Roger Clarke's Web-Site
© Xamax Consultancy Pty Ltd, 1995-2013
|Identity Matters||Other Topics||Waltzing Matilda||What's New|
Principal, Xamax Consultancy Pty Ltd, Canberra
Visiting Fellow, Department of Computer Science, Australian National University
Published Version of 25 August 2001
Published in Mots Pluriels 18 (August 2001), Special Issue on 'The Net: New Apprentices and Old Masters', at http://www.arts.uwa.edu.au/MotsPluriels/MP1801rc.html
© Xamax Consultancy Pty Ltd, 2001
This document is at http://www.rogerclarke.com/II/PGPR01.html
The last 50 years has seen very substantial application of the technologies of personal and mass surveillance. The next two decades may see technologies of identification, and of location and tracking, destroy individual freedoms.
Running counter to those tendencies are new forms of networking that have been enabled by the Internet. These have created the possibility of enhanced freedom and power for individuals and social groups.
Government authorities and corporations, however, are implementing a substantial counter-reformation. This is designed to overcome the potential for net-based freedoms and to ensure the maintenance and enhancement of social control. This paper investigates the dimensions of the current struggle.
The advent of the open, public Internet during the 1990s was greeted with unbridled enthusiasm by a great many people. It was perceived to embody enormous potential to enhance the social, the political and the economic dimensions of people's lives.
But freedoms are utilised for many different purposes. Some are largely good; some are largely bad; and most can be argued to be either. The Internet quickly came to be used for old crimes and old misdemeanours, for new crimes and new misdemeanours, and for communications whose content was not to the taste of society's official and unofficial moral guardians. From an untrammelled 'idea in good standing', the Internet came to be seen as 'a mixed blessing'.
Meanwhile, giants were awakening from their slumber. Any major change has losers as well as winners, and an array of powerful organisations came to the realisation that the losers could well include them. Considerable efforts have been invested during the last few years to rein in the Internet's liberating potentials.
The purpose of this paper is to document the rise and imminent fall of the freedom-enhancing Internet, and provide access to resources that expand upon this vital issue.
The first section of the paper identifies the ways in which the new network forms create possibilities for enhancement of freedoms. It provides an outline of the arrangements by which computers are linked. Although this may seem a narrow and technical topic, it is actually enormously important to an understanding of the Internet's impacts on power relations within social and economic combines. Other aspects of 'the digital revolution' are highlighted. This provides the foundations for a brief discussion of the experiences that people have when they use the net. The section concludes by identifying the many different kinds of freedoms that the Internet appeared in the mid-to-late 1990s to offer.
The second section of the paper explores the counter-reformation that has been stimulated by the exercise of those freedoms. Powerful institutions perceive their interests to be harmed by a wide range of practices and potentials. There has been a vast increase in the number and the power of surveillance technologies during the last half-century. The paper examines ways in which those institutions are conducting multi-pronged counter-attacks against many aspects of the Internet and its use.
Finally, the paper considers ways in which the these authoritarian tendencies might be resisted, and concludes with a less-then-confident view of the survival prospects of the freedoms that we have come to enjoy.
The first part of the paper reviews the nature of the Internet, the services it supports, and the virtual communities and societies that use it, and identifies the freedoms it was perceived to be ushering in.
Computers were invented around 1940, initially intended to perform rapid computation. Their numerical processing capabilities were augmented with data storage, and they have been applied to the processing of administrative data since 1952. Initially, computers were independent of one another. Data was captured into machine-readable form and fed into the machine. Processed data was output in both machine-readable form (for re-use in subsequent operations), and in human-readable form.
The impact of standalone computing was to reinforce centralisation, hierarchy, authority, and supplier power. This was an excellent fit to the Cold War era. Not only communist but also 'free world' governments were concerned about national security and control over information. Computing was intrinsically authoritarian and freedom-threatening (Thompson 1970, Miller 1972, Rule 1974, Rodota 1976, Roszak 1986, Clarke 1988, Clarke 1994b).
From the mid-1960s onwards, electronic communications converged with computing. The initial applications sustained the centralist model, because they were shaped like a star, with a powerful computer at the hub and mere 'dumb terminals' at the extremities.
The progressive miniaturisation of processors. however, combined with mass production efficiencies, resulted in small devices becoming available which had increasingly significant processing capabilities. It is even arguable that the advent of the personal computer (PC) made the end of the Soviet Union inevitable. (In order to continue competing with the West, the Soviets had to harness their people's creativity and effort, which meant that PCs had to proliferate; but PCs, much more so than photocopiers before them, were samizdat presses. The truth would inevitably out, and the lies on which the regime was built would bring it down. Other authoritarian States such as Cuba and Vietnam have not felt the same need to compete, and hence have not succumbed. China has only recently eased its opposition to capital-driven economic development, and is already feeling the pressure).
Through the 1980s, connections were achieved among the proliferating PCs. These linkages were used primarily by technology-enthusiasts and social activists, and depended on clumsy one-to-one connections over voice-grade telephone lines. During the course of a mere decade, the links were upgraded to more sophisticated technologies and topologies. Relatively small number of computers in fairly close proximity to one another were linked using local area networks (LANs). Connections among greater numbers of computers over longer distances were supported by wide-area networks (WANs). Centralisation gave way to dispersion, and hierarchy and authority were challenged. Supplier power migrated from the manufacturers of large computers (in particular, IBM) to the providers of software for small computers (primarily Microsoft).
Means were then established for interconnecting these proliferating networks, giving rise to inter-networking, and hence the Internet. A network comprises nodes (computers) and arcs (connections between them). A network is fragile if individual nodes are dependent on only a very few arcs or on a very few other nodes. The most robust networks involve a large amount of redundancy, that is to say that they comprise many computers performing similar functions, connected by many different paths.
The Internet features multiple connections among many nodes, and is therefore resilient when (not if) individual elements fail. It also scales readily, that is to say that it is capable of expanding rapidly without the serious growing pains that other topologies would suffer. The Internet emerged from research-related activities funded by the U.S. (Defense) Advanced Research Projects Agency - (D)ARPA - during the period c. 1969-1990. During the Cold War era, military strategists were concerned about the devastating impact of neutron bomb explosions on electronic componentry. As a result, robustness and resilience (or, to use terms of that period, 'survivability' and 'fail-soft') were uppermost in the designers' minds. For historical information about the Internet, see the resources at ISOC (1999), notably Zakon (2001), Leiner et al. (2000), and Brand (2001).
The Internet is fundamentally an infrastructure (roughly equivalent to the electricity grid, water reticulation pipework, and the networks of track, macadam and re-fuelling facilities that support rail and road transport). The purpose of the information infrastructure is to carry messages. A simplified explanation of the process whereby messages are transmitted is provided in Clarke (1998a).
Further levels of facilities use those messages in order to deliver services. Some services are by computers for other computers, some are by computers but for people, and some are by people and for people. Key services that are available over the underlying infrastructure include e-mail and the World Wide Web (which together dominate Internet traffic volumes), file transfer and news (also referred to as 'netnews' and 'Usenet news'. There are, however, several score other services, some of which have great significance to particular kinds of users, or as enablers of better-known services.
Until the early 1990s, the 'usage policies' that defined who could be connected to the Internet, and what applications they could use it for, precluded general use of the Internet by the public, or for commercial purposes. Around that time, telecommunications companies took over from the U.S. government the provision of the 'backbone' arcs that carry long-distance traffic, and the usage policies were changed. People perceived new opportunities to communicate with one another, and business enterprises perceived new opportunities for sales and profits. Many more access-points were added, bandwidth was increased, and new services emerged. The explosion is generally attributed to the release in early 1994 of the Mosaic web-browser, the fore-runner of Netscape (Wolfe 1994b).
The explosion has continued to be exponential. That has been a result of a combination of more people joining in, and those who are connected using it more. The use of the Internet, like telephones, fax-machines and mobile phones, is subject to what economists refer to as 'the network effect': as the number of users goes up, the value to each user increases very rapidly because there are more users with whom interactions can be conducted (Shapiro & Varian 1999). Some elements of the growth are starting to flatten out (e.g. more than half of the U.S. households that are likely to ever connect are already connected), and all growth-rates within finite populations have to eventually decline; but new services in such areas as the transmission of sound, image and video are likely to result in the demand for bandwidth continuing to rise for quite some time yet.
The concept of 'architecture' encompasses the elements that make up an infrastructure, the relationships between them, and the manner in which they are created and maintained. From an engineering perspective, the Internet comprises the following:
Descriptions of Internet architecture and of the process by which the Internet is defined and governed are available on the IAB, IETF and ICANN sites, and in Krol & Hoffman (1993) and Clarke, Dempsey et al. (1998a).
Particular aspects of the Internet's architecture have been particularly important in enabling it to deliver value to its users. These include the following:
The Internet, critical though it was, was only one of a number of technological developments during the latter decades of the twentieth century that tended to increase the availability of information. These developments are usefully referred to by the generic term 'the digital revolution', and included the following additional elements (Clarke 1999g):
Underpinning these tools are common standards and protocols, some of which are proprietary and closed, but many of which are published.
The Internet and digital technologies are just infrastructure and tools. In order to understand their impacts and implications, it is necessary to appreciate what people have done with them. The Internet has created new kinds of place or space, within which human actors are disporting themselves.
A variety of metaphors have been used in attempts to explain the Internet. My brief summary of important examples is in Clarke (1994d). See also Stefik (1996). Some of these metaphors focussed on the physical infrastructure; but the more interesting and useful images were concerned with its use, and the state of mind people adopted while they were using it.
One of the first people to document social behaviour in the new contexts was Rheingold (1994). In 'The Virtual Community', he described the patterns that arose in several pre-Internet information infrastructures (bulletin board systems - BBS, The Well and newsgroups), and in Internet Relay Chat (IRC) and Multi-User Dungeons and Dragons gaming (MUDs). Netizens around the turn of the century were more familiar with e-mail, e-lists (sometimes called listservs or listprocs), web- chat and ICQ. See also Valauskas (1996).
What these various experiences of using the Internet have in common is that the participants indulge in a 'shared hallucination' that there is a virtual place or space within which they are interacting. The term most commonly used for this is 'cyberspace'. Its use is testament to the pre-cognition of the artist: William Gibson, the sci-fi author who coined the term in 1983, was not a user of the (then very primitive) Internet, and indeed only during the 1990s did he even start using a PC. Gibson popularised the word in his important 1984 novel 'Neuromancer', and the fictional virtual world that he created has since been depicted in even more compelling form in films such as 'The Matrix'.
