boundary 2

Tag: corporate control of internet

  • Richard Hill – Too Big to Be (Review of Wu, The Curse of Bigness: Antitrust in the New Gilded Age)

    Richard Hill – Too Big to Be (Review of Wu, The Curse of Bigness: Antitrust in the New Gilded Age)

    a review of Timothy Wu, The Curse of Bigness: Antitrust in the New Gilded Age (Random House/Columbia Global Reports, 2018)

    by Richard Hill

    ~

    Tim Wu’s brilliant new book analyses in detail one specific aspect and cause of the dominance of big companies in general and big tech companies in particular: the current unwillingness to modernize antitrust law to deal with concentration in the provision of key Internet services. Wu is a professor at Columbia Law School, and a contributing opinion writer for the New York Times. He is best known for his work on Net Neutrality theory. He is author of the books The Master Switch and The Attention Merchants, along with Network Neutrality, Broadband Discrimination, and other works. In 2013 he was named one of America’s 100 Most Influential Lawyers, and in 2017 he was named to the American Academy of Arts and Sciences.

    What are the consequences of allowing unrestricted growth of concentrated private power, and abandoning most curbs on anticompetitive conduct? As Wu masterfully reminds us:

    We have managed to recreate both the economics and politics of a century ago – the first Gilded Age – and remain in grave danger of repeating more of the signature errors of the twentieth century. As that era has taught us, extreme economic concentration yields gross inequality and material suffering, feeding an appetite for nationalistic and extremist leadership. Yet, as if blind to the greatest lessons of the last century, we are going down the same path. If we learned one thing from the Gilded Age, it should have been this: The road to fascism and dictatorship is paved with failures of economic policy to serve the needs of the general public. (14)

    While increasing concentration, and its negative effects on social equity, is a general phenomenon, it is particularly concerning for what regards the Internet: “Most visible in our daily lives is the great power of the tech platforms, especially Google, Facebook, and Amazon, who have gained extraordinary power over our lives. With this centralization of private power has come a renewed concentration of wealth, and a wide gap between the rich and poor” (15). These trends have very real political effects: “The concentration of wealth and power has helped transform and radicalize electoral politics. As in the Gilded Age, a disaffected and declining middle class has come to support radically anti-corporate and nationalist candidates, catering to a discontent that transcends party lines” (15). “What we must realize is that, once again, we face what Louis Brandeis called the ‘Curse of Bigness,’ which, as he warned, represents a profound threat to democracy itself. What else can one say about a time when we simply accept that industry will have far greater influence over elections and lawmaking than mere citizens?” (15). And, I would add, what have we come to when some advocate that corporations should have veto power over public policies that affect all of us?

    Surely it is, or should be, obvious that current extreme levels of concentration are not compatible with the premises of social and economic equity, free competition, or democracy. And that “the classic antidote to bigness – the antitrust and other antimonopoly laws – might be recovered and updated to face the challenges of our times” (16). Those who doubt these propositions should read Wu’s book carefully, because he shows that they are true. My only suggestion for improvement would be to add a more detailed explanation of how network effects interact with economies of scale to favour concentration in the ICT industry in general, and in telecommunications and the Internet in particular. But this topic is well explained in other works.

    As Wu points out, antitrust law must not be restricted (as it is at present in the USA) “to deal with one very narrow type of harm: higher prices to consumers” (17). On the contrary, “It needs better tools to assess new forms of market power, to assess macroeconomic arguments, and to take seriously the link between industrial concentration and political influence” (18). The same has been said by other scholars (e.g. here, here, here and here), by a newspaper, an advocacy group, a commission of the European Parliament, a group of European industries, a well-known academic, and even by a plutocrat who benefitted from the current regime.

    Do we have a choice? Can we continue to pretend that we don’t need to adapt antitrust law to rein in the excessive power of the Internet giants? No: “The alternative is not appealing. Over the twentieth century, nations that failed to control private power and attend to the economic needs of their citizens faced the rise of strongmen who promised their citizens a more immediate deliverance from economic woes” (18). (I would argue that any resemblance to the election of US President Trump, to the British vote to leave the European Union, and to the rise of so-called populist parties in several European countries [e.g. Hungary, Italy, Poland, Sweden] is not coincidental).

