Information to change the world | |
Find Topics, Titles, Names related to your query |
Wanted: A Hackers' CharterEmmanuel Goldstein
Much of this is a result of the advance of technology. The same
rules of liberty do not apply in the cybernetic world. Private files
are far more easily accessible to unauthorised eyes when they are
stored on computer; electronic publications are not afforded the
same protections as ‘real’ publications; and sending
someone electronic mail by no means guarantees the same level of
privacy as dropping mail into a mailbox. A growing number of people have a legal right to access this personal information. Others do not have the right but do have the knowledge and the motivation. Others still are simply out to explore the systems themselves. Commonly known as computer hackers, the last are often portrayed as the biggest threat to privacy. Recently, three hackers in Atlanta were sent to prison simply for gaining access to a computer system, the equivalent of opening the drawer of a filing cabinet. Similar inequities are present in publishing. While most magazines and newspapers are able to operate freely under the 1st Amendment of the Constitution, which protects freedom of the press, electronic publications are not included. In 1990, an electronic magazine called Phrack was shut down, its list of subscribers seized, and its editor put on trial for publishing an article that was alleged to contain proprietary telephone company information. The claim was eventually proven to be unsubstantiated but not until after the magazine had been forced to stop publication. The same moves against a printed magazine or newspaper would have been difficult, if not impossible. Public and press would both have been outraged at the attempt. In this particular case, the government was able to monitor the electronic mail going to and from the magazine by gaining access to a computer that acted as a step in the mailing process. This is tantamount to opening every letter going to and from a location and then resealing the envelopes. Here the agents merely had to copy each message as it passed by, unthinkable in the case of conventional mail. Computer bulletin board systems form what is perhaps the most valuable form of free speech we have today. Anybody with a computer can call, speak their mind on a variety of issues, communicate privately with other users, and if he/she chooses, remain anonymous. There can be no judgement based on personal appearance or the sound of a voice: the words tell the whole story and everyone starts out equal. Yet the authorities frequently look on the bulletin boards as criminal tools, as though all kinds of illicit behaviour could be festering within private and anonymous communications It is not unusual for a computer bulletin board to be seized by the authorities to investigate the contents of private electronic mail. When this happens, all private mail within the system is perused. It is sad and ominous that technology is allowing those in power to keep an eye on people surreptitiously, conveniently,and thoroughly. Those who discover how the system works are themselves targeted as threats to society. Discouraged from learning the technicalities of massive computer systems, the public believes what it is told. Americans assume their way of life is incorruptible: an Orwellian scenario could never unfold, no matter how much information is gathered on the public. This may be a valid assumption, but even if the political system is wholly benevolent, can it be guaranteed for all time? This power of scrutiny in the hands of a future regime that did not value human life as highly as at present, or in the hands of a totalitarian society, an Adolf Hitler, is all too easy to imagine. There are two sides to every revolution. After the initial glory
comes the purge and the reign of terror. The computer revolution,
while different in kind, is not immune. (CX5050)
Subject Headings Contact Connexions
|
Donate or Volunteer |