any toast that was crushed in the reversion procedure. Like, okay.
Then the next week you come down and it's making orange juice. Now, at this point you
can't answer the question "what did I buy." What you bought was no longer a toaster.
You bought an ongoing relationship with a breakfast-oriented service provider. And
they're going to try to satisfy you as much as possible because they're competing with
other breakfast service providers: Where does your breakfast service come from? Are
you an Amana man? Oh, those are terrible.
And yet you feel much more not anchored with the stuff in your house because it's not
your stuff anymore; it's just part of a relationship with the stuff providers.
Now, two concrete, really quick cases in point. Case number one: This is an EchoStar
DVR. It's a DISH system, but they added digital video recorder functionality to it.
Great. TiVo sees this done by EchoStar and they sue for patent infringement. They sue
in Texas where plaintiffs always win, so TiVo wins. They get a judgment against
EchoStar for $70 million. Fine. That can be paid. But then TiVo under seal in briefs
asks for and gets more. They get an order from the judge telling EchoStar within 30 days
to fry all but a handful of the DVRs out there through a remote update. Congratulations.
You've got the summer litigation update. You now have an Echo brick.
And that was not possible before things were tethered to their vendors in an ongoing way
made possible by ubiquitous network connectivity. And if you can fry the thing through
a single court order around the world, you could also do something where the Simpsons is
accused of copyright infringement or defamation late in one of the shows. Fine. Let the
order go out to excise from all copies of the Simpsons reposing on DVRs the offending
two minutes, and then you'll just notice it's 20 minutes instead of 22 this week.
Example No. 2: The OnStar system. Some of you may have this. It provides
turn-by-turn directions for some General Motors cars. And it has a little button here
where if you run into trouble you press the button, you say, I've fallen and I can't get up,
help, help. This goes into this microphone and then over the speakers in the ceiling a
woman's voice comes out. This is the actual woman who says, Don't worry, help is on
the way. Great feature.
The FBI realizes that this feature exists in cars like OnStar, and they order an OnStar-like
company to reprogram a single vehicle containing people of interest to the FBI with an
update that simply turns on the microphone at all times. The company does this and then
files suit anonymously, so their customers won't realize, leading to the case: The
Company versus the United States of America. Amazing title for a case. It's reminiscent
of some of the old (inaudible) cases, like United States versus Six Reels of 8-Millimeter
Film. It's like I wonder who's going to win that case, right? Let's just say if the U.S. can't
beat six reels of 8-millimeter film, you have no business being in a war overseas.
So the company loses in the district court in an opinion under seal. An appeal is taken,
and then the Ninth Circuit finds for the company on the thinnest of reeds. They say that
the way the FBI asked for this to be implemented at all times, including if the help button
is pressed it goes to the FBI, so if the bad guys actually fall and can't get up and ask for
help, it goes to the FBI, who presumably won't come.
If you can make the system so that at all times it goes to the FBI but when they ask for
help it conferences in the lady with the headset, no problemo, right? That's weird.
That's -- I can think of cases where I might like to have that, but I think of a lot of cases
where it's like, whoa, maybe I credit that the United States government would never
abuse this kind of power and completely just -- I see for the fraud that it is the report by
the current Department of Justice Inspector General finding 30,000 lapses in the use of
national security letters.
But in China these things are rolling off the assembly line with these features and, boom,
you're handing to the state a means of surveillance through consumer choice that it had
never before had. Same, of course, with mobile phones, the ability to reprogram them at
a distance and simply turn on the mike as an ambient noise catcher to see what's going
on.
The World Economic Forum last January, the head of China Mobile, the largest mobile
provider in China, was on a panel about mobile advertising -- mobile advertising, colon,
the next great bubble. And he was saying how cool it was that he can count the number
of people attending a sporting event by just counting the number of mobile phone signals.
