Censorship And Internet Essay, Research Paper
Censorship And The Internet
The freedom of speech that was possible on the
Internet could now be subjected to governmental approvals. For example,
China is attempting to restrict political expression, in the name of
security and social stability. It requires users of the Internet an d
electronic mail (e-mail) to register, so that it may monitor their
activities.9 In the United Kingdom, state secrets and personal attacks are
off limits on the Internet. Laws are strict and the government is
extremely interested in regulating the Intern et with respect to these
issues.10 Laws intended for other types of communication will not
necessarily apply in this medium. Through all the components of the
Internet it becomes easy to transfer material that particular governments
might find objectionable. However, all of these means of communicating on
the Internet make up a large and vast system. For inspectors to monitor
every e-mail, every article in every Newsgroup, every Webpage, every IRC
channel, every Gopher site and every FTP site would be near impossible.
Besides taking an ext raordinary amount of money and time, attempts to
censor the Internet violate freedom of speech rights that are included in
democratic constitutions and international laws.11 It would be a breach of
the First Amendment. The Constitution of the United Stat es of America
declares that “Congress shall make no law respecting an establishment of
religion, or prohibiting the free exercise thereof; or abridging the
freedom of speech, or of the press; or the right of the people peaceably
to assemble, and to petition the Government for a redr ess of grievances”
12
Therefore it would be unconstitutional for any sort of censorship to occur
on the Internet and affiliated services. Despite the illegality,
restrictions on Internet access and content are increasing worldwide under
all forms of government. In France, a co untry where the press generally
has a large amount of freedom, the Internet has recently been in the
spotlight. A banned book on the health history of former French president
Francois Mitterrand was republished electronically on the World Wide Web
(WWW). Apparently, the electronic reproduction of Le Grand Secret by a
third party wasn’t banned by a court that ruled that the printed version
of the book unlawfully violated Mitterrand’s privacy. To enforce
censorship of the Internet, free societies find that they become more
repressive and closed societies find new ways to crush political
expression and opposition.13 Vice – President Al Gore, while at an
international conference in Brussels about
the Internet, in a keynote address said that “[Cyberspace] is about
protecting and enlarging freedom of expression for all our citizens …
Ideas should not be checked at the border”.14 Another person attending
that conference was Ann Breeson of the Ame rican Civil Liberties Union, an
organization dedicated to preserving many things including free speech.
She is quoted as saying, “Our big victory at Brussels was that we
pressured them enough so that Al Gore in his keynote address made a big
point of stre ssing the importance of free speech on the Internet.”15 Many
other organizations have fought against laws and have succeeded. A prime
example of this is the fight that various groups put on against the recent
Communication Decency Act (CDA) of the U.S. Se nate. The Citizens Internet
Empowerment Coalition on 26 February 1996 filed a historic lawsuit in
Philadelphia against the U.S. Department of Justice and Attorney General
Janet Reno to make certain that the First Amendment of the U.S.A. would
not be compr omised by the CDA. The sheer range of plaintiffs alone,
including the American Booksellers Association, the Freedom to Read
Foundation, Apple, Microsoft, America Online, the Society of Professional
Journalists, the Commercial Internet eXchange Association , Wired, and
HotWired, as well as thousands of netizens (citizens of the Internet)
shows the dedication that is felt by many different people and groups to
the cause of free speech on the Internet.16 “Words like shit, fuck, piss,
and tits. Words of which our mothers (at least some of them) would no
doubt disapprove, but which by no means should be regulated by the
government. But it’s not just about dirty words. It’s also about words
like AIDS, gay, a nd breasts. It’s about sexual content, and politically
controversial topics like drug addiction, euthanasia, and racism.”17 Just
recently in France, a high court has struck down a bill that promoted the
censorship of the Internet. Other countries have attempted similar moves.
The Internet cannot be regulated in the way of other mediums simply
because it is not the same as anyt hing else that we have. It is a totally
new and unique form of communication and deserves to be given a chance to
prove itself. Laws of one country can not hold jurisdiction in another
country and holds true on the Internet because it has no borders.
Although North America (mainly the United States) has the largest
share of servers, the Internet is still a worldwide network. This means
that domestic regulations cannot oversee the rules of foreign countries.
It would be just as easy for an American te en to download (receive)
pornographic material from England, as it would be from down the street.
One of the major problems is the lack of physical boundaries, making it
difficult to determine where violations of the law should be prosecuted.