The neologism 'cyberspace' denies the concept of a physical 'place', by using the more abstract idea of 'space'. It couples 'space' with the mysterious and threatening prefix 'cyber'. This is also a modern coinage, by Norbert Wiener in 1949, who created it in order to refer to layers of control mechanisms. These were thought to hold the prospect of inventing intelligence from cascades of electronic devices functionally equivalent to the governor in Watts' steam-engine.
Gibson's virtual world was full of foreboding; but despite the dark overtones (or in ignorance of them), people cheerfully play in cyberspace. Its uses put varying emphases on content and connectivity. A general perception has been that content (typified by use of the Web) would overtake connectivity (typified by e-mail); but some feel that a balance between the two will always be evident Odlyzko (2001).
Associated with cyberspace behaviour is an ethos. That evident during the 1990s derived from the values of the pioneers, and it is unclear the extent to which the surge of newcomers will absorb the old ethos or drown it. Nonetheless, there are some expectations that still appear to be commonly held among participants. They are:
In every case, the popular perceptions of cyberspace as being free and open are partly misguided; but they are part of the shared hallucination.
An expectation of greater freedoms has been one of the recurring elements within electronic communities. This was reflected in the term 'electronic frontier', which invoked the image of the 'wild west' of the U.S. in the early-to-mid 19th century, where pioneers were relatively unfettered by law enforcement agencies. The term was used in the title of a significant association formed to defend netizen's rights, called the Electronic Frontier Foundation (EFF) (Kapor & Barlow 1990). It has also been co-opted by other organisations, such as Electronic Frontiers Australia (EFA).
The kinds of freedoms that net-users expect are documented in Clarke (1997e). One aspect of particular significance is the expectation of greatly enhanced freedom of access to information, summed up by the call-to-arms 'information wants to be free' Clarke (1999f). Particularly since 1995, the efforts of millions of people have resulted in an unprecedented volume of information being made available, readily discovered and easily and quickly downloaded to individuals' own machines, for display, analysis, printing, re-publishing and adaptation.
The nature of the liberating influences need to be considered at several levels. At the level of individual behaviour, the following were evident:
At the level of social behaviour, the following were in prospect:
At the level of economic behaviour, the following were evident or in prospect:
At the level of political behaviour, the following were in prospect:
The person who probably encapsulated the promise of the Internet most effectively, and certainly most famously, was John Perry Barlow (1994, 1996a - "We will create a civilization of the Mind in Cyberspace", and 1996b). Politicians who hailed the prospects that the Internet offered included the European Commission (Bangemann 1994), and U.S. Vice-President Al Gore, who made much of the 'information superhighway' metaphor. For an analysis of Gore's actual contributions, see Wiggins (2000). See also Clarke (1994d).
Doubters of course existed (e.g. Lappin 1995, Stoll 1995, Floridi 1996, Greenleaf 1998). But the promises were not mere rhetoric. Although the excited claims required some qualification, considerable progress was evident in every one of the instances identified in this section.
This part of the paper shifts the focus from the hopefulness of the recent past to the far less encouraging patterns of the present. It catalogues the many factors that are at work to prevent the liberating potentials of the Internet bearing fruit.
Even among enthusiasts, misgivings have been apparent about whether the promise of the Internet can be fulfilled. These include questions about the extent to which it is feasible to achieve the articulation of the alternative economic patterns, so as to supplement or even supplant the incumbent conventional capitalist processes (e.g. Stalder 1999). In the aftermath of the collapse of the dot.com bubble around 2000, the debate about whether there are such things as 'new business models' rages on. Further expressions of concern about misfit between social need and technological reality are to be found in Brown & Duguid (2000) and Borgman (2000).
I expressed in Clarke (1994c) concerns about the 'the limited focus of debate'. I drew attention to the way in which discussions about information infrastructure were using a vocabulary that reflected historical relationships between people and social institutions, rather than the relationships that are more appropriate to the present and the future. Key elements of that vocabulary included:
I stressed at the time the vital needs for a participative approach rather than a master-servant framework, and proposed the following principles for the design of information infrastructure:
Seven years later, there is little evidence of these principles being applied, and every sign that corporations and government agencies perceive the Internet as just a broadcast medium with a low-bandwidth back-channel, and themselves as projectors of messages at a largely inert and manipulable public.
A further disappointment has been the volatility of web-site contents and domain-names, and the very patchy extent to which electronic archives have actually arisen. The web-sites of disestablished agencies such as the U.S. Office of Technology Assessment (OTA) tend to simply disappear, with mirroring of the agency's publications performed by anyone who has downloaded them in anticipation of their disappearance (and who is prepared to breach copyright by placing them on a web-site). In Australia, government documents are routinely removed when a change in government occurs, through what appear to be active measures by the incoming government to deny access to historical documents. This creates serious difficulties for policy research.
Another concern has been the so-called 'digital divide', which refers to the dependence of Internet access on local infrastructure, personal capabilities and motivation, and the consequential inequitable scope for people in remote and economically deprived regions to participate. The term relates to the 'north-south' divide between rich and poor nations, although some commentators have co-opted it to refer only to economic and social inequalities within individual countries, primarily the U.S.A. (e.g. Kahin & Keller 1995).
Change of any kind disturbs established patterns, and a fundamental shift like the explosion of the Internet in the mid-to-late 1990s inevitably had substantial impacts that harmed some people's interests, and caused many people concern.
Although some people have taken advantage of the Internet to perform their work in or close to their homes, others miss the social aspects of conventional workplaces. Another concern has been the emergence of sub-contracted tele-working, with corporations taking advantage of telecommunications to reduce not only their infrastructure costs but also their salary-costs, and hence the income-levels of some categories of employees (such as call-centre staff).
Another area of concern for some people has been the undermining of intellectual property. Some goods and services have become easily replicable as a result of digital technologies. As a result, individuals who originate and sell such works might see their income-stream reduced. This applies to artists of various kinds who both originate and sell to the work's ultimate consumer. It also applies to those whose works are processed through intermediaries, although in that case the originator generally gains only a small proportion of the total revenue. There are counter-arguments, however, to the effect that intellectual property is untenable in the digital era, that the long production-lines for publishing are no longer needed, and that new business models will rapidly emerge whereby originators will still be rewarded. This critical issue is further considered in sections 3.4 and 3.6 below.
Predecessors to the Internet such as the Usenet news network had already involved many instances of misbehaviour (e.g. Rosenberg 1993), and emergent applications of the law to human behaviour on the net (e.g. Auburn 1995). As early as April 1995, I compiled a substantial list of what I referred to as 'dysfunctional human behaviour on the Internet' (Clarke 1995a). This included accidental dysfunctionality (information overload, rumour and accidental misinformation, negligent defamation, persistence, minor plagiarism, inadequate care with data, and unauthorised spidering), socially aggressive dysfunctionality (intentional misinformation, flaming, intentional defamation, harassment, mail-bombing, obscenity, incitement, impersonation and surveillance), economically aggressive dysfunctionality (spamming, advertising, promotion and soliciting, secondary use of data, serious plagiarism, abuse of intellectual property rights, breaking into systems, viruses and worms, and security breach) and avoidance dysfunctionality (circumvention, anonymisation and obscuration).
Harassment, for example, extends beyond the conventional problems of aggressive language and persistent unwelcome communications, through electronic stalking, to an account of 'a rape in cyberspace' (Dibbell 1993).
Freedom of speech has a counterpoint in freedom to indulge in salacious gossip about individuals, rumour-mongering, or indeed merely publishing a true statement, all of which can constitute defamation in one jurisdiction or another. An early, contentious example was the book published by Mitterand's doctor very shortly after the sometime French President's death in 1995. More recent examples have been fought out between parties in the commercial realm, in particular Macquarie Bank v. Berg, and Gutnick v. Dow Jones.
An e-mail message broadcast to a long list of addressees is very similar to other forms of publication, because it involves 'pushing' information by one person to one or more other people. The challenge currently before the courts is to construct a sensible application of current laws to the quite different pull-technology of the web. For a court to rule that placement of a document on a web-site constitutes publication in every jurisdiction from which it is subsequently downloaded would subject every web-site owner to the vagaries of in excess of 300 jurisdictions; and if that were the case, then the chilling effect on free speech would be dramatic. In Macquarie Bank v. Berg, the judge refused to grant an interim injunction for that reason (Parry 1999). See also Godwin (1996) and Martin (2000).
There has also been disappointment about people's limited exploitation of the net's capacity for openness and diversity. The consumer mentality is strong, and many people content themselves with visits and re-visits to commercial web-sites such as Disney and sites linked with popular TV programmes. Habit is strong too, and many people appear to limit themselves to specific e-communities rather than sampling the available richness. Commercial offerings are exacerbating this by offering filtering and personalisation features that narrow users' experiences to pre-selected categories. Rather than encouraging expanded worldviews, the Internet has even been accused by some of fostering social division and extremism.
Another downside that emerged early in the life of the Internet was attacks on Internet services. Many of these were and are performed because it demonstrates the attacker's skill and daring; and as a result the term 'exploits' is commonly used to refer to such attacks, and the term 'malware' usefully describes software that performs, or enables individuals to perform, such exploits.
A common form of malware is viruses (faqs.org 2001). A virus is a program that attaches copies of itself to other programs. It may perform no other function than its own replication. It may, however, 'carry a payload', i.e. perform some additional function. This may have nuisance value (e.g. displaying a funny face on the screen of the infected computer), or serious consequences (such as the deletion of the directory that records the location of files stored on the infected machine). In order to avoid early detection, viruses are commonly designed to delay the performance of functions other than replication.
Viruses had long been transmitted via diskette. They had also taken advantage of pre-Internet data communications, such as programs stored on bulletin boards. A virus that propagates via telecommunication means is commonly referred to as a 'worm' (after Brunner 1975). The Internet provided a greatly enhanced capability for worms to infect large numbers of machines in a short period of time. The first celebrated instance of a successful worm was that released by Robert Morris in 1988 (Reynolds 1989). Because of the naiveté of users, inadequate care by some information systems professionals, and the culpably insecure state of software distributed by some vendors, worms continue to flourish, with multiple major security alerts occurring each year.
Beyond viruses and worms are other forms of attack. These include:
Servers have proven to be highly susceptible to even quite simple attacks. This is because a great deal of software is distributed in an intrinsically insecure state, especially those of the supplier dominant in several segments of the market, Microsoft. In general, software is not deemed to be a product for the purposes of product liability law. The result is that actions against suppliers of software products have to be by means of torts such as negligence, which have much higher threshholds of tolerance of supplier and product deficiency than do product liability laws; or through 'deceptive conduct' provisions, which seldom provide aggrieved parties with satisfaction. In short, suppliers are subject to seriously inadequate disincentives against distributing inherently insecure software.