    Chapter One of Wu’s book, “The Monopolization Movement,” provides historical background, reminding us that from the late nineteenth through the early twentieth century, dominant, sector-specific monopolies emerged and were thought to be an appropriate way to structure economic activity. In the USA, in the early decades of the twentieth century, under the Trust Movement, essentially every area of major industrial activity was controlled or influenced by a single man (but not the same man for each area), e.g. Rockefeller and Morgan. “In the same way that Silicon Valley’s Peter Thiel today argues that monopoly ‘drives progress’ and that ‘competition is for losers,’ adherents to the Trust Movement thought Adam Smith’s fierce competition had no place in a modern, industrialized economy” (26). This system rapidly proved to be dysfunctional: “There was a new divide between the giant corporation and its workers, leading to strikes, violence, and a constant threat of class warfare” (30). Popular resistance mobilized in both Europe and the USA, and it led to the adoption of the first antitrust laws.

    Chapter Two, “The Right to Live, and Not Merely to Exist,” reminds us that US Supreme Court Justice Louis Brandeis “really cared about … the economic conditions under which life is lived, and the effects of the economy on one’s character and on the nation’s soul” (33). The chapter outlines Brandeis’ career and what motivated him to combat monopolies.

    In Chapter Three, “The Trustbuster,” Wu explains how the 1901 assassination of US President McKinley, a devout supporter of unrestricted laissez-faire capitalism (“let well enough alone”, reminiscent of today’s calls for government to “do not harm” through regulation, and to “don’t fix it if it isn’t broken”), resulted in a fundamental change in US economic policy, when Theodore Roosevelt succeeded him. Roosevelt’s “determination that the public was ruler over the corporation, and not vice versa, would make him the single most important advocate of a political antitrust law.” (47). He took on the great US monopolists of the time by enforcing the antitrust laws. “To Roosevelt, economic policy did not form an exception to popular rule, and he viewed the seizure of economic policy by Wall Street and trust management as a serious corruption of the democratic system. He also understood, as we should today, that ignoring economic misery and refusing to give the public what they wanted would drive a demand for more extreme solutions, like Marxist or anarchist revolution” (49). Subsequent US presidents and authorities continued to be “trust busters”, through the 1990s. At the time, it was understood that antitrust was not just an economic issue, but also a political issue: “power that controls the economy should be in the hands of elected representatives of the people, not in the hands of an industrial oligarchy” (54, citing Justice William Douglas). As we all know, “Increased industrial concentration predictably yields increased influence over political outcomes for corporations and business interests, as opposed to citizens or the public” (55). Wu goes on to explain why and how concentration exacerbates the influence of private companies on public policies and undermines democracy (that is, the rule of the people, by the people, for the people). And he outlines why and how Standard Oil was broken up (as opposed to becoming a government-regulated monopoly). The chapter then explains why very large companies might experience disecomonies of scale, that is, reduced efficiency. So very large companies compensate for their inefficiency by developing and exploiting “a different kind of advantages having less to do with efficiencies of operation, and more to do with its ability to wield economic and political power, by itself or conjunction with others. In other words, a firm may not actually become more efficient as it gets larger, but may become better at raising prices or keeping out competitors” (71). Wu explains how this is done in practice. The rest of this chapter summarizes the impact of the US presidential election of 1912 on US antitrust actions.

    Chapter Four, “Peak Antitrust and the Chicago School,” explains how, during the decades after World War II, strong antitrust laws were viewed as an essential component of democracy; and how the European Community (which later became the European Union) adopted antitrust laws modelled on those of the USA. However, in the mid-1960s, scholars at the University of Chicago (in particular Robert Bork) developed the theory that antitrust measures were meant only to protect consumer welfare, and thus no antitrust actions could be taken unless there was evidence that consumers were being harmed, that is, that a dominant company was raising prices. Harm to competitors or suppliers was no longer sufficient for antitrust enforcement. As Wu shows, this “was really laissez-faire reincarnated.”

    Chapter Five, “The Last of the Big Cases,” discusses two of the last really large US antitrust case. The first was breakup of the regulated de facto telephone monopoly, AT&T, which was initiated in 1974. The second was the case against Microsoft, which started in 1998 and ended in 2001 with a settlement that many consider to be a negative turning point in US antitrust enforcement. (A third big case, the 1969-1982 case against IBM, is discussed in Chapter Six.)