In fact, he can know who attended the event. There's like silence in the room. And a guy
asked a question, he's like, Isn't there a privacy problem with this? The guy was like, No,
we take privacy very seriously. We only give this information to the government. The
people were like, oh, okay.
So there was a time when law enforcement itself was a civic activity. There weren't
enough sheriffs. I'm talking United States mid-19th Century. And what was one of the
most controversial laws? The compromise, a political accommodation reached among
the elites by which the North would return slaves to the South if they escaped. How do
you do it? You have to raise a posse. How do you raise the posse? You invoke the
Posse Comitatus law, and as the sheriff you can get able-bodied men to come and help
you enforce the law of some kind. Well, guess what happened? The sheriff sends out the
call and suddenly able-bodied men are realizing they just have to shampoo their cat right
then and there and they're not available; "call me for tomorrow's posse, I'll give you a rain
check" kind of thing.
To enforce the law in a huge, substantial, broad-based way requires the cooperation of the
public in all sorts of ways, including massive surveillance regimes. Somebody has to
drill the hole in the wall, somebody has to wait outside, the landlord has to let you into
the apartment, et cetera, et cetera. And if any link in that chain objects, you start running
into friction.
The noncivic technologies that are tethered to their vendor that can effect huge change by
one feature update across a swath of users, these don't require any cooperation and mean
that the natural check that comes when people basically have to be down with the law in
order for it to be effectively enforced, that check evaporates. And it was never
permanently enshrined in the law, formally enshrined there, except through things like
Posse Comitatus, which only worked if people agreed to join the posse. Without that
there, you run into all sorts of trouble.
In North Korea, the radios are tunable by law to one of only three stations. The radios
physically can only be tuned to like the Kim Jong-il Party Hour, the Kim Il Sung
Reflection Hour, and like Rhythm and Blues and that's it. And they have an idea in South
Korea to take solar-powered radios that can go to any station and float them across the
demilitarized zone so that people can actually have technology that offers them more
flexibility.
Somewhere between that clear extreme, on the one hand, and the utter openness of the
1977 Apple II or the 1990 Windows 3.1, somewhere in between we're going to reach this
hybrid environment. And I am worried that we'll get the worst of both worlds rather than
the best.
In the absence of finding ways to engage people in solving problems together, knowing
that there are still bad apples among us, we just have to get more and more into
technological tools implemented in a top-down way. This in Britain: Because of the
ongoing abuse of carpool lanes, they now have roadside cameras to detect blood because
people were putting dummies in the car next to them as they were driving to fool the
cameras. So I'm waiting for the first pig carcass to be found in a car in the passenger's
seat -- no, really, we're both going to the vet kind of thing -- in order to get the carpool
lane.
Now, I have some ideas about what to do about this, how to try to thread a middle course
between what is too much openness for a mainstream technology now -- we can't just go
back to 1977 -- and yet avoiding the kind of control that I see in the models that the
market is now producing.
But I think I should stop right now and see if there are questions, comments, reactions,
and maybe I'll work in some of the solutions slides as we go. Thank you very much.
(Applause.)
>>: (Inaudible) e-mail in 1982, we had to give the full path to get to our recipients
(inaudible).
>> Jonathan Zittrain: Do you mean that you (inaudible) is that what you're talking about?
>>: Yeah, SDC, RDC (inaudible).
>> Jonathan Zittrain: Those were the days, huh. Okay. You might be talking about
X400, which was an ITU standard. Yeah. Things got better. I agree with that.
>>: (Inaudible.)
>> Jonathan Zittrain: Yes. Yeah. Yeah. Those were the days.
The at sign, though, is incredibly powerful, because it means you can unify a ton of
disparate name spaces and still have a consistent format for it. Remember that
CompuServe and AOL were the e-mail address without the at sign because they were the
whole world. And the way to migrate them online was just to give them an "at," say,
okay, they're all at cis.com or compuserve.com or aol.com. And I'm waiting for a move.