There is no one place through which all information passes through. That
was one of the key points that was stressed during the original days of
the Internet, then called ARPANET. It started out as a defense project
that would allow communication in the event of an e mergency such as
nuclear attack. Without a central authority, information would pass around
until it got where it was going.18 This was intended to be similar to the
road system. It is not necessary to take any specific route but rather
anyone goes. In th e same way the information on the Internet starts out
and eventually gets to it’s destination. The Internet is full of
anonymity. Since text is the standard form of communication on the
Internet it becomes difficult to determine the identity and/or age of a
specific person. Nothing is known for certain about a person accessing
content. There are no
signatures or photo-ids on the Internet therefore it is difficult to
certify that illegal activities (regarding minors accessing restricted
data) are taking place. Take for example a conversation on IRC. Two people
could people talking to one another, bu t all that they see is text. It
would be extremely difficult, if not impossible, to ascertain the gender
and/or age just from communication of this sort. Then if the
conversationalist lies about any points mentioned above it would be
extremely difficult t o know or prove otherwise. In this way governments
could not restrict access to certain sites on the basis of ages. A
thirteen-year-old boy in British Columbia could decide that he wanted to
download pornography from an adult site in the U.S. The site may
have warnings and age restrictions but they have no way of stopping him
from receiving their material if he says he is 19 years of age when
prompted. The complexity in the way information is passed around the
Internet means that if information has been posted, deleting this material
becomes almost impossible. A good example of this is the junk mail that
people refer to as spam. These include e-mails ad vertising products,
usenet articles that are open for flames. Flames are heated letters that
many times have no founding behind them. These seem to float around for
ages before dying out because they are perfect material for flamewars.
Flamewars are long,
drawn out and highly heated discussions consisting of flames, which often
time, obscenely, slander one’s reputation and personae. Mostly these are
immature arguments that are totally pointless except to those involved.
The millions of people that partici pate on the Internet everyday have
access to almost all of the data present. As well it becomes easy to copy
something that exists on the Internet with only a click of a button. The
relative ease of copying data means that the second information is posted
to the Internet it may be archived somewhere else. There are in fact many
sites on the Internet that are devoted to the archiving of information
including: ftp.cdrom.com (which archives an extraordinary amount of
software among others), www.archive.org ( which is working towards
archiving as much of the WWW as possible), and wuarchive.wustl.edu (which
is dedicated towards archiving software, publications, and many other
types of data). It becomes hard to censor material that might be
duplicated or triplic ated within a matter of minutes. An example could be
the recent hacking of the U.S. Department of Justice’s Homepage and the
hacking of the Central Intelligence Agency’s Homepage. Someone illegally
obtained access to the computer on which these homepages were stored and
modified them. It was done as a prank; however, both of these agencies
have since shut down their pages. 2600 (www.2600.com), a magazine devoted
to hacking, has republished the hacked DoJ and CIA homepages on their
website. The magazine ei ther copied the data straight from the hacked
sites or the hacked site was submitted to the magazine. I don’t know which
one is true but it does show the ease that data can be copied and
distributed, as well it shows the difficulty in preventing material deemed
inappropriate from appearing where it shouldn’t. The Internet is much too
complex a network for censorship to effectively occur. It is a totally new
and unique environment in which communications transpire. Existing laws
are not applicable to this medium. The lack of tangible boundaries causes
confusion
as to where violations of law take place. The Internet is made up of
nameless interaction and anonymous communication. The intricacy of the
Internet makes it near impossible to delete data that has been publicized.
No one country should be allowed to, or
could, regulate or censor the Internet.
1 http://fileroom.aaup.uic.edu/FileRoom/documents/Cases/102socrates.html
2 Declan McCullagh, “PLAGUE OF FREEDOM” Internet Underground, http://www.eff.org/ declan/global/reports/plague.073196.txt (31 July 1996).
3 Declan McCullagh, “PLAGUE OF FREEDOM” Internet Underground, http://www.eff.org/ declan/global/reports/plague.073196.txt (31 July 1996).
4 Shari, Steele, “Taking a Byte Out of the First Amendment. How Free Is Speech in Cyberspace?” Human Rights, http://www.eff.org/pub/Censorship/human_rights_960420.article (Spring 1996).
5 Bryan Bradford and Mark Krumholz, “Telecommunications and Decency: Big Brother goes Digital,” Business Today, Spring 1996 : 12-16.