    Chapter Six, “Chicago Triumphant,” documents how the US Supreme Court adopted Bork’s “consumer welfare” theory of antitrust, leading to weak enforcement. As a consequence, “In the United States, there have been no trustbusting or ‘big cases’ for nearly twenty years: no cases targeting an industry-spanning monopolist or super-monopolist, seeking the goal of breakup” (110). Thus, “In a run that lasted some two decades, American industry reached levels of industry concentration arguably unseen since the original Trust era. A full 75 percent of industries witnessed increased concentration from the years 1997 to 2012” (115). Wu gives concrete examples: the old AT&T monopoly, which had been broken up, has reconstituted itself; there are only three large US airlines; there are three regional monopolies for cable TV; etc. But the greatest failure “was surely that which allowed the almost entirely uninhibited consolidation of the tech industry into a new class of monopolists” (118).

    Chapter Seven, “The Rise of the Tech Trusts,” explains how the Internet morphed from a very competitive environment into one dominated by large companies that buy up any threatening competitor. “When a dominant firm buys a nascent challenger, alarm bells are supposed to ring. Yet both American and European regulators found themselves unable to find anything wrong with the takeover [of Instagram by Facebook]” (122).

    The Conclusion, “A Neo-Brandeisian Agenda,” outlines Wu’s thoughts on how to address current issues regarding dominant market power. These include renewing the well known practice of reviewing mergers; opening up the merger review process to public comment; renewing the practice of bringing major antitrust actions against the biggest companies; breaking up the biggest monopolies, adopting the market investigation law and practices of the United Kingdom; recognizing that the goal of antitrust is not just to protect consumers against high prices, but also to protect competition per se, that is to protect competitors, suppliers, and democracy itself. “By providing checks on monopoly and limiting private concentration of economic power, the antitrust law can maintain and support a different economic structure than the one we have now. It can give humans a fighting chance against corporations, and free the political process from invisible government. But to turn the ship, as the leaders of the Progressive era did, will require an acute sensitivity to the dangers of the current path, the growing threats to the Constitutional order, and the potential of rebuilding a nation that actually lives up to its greatest ideals” (139).

    In other words, something is rotten in the state of the Internet: it has “collection and exploitation of personal data”; it has “recently been used to erode privacy and to increase the concentration of economic power, leading to increasing income inequalities”; it has led to “erosion of the press, leading to erosion of democracy.” These developments are due to the fact that “US policies that ostensibly promote the free flow of information around the world, the right of all people to connect to the Internet, and free speech, are in reality policies that have, by design, furthered the geo-economic and geo-political goals of the US, including its military goals, its imperialist tendencies, and the interests of large private companies”; and to the fact that “vibrant government institutions deliberately transferred power to US corporations in order to further US geo-economical and geo-political goals.”

    Wu’s call for action is not just opportune, but necessary and important; at the same time, it is not sufficient.

    _____

    Richard Hill is President of the Association for Proper internet Governance, and was formerly a senior official at the International Telecommunication Union (ITU). He has been involved in internet governance issues since the inception of the internet and is now an activist in that area, speaking, publishing, and contributing to discussions in various forums. Among other works he is the author of The New International Telecommunication Regulations and the Internet: A Commentary and Legislative History (Springer, 2014). He writes frequently about internet governance issues for The b2o Review Digital Studies magazine.

    Back to the essay

  • Zachary Loeb – All Watched Over By Machines (Review of Levine, Surveillance Valley)

    Zachary Loeb – All Watched Over By Machines (Review of Levine, Surveillance Valley)

    a review of Yasha Levine, Surveillance Valley: The Secret Military History of the Internet (PublicAffairs, 2018)

    by Zachary Loeb

    ~

    There is something rather precious about Google employees, and Internet users, who earnestly believe the “don’t be evil” line. Though those three words have often been taken to represent a sort of ethos, their primary function is as a steam vent – providing a useful way to allow building pressure to escape before it can become explosive. While “don’t be evil” is associated with Google, most of the giants of Silicon Valley have their own variations of this comforting ideological façade: Apple’s “think different,” Facebook’s talk of “connecting the world,” the smiles on the side of Amazon boxes. And when a revelation troubles this carefully constructed exterior – when it turns out Google is involved in building military drones, when it turns out that Amazon is making facial recognition software for the police – people react in shock and outrage. How could this company do this?!?