To me it would be a huge strategic move by Facebook to realize you should be a
Facebook identity at somewhere and all current Facebook identities are simply at
facebook.com. And maybe you'll just choose to interact with others only in the
facebook.com universe, but then let Microsoft set up its own Facebook server, and I
might trust Microsoft as an institution so now I can find people at microsoft.com and that
data is hosted there. You can start to go distribute it and get more generative with what
features each Facebook server allows. It's a big change for Facebook. They're not down
with this yet.
>>: They need to move to this hybrid model.
>> Jonathan Zittrain: Yes.
>>: It depends on the hypothesis that the civic model that we have today will come
crashing down.
>> Jonathan Zittrain: Yes.
>>: And you've shown some ways where which it might come crashing down, but I
haven't seen a lot of evidence that conclusively it will and that we really need to do
something different.
>> Jonathan Zittrain: Yeah. I think that these phases kind of have two pieces to them.
The first is too early to tell; the second is too late to do anything about it.
Chapter 3 of the book is my best effort to lay out the evidence as best I know it. And so
I'd be interested, if you have a chance to read Chapter 3, by the end of it are you feeling
nervous, are you like, well, you know, it's all still speculative, when I get that first worm
that transposes the things in the spreadsheet, you know, that will do it.
What finally convinced me was that I talked to some serious nerds. And for a while was
not trying to lead them down the path, I was just genuinely wondering are we really just
walking off this cliff with nothing under it? There's got to be something I'm missing
here. And I would say to them, Imagine a 24 situation where your life depends on
bringing down 40 percent of the machines on the Net, the PCs on the Net within a week.
If you don't do it, you'll die. Tell me if you'll be dead at the end of the week. And most
of them think -- they actually think it over -- Ed Felten of Princeton said, Can I have two
weeks? It's like, okay, you can have two weeks. He's like, great, done.
And then you start to ask, well, why hasn't it happened? And it's the same kind of
question that makes me compare the kinds of security you have at a bank versus at a
7Eleven versus an airport versus a train station. How many attacks would there have to
be in train stations before we turn them into airports with trains? Probably three: The
first one we write off; the second one, hmm; the third one it's a trend and now we have to
completely rethink security for trains. And guess what? Then they move to Greyhound.
Or then they do movie theaters.
And you ask some of the Homeland Security people why haven't we seen the really
low-tech, low-price -- I mean, remember the Washington sniper? Right? For like about
six weeks the entire D.C. metro area you wouldn't go out and fill your car with gas. And
that was just one guy and a little kid. I mean, so then you're like, well, why haven't the
bad guys come up with that? The answer is not because our border security is so tight
and because our containers are so well inspected.
So I'm nervous that without plans to figure out how to deal with that when the third strike
arrives the response will be disproportionate and will be noncivic. Because the last
people you can trust are the people. I mean, that's been amply made clear these last three
incidents. So that's why I'm wanting to try to deal with it sooner rather than later.
Other questions? Yes.
>>: So I'm wondering how this whole research started, like when did you start becoming
aware of this potential danger?
>> Jonathan Zittrain: The question was when did this research start, when did I become
aware of this potential danger. Some of this goes back at least ten years. And I cut my
own teeth here at Microsoft as a program manager intern the summer of 1990. I was
T-Jon-Z and working on Excel 3.0, including the shrink-to-fit feature. Scoped that out.
It was some very tricky stuff on the Apple side of things because the print setup box -well, don't get me started.
And also in competing with Lotus 1-2-3, it turns out that market research -- because
Lotus 1-2-3 had 85 percent market share then -- Excel was the underdog -- it showed that
these stupid accountants who used it, they were stuck with the stupid slash command:
slash FS to save a file. And even though it was so clear that Excel's scheme was better,
like we couldn't get them out of it. And Quattro had just come up with a -- they ripped
off the whole scheme and put it into Quattro and got sued for copyright infringement
that -- another story.
So part of my job as one approach to this problem was to come up with synonyms,
because the copyright was not over the letters but over the words, like "file save."