Another concern felt by many people has been the undermining of existing censorship controls. The term 'censorship' is used here in its generic sense, to refer to the prevention of public access to information of any kind, for any reason. Examples of such content that has arguably become more readily available as a result of the Internet include the teaching of bomb-making, and possibly of means of conducting insurrection; the incitement of violence, particularly racially-related violence, including the sale of Nazi memorabilia (see, for example, BBC 2000); and access to pornography that breaches censorship laws within a particular jurisdiction.
Although there is a firm basis for such concerns, discussions are often heated, and judgement impaired. The extent of abuse is often exaggerated, and non-infringing content and actions are often caught up in the process. For example, little evidence appears to have been advanced that the availability of instruction in violence has greatly increased since the advent of the Internet; and a study of recruitment by extremist groups on the Internet found little to suggest that a serious new problem had arisen (Ray & Marsh 2001). On the other hand, restrictions on the availability of sex-related materials to minors, by means of 'behind-the counter' storage and 'adults-only' shops, are not as readily achieved on the Internet.
Moreover, what many people refer to as pornography may infringe their good taste, but is in many jurisdictions not actually illegal. In addition, a great deal of misinformation has been peddled in relation to pornographic materials thrusting themselves in front of children. The 'porn in kiddies' bedrooms' furore arose from a very poorly-conducted, and arguably fraudulent, undergraduate assignment publicised on the cover of Time magazine as thought it were fact (Elmer-DeWitt 1995). For negative reviews of the article, see Hotwired (1995).
The Internet is not an unmitigated 'good thing', and its downsides need to be recognised and addressed. Many of the arguments offered by sceptics have, however, been found to be exaggerated, and some have even been unfounded.
The Internet's incidental social impacts motivated some calls for regulation, and some extensions to law have resulted. On the other hand, vested interests quickly discovered that the changes had negative impacts for them which they regarded as very serious. This section considers effects on governments, and the next those on large corporations.
One concern has been the undermining of the rationale underlying existing laws. The particular case of copyright law is considered in the following section. In the area of on-line gambling, many governments' activities have been decidedly hypocritical. They are subject to the fiscal imperative of sustaining taxation revenues from existing licensed gambling venues, and the need to appease powerful commercial lobby-groups. They have accordingly been forced into the prohibition of Internet gambling, even though some of them had the opportunity to address the social ills by attracting on-line casinos into their jurisdiction while imposing consumer safeguards (Schwartz 1995, Clarke, Dempsey eta al. 1998c).
A further concern is the unenforceability of existing laws. One reason for this is the difficulties confronting investigation of criminal acts, and the gathering of information with evidentiary value (Clarke, Dempsey, et al. 1998b). Examples of activities that have created challenges are the use of various Internet channels to promote fraudulent schemes, and for what amount to unlicensed investment newsletters and stock-price manipulation.
Criminal activities are difficult to pursue when they are extra-jurisdictional (taking place outside the reach of the jurisdiction in question) or trans-jurisdictional (that is to say that parts of a transaction take place in two or more separate jurisdictions). It is especially inconvenient where one of the other jurisdictions has laws that make the acquisition of investigative or evidentiary information difficult. In the case of the Internet, the geographical location of an event may be very difficult to determine, and hence some actions may be effectively supra-jurisdictional such that no court can reasonably claim to be able to consider the case.
One effect of the Internet has been to lower the cost of locating transactions in convenient jurisdictions such as 'tax-havens', and hence of so-called 'regulatory arbitrage'. As a result, they are no longer accessible only by corporations and wealthy individuals. See Froomkin (1997), Kahin & Nesson (1997) and Clarke (1997a).
On the other hand, it seems unlikely that cyberspace will remain a lawless electronic frontier for very long. Lessig (1999) argued that there were two kinds of what he called 'code': 'East Coast Code' or statute law; and 'West Coast Code' or "instructions embedded in the software and hardware that make cyberspace work" (p.54). His argument was seriously deficient, because in defining 'code' as only the software and hardware (p.6), it overlooked many aspects of the architecture of the Internet that were outlined in section 2.3 above. Although Lessig did later use the term 'architecture' (pp. 87, 100-108, 220-221, 236-237), his usage remained too imprecise. What Lessig did achieve, however, was to highlight that the Internet's architecture embodies some capacities for control, and that it can be adapted to embody more. This will be further discussed in a later section.
Another consideration is that communities within cyberspace exhibit a variety of self-regulatory mechanisms, and these also represent a kind of law. The possibility also exists that a new internationalist jurisdiction may emerge, specifically to deal with behaviour in electronic contexts. This would be a serious challenge to governments, not only because it would compromise their sovereignty, but also because of the difficulties of definition of the boundary between geographical and virtual jurisdictions.
Beyond the question of the rule of law, the Internet is perceived by some people as a threat to national sovereignty and cultural integrity. This argument goes along the lines that the Internet is heavily dominated by the U.S.A., variously in terms of the technology, the services and the content; and Internet traffic continues to be heavily dominated by the English language. The Internet therefore imposes foreign values, effecting yet more intrusions into the lingual and cultural integrity of countries and societies whose first language is other than English. It is therefore a weapon of cultural imperialism.
Finally, the freedoms that the Internet has given rise to include some that, at least from the perspective of governments, are of an undesirable nature. Signal among these 'undesirable freedoms' are the following:
Corporations, meanwhile, have perceived a rather different collection of ills arising from the Internet.
One has been challenges to corporate brand-names and images, approximately equivalent to the defamation of corporations. Organisations that have been subjected to close attention by consumer and public interest advocates in a movement usefully referred to as 'corporation-watch' include McDonalds, Nike, Monsanto, Coca-Cola, and Nestlé.
Corporations tend to regard the community aspects of the Internet as a resource to be plundered once it becomes apparent how. One aspect of the e-community ethos concerns them, however, because they perceive it as socialism reinvented in a dangerous form. This is the so-called 'open source' phenomenon. The open source movement argues that software should be licensed without cost, but subject to conditions that ensure that bugs are reported, fixes publicised, and enhancements made available subject to similar conditions (Stallman 1992, Raymond 1998, Moglen 1999, Bezroukov 1999). Open source is a concern for large corporations in two ways:
Whereas the 'cooperative' movement is an object of derision among corporate executives, open source is threatening to them. Despite those concerns, many small companies appear to be operating effectively creating and using open source software, and a few large corporations are investigating it, including IBM in the context of the operating system Linux.
Another important Internet aphorism and battle-cry is 'Information wants to be free' (Clarke (1999f). The open movement has been applied to information as well as source-code, and has thus given rise to arguments for open content, in such areas as technical protocols and standards but also education and the law. See, for example, the Australasian Legal Information Institute (AustLII), which makes freely available the corpus of primary and secondary law of Australia and New Zealand, and whose underlying philosophy and software are being applied in countries as diverse as Ireland and Mongolia.
Another problem for some corporations is the difficulties for the broadcast mode of communication that are presented by the Internet in its current manifestation. Broadcasting comprises one-way dissemination of undifferentiated content, with no or a very limited back-channel to the broadcaster. Radio and television represented great progress respectively about a century and a half-century ago. The potentials of contemporary telecommunications technologies, and the expectations of a now far-better-educated public, go far beyond them. But leaving the broadcast era behind is contrary to the mind-set of the one-at-many direct marketers whose emergence broadcast media stimulated. After less than a decade of the Internet era, it is still perceived by large consumer marketing corporations to be contrary to their interests.
The most nervous reaction among corporations, however, has been that of publishers, who have come to perceive massive threat to the intellectual property, especially copyright, which they have garnered over the years, and which is the basis of many micro-monopolies, and hence super-profits. The impact of the digital era on the income-streams of artists was noted earlier. The publishing of magazines, books, music and films has long been industrialised. The copying and distribution of digital media by parties other than the copyright-owner places under threat the revenue, profits, employment-levels and even survival of corporations in those value-chains.
Disputes of this nature have accompanied a succession of technologies, long before the advent of the Internet. In recent times, for example, the explosion of video-cassette recorders (VCRs) resulted in attempts by copyright-owners to have laws enforced that were clearly no longer workable. Once the smoke had cleared, and the industry's arguments carefully assessed, the practicability and reasonableness of their proposals were found wanting. Instead, copyright laws were amended to actually permit people to lawfully do what they were already doing (recording broadcast copyright works, for the purposes of personal use, within-home entertainment, and 'time-shifting').
Nonetheless, large corporations dependent on copyright have pursued the line that the use of the various capabilities that have become available during the digital era represent theft. Because of the qualities of books, the book-publishing industry has not been significantly affected during the first decade. The shrink-wrapped software industry, dominated by Microsoft and spearheaded by the Business Software Alliance (BSA), has long regarded itself as being threatened by the digital era. The film industry has also been very active, particularly in attacking people and companies that have cracked the codes designed to protect digital video/versatile discs (DVDs) from being copied.
A further development has been the emergence of so-called 'peer-to-peer' (P2P) file-sharing tools Clarke (2000d). Most of the attention to date has been attracted by Napster (e.g. Mann 2000). This was a centralised catalogue. The files that were the subject of the catalogue were not, however, stored centrally, but rather on very large numbers of servers throughout the world. They were primarily music in the MP3 format, and many of the files allegedly involved breach of copyright. At its peak during the second half of 2000, the volume of activity on Napster showed arguably the fastest growth of any metric on the Internet up to that time.
Unsurprisingly, the music-recording industry, which is dominated by a few very large corporations and represented in particular by the Recording Industry Association of America (RIAA), perceived its interests to be seriously threatened by Napster. Because there was a central catalogue, a 'choke-point' existed, and action by RIAA between 1999 and 2001 to gain an injunction against the operator of the catalogue could, and eventually did, result in the collapse of the unregulated, copyright-breaching service (Clarke 2000d).
Such a strategy is unlikely to work against a P2P scheme that features a distributed catalogue. By the time of Napster's demise, there were already more than a dozen contenders, the best-known of which was Gnutella (so-called because it spreads easily ...). In early 2001, despite the much greater difficulties involved, RIAA had already commenced its pursuit of these services as well, in the hope of somehow sustaining its control over the market for copyrighted music. The second prong of its attack, coded the Secure Digital Music Initiative (SDMI), is a desperate search for some form of cryptographic or stenographic mechanism that could prevent unauthorised use and copying of files.
The significance of P2P extends far beyond music. Every category of object that can be expressed in digital form is capable of being reticulated and mirrored using a combination of distributed database and distributed directory approaches. Revenue-generating images and video are forthcoming battlefields. From the social and political perspectives, however, the most critical aspects are not entertainment, but information; and high-volume, time-critical delivery such as films are less relevant than simple text formats.
The Internet was only one of a number of relevant technological developments during the latter part of the twentieth century. A considerable collection of technologies has emerged whose purpose is to monitor individuals and populations in a cost-effective manner. 'Dataveillance', or the surveillance of people through data trails that they leave behind them, was examined in Clarke (1988).