    What these revelations challenge is not simply the mythos surrounding particular tech companies, but the mythos surrounding the tech industry itself. After all, many people have their hopes invested in the belief that these companies are building a better brighter future, and they are naturally taken aback when they are forced to reckon with stories that reveal how these companies are building the types of high-tech dystopias that science fiction has been warning us about for decades. And in this space there are some who seem eager to allow a new myth to take root: one in which the unsettling connections between big tech firms and the military industrial complex is something new. But as Yasha Levine’s important new book, Surveillance Valley, deftly demonstrates the history of the big tech firms, complete with its panoptic overtones, is thoroughly interwoven with the history of the repressive state apparatus. While many people may be at least nominally aware of the links between early computing, or the proto-Internet, and the military, Levine’s book reveals the depth of these connections and how they persist. As he provocatively puts it, “the Internet was developed as a weapon and remains a weapon today” (9).

    Thus, cases of Google building military drones, Facebook watching us all, and Amazon making facial recognition software for the police, need to be understood not as aberrations. Rather, they are business as usual.

    Levine begins his account with the war in Vietnam, and the origins of a part of the Department of Defense known as the Advanced Research Projects Agency (ARPA) – an outfit born of the belief that victory required the US to fight a high-tech war. ARPA’s technocrats earnestly believed “in the power of science and technology to solve the world’s problems” (23), and they were confident that the high-tech systems they developed and deployed (such as Project Igloo White) would allow the US to triumph in Vietnam. And though the US was not ultimately victorious in that conflict, the worldview of ARPA’s technocrats was, as was the linkage between the nascent tech sector and the military. Indeed, the tactics and techniques developed in Vietnam were soon to be deployed for dealing with domestic issues, “giving a modern scientific veneer to public policies that reinforced racism and structural poverty” (30).

    Much of the early history of computers, as Levine documents, is rooted in systems developed to meet military and intelligence needs during WWII – but the Cold War provided plenty of impetus for further military reliance on increasingly complex computing systems. And as fears of nuclear war took hold, computer systems (such as SAGE) were developed to surveil the nation and provide military officials with a steady flow of information. Along with the advancements in computing came the dispersion of cybernetic thinking which treated humans as information processing machines, not unlike computers, and helped advance a worldview wherein, given enough data, computers could make sense of the world. All that was needed was to feed more, and more, information into the computers – and intelligence agencies proved to be among the first groups interested in taking advantage of these systems.

    While the development of these systems of control and surveillance ran alongside attempts to market computers to commercial firms, Levine’s point is that it was not an either/or situation but a both/and, “computer technology is always ‘dual use,’ to be used in both commercial and military applications” (58) – and this split allows computer scientists and engineers who would be morally troubled by the “military applications” of their work to tell themselves that they work strictly on the commercial, or scientific side. ARPANET, the famous forerunner of the Internet, was developed to connect computer centers at a variety of prominent universities. Reliant on Interface Message Processors (IMPs) the system routed messages through the network through a variety of nodes and in the case that one node went down the system would reroute the message through other nodes – it was a system of relaying information built to withstand a nuclear war.

    Though all manner of utopian myths surround the early Internet, and by extension its forerunner, Levine highlights that “surveillance was baked in from the very beginning” (75). Case in point, the largely forgotten CONUS Intel program that gathered information on millions of Americans. By encoding this information on IBM punch cards, which were then fed into a computer, law enforcement groups and the army were able to access information not only regarding criminal activity, but activities protected by the first amendment. As news of these databases reached the public they generated fears of a high-tech surveillance society, leading some Senators, such as Sam Ervin, to push back against the program. And in a foreshadowing of further things to come, “the army promised to destroy the surveillance files, but the Senate could not obtain definitive proof that the files were ever fully expunged,” (87). Though there were concerns about the surveillance potential of ARPANET, its growing power was hardly checked, and more government agencies began building their own subnetworks (PRNET, SATNET). Yet, as they relied on different protocols, these networks could not connect to each other, until TCP/IP “the same basic network language that powers the Internet today” (95), allowed them to do so.