Synonyms for each menu tree that would conveniently lead to the same menu tree but
with different words. So like "folder stash" instead of "file save." And just try doing that
with "data consolidate pivot table" and you're just like Webster's is no help.
So, anyway, I've been thinking about the stuff for a while, and (inaudible) on
CompuServe for years. I loved CompuServe. But I also was aware of the ways in which
there was an uneasy relationship between the generative islands within CompuServe, like
the forums where people could just kind of talk to each directly without mediation or
with mediation of an independent contract or sys op and (inaudible) company.
And we see that today -- we were just talking about this earlier -- in enterprises like Yelp
and TripAdvisor and Citysearch, where they don't really like the corporate overseer, but
they're having fun and they're generating all this content and why not.
So I've long been interested in what we'd call the civic areas made possible by networked
technology. And that's why the solutions part of the book, basically the last part of the
book, tries to see how we could design new technologies -- and by "we" I mean pretty
much anybody who feels like he or she wants to step up to the plate, just like nobody
needed a license to make Wikipedia, just somebody did it -- technologies that allow
people who want to be helpful to try to be helpful, to set up the equivalent of a NANOG
or a countervandalism unit for PCs, some of which might require a lot of skill. You've
got to be a pretty good PC hacker to be helpful. If NANOG had clueless people on it, I'm
glad they want to help, but they can't help.
But there are other ways in which even clueless people can help. So we think of, for
example, software you could download to each machine, each participating machine, that
radiates its vital signs back to other participating machines and how happy it is basically,
how many restarts, how many pop-up ads, all that kind of stuff, and what processes are
running on the machine. And then eventually I could start asking questions of the herd,
like I've got this new piece of software I'm about to run: is it recent or has it been around
the herd for years? On average does the herd get less happy or more happy when it runs
this code? And you get all sorts of problems, like it turns out when TurboTax is put on a
machine, the users get much less happy. It's like, well, that could be for other reasons
than that TurboTax isn't good.
But that's a great research area. And it's one particularly suited to university or university
and .com partnership, because it's more than just one app, more than just one OS even.
And it's about a collective effort to know what's going on.
>>: Assuming that people don't like this Big Brother control over their technology, why
doesn't the market make it in case people move away from those things that are like that?
Or do people actually want all this safety ->> Jonathan Zittrain: Yeah. This is a great question. The question basically is so if
you're scared by the security stuff or by the privacy stuff, why isn't the market taking care
of this? And that's a really neat question. That it's one you could ask about Internet
searching, where people will tell a survey that they're concerned about how long their
cookies are set by search engines, and then they keep using the same search engines.
I propose in the book a lot of things that might be described as market interventions. This
project I was just talking about where you would download software to your machine, in
a way it's just me being a market participant writing software, admittedly with no
business model, because we're not trying to make money, but the Internet didn't have one
either, nor does Wikipedia, that ask people to participate to make a better Net. In that
sense I'm not calling for the government to come in and fix this market failure sort of
thing.
But I think at the moment the reason why The Company in The Company versus the
United States wanted to be anonymous was because of the market implications if it
became widely known.
Actually what I hadn't said yet was that I just recently successfully petitioned to have the
hearing unsealed, so I know the company. And I've been trying to mull over -- it's now a
public record; I got the name of the company -- should I blog it, should I say here's the
company, this is what they did. It's the kind of thing -- I kind of know how the media
works sometimes. If it's a slow new week, it could be one click down in CNN.com in
technology news, and that company would have a huge problem on its hands.
Should I do that? Let me ask the people. I would sell more books.
>>: Why wouldn't you do it?
>>: (Inaudible) you should do it here.
>> Jonathan Zittrain: No. I have signed an agreement that says I will not divulge any
nonpublic information in this room.
>>: It's public information, you said.
>> Jonathan Zittrain: But it's not known to the public. Hmm.
>>: (Inaudible.) Let's stay on the subject.