The underlying requirement is individual data trails arising from particular kinds of transactions, which can be consolidated and subjected to analysis. Examples of data trails include ATM withdrawals, credit-card transactions, and records generated by telephone calls, building access and the use of toll roads (Clarke 1996a).
Further technologies that have emerged during the closing decades of the century include the following:
The surveillance society has arrived, without people really noticing (Clarke 2001b).
Suppliers of goods and services have concocted imperatives that demand the development and application of these invasive technologies. In addition to technological determinism ('I can therefore I must'), drivers for these privacy-hostile and freedom-hostile applications have also included marketing determinism ('I can imagine they need it, so I must make them need it'), fiscal determinism ('everything must cost less tomorrow than it did today'), and what might be termed 'original sin' determinism ('people can't be trusted', or, as law enforcement agencies are reputed to express it, '10% of the population is inveterately honest, 10% is inveterately dishonest, and with the other 80% it depends').
During the second half of the twentieth century, the public sector has been both monolithic and multi-partite: individual agencies have exercised independence from others when it suits their ends, but clubbed together in other circumstances. The private sector has been similar, with competition complemented by collaboration within conglomerates, joint ventures, strategic partnerships, and industry associations. The public sector has, among its other roles, been expected to regulate the behaviour of corporations; but has also, of course, used it as a supplier of goods and services.
The power of the organisations that are able to deploy surveillance technologies has been enhanced by the recent tendencies towards information-sharing among organisations across both the public and private sector, and towards outsourcing of 'non-core functions' in order to produce a matrix that has blurred the once-distinct boundaries between the public and private sectors.
The power-sharing model for the twenty-first century appears to be being based on three models. One is the U.S. aero-space-defense complex of the latter part of the twentieth century, with its close linkages between companies and public sector agencies. A second is the Japanese keiretsu, the horizontally and vertically linked industrial structure of post-war Japan; and the third is the Korean chaebol - conglomerates characterised by close control, authoritarian management, and centralised decision making. In the emergent scheme, large corporations and government agencies get to share power; but citizens and consumers do not.
Governments, both in relatively free and relatively un-free countries, together with major corporations whose profits were dependent on copyright, have all perceived the need to take action against the excess of freedoms wrought by the explosion of the Internet. The fightback has been sufficiently vigorous to be worth referring to as a counter-reformation. This section considers measures undertaken firstly by governments and then by corporations.
During the mid-1990s, a series of moderately hysterical over-reactions occurred, with law enforcement agencies exceeding their powers or applying their powers in ill-judged ways, and Internet service providers misunderstanding the law's requirements of them. An early example was the Bavarian police intervention with Compuserve (Kunze 1996, Lewis 1996). There is little doubt that adaptations of the law are necessary and appropriate; and that collaboration among the law enforcement agencies of multiple countries is essential. The question is the extent to which freedoms of the law-abiding majority are permitted to be trampled on in the attempt to rein in those activities of a small minority that are actually criminal.
A recent study of control by authoritarian regimes over Internet connectivity and usage concluded that there was already a range of ways in which the liberating potentials of the current Internet could be controlled by a determined government (Kalathil & Boas 2001).
Governments of relatively free countries are subject to constitutional and parliamentary constraints. To ovecome the hurdles, they use law and order issues to generate public support for authoritarian measures. The opportunities range from the much-used terrorist attack threat, through the risk of theft of fissionable materials, and the increased incidence of burglaries by drug-addicts, to the theft of credit-card details on the Internet. (The epithet that sums this up is that 'all that is necessary to convert a liberal to a conservative is the theft of their child's bicycle').
National security and law enforcement agencies have furthered their aims by utilising each new wave of virus transmission over the Internet, of web-site 'hacking', and of distributed denial of service attacks. Particularly in view of the convenient timing of many of the events, it has even been suggested that the sources of some of the attacks may be people at least tolerated by, and perhaps even directed and funded by, national security and law enforcement agencies, especially those of the United States (e.g. Madsen 2001).
One approach to tightening controls is to impose adaptations to Internet infrastructure. A key example has been proxy-servers for the purpose of filtering prohibited materials such as political speech treated by the regime as seditious (e.g. in Singapore and China) and illegal pornography (e.g. in the U.S.A. and Australia). These impositions are highly unpopular with many users and service providers, not only because they deny freedom of access and choice, but also because they impose overheads, they are only partially effective, and they involve considerable collateral damage (such as the exclusion of breast cancer information in the process of blocking sources of pictures of naked women intended to provide sexual excitement).
The creation of 'computer crimes' pre-dates the explosion of the Internet. The pursuit of hackers has been conducted with energy, if not always with precision and commensurate force (e.g. Sterling 1992).
The increasing Internet-dependence of the economy, businesses, utilities, government, law enforcement and national security has combined with poor-quality software to result in concerns extending beyond mere susceptibility to vandalism to the robustness of the (national) information infrastructure. See, for example, Schwartau (1996) and Clinton Administration (1997). Security threats are now being routinely used by national security and law enforcement agencies as justification for increased surveillance capabilities over Internet traffic and content. Although spear-headed by the United States, this movement extends to many other governments by means of bilateral relationships and multilateral clubs of such agencies.
The fightback has seen intemperate expansions of the powers of national security and law enforcement agencies. These statutes have generally extended the criminal law to encompass particular kinds of actions in relation to computers and networks. In addition to providing reasonable clarifications and extensions, they have included seriously privacy-invasive and freedom-threatening measures. These have included the criminalisation of activities that are mainstream behaviour, in some cases with compromise to the need that the prosecution prove criminal intent; and removal of constraints on agencies in a manner that invites abuse. Examples include the U.S. FBI initiative code-named Carnivore (Blaze & Bellovin 2000), the U.K. Regulation of Investigatory Powers Act 2000 (popularly referred to as the RIP Act), and the Australian Cybercrime Bill 2001. The measures have been passed through multi-governmental bodies (such as the Council of Europe Cybercrime Convention), in order to coordinate the provision of national laws, and acquire the gloss of international imprimatur.
Beyond changes to the law, opportunities for control arise because various aspects of the Internet are not quite as distributed as is often assumed. A salutary lesson was provided by Kashpureff's demonstration of the fragility of the domain name system or DNS (Diamond 1998). Authorities in some countries have become adept at the exploitation of 'choke-points' in order to strangle the net's liberating influence (Mann 2001). The Singapore Broadcasting Authority, as the relevant agency within a small island nation with high levels of control over all aspects of the economy and society, has been readily able to force Internet traffic through proxy-servers. To date, China has also sustained tight control. Its government's power is in one sense less than Singapore's because of the country's vastly greater scale. On the other hand, China's technological infrastructure is far less sophisticated, and its traditions are even less favourable to democracy than is the case with Singapore.
Another way in which the net's freedom can be attacked is through increasing governmental involvement in Internet governance, and a concomitant drift away from the original pattern of voluntary collaboration among individuals. In such countries as the U.S.A. and Australia, new governing bodies are being constituted as non-profit organisations, with government exercising a great deal of influence, but unable to exert complete control. It is unlikely that citizens in all countries will be so fortunate. In the case of the key organisation ICANN, the negotiation of constitution, constituencies, representational arrangements, structure, process and policies have proven to be very difficult and protracted (Bayers 2000).
The use of existing choke-points is likely to be supplemented by attempts to create new ones, and the hierarchisation of the hitherto relatively open and distributed net. A recent example of such a measure was pressure on the Internet Engineering task Force (IETF) to adapt the Internet's architecture to facilitate traffic-monitoring and content-monitoring. To date, the IETF has been resistant to the proposition, but this may well have been more for engineering reasons than because of public policy considerations.
In the private sector, one all-too-apparent strand of the counter-reformation has been activities designed to advantage copyright-owning corporations. These have included:
The implications of such manoeuvres were examined in Clarke (1999g) and in Stalder (2001), and were argued to threaten freedom of information flows, and create the risk of a new 'dark ages'.
Meanwhile, information technology suppliers have grasped opportunities to further the interests of themselves and their corporate clients. One example is the distribution by software vendors (primarily Microsoft) of versions of software whose features include auto-reporting of unregistered Microsoft software. Even greater control over user patterns is being sought as part of Microsoft's .Net initiative, by storing software centrally, rather than on customers' own machines.
An especially insidious manoeuvre has been the adaptation of Internet protocols to incorporate identifiers of various kinds. Some of these have been unique device-identifiers, which, for example, enable an organisation to check which workstation or hand-held digital assistant is being used. Some kinds of devices (e.g. Ethernet network interface cards, and Sun workstations) have always carried an identifier. A much more general-purpose id was recently proposed by Intel, in the form of a Processor Serial Number. This was dubbed Big Brother Inside by its opponents, and it appears that it is not currently documented on the company's web-site.
Another approach has been to use surreptitious techniques to force the device or the client-software to disclose identifying information. Two common means whereby users' trust is abused are cookies and web-bugs.
The most freedom-threatening initiatives of all have involved measures to produce and profit from the surveillance nirvana of a unique personal identifier. Techniques that have been attempted to date include:
There is also the probability that market-determined directions that the Internet takes will work against its hitherto liberating influences, Concerns include:
There is no guarantee that the underlying protocols (especially TCP, IP and DNS), and the processes whereby they are maintained, will survive in their current form. A revised version of the IP protocol, IPv6, is now operational in what is usually referred to as Internet 2 (Montfort 1999), but whether this will be retro-fitted to the open, public Internet is not yet certain. Moreover, its impacts if it is widely implemented are far from clear.
It would be entirely feasible, for example, to adapt Internet architecture to support broadcast. The experimental MBone protocol did just this for radio transmissions. The risk is that powerful media organisations, supported by advertisers trying to sustain the old-fashioned direct marketing way of life that broadcast media created, may force change in Internet architecture that undermines interactivity in order to enable broadcast-mode transmissions.
Finally, if the net continues to avoid attempts to control it, governments and corporations may, in collaboration, invent a new set of protocols. These might severely restrict the freedoms that threaten the powerful institutions, and force traffic onto new networks that implement the prospective, new, power-friendly protocols, resulting in the collapse of the Internet as it has been known since the early 1990s.
There has been speculation that Microsoft's latest attempt to take advantage of its market-dominance, in the form of Windows XP and related products such as Passport and Hailstorm, may signal a move to adapt the Internet Protocol (IP) layer to suit its own ends and those of its business partners, such as the U.S. and U.K. governments. See Procomp(2001), EPIC (2001b), and Cringely (2001).
Like the library in Eco's 'The Name of the Rose', the future information infrastructure may be devised to deny access to information rather than to enable it.