    Yet surveillance of citizens, and public pushback against computerized control, is not the grand origin story that most people are familiar with when it comes to the Internet. Instead the story that gets told is one whereby a military technology is filtered through the sieve of a very selective segment of the 1960s counterculture to allow it to emerge with some rebellious credibility. This view, owing much to Stewart Brand, transformed the nascent Internet from a military technology into a technology for everybody “that just happened to be run by the Pentagon” (106). Brand played a prominent and public role in rebranding the computer, as well as those working on the computers – turning these cold calculating machines into doors to utopia, and portraying computer programmers and entrepreneurs as the real heroes of the counterculture. In the process the military nature of these machines disappeared behind a tie-dyed shirt, and the fears of a surveillance society were displaced by hip promises of total freedom. The government links to the network were further hidden as ARPANET slowly morphed into the privatized commercial system we know as the Internet. It may seem mind boggling that the Internet was simply given away with “no real public debate, no discussion, no dissension, and no oversight” (121), but it is worth remembering that this was not the Internet we know. Rather it was how the myth of the Internet we know was built. A myth that combined, as was best demonstrated by Wired magazine, “an unquestioning belief in the ultimate goodness and rightness of markets and decentralized computer technology, no matter how it was used” (133).

    The shift from ARPANET to the early Internet to the Internet of today presents a steadily unfolding tale wherein the result is that, today, “the Internet is like a giant, unseen blob that engulfs the modern world” (169). And in terms of this “engulfing” it is difficult to not think of a handful of giant tech companies (Amazon, Facebook, Apple, eBay, Google) who are responsible for much of that. In the present Internet atmosphere people have become largely inured to the almost clichéd canard that “if you’re not paying, you are the product,” but what this represents is how people have, largely, come to accept that the Internet is one big surveillance machine. Of course, feeding information to the giants made a sort of sense, many people (at least early on) seem to have been genuinely taken in by Google’s “Don’t Be Evil” image, and they saw themselves as the beneficiaries of the fact that “the more Google knew about someone, the better its search results would be” (150). The key insight that firms like Google seem to have understood is that a lot can be learned about a person based on what they do online (especially when they think no one is watching) – what people search for, what sites people visit, what people buy. And most importantly, what these companies understand is that “everything that people do online leaves a trail of data” (169), and controlling that data is power. These companies “know us intimately, even the things that we hide from those closest to us” (171). ARPANET found itself embroiled in a major scandal, at its time, when it was revealed how it was being used to gather information on and monitor regular people going about their lives – and it may well be that “in a lot of ways” the Internet “hasn’t changed much from its ARPANET days. It’s just gotten more powerful” (168).

    But even as people have come to gradually accept, by their actions if not necessarily by their beliefs, that the Internet is one big surveillance machine – periodically events still puncture this complacency. Case in point: Edward Snowden’s revelations about the NSA which splashed the scale of Internet assisted surveillance across the front pages of the world’s newspapers. Reporting linked to the documents Snowden leaked revealed how “the NSA had turned Silicon Valley’s globe-spanning platforms into a de facto intelligence collection apparatus” (193), and these documents exposed “the symbiotic relationship between Silicon Valley and the US government” (194). And yet, in the ensuing brouhaha, Silicon Valley was largely able to paint itself as the victim. Levine attributes some of this to Snowden’s own libertarian political bent, as he became a cult hero amongst technophiles, cypher-punks, and Internet advocates, “he swept Silicon Valley’s role in Internet surveillance under the rug” (199), while advancing a libertarian belief in “the utopian promise of computer networks” (200) similar to that professed by Steward Brand. In many ways Snowden appeared as the perfect heir apparent to the early techno-libertarians, especially as he (like them) focused less on mass political action and instead more on doubling-down on the idea that salvation would come through technology. And Snowden’s technology of choice was Tor.

    While Tor may project itself as a solution to surveillance, and be touted as such by many of its staunchest advocates, Levine casts doubt on this. Noting that, “Tor works only if people are dedicated to maintaining a strict anonymous Internet routine,” one consisting of dummy e-mail accounts and all transactions carried out in Bitcoin, Levine suggests that what Tor offers is “a false sense of privacy” (213). Levine describes the roots of Tor in an original need to provide government operatives with an ability to access the Internet, in the field, without revealing their true identities; and in order for Tor to be effective (and not simply signal that all of its users are spies and soldiers) the platform needed to expand its user base: “Tor was like a public square—the bigger and more diverse the group assembled there, the better spies could hide in the crowd” (227).