6 Bruce, Sterling, “Short History of the Internet,” The Magazine of Fantasy and Science Fiction, http://www.isoc.org:70/00/internet/history/short.history.of.internet (17 Apr. 1996).
7 Bruce, Sterling, “Short History of the Internet,” The Magazine of Fantasy and Science Fiction, http://www.isoc.org:70/00/internet/history/short.history.of.internet (17 Apr. 1996).
8 Shari, Steele, “Taking a Byte Out of the First Amendment. How Free Is Speech in Cyberspace?” Human Rights, http://www.eff.org/pub/Censorship/human_rights_960420.article (Spring 1996).
9 Bill Gates, “Searching for middle ground in online censorship,” Microsoft Corporation,
http://www.microsoft.com/corpinfo/bill-g/column/1996essay/censorship.htm (27 Mar. 1996).
10 Bill Gates, “Searching for middle ground in online censorship,” Microsoft Corporation,
http://www.microsoft.com/corpinfo/bill-g/column/1996essay/censorship.htm (27 Mar. 1996).
11 “Silencing the Net–The Threat to Freedom of Expression Online.” Human Rights Watch May 1996, Vol. 8, No. 2 (G).
12 Thomas Jefferson, “Bill Of Rights,” The Constitution of the United States,
http://Constitution.by.net/uSA/BillOfRights.html (21 Apr. 1996).
13 “Silencing the Net–The Threat to Freedom of Expression Online.” Human Rights Watch May 1996, Vol. 8, No. 2 (G).
14 Declan McCullagh, “PLAGUE OF FREEDOM” Internet Underground, http://www.eff.org/ declan/global/reports/plague.073196.txt (31 July 1996).
15 Declan McCullagh, “PLAGUE OF FREEDOM” Internet Underground, http://www.eff.org/ declan/global/reports/plague.073196.txt (31 July 1996).
16 Steve Silberman, “Defending the First Amendment,” Hotwired.com,
http://www.hotwired.com/special/lawsuit.
17 Heather Irwin, “Geeks Take to the Streets,” Hotwired.com, http://www.hotwired.com/special/indecent/rally.html
18 Bruce, Sterling, “Short History of the Internet,” The Magazine of Fantasy and Science Fiction, http://www.isoc.org:70/00/internet/history/short.history.of.internet (17 Apr. 1996).
Bibliography
Bradford, Bryan and Mark Krumholz. “Telecommunications and Decency: Big Brother goes Digital.” Business Today Spring 1996 : 12-16.
Gates, Bill. “Searching for middle ground in online censorship.” Microsoft Corporation.
http://www.microsoft.com/corpinfo/bill-g/column/1996essay/censorship.htm (27 Mar. 1996).
Irwin, Heather. “Geeks Take to the Streets.” Hotwired.com. http://www.hotwired.com/special/indecent/rally.html
Jefferson, Thomas. “Bill Of Rights.” The Constitution of the United States.
http://Constitution.by.net/uSA/BillOfRights.html (21 Apr. 1996).
McCullagh, Declan. “PLAGUE OF FREEDOM” Internet Underground. http://www.eff.org/ declan/global/reports/plague.073196.txt (31 July 1996).
Silberman, Steve. “Defending the First Amendment.” Hotwired.com.
http://www.hotwired.com/special/lawsuit.
“Silencing the Net–The Threat to Freedom of Expression Online.” Human Rights Watch May 1996, Vol. 8, No. 2 (G).
Steele, Shari. “Taking a Byte Out of the First Amendment. How Free Is Speech in Cyberspace?” Human Rights. http://www.eff.org/pub/Censorship/human_rights_960420.article (Spring 1996).
Sterling, Bruce. “Short History of the Internet.” The Magazine of Fantasy and Science Fiction. http://www.isoc.org:70/00/internet/history/short.history.of.internet (17 Apr. 1996).
! |
Как писать рефераты Практические рекомендации по написанию студенческих рефератов. |
! | План реферата Краткий список разделов, отражающий структура и порядок работы над будующим рефератом. |
! | Введение реферата Вводная часть работы, в которой отражается цель и обозначается список задач. |
! | Заключение реферата В заключении подводятся итоги, описывается была ли достигнута поставленная цель, каковы результаты. |
! | Оформление рефератов Методические рекомендации по грамотному оформлению работы по ГОСТ. |
→ | Виды рефератов Какими бывают рефераты по своему назначению и структуре. |