>> Jonathan Zittrain: But the question back was why not do it? And I guess one answer
is -- and this is really why I haven't done it yet. I probably will ultimately do it. But, one,
I'd feel bad for the company. They were actually trying to -- within the limits of their
own balance sheet trying to do the right thing. They didn't have to sue. Most companies
don't. In fact, what makes me able to discover them is because they sued. How many
other companies have done it and not sued. But already that subtlety is so difficult to get
across to the AP reporter. They're going to take a bath in a way because they tried to do
the right thing. So that makes me a little hesitant to out them, and even as I might
carefully try to do it, I know what the headline is going to say, and that's that.
But in other ways I am very much trying to out some of the fine print of these contracts,
trying to get the developers to care because for some of these contracts, if Facebook were
told by their developers, community, like we're not going to code for Facebook if you
reserve the right to charge us a fee of any kind at any moment, like screw that, at that
point Facebook might be like, well, we were just putting that in to cover ourselves in case
we wanted to go that way. They're not materially committed to it yet. And with enough
pressure from the community, they might well recede.
And you could try this similar thing with privacy protections or even architectural
interventions that could make it -- right? What would you do -- what would you want for
the inside of that car? Maybe you would want something that is part of the
nonchangeable firmware that when that microphone is powered there is an LED attached
to it that when current is running through the microphone the LED is on. And then you
say to the FBI, gee, we'd love to, but we want you to know there'll be a red light on when
you're listening to everything.
You could do that if you wanted and the public could demand it, and then you get back to
uh-oh, how many people -- how many kidnapped kids won't be found because the red
light goes on. And now we're really into the debate. Chapter 5 is my best shot at
basically arguing for the red light.
>>: How much is the interest or the topic of civic involvement (inaudible), is that a
Western notion and as we think in a global -- I'm wondering how many of your ideas and
solutions have very much the Western lens on it.
>> Jonathan Zittrain: Yeah.
>>: And it's certainly -- you think about China, you think about Korea, you think about
India and people that weren't necessarily raised in a democratic world in this together
environment, how the views might be different.
>> Jonathan Zittrain: That is a great question. On the empirical questions of to what
extent are the sorts of values that make me able to use shorthand, like that's weird. Or
that's unsettling. Everybody's like, yeah, that's unsettling. Good question.
In Europe I usually get people when I talk about things like this to be as unsettled, but
that's still the West. I haven't spoken as much about this book in other countries. And I
would be genuinely curious to know I am open to the possible that a lot of this reflects
certain values that happen to be -- I mean, even the British and the Europeans think of the
Americans as like these First Amendment nuts. It's like they, you know, oh, no, how dare
you filter out pornography or whatever it is, gambling, the hot-button stuff. Hate speech
is actually what it is for the Europeans. Like the idea that we would constitutionally
protect hate speech seems bizarre to them.
But, of course, the question behind your question is to the extent that it is culturally
contingent, is it the wrong thing to do if you are in the position to be generating software
for the entire world to use to make the software such that reflects those values.
Another great question. I'm not sure I have a quick answer to that, but I wouldn't say the
answer is an instant, oh, that would be a form of undesirable cultural imperialism.
One of the best features of the Net is the way in which it -- unadulterated, because there's
lots of caveats with filtering and such as it gets deployed -- but the way in which it really
does open the doors of modernity in places that wanted to have them shut. And I guess
it's okay for me to decide that I support that. And it's being brought by consumer choice
rather than at the barrel of a gun, "here, you must use the Internet," kind of thing. But it's
a great question.
When I look at the uptake in places, another civic technology we're developing is to track
Internet filtering around the world. And the way we do it right now is a very noncivic
centralized way at the OpenNet Initiative. We get money from foundations that want to
see good things happen, so like MacArthur gives us several million dollars, we take
months, sometimes years, we send people to different countries and have them access the
Internet there, push a button, ask for a ton of Web sites and get out before they get
arrested. And that's a dicey model.