    Though Tor had spun off as an independent non-profit, it remained reliant for much of its funding on the US government, a matter which Tor aimed to downplay through emphasizing its radical activist user base and by forming close working connections with organizations like WikiLeaks that often ran afoul of the US government. And in the figure of Snowden, Tor found a perfect public advocate, who seemed to be living proof of Tor’s power – after all, he had used it successfully. Yet, as the case of Ross Ulbricht (the “Dread Pirate Roberts” of Silk Road notoriety) demonstrated, Tor may not be as impervious as it seems – researchers at Carnegie Mellon University “had figured out a cheap and easy way to crack Tor’s super-secure network” (263). To further complicate matters Tor had come to be seen by the NSA “as a honeypot,” to the NSA “people with something to hide” were the ones using Tor and simply by using it they were “helping to mark themselves for further surveillance” (265). And much of the same story seems to be true for the encrypted messaging service Signal (it is government funded, and less secure than its fans like to believe). While these tools may be useful to highly technically literate individuals committed to maintaining constant anonymity, “for the average users, these tools provided a false sense of security and offered the opposite of privacy” (267).

    The central myth of the Internet frames it as an anarchic utopia built by optimistic hippies hoping to save the world from intrusive governments through high-tech tools. Yet, as Surveillance Valley documents, “computer technology can’t be separated from the culture in which it is developed and used” (273). Surveillance is at the core of, and has always been at the core of, the Internet – whether the all-seeing eye be that of the government agency, or the corporation. And this is a problem that, alas, won’t be solved by crypto-fixes that present technological solutions to political problems. The libertarian ethos that undergirds the Internet works well for tech giants and cypher-punks, but a real alternative is not a set of tools that allow a small technically literate gaggle to play in the shadows, but a genuine democratization of the Internet.

     

    *

     

    Surveillance Valley is not interested in making friends.

    It is an unsparing look at the origins of, and the current state of, the Internet. And it is a book that has little interest in helping to prop up the popular myths that sustain the utopian image of the Internet. It is a book that should be read by anyone who was outraged by the Facebook/Cambridge Analytica scandal, anyone who feels uncomfortable about Google building drones or Amazon building facial recognition software, and frankly by anyone who uses the Internet. At the very least, after reading Surveillance Valley many of those aforementioned situations seem far less surprising. While there are no shortage of books, many of them quite excellent, that argue that steps need to be taken to create “the Internet we want,” in Surveillance Valley Yasha Levine takes a step back and insists “first we need to really understand what the Internet really is.” And it is not as simple as merely saying “Google is bad.”

    While much of the history that Levine unpacks won’t be new to historians of technology, or those well versed in critiques of technology, Surveillance Valley brings many, often separate strands into one narrative. Too often the early history of computing and the Internet is placed in one silo, while the rise of the tech giants is placed in another – by bringing them together, Levine is able to show the continuities and allow them to be understood more fully. What is particularly noteworthy in Levine’s account is his emphasis on early pushback to ARPANET, an often forgotten series of occurrences that certainly deserves a book of its own. Levine describes students in the 1960s who saw in early ARPANET projects “a networked system of surveillance, political control, and military conquest being quietly assembled by diligent researchers and engineers at college campuses around the country,” and as Levine provocatively adds, “the college kids had a point” (64). Similarly, Levine highlights NBC reporting from 1975 on the CIA and NSA spying on Americans by utilizing ARPANET, and on the efforts of Senators to rein in these projects. Though Levine is not presenting, nor is he claiming to present, a comprehensive history of pushback and resistance, his account makes it clear that liberatory claims regarding technology were often met with skepticism. And much of that skepticism proved to be highly prescient.

    Yet this history of resistance has largely been forgotten amidst the clever contortions that shifted the Internet’s origins, in the public imagination, from counterinsurgency in Vietnam to the counterculture in California. Though the area of Surveillance Valley that will likely cause the most contention is Levine’s chapters on crypto-tools like Tor and Signal, perhaps his greatest heresy is in his refusal to pay homage to the early tech-evangels like Stewart Brand and Kevin Kelly. While the likes of Brand, and John Perry Barlow, are often celebrated as visionaries whose utopian blueprints have been warped by power-hungry tech firms, Levine is frank in framing such figures as long-haired libertarians who knew how to spin a compelling story in such a way that made empowering massive corporations seem like a radical act. And this is in keeping with one of the major themes that runs, often subtlety, through Surveillance Valley: the substitution of technology for politics. Thus, in his book, Levine does not only frame the Internet as disempowering insofar as it runs on surveillance and relies on massive corporations, but he emphasizes how the ideological core of the Internet focuses all political action on technology. To every social, economic, and political problem the Internet presents itself as the solution – but Levine is unwilling to go along with that idea.