Will electronic technologies revert to a virtual form of the centralist notion, and thereby hand victory to the authoritarianism of the powerful? The tension was summed up at the very beginning of the open, public Internet era by the caption "It's the FBIs, NSAs, and Equifaxes of the world versus a swelling movement of Cypherpunks , civil libertarians, and millionaire hackers. At stake: Whether privacy will exist in the 21st century" (Levy 1993).
One approach is for the public to use the freedoms that are available, before it's too late. This means activism, and organised movements to discredit, undermine and defeat manoeuvres of an authoritarian nature. Advice on the techniques and tools of virtual activism is provided by sites such as Net Action.
These need to focus on key elements of the new economy and society, such as open source, open content, freedom of access to cryptography, and P2P technologies. A specific movement is The Public Library of Science, which is seeking to recapture scientific publications from the grasp of publishing companies. See also Harnad (2001).
This is in part a question of political economy; but technology may play a hand. There is already a category of tools commonly referred to as privacy-enhancing technologies (PETs). One fundamental example is the use of cryptography to protect the content of messages while they are in transit, and the content of computer-based files.
A much more vital category of PET comprises tools that enable anonymity, taking advantage of features and potentials within existing infrastructure. They were anticipated in literature (especially Brunner 1975), and occupy the spare time of many fringe-dwellers on the net; but some tools are being developed by large, respectable corporations. See IPCR (1995), Clarke (1999d), Kling et al. (1999) and EPIC (2001a). These tools appear to have caused the U.S. Government sufficient concern that it has gained a patent for a key technique whereby the identities of message-senders and receivers can be protected (US Patent 6,266,704, Onion Routing, of 24 July 2001). It is to be expected that this will be utilised in order to deny corporations the right to implement the technique.
There is a need for a concept broader than PETs, such as freedom-enhancing technologies (FrETs?). Examples that already exist are Freenet, and the other 'peer-to-peer' (P2P) arrangements, which subvert the intended central control of digital resources and enable them to be shared around the community. See Clarke (2000d) and Wired (2001)', but also Clarke (2001a).
Although large corporations have generally been slow to perceive business opportunities in privacy-enhancing and freedom-enhancing technologies, many small, motivated, risk-taking companies have been very active, combining religious zeal for liberty with the desire to apply venture capitalists' money to socially worthwhile undertakings.
The business sector is likely to be an ally, at least for short periods of time, for another reason as well. The measures being passed into law entrench the power of existing large corporations. In doing so, they stifle not only 'theft' and 'the enablement of theft', but also 'innovation'. This anti-competitive dimension will attract the opprobrium of innovative corporations whose own activities are challenged by the restrictive laws. Gradually the dynamic growth companies are likely to look more attractive to politicians than the dinosaur publishing houses; and the freedom-constraining laws will at first be less enthusiastically applied, then ignored, and finally washed out of the statute-books by next-generation laws.
A further possibility is maverick States (which in the near future might be as well defined as virtual spaces as geographic places). There are two reasons for the survival of maverick States (as presaged, once again, by Brunner). One is that some people manage to find cracks in any authoritarian edifice, and the powerful are too busy to commit resources to addressing the flea-bites, or choose not to do so (in particular, because members of the elite use the same cracks). The other is that one element of the calculus of authoritarianism is the perception of an enemy, and maverick nations fulfil a role as that which needs to be hated.
There remains another alternative, which might be dubbed 'the American way'. In The New York Times of Sunday December 8, 1996, Thomas Friedman coined the epithet that 'no two countries that both have a McDonald's have ever fought a war against each other'. This is a much-travelled and not altogether supportable hypothesis (and since the NATO bombing of Yugoslavia in 1999, Friedman's attention has transferred to Starbucks). Nonetheless, there is a real chance that increasing prosperity and economic interdependence may make both armed conflict and authoritarianism less common. Applied to the Internet, the proposition is that "by building a state-of-the-art Internet, Beijing may have set an irreversible course", away from authoritarianism and towards some form of democracy, and presumably of capitalism as well (Sheff 2001).
Europeans are likely to baulk at the American way's dependence on profit as the sole arbiter of good judgement. A gentler argument might be based less on positivist economics and more on political economics and even social ethics. For example, as was the case with the copying of films using VCRs, the present 'copyright owner-supremacist' positions being afforded to publishers might very rapidly come to be seen as dysfunctional, because they place serious constraints on innovation. If so, each new set of anti-authoritarian measures might need only to gain enough momentum to become credible, in order that the tide might be turned, and authoritarian measures rescinded.
This author's misgivings about whether anti-authoritarian measures will be adequate are not shared by John Perry Barlow. He reflected the ebullience of American libertarianism when he confidently declared not only that P2P could not be defeated by the RIAA and its friends in the U.S. government, but also that "We've won the revolution. It's all over but the litigation. While that drags on, it's time to start building the new economic models that will replace what came before" (Barlow 2000).
This underlines a further weakness in the analyses of Barlow and his fellow EFF Directors, and of Lessig (1999). Their US-centrism and inadequate appreciation of international differences leads them to assume that the dynamic balance that exists in the U.S.A. will be reflected in other countries. But the U.S. Constitution includes a Bill of Rights, whereas few other countries have such a substantial countervailing power against the inevitable drift towards authoritarianism. Whether or not they will work in the U.S.A., the solutions that Barlow and Lessig champion simply will not work for the perhaps 50% of Internet activity, and 95% of the world's population, that live elsewhere.
Idealistically, one could call for a wider appreciation of the need for balance between the interests of law and order, on the one hand, and freedoms on the other; and for non-deployment of excessively threatening technologies. Unfortunately, the power lies substantially in the hands of the law-and-order community, and balance is a forlorn hope, unless very substantial countervailing power is somehow brought to bear.
Another means of achieving balance would be to invest significant resources into the development of tools for pseudonymity. Such technology would lie between anonymity (and its scope for accountability to be undermined by the absence of any means of applying retribution to guilty parties), and ubiquitous identification (which renders everyone's behaviour subject to transparency, and their locations subject to real-time discovery, resulting in the chilling of non-conformist behaviour).
Far from the halcyon days that John Perry Barlow foresaw, there exists a real prospect of a new Dark Ages, arising from a successful counter-reformation driven by partnerships of governments and corporations, spear-headed by the self-appointed policeman of the free world.
This first decade of the new century will see critical battles fought between the old guard and the new. Networks are only one of the battlegrounds. Technologies of repression are rampant, including the embedment of person location and tracking in consumer-carried devices, the imposition of general-purpose identification schemes, and the uncontrolled application of biometrics. Globalisation is seeing the wane of the power of nation-states, and increasing dominance of the polity by corporations.
Will the forces of authority, sponsored by corporations, win these battles? If so, the future has already been largely foretold by the anti-utopian novelists (in particular, Gibson 1984), and their accounts merely need to be updated.
Will consumers and citizens create countervailing power against the authority of the government-corporation complex? If so, they'd better hurry.
One hope for freedom may be the conflicts of interest within and between governments, within and between corporations, and between governments and corporations. People may need to encourage the ongoing divisions among the powerful players, in order to provide sufficient scope for freedoms to survive.
A key theatre will be the information infrastructure. If the architecture is adapted to support surveillance, then authoritarianism has largely won the war. Resistance is being led by people with technical capabilities (often referred to, disparagingly, as 'nerds'); but the strong likelihood is that the ravages of the authorities will stimulate more effective coalitions between politically-minded and technically-oriented groups. Our desire to live in interesting times seems very likely to be fulfilled.
I have benefited for over six years from interactions within the Internet policy-watchers' community in Australia (the link list). While developing the arguments in this paper, I greatly appreciated the encouragement and constructive criticism of the Editor of this Special Issue, Mark Pegrum, and of my colleague, Graham Greenleaf.
For papers whose first-named author is Roger Clarke, see the separate list below.