It also has methodological limits, because we have to know ahead of time what sites to
ask for, which means we need all sorts of regional experts to tell us what the Chinese kids
are all wanting to look at these days. Instead we are developing and should have
deployed by the fall a toolbar that you can load into -- we've written a Firefox version and
an IE version. You can load it into either browser. And with it when you can't get there
from here, you click a button in the lower right corner that say just says "I can't get there
from here, what's going on. " And the act of asking that question aggregated across
everybody asking the question or not helps to provide the answer, because we see that a
bunch of people in China are asking why they can't get to BBC and nobody in America is
and now we can start making inferences. And, in fact, what the toolbar will do is as
you're is surfing -- if you install it here in America, as you surf, there'll be either a green,
a yellow or a red light. Green means nobody is particularly reporting this as blocked;
yellow means somebody around the world says it blocked in a substantial number, but
not near you; red means people near you are saying they can't get there, can you take a
look. The corresponding Web site: amiblockedornot.com. And instead of playing
Solitaire or editing a Wikipedia article, why not spend your idle time going to
amiblockedornot and hitting reload to see one Web site after another that's been reported
as blocked by somebody else, having a frame below that tries to load it in your browser
and say whether you can get there too. That would accomplish the work of the OpenNet
Initiative in a civic distributed way.
And so far the enthusiasm for it does not appear to be a Western versus Nonwestern
thing. Lots of people everywhere are interested to at least know what they're missing.
>>: So there's a whole bunch of technologies through the last few hundreds years -- cars,
radio, with the printing press itself -- that have been tremendously generative and they've
created all sorts of social problems. And we as a society have accepted these
technologies without necessarily creating these very closed systems that we're worried
about.
And I'm wondering if the concern that you have comes from only looking at the computer
revolution in this trend within the amazing things that computers and the Internet have
generated, or if you looked at other possibly similar historical analogs.
>> Jonathan Zittrain: I looked at some historical analogs. Not enough to make a Ph.D.
committee happy kind of thing, but enough to talk about it right now, unless any of you
are on a Ph.D. committee. And I'm surprised that you mentioned the car as a generative
technology. Because the way I see most of these other technologies is they start off in the
realm of the tinkerers. There's the equivalent West Coast Computer Fair for enthusiasts
of horseless carriages or of radio, and then very quickly as they go mainstream they get
made nongenerative and you end up with a few brand leaders who produce that
technology, or in the case of radio are licensed to broadcast on the airwaves, and then
that's it. You don't have the hobbyists anymore.
In automobiles, they are not generative. They are less and less so with notable
exceptions, like I think the Prius let's you hack it a little bit. And I got to say I'm nervous
about that. It's like hack your Prius so it doesn't make that annoying beep-beep sound
when it backs up anymore. It's like, well, there's two sides to that story.
And I don't care whether the refrigerator is generative. Like I'm just as happy with it not
being generative. In radio, the last eddies of generativity are around CB radio, for which
by law you are not allowed to say anything entertaining over citizens band radio. If you
like decide to set up on Channel 6, which is vacant -- I guarantee you it's vacant right
now -- and start telling like Uncle Bob's stories, like every night at 7:00, they will find
you and fine. You. Because that's not what CB is for. It's only for uninteresting
communications.
So I feel like information technology, because it so much underpins speech and political
interaction and social change, I mean so much stuff that has to do with freedom of
association, of self-determination, of knowledge, of the oil that actually makes a
democratic polity work much more important, that that be generative and be able to be
disruptive and generate stuff that is seen as not worthy of funding or not pleasant rather
than generative chemistry sets where people can make any form of 18 kinds of anthrax in
their spare time, like I just as soon the government control the hell out of that. But I
may -- it looks like I'm misunderstanding your question.
>>: I think we need to follow up on this rather than have a conversation right here.
Thank you very much.
>> Jonathan Zittrain: Thank you all very much.
(Applause.)
Download