    Those who were familiar with Levine’s journalism before he penned Surveillance Valley will know that much of his reporting has covered crypto-tech, like Tor, and similar privacy technologies. Indeed, to a certain respect, Surveillance Valley can be read as an outgrowth of that reporting. And it is also important to note, as Levine does in the book, that Levine did not make himself many friends in the crypto community by taking on Tor. It is doubtful that cypherpunks will like Surveillance Valley, but it is just as doubtful that they will bother to actually read it and engage with Levine’s argument or the history he lays out. This is a shame, for it would be a mistake to frame Levine’s book as an attack on Tor (or on those who work on the project). Levine’s comments on Tor are in keeping with the thrust of the larger argument of his book: such privacy tools are high-tech solutions to problems created by high-tech society, that mainly serve to keep people hooked into all those high-tech systems. And he questions the politics of Tor, noting that “Silicon Valley fears a political solution to privacy. Internet Freedom and crypto offer an acceptable solution” (268). Or, to put it another way, Tor is kind of like shopping at Whole Foods – people who are concerned about their food are willing to pay a bit more to get their food there, but in the end shopping there lets people feel good about what they’re doing without genuinely challenging the broader system. And, of course, now Whole Foods is owned by Amazon. The most important element of Levine’s critique of Tor is not that it doesn’t work, for some (like Snowden) it clearly does, but that most users do not know how to use it properly (and are unwilling to lead a genuinely full-crypto lifestyle) and so it fails to offer more than a false sense of security.

    Thus, to say it again, Surveillance Valley isn’t particularly interested in making a lot of friends. With one hand it brushes away the comforting myths about the Internet, and with the other it pushes away the tools that are often touted as the solution to many of the Internet’s problems. And in so doing Levine takes on a variety of technoculture’s sainted figures like Stewart Brand, Edward Snowden, and even organizations like the EFF. While Levine clearly doesn’t seem interested in creating new myths, or propping up new heroes, it seems as though he somewhat misses an opportunity here. Levine shows how some groups and individuals had warned about the Internet back when it was still ARPANET, and a greater emphasis on such people could have helped create a better sense of alternatives and paths that were not taken. Levine notes near the book’s end that, “we live in bleak times, and the Internet is a reflection of them: run by spies and powerful corporations just as our society is run by them. But it isn’t all hopeless” (274). Yet it would be easier to believe the “isn’t all hopeless” sentiment, had the book provided more analysis of successful instances of pushback. While it is respectable that Levine puts forward democratic (small d) action as the needed response, this comes as the solution at the end of a lengthy work that has discussed how the Internet has largely eroded democracy. What Levine’s book points to is that it isn’t enough to just talk about democracy, one needs to recognize that some technologies are democratic while others are not. And though we are loathe to admit it, perhaps the Internet (and computers) simply are not democratic technologies. Sure, we may be able to use them for democratic purposes, but that does not make the technologies themselves democratic.

    Surveillance Valley is a troubling book, but it is an important book. It smashes comforting myths and refuses to leave its readers with simple solutions. What it demonstrates in stark relief is that surveillance and unnerving links to the military-industrial complex are not signs that the Internet has gone awry, but signs that the Internet is functioning as intended.

    _____

    Zachary Loeb is a writer, activist, librarian, and terrible accordion player. He earned his MSIS from the University of Texas at Austin, an MA from the Media, Culture, and Communications department at NYU, and is currently working towards a PhD in the History and Sociology of Science department at the University of Pennsylvania. His research areas include media refusal and resistance to technology, ideologies that develop in response to technological change, and the ways in which technology factors into ethical philosophy – particularly in regards of the way in which Jewish philosophers have written about ethics and technology. Using the moniker “The Luddbrarian,” Loeb writes at the blog Librarian Shipwreck, and is a frequent contributor to The b2 Review Digital Studies section.