Hotlinks to definitions of technical terms are to FOLDOC (2001) 'Free On-Line Dictionary of Computing', at http://foldoc.doc.ic.ac.uk/
Andresen T. (1999) 'Consumer Power via the Internet' First Monday 4, 1 (January 1999), at http://www.firstmonday.dk/issues/issue4_1/andresen/index.html
Auburn F. (1995) 'Usenet News And The Law' 1 Web JCLI (1995), at http://webjcli.ncl.ac.uk/articles1/auburn1.html
Bangemann (1994) 'Europe and the Global Information Society: Recommendations to the European Council' ('the Bangemann report'), Brussels: European Council, 1994
Barme G.R. & Sang Y. (1997) 'The Great Firewall of China' Wired 5.06 (June 1997), at http://www.wired.com/wired/archive/5.06/china_pr.html
Barlow J.P. (1994) 'The Economy of Ideas: A framework for patents and copyrights in the Digital Age' Wired 2.03 (March 1994), at http://www.wired.com/wired/archive/2.03/economy.ideas_pr.html
Barlow J.P. (1996a) 'A Declaration of the Independence of Cyberspace' Hotwired, 8 February 1996, at /http://hotwired.lycos.com/wired_online/4.06/declaration/
Barlow J.P. (1996b) 'Declaring Independence' Wired 4.06 (June 1996), at http://www.wired.com/wired/archive/4.06/independence_pr.html
Barlow J.P. (2000) 'The Next Economy Of Ideas: Will copyright survive the Napster bomb? Nope, but creativity will' Wired 8.10 (October 2000), at http://www.wired.com/wired/archive/8.10/download_pr.html
Bayers C. (2000) 'Mission Impossible' Wired 8.12 (December 2000), at http://www.wired.com/wired/archive/8.12/dyson_pr.html
BBC (2000) 'Yahoo hits back at Nazi ruling', BBC World News: Europe, 21 November, 2000, at http://news.bbc.co.uk/hi/english/world/europe/newsid_1032000/1032605.stm
Bennahum D.S. (1997) 'The Internet Revolution' Wired 5.04 (April 1997), at http://www.wired.com/wired/archive/5.04/ff_belgrad_pr.html
Bezroukov N. (1999) 'Open Source Software Development as a Special Type of Academic Research (Critique of Vulgar Raymondism)' First Monday 4, 10 (October 1999), at http://www.firstmonday.dk/issues/issue4_10/bezroukov/index.html
Blaze M. & Bellovin S.M. (2000) 'Tapping, Tapping On My Network Door' Inside Risks 124, Commun. ACM 43, 10 (October 2000), at http://www.crypto.com/papers/carnivore-risks.html
Borgman C.L. (2000) 'From Gutenberg to the Global Information Infrastructure: Access to Information on the Networked World' MIT Press, 2000, excerpt at http://www.firstmonday.dk/issues/issue5_8/borgman/index.html
Brand S. (2001) 'Founding Father' Wired 9.03 (March 2001), at http://www.wired.com/wired/archive/9.03/baran_pr.html
Brown J.S. & Duguid P. (2000) 'The Social Life of Information' Boston: Harvard Business School Press, 2000, excerpts at http://www.firstmonday.dk/issues/issue5_4/brown_contents.html
Brunner J. (1975) 'The Shockwave Rider' Methuen, London, 1975, 1988
Clinton Administration (1997) President's Commission on Critical Infrastructure Protection: Executive Order 13010, July 10, 1997
Corn D. (2000) 'Filegate.gov: The biggest Congressional scandal of the digital age: Politicians aren't putting public docs on the Net, and no one seems to care' Wired 8.11 (November 2000), at http://www.wired.com/wired/archive/8.11/govdocs_pr.html
Cringely R.X. (2001) 'The Death of TCP/IP: Why the Age of Internet Innocence is Over', at http://www.pbs.org/cringely/pulpit/pulpit20010802.html
Diamond D. (1998) 'Whose Internet Is It, Anyway?' Wired 6.04 (April 1998), at http://www.wired.com/wired/archive/6.04/kashpureff_pr.html
Dibbell J. (1993) 'A Rape in Cyberspace: How an Evil Clown, a Haitian Trickster Spirit, Two Wizards, and a Cast of Dozens Turned a Database Into a Society' The Village Voice, December 23, 1993, at http://www.levity.com/julian/bungle_vv.html
Dixon T. (1995) 'Invisible Eyes: Report on Video Surveillance in the Workplace', Privacy Committee of N.S.W., Report No.67, August 1995, at http://www.austlii.edu.au/au/other/privacy/video/index.html
Elmer-DeWitt P. (1995) 'On a Screen Near You: Cyberporn' Time Magazine, 3 July 1995, Cover Story, apparently no longer available on the Web
EPIC (2001a) 'EPIC Online Guide to Practical Privacy Tools', March 2001, at http://www.epic.org/privacy/tools.html
EPIC (2001b) 'Complaint to the FCC regarding the privacy implications of thge Microsoft XP operating system', 26 July 2001, at http://www.epic.org/privacy/consumer/MS_complaint.pdf
Evans F. (2000) 'Cyberspace and the Concept of Democracy' First Monday 5, 10 (October 2000), at http://www.firstmonday.dk/issues/issue5_10/evans/index.html
Faltstrom P. (2000) 'E.164 number and DNS' RFC 2916, Information Engineering Task Force, September 2000, at http://www.ietf.org/rfc/rfc2916.txt
faqs.org (2001) 'Computer Virus FAQ for New Users', at http://www.faqs.org/faqs/computer-virus/new-users/
Floridi L. (1996) 'Internet: Which future for organized knowledge, Frankenstein or Pygmalion?' Information Society 12, 1 (March 1996) 5-16, Abstract at http://www.slis.indiana.edu/TIS/abstracts/ab12-1/floridi.html
Froomkin M. (1997) 'The Internet as a Source of Regulatory Arbitrage' in Kahin B. & Nesson C. (1997) pp. 129-163, at http://www.law.miami.edu/~froomkin/articles/arbitr.htm
Ghosh R.A. (1998) 'Cooking pot markets: an economic model for the trade in free goods and services on the Internet' First Monday 3, 3 (March 1998), at http://www.firstmonday.dk/issues/issue3_3/ghosh/index.html
Gibson W. (1985) 'Neuromancer' Grafton, London, 1985
Gilmore J. (2001) 'What's Wrong With Copy Protection?' at http://www.toad.com/gnu/whatswrong.html
Godwin M. (1996) 'Libel Law: Let It Die' Wired 4.03 (March 1996), at http://www.wired.com/wired/archive/4.03/letitdie_pr.html
Goldhaber M.H. (1997) 'What's the Right Economics for Cyberspace? First Monday 2, 7 (July 1997), at http://www.firstmonday.dk/issues/issue2_7/goldhaber/index.html
Greenleaf G.W. (1998) 'An Endnote on Regulating Cyberspace: Architecture vs Law?' UN.S.W. L. J. 21, 2 (November 1998), at http://www.austlii.edu.au/au/other/unswlj/thematic/1998/vol21no2/greenleaf.html
Greenleaf G.W. (1999) '"IP, phone home" - ECMS, ©-tech, and protecting privacy against surveillance by digital works' Proc. 21st Int'l Conf. Privacy and Personal Date Protection, 13-15 September 1999, Hong Kong SAR, China. at http://www2.austlii.edu.au/~graham/publications/ip_privacy/
Greenleaf G.W. & Clarke R. (1997) 'Privacy Implications of Digital Signatures' Proc. IBC Conf. on Digital Signatures, Sydney, 12 March 1997, at http://www.rogerclarke.com/DV/DigSig.html
Hagel J. & Rayport J.F. (1996) 'The Coming Battle for Customer Information' Harvard Business Review, 1996
Hagel J. & Armstrong A.G. (1997) 'Net Gain : Expanding Markets Through Virtual Communities', Harvard Business School, March 1997
Hagel J. & Singer M. (1999) 'Net Worth : Shaping Markets When Customers Make the Rules', Harvard Business School, January 1999
Harnad S. (2001) 'For Whom the Gate Tolls? How and Why to Free the Refereed Research Literature Online Through Author/Institution Self-Archiving, Now', at http://www.cogsci.soton.ac.uk/~harnad/
Hibbitts B. (1997) 'E-Journals, Archives and Knowledge Networks: A Commentary on Archie Zariski's Defense of Electronic Law Journals' First Monday 2, 7 (July 1997), at http://www.firstmonday.dk/issues/issue2_7/hibbitts/index.html
Hotwired (1995) 'TechnoPorn: Dissection of the Time Scandal' Hotwired Resource-Page, to 30 October 1995, at http://hotwired.lycos.com/special/pornscare/
IPCR (1995) 'Privacy-Enhancing Technologies: The Path to Anonymity' Information and Privacy Commissioner (Ontario, Canada) and Registratiekamer (The Netherlands), 2 vols., August 1995, at http://www.ipc.on.ca/web%5Fsite.eng/matters/sum%5Fpap/papers/anon%2De.htm
ISOC (1999) 'History of the Internet', at http://www.isoc.org/internet-history/
Kahin B. & Keller J. (eds.) (1995) 'Public Access to the Internet' Cambridge, Mass.: MIT Press, 1995
Kahin B. & Nesson C. (eds.) (1997) 'Borders in Cyberspace' Cambridge, Mass.: MIT Press, 1997
Kalathil S. & Boas T.C. (2001) 'The Internet and State Control in Authoritarian Regimes: China, Cuba, and the Counterrevolution' First Monday 6, 8 (August 2001), at http://www.firstmonday.dk/issues/issue6_8/kalathil/index.html
Kapor M. & Barlow J.P. (1990) 'Across the Electronic Frontier', Electronic Frontier Foundation, 10 July 1990, at http://www.eff.org/pub/Publications/John_Perry_Barlow/electronic_frontier.eff
Kelly K. (1997) 'New Rules for the New Economy' Wired 5.09 (September 1997), at http://www.wired.com/wired/archive/5.09/newrules_pr.html
Kling R., Lee Y.-C., Teich A. & Frankel M.S. (1998) 'Assessing Anonymous Communication on the Internet: Policy Deliberations' The Information Society 15, 2 (June 1999), Abstract at http://www.slis.indiana.edu/TIS/abstracts/ab15-2/kling.html
Krebs V. (2001) 'The Impact of the Internet on Myanmar' First Monday 6, 5 (May 2001), at http://www.firstmonday.dk/issues/issue6_5/krebs/index.html
Krol E. & Hoffman E. (1993) 'What is the Internet?', RFC1462, Internet Engineering Task Force, at ftp://ftp.isi.edu/in-notes/rfc1462.txt
Kunze M. (1996) 'The Compuserve Switch-Off of USENET NewsGroups' Posting to Newsgroups--alt.censorship, at http://www.rogerclarke.com/II/Compuserve.html
Lappin T. (1995) 'Déjà Vu All Over Again' Wired 3.05 (May 1995), at http://www.wired.com/wired/archive/3.05/dejavu_pr.html
Leiner B.M. et al. (2000) 'A Brief History of the Internet' Internet Society, version 3.31, August 2000, at http://www.isoc.org/internet-history/brief.html
Lessig L. (1999) 'Code and Other Laws of Cyberspace' Basic Books, 1999
Levy S. (1993) 'Crypto Rebels', Wired 1.02 (May/Jun 1993) at http://www.wired.com/wired/archive/1.02/crypto.rebels_pr.html
Levy S. (1994) 'E-Money (That's What I Want)' Wired 2.12 (December 1994), at http://www.wired.com/wired/archive/2.12/emoney_pr.html
Lewis P.H. (1996) 'An On-Line Service Halts Restriction on Sex Material Control to Subscribers: Compuserve to Offer Blocking Software Championed by Censorship Opponents' The New York Times, February 14, 1996, pp. A1, D2, at http://www.rogerclarke.com/II/Compuserve2.html
Madsen W. (2001) 'Why the "Code Red" worm is a red herring', Declan McCullagh's politechbot.com e-list archives, at http://www.politechbot.com/p-02337.html
Mann C. (2000) 'The Heavenly Jukebox' Atlantic Monthly (September 2000), at http://www.theatlantic.com/cgi-bin/o/issues/2000/09/mann.htm
Mann C. (2001) 'Taming the Web' Technology Review (September 2001), at http://www.technologyreview.com/magazine/sep01/print_version/mann.html
Martin B. (2000) 'Defamation Havens' First Monday 5, 3 (March 2000), at http://www.firstmonday.dk/issues/issue5_3/martin/index.html
Miller A.R. (1972) The Assault on Privacy' Mentor, 1972
Moglen E. (1999) 'Anarchism Triumphant: Free Software and the Death of Copyright' First Monday 4, 8 (August 1999), at http://www.firstmonday.dk/issues/issue4_8/moglen/index.html
Montfort N. (1999) 'Breaking Protocol: Forget Y2K. IPv6 is here - the Net's first major upgrade ever' Wired 7.12 (December 1999), at http://www.wired.com/wired/archive/7.12/ipv6_pr.html
Morrisett L. (1996) 'Habits of Mind and A New Technology of Freedom' First Monday 1, 3 (September 1996), at http://www.firstmonday.dk/issues/issue3/morrisett/index.html
Negroponte N. (1995) 'Being Digital' Hodder & Stoughton, 1995
Odlyzko A. (1999) 'The Visible Problems of the Invisible Computer: A Skeptical Look at Information Appliances' First Monday 4, 9 (September 1999), at http://www.firstmonday.dk/issues/issue4_9/odlyzko/index.html
Odlyzko A. (2001) 'Content is Not King' First Monday 6, 2 (February 2001), at http://www.firstmonday.dk/issues/issue6_2/odlyzko/index.html
Pantic D. (1997) 'Internet in Serbia: From Dark Side of the Moon to the Internet Revolution' First Monday 2, 4 (April 1997), at http://www.firstmonday.dk/issues/issue2_4/pantic/index.html
Parry Z. (1999) 'Macquarie Bank Ltd v Chalres Joseph Berg (Unreported, NSW Sup Ct, Simpson J, 2 June 1999)' Privacy Law & Policy Reporter 6, 2 (July/August 1999) 21, at http://www.austlii.edu.au/au/journals/PLPR/1999/39.html
Perrone C., Repenning, A. & Clark D. (1996) 'WebQuest: Using the World Wide Web & Interactive Simulation Games in the Classroom' First Monday 1, 5 (November 1996), at http://www.firstmonday.dk/issues/issue5/perrone/index.html
PI (1999) 'Video Surveillance', Privacy International, at http://www.privacy.org/pi/issues/cctv/
Procomp (2001) 'White Paper: Passport to Monopoly: Windows XP, Passport, and the Emerging World of Distributed Applications' The Project to Promote Competition and Innovation in the Digital Age, 21 June 2001, at http://www.procompetition.org/headlines/WhitePaper6_21.pdf
Ray B. & Marsh G.E. (2001) 'Recruitment by Extremist Groups on the Internet' First Monday 6, 2 (February 2001), at http://www.firstmonday.dk/issues/issue6_2/ray/index.html
Raymond E.S. (1998) 'The Cathedral and the Bazaar' First Monday 3, 3 (March 1998), at http://www.firstmonday.dk/issues/issue3_3/raymond/index.html
Reynolds J. (1989) 'The Helminthiasis of the Internet' RFC 1135, December 1989, at ftp://ftp.isi.edu/in-notes/rfc1135.txt
Rheingold H. (1993) 'The Virtual Community: Homesteading on the Electronic Frontier' Reading, Mass.: Addison-Wesley. 1993, at http://www.rheingold.com/vc/book/
Rodota S. (1976) 'Privacy and data surveillance: Growing public concern' Inf. Stud. 10, OECD. Paris, France, 1976
Ronfeldt D. (1992) 'Cyberocracy Is Coming' The Information Society 8, 4 (December, 1992), Abstract at http://www.slis.indiana.edu/TIS/abstracts/ab08-4/ronfeldt.html
Rosenberg R. S. (1993) 'Free speech, pornography, sexual harassment, and electronic networks' The Information Society 9, 4 (December 1993), Abstract at http://www.slis.indiana.edu/TIS/abstracts/ab09-4/rosenberg.html
Rule J.B. (1974) 'Private Lives and Public Surveillance: Social Control in the Computer Age' Schocken Books, 1974
Rutkowski A. (2001) 'The ENUM Golden Tree: The Quest for a Universal Communications Identifier' inform 3, 2, April 2001 (97-100), at http://www.ngi.org/enum/pub/info_rutkowski.pdf
Samuelson P. (1996) 'The Copyright Grab' Wired 4.01 (January 1996), at http://www.wired.com/wired/archive/4.01/white.paper_pr.html
Samuelson P. (1999) 'Intellectual Property And The Digital Economy: Why The Anti-Circumvention Regulations Need To Be Revised' 14 Berkeley Tech. L. J. 519 (1999), at http://www.sims.berkeley.edu/~pam/papers/Samuelson_IP_dig_eco_htm.htm
Schwartau W. (1996) 'Information Warfare: Chaos on the Electronic Superhighway' Thunder's Mouth Press/Nation Books, 1996
Schwartz E.I. (1995) 'Wanna Bet?' Wired 3.10 (October 1995), at http://www.wired.com/wired/archive/3.10/gambling_pr.html
Schwartz E.I. (1994) 'Direct Democracy: Are you ready for the Democracy Channel?' Wired 2.01 (January 1994), at http://www.wired.com/wired/archive/2.01/e.dem_pr.html
Sewell D.R. (1997) 'The Internet Oracle: Virtual Authors and Network Community' First Monday 2, 6 (June 1997), at http://www.firstmonday.dk/issues/issue2_6/sewell/index.html
Shapiro C. & Varian H.R. (1999) 'Information Rules: A Strategic Guide to the Network Economy' Boston: Harvard Business School Press, 1999, information at http://www.inforules.com/
Sheff D. (2001) 'Betting on Bandwidth: Edward Tian has a pipe dream for China. It's called democracy' Wired 9.02 (February 2001), at http://www.wired.com/wired/archive/9.02/tian_pr.html
Smith A. & Clarke R. (1999) 'Identification, Authentication and Anonymity in a Legal Context', Proc. IFIP User Identification & Privacy Protection Conference, Stockholm, June 1999. Republished in Computer Law & Security Report 16, 2 (March/April 2000) CLSR 95-101, at http://www.rogerclarke.com/DV/AnonLegal.html
Stalder F. (1999) 'Beyond Portals and Gifts: Towards a Bottom-Up Net-Economy' First Monday 4, 1 (January 1999), at http://www.firstmonday.dk/issues/issue4_1/index.html
Stalder F. (2001) 'The Internet Backlash', at http://news.openflows.org/article.pl?sid=01/08/18/1441206
Stallman R. (1992) 'Why Software Should Be Free', April 24, 1992, at http://www.gnu.org/philosophy/shouldbefree.html
Stefik M. (ed.) (1996) 'Internet Dreams: Archetypes, Myths, and Metaphors' MIT Press, 1996
Stefik M. (1997) 'Shifting The Possible: How Trusted Systems And Digital Property Rights Challenge Us To Rethink Digital Publishing', Berkeley Technology Law Journal, 12, 1 (Spring 1997), at http://www.law.berkeley.edu/journals/btlj/articles/12-1/stefik.html
Sterling B. (1992) 'The Hacker Crackdown: Law and Disorder on the Electronic Frontier' New York, Bantam, 1992
Stoll C. (1995) 'Silicon Snake-Oil: Second Thoughts on the Information Highway' Doubleday, 1995
Tao W. (2001) 'Censorship and Protest: The Regulation of BBS in China People Daily' First Monday 6, 1 (January 2001), at http://www.firstmonday.dk/issues/issue6_1/tao/index.html
Thompson A.A. (1970) 'A Big Brother in Britain Today' Michael Joseph, 1970
Titelbaum S. (1997) 'The Call of the Wired' Wired 5.11 (November 1997), at http://www.wired.com/wired/archive/5.11/arctic_pr.html
Valauskas E.J. (1996) 'Lex Networkia: Understanding the Internet Community' First Monday 1, 4 (October 1996), at http://www.firstmonday.dk/issues/issue4/valauskas/index.html
Wiener N. (1949) 'The Human Use of Human Beings' Avon Books, New York, 1949, 1974
Wigan M.R. (1992) 'Data Ownership' in Clarke R.A. & Cameron J. (Eds.) 'Managing the Organisational Implications of Information Technology, II' Elsevier / North Holland, Amsterdam, 1992
Wiggins R. (2000) 'Al Gore and the Creation of the Internet' First Monday 5, 10 (October 2000), at http://www.firstmonday.dk/issues/issue5_10/wiggins/index.html
Wired (2001) 'P2P Pages: Wired's Guide to Global File-Sharing', original version in Wired 8.10 (October 2000), at http://www.wired.com/wired/archive/8.10/p2p_pages.html
Wolfe G. (1994a) 'Who Owns the Law?' Wired 2.05 (May 1994), at http://www.wired.com/wired/archive/2.05/the.law_pr.html
Wolfe G. (1994b) 'The (Second Phase of the) Revolution Has Begun' Wired 2.10 (October 1994), at http://www.wired.com/wired/archive/2.10/mosaic_pr.html
Zakon R. (2001) 'Hobbes' Internet Timeline', version 5.3, April 2001, at http://www.zakon.org/robert/internet/timeline/
This paper has been prepared on the basis of a long series of prior research and publications. Many references to the broader literature are to be found in these papers. The papers are variously refereed, invited, contributed, and self-published. Not all are directly referenced in the text of the article.
Clarke R. (1988) 'Information Technology and Dataveillance' Commun. ACM 31,5 (May 1988) Re-published in C. Dunlop and R. Kling (Eds.), 'Controversies in Computing', Academic Press, 1991, at http://www.rogerclarke.com/DV/CACM88.html
Clarke R. (1993a) 'A 'Future Trace' on Dataveillance: Trends in the Anti-Utopia / Science Fiction Genre', March 1993 at http://www.rogerclarke.com/DV/NotesAntiUtopia.html
Clarke R. (1993b) 'Asimov's Laws of Robotics: Implications for Information Technology' In two parts, in IEEE Computer 26,12 (December 1993) 53-61, and 27,1 (January 1994) 57-66, at http://www.rogerclarke.com/SOS/Asimov.html
Clarke R. (1994a) 'Information Infrastructure Policy Issues' Policy 10,3 (Spring 1994), at http://www.rogerclarke.com/II/PaperIIPolicy.html
Clarke R. (1994b) 'Information Technology: Weapon of Authoritarianism or Tool of Democracy?' Proc. World Congress, Int'l Fed. of Info. Processing, Hamburg, September 1994. At http://www.rogerclarke.com/DV/PaperAuthism.html
Clarke R. (1994c) 'The Information Age As Threat' Address to a Symposium on 'Public Access to Networked Information', National Scholarly Communications Forum, Canberra, 13 October 1994, at http://www.rogerclarke.com/II/PaperNSCF.html
Clarke R. (1994d) 'Information Infrastructure for The Networked Nation' November 1994, at http://www.rogerclarke.com/II/NetNation.html
Clarke R. (1994e) 'Human Identification in Information Systems: Management Challenges and Public Policy Issues' Information Technology & People 7,4 (December 1994) 6-37, at http://www.rogerclarke.com/DV/HumanID.html
Clarke R. (1995a) `Netethiquette: Mini Case Studies of Dysfunctional Human Behaviour on the Net', April 1995, at http://www.rogerclarke.com/II/Netethiquettecases.html
Clarke R. (1995b) 'Information Technology & Cyberspace: Their Impact on Rights and Liberties' Invited Presentation to the 'New Rights' Seminar Series, Victorian Council for Civil Liberties, Melbourne, 13 September 1995, at http://www.rogerclarke.com/II/VicCCL.html
Clarke R. (1996a) 'Trails in the Sand' 18 May 1996, at http://www.rogerclarke.com/DV/Trails.html
Clarke R. (1996b) Book Review of Mark Dery's 'Escape Velocity', 15 July 1996, at http://www.rogerclarke.com/II/EscVel.html, an entry in the service 'Australian Computer Journal Reviews Published Electronically', re-published in slightly modified form in Information Technology & People 10,1 (1997) pp.87-92
Clarke R. (1996c) 'CyberCulture: Towards the Analysis That Internet Participants Need', 15 July 1996, at http://www.rogerclarke.com/II/CyberCulture.html
Clarke R. (1997a) 'Regulating Financial Services in the Marketspace: The Public's Interests', Conference of the Australian Securities Commission Conference on 'Electronic Commerce: Regulating Financial Services in the Marketspace', Sydney, 4-5 February 1997 (February 1997), at http://www.rogerclarke.com/EC/ASC97.html
Clarke R. (1997b) 'Encouraging Cyberculture', Proc. CAUSE in Australasia '97, Melbourne (March 1997), at http://www.rogerclarke.com/II/EncoCyberCulture.html
Clarke R. (1997c) 'The Neighbourhood', 17 March 1997, at http://www.rogerclarke.com/II/Neighbourhood.html
Clarke R. (1997d) 'The Monster from the Crypt: Impacts and Effects of Digital Money', Proc. Computers, Freedom & Privacy Conf. (CFP'97), San Francisco (March 1997), at http://www.rogerclarke.com/EC/CFP97.html, revised version presented as a Keynote at QuestNet'97, Brisbane, 4 July 1997, at http://www.rogerclarke.com/EC/Monster.html
Clarke R. (1997e) 'Public Interests on the Electronic Frontier', Invited Address to IT Security '97, 14 & 15 August 1997, Rydges Canberra (August 1997). Republished in Computers & Law No. 35 (April 1998) pp.15-20, at http://www.rogerclarke.com/II/IIRSecy97.html
Clarke R. (1997f) 'Chip-Based ID: Promise and Peril' Proc. Int'l Conf. on Privacy, Montreal, 23-26 September 1997, at http://www.rogerclarke.com/DV/IDCards97.html
Clarke R. (1997g) 'Instrumentalist Futurism: A Tool for Examining I.T. Impacts and Implications' October 1997, at http://www.rogerclarke.com/DV/InstFut.html
Clarke R. (1998a) 'The Internet as a Postal Service: A Fairy Story' February 1998, at http://www.rogerclarke.com/II/InternetPS.html
Clarke R. (1998b) 'Information Privacy On the Internet: Cyberspace Invades Personal Space' Telecommunication Journal of Australia 48, 2 (May/June 1998), at http://www.rogerclarke.com/DV/IPrivacy.html
Clarke R. (1998c) 'A Brief History of the Internet in Australia', December 1998, at http://www.rogerclarke.com/II/OzIHist.html
Clarke R. (1999a) 'Internet Issues - Bigger Than Y2K, Much More Pressing Than a Constitutional Preamble', presentation to staff of the Australian Intellectual Property Office, March 1999, at http://www.rogerclarke.com/II/Issues99.html
Clarke R. (1999b) 'Electronic Trading in Copyright Objects and Its Implications for Universities', Proc. CAUSE Conf., April 1999, at http://www.rogerclarke.com/EC/CAUSE99.html
Clarke R. (1999c) 'The Willingness of Net-Consumers to Pay: A Lack-of-Progress Report', Proc. 12th International Bled EC Conf., June 1999, at http://www.rogerclarke.com/EC/WillPay.html
Clarke R. (1999d) 'Anonymous, Pseudonymous and Identified Transactions: The Spectrum of Choice', Proc. IFIP User Identification & Privacy Protection Conference, Stockholm, June 1999, at http://www.rogerclarke.com/DV/UIPP99.html
Clarke R. (1999e) 'Current Developments in Internet Privacy', Proc. IIR Conf. Data Protection and Information Privacy, August 1999, Sydney, at http://www.rogerclarke.com/DV/ICurr9908.html
Clarke R. (1999f) '"Information Wants to be Free"' August 1999, at http://www.rogerclarke.com/II/IWtbF.html
Clarke R. (1999g) 'Freedom of Information? The Internet as Harbinger of the New Dark Ages', Proc. Conf. 'Freedom of Information and the Right to Know', Melbourne, 19-20 August 1999. Republished in First Monday 4, 11 (November 1999), at http://firstmonday.org/issues/issue4_11/clarke/, at http://www.rogerclarke.com/II/DarkAges.html
Clarke R. (1999h) 'Person-Location and Person-Tracking: Technologies, Risks and Policy Implications' Proc. 21st International Conf. Privacy and Personal Data Protection, Hong Kong, September 1999. Revised version published in Information Technology & Privacy 14, 2 (Summer 2001) 206-231, at http://www.rogerclarke.com/DV/PLT.html
Clarke R. (1999i) 'Relevant Characteristics of Person-Location and Person-Tracking Technologies', September 1999, at http://www.rogerclarke.com/DV/PLTApp.html
Clarke R. (1999j) 'Ethics and the Internet: The Cyberspace Behaviour of People, Communities and Organisations' Proc. 6th Annual Conf. Aust. Association for Professional and Applied Ethics, Canberra, 2 October 1999. Revised version published in Bus. & Prof'l Ethics J. 18, 3&4 (1999) 153-167, at http://www.rogerclarke.com/II/IEthics99.html
Clarke R. (2000a) 'Beyond the OECD Guidelines: Privacy Protection for the 21st Century', January 2000, at http://www.rogerclarke.com/DV/PP21C.html
Clarke R. (2000b) 'E-Consent: A Key Issue in the New E-Context' KPMG Conference, Barossa Valley, May 2000, PowerPoint slides
Clarke R. (2000c) 'Famous Nyms', June 2000, at http://www.rogerclarke.com/DV/FamousNyms.html
Clarke R. (2000d) 'File-Discovery and File-Sharing Technologies (aka Peer-to-Peer or P2P): MP3, Napster and Friends, and Their Impact on Music E-Publishing' July 2000, at http://www.rogerclarke.com/EC/FDST.html
Clarke R. (2000e) 'Stephen King and E-Publishing' July 2000, at http://www.rogerclarke.com/EC/KingEP.html
Clarke R. (2000f) 'How to Ensure That Privacy Concerns Don't Undermine e-Transport Investments', Proc. AIC e-Transport Conf., Melbourne, July 2000, July 2000, at http://www.rogerclarke.com/EC/EC/eTP.html
Clarke R. (2000g) 'Technologies of Mass Observation', 'Mass Observation Movement' Forum, Treasury Theatre, Melbourne, 26 October 2000, at http://www.rogerclarke.com/DV/MassObsT.html
Clarke R. (2000h) 'Conventional Public Key Infrastructure: An Artefact Ill-Fitted to the Needs of the Information Society' November 2000, at http://www.rogerclarke.com/II/PKIMisFit.html
Clarke R. (2001a) 'DRM Will Beget DCRM' Position Paper for the W3C DRM Workshop, Sophia Antipolis, France, 22-23 January 2001, at http://www.rogerclarke.com/II/DCRM.html
Clarke R. (2001b) 'While You Were Sleeping ... Surveillance Technologies Arrived', Australian Quarterly 73, 1 (January-February 2001), at http://www.rogerclarke.com/DV/AQ2001.html
Clarke R. (2001c) 'Roger Clarke's PITs and PETs Resources Site' February 2001, at http://www.rogerclarke.com/DV/PITsPETsRes.html
Clarke R. (2001d) 'Why Would M-Marketing be Trusted by Consumers and Small Enterprises??' Powerpoint slides for AMTA Congress, Sydney, 27 February 2000, at http://www.rogerclarke.com/EC/AMTA01.ppt
Clarke R. (2001e) 'Introducing PITs and PETs: Technologies Affecting Privacy' Privacy Law & Policy Reporter 7, 9 (March 2001), at http://www.rogerclarke.com/DV/PITsPETs.html
Clarke R. (2001f) 'Biometrics and Privacy' 15 April 2001, at http://www.rogerclarke.com/DV/Biometrics.html
Clarke R. (2001g) 'The Fundamental Inadequacies of Conventional Public Key Infrastructure' Proc. Conf. ECIS'2001, Bled, Slovenia, 27-29 June 2001, at http://www.rogerclarke.com/II/ECIS2001.html
Clarke R. & Dempsey G. (2000) 'The Feasibility of Regulating Gambling on the Internet' Forthcoming in Managerial and Decision Economics, at http://www.rogerclarke.com/II/FeasIGR.html
Clarke R., Dempsey G., Ooi C.N. & O'Connor R.F. (1998a) 'A Primer on Internet Technology', February 1998, at http://www.rogerclarke.com/II/IPrimer.html
Clarke R., Dempsey G., Ooi C.N. & O'Connor R.F. (1998b) `Technological Aspects of Internet Crime Prevention', Proc. Conf. 'Internet Crime', Australian Institute for Criminology, Melbourne University, 16-17 February 1998, at http://www.rogerclarke.com/II/ICrimPrev.html
Clarke R., Dempsey G., Ooi C.N. & O'Connor R.F. (1998c) 'The Technical Feasibility of Regulating Gambling on the Internet', Proc. Conf. Gambling, Technology & Society, 7 - 8 May 1998, at http://www.rogerclarke.com/II/IGambReg.html
Clarke R., Higgs P. & Dempsey G. (2000) 'Key Design Issues in Marketspaces for Intellectual Property Rights' Proc. 13th International EC Conf., Bled, Slovenia, 19-21 June 2000, at http://www.rogerclarke.com/EC/Bled2K.html
Clarke R. & Nees S. (2000) 'Technological Protections for Digital Copyright Objects' Proc. 8th Euro. Conf. Infor. Sys. (ECIS'2000), July 2000, Vienna Uni. of Economics & Business Administration, pp. 745-752, at http://www.rogerclarke.com/II/TPDCO.html
Clarke R. & Worthington T. (1994) 'Vision for a Networked Nation: The Public Interest in Network Services' Proc. Conf. Int'l Telecommunications Soc., Sydney, July 1994, at http://www.acs.org.au/president/1997/acsnet/acsnet.htm
The content and infrastructure for these community service pages are provided by Roger Clarke through his consultancy company, Xamax.
From the site's beginnings in August 1994 until February 2009, the infrastructure was provided by the Australian National University. During that time, the site accumulated close to 30 million hits. It passed 40 million by the end of 2012.
Sponsored by Bunhybee Grasslands, the extended Clarke Family, Knights of the Spatchcock and their drummer
Xamax Consultancy Pty Ltd
ACN: 002 360 456
78 Sidaway St, Chapman ACT 2611 AUSTRALIA
Tel: +61 2 6288 1472, 6288 6916
Created: 10 March 2001 - Last Amended: 25 August 2001 by Roger Clarke - Site Last Verified: 15 February 2009
This document is at www.rogerclarke.com/II/PGPR01.html