Claws to the Weak: internet and rightsPresentation Transcript
Claws to the Weak: internet andrightsMathias Klang @klang67
George Orwell: You and the AtomicBomb (1945)Thus, for example, tanks, battleships andbombing planes are inherently tyrannicalweapons, while rifles, muskets, long-bowsand hand-grenades are inherentlydemocratic weapons. A complex weaponmakes the strong stronger, while a simpleweapon--so long as there is no answer to it--gives claws to the weak.
Killer app 1415
Killer app 1455
Chokehold on printers
I disapprove of what you say, but I will defend tothe death your right to say it.
Killer app 1710
Universal declaration of human rights (1948)
Killer app 1948
Killer app 1960
Is teleportation legal?
LawContextual &programmed socialrulesArchitecture
Only technology(spot the ethical dilemma?)
Swedish telephonec:a 1896Graham Bell wasawarded a patent forthe electric telephonein March 1876
Ludicrously brief history ofcomputers
Generation 3 (1964-72)
The digital is the original& everything is copy
Killer apps 1995: Browser wars
Everything is miscellaneous
91 % Access to the Internet at home83 % Access to broadband at home7 % Never used a computerSource: Sweden Statistics 2011 (*Individuals aged 16-74)
Voltaire’s dream? The theoreticallypossiblebecomes the inevitableDigitalizationConnectivityDevicesStorage
Blogger1999Google1999End of communications monopoly
Normalizing the abnormal
The Net interprets censorship asdamage and routes around it.John Gilmor (TIME magazine December 1993)
The other control
Technology makes society
A Squirrel Dying InYour Front Yard MayBe More Relevant ToYour Interests RightNow Than PeopleDying In AfricaMark Zuckerberg
It will be very hard forpeople to watch orconsume somethingthat has not in somesense been tailored forthem. Eric Schmidt, Google
The internet is shows us what it thinks that wewant to see – not what we need to see Eli Pariser
Identity & Information junk food.
Freedom of Speech
iTunes censor fail
The Right to PrivacyThe intensity and complexity of life,attendant upon advancing civilization,have rendered necessary some retreatfrom the world…solitude and privacyhave become more essential to theindividual; but modern enterprise andinvention have, through invasions uponhis privacy, subjected him to mental painand distress…Warren and Brandeis The Right to Privacy,4 Harvard Law Review 193 (1890)
"You havezero privacy anyway.Get over it."Scott McNealy (Wired 1999)
“Having two identities for yourselfis an example of a lack of integrity”Mark Zuckerberg (2010)
We leak information
Surveillance: gaze from above
Protection fromthe outer gaze
Peerview: social control
End of privacy?
If you have done nothing wrong,you have nothing to fear
The memory hole
"We have found your account is directly related to anotherwhich has been previously closed for abuse of our policies.As such, your Amazon.co.uk account has been closed andany open orders have been cancelled. Please understandthat the closure of an account is a permanent action. Anysubsequent accounts that are opened will be closed aswell. Thank you for your understanding with our decision."
Orwell or Huxley?
The illusion of simplicity
The keepers of algorithms know
We have (theoretical) control overBig Brother
Regulation of technologyis the regulation ofdemocracy
The social construction of claws
Mathias Klangklang@ituniv.se or @klang67www.digital-rights.netImage & licensing info in the notessection of slides.Images at www.flickr.com (orspecifically stated).This ppt licensed: CreativeCommons BY-NC-SADownload presentationwww.slideshare.net/klang