    Back to the essay

  • Richard Hill – Review of Bauer and Latzer, Handbook on the Economics of the Internet

    Richard Hill – Review of Bauer and Latzer, Handbook on the Economics of the Internet

    a review of Johannes M. Bauer and Michal Latzer, eds., Handbook on the Economics of the Internet (Edward Elgar, 2016)

    by Richard Hill

    ~

    The editors of this book must be commended for having undertaken the task of producing it: it must surely have taken tremendous persistence and patience to assemble the broad range of chapters.  The result is a valuable book is valuable, even if at some parts are disappointing.  As is often the case for a compilation of articles written by different authors, the quality of the individual contributions is uneven: some are excellent, others not.  The book is valuable because it identifies many of the key issues regarding the economics of the Internet, but it is somewhat disappointing because some of the topics are not covered in sufficient depth and because some key topics are not covered at all.  For example, the digital divide is mentioned cursorily on pp. 6-7 of the hardback edition and there is no discussion of its historical origins, economic causes, future evolution, etc.

    Yet there is extensive literature on the digital divide, such as easily available overall ITU reports from 2016 and 2017, or more detailed ITU regional studies regarding international Internet interconnectivity for Africa and Latin America.  The historical impact of the abolition of the traditional telephony account settlement scheme is covered summarily in Chapter 2 of my book The New International Telecommunication Regulations and the Internet: A Commentary and Legislative History (2013).  One might have expected that a book dedicated to the economics of the Internet would have started from that event and explained its consequences, and analyse proposals regarding how to address the digital divide, for example the proposals made during the World Summit on the Information Society to create some kind of fund to bridge the gap (those proposals were not accepted).  I would have expected such a book to discuss the possibilities and the ramifications of an international version of the universal service funds that are used in many countries to minimize national digital divides between low-density rural areas and high-density cities.  But there is no discussion at all of these topics in the book.

    And there is little discussion of Artificial Intelligence (some of which is enabled by data obtained through the Internet) or of the disruption of labour markets that some believe is or will be caused by the Internet.  For a summary treatment of these topics, with extensive references, see sections 1 and 8 of my submission to the Working Group on Enhanced Cooperation.

    The Introduction of the book correctly notes that “Scale economies, interdependencies, and abundance are pervasive [in the Internet] and call for analytical concepts that augment the traditional approaches” (p. 3).  Yet, the book fails, on the whole, to deliver sufficient detail regarding such analytical concepts, an exception being the excellent discussion on pp. 297-308 of the Internet’s economic environment for innovation, in particular pp. 301-303.

    Of the 569 pages of text (in the hardcover edition), only 22 or so contain quantitative charts or tables (eight are in one chapter), and of those only 12 or so are original research.  Only one page has equations.  Of course the paucity of data in the book is due to the fact that data regarding the Internet is hard to obtain: in today’s privatized environment, companies strive to collect data, but not to publish it.  But economics is supposed to be a quantitative discipline, at least in part, so it would have been valuable if the book had included a chapter on the reasons for the relative paucity of reliable data (both micro and macro) concerning the Internet and the myriad of transactions that take place on the Internet.

    In a nutshell, the book gives good overall, comprehensive, and legible, descriptions of many trees, but in some cases without sufficient quantitative detail, whereas it mostly fails to provide an analysis of the forest comprised by the trees (except for the brilliant chapter by Eli Noam titled “From the Internet of Science to the Internet of Entertainment”).

    The book will be very valuable for people who know little or nothing about the Internet and its economics.  Those who know something will benefit from the extensive references given at the end of each chapter.  Those who know specific topics well will not learn much from this book.  A more appropriate title for the book would have been “A Comprehensive Introduction to the Economics of the Internet”.

    The rest of this review consists of brief reviews of each of the chapters of the book.  We start with the strongest chapter, followed by the weakest chapter, then review the other chapters in the order in which they appear in the book.

    1. From the Internet of Science to the Internet of Entertainment

    This chapter is truly excellent, as one would expect, given that it is written by Eli Noam.  It captures succinctly the key policy questions regarding the economics of the Internet.  We cite p. 564:

    • How to assure the financial viability of infrastructure?
    • Market power in the entertainment Internet?
    • Does vertical integration impede competition?
    • How to protect children, old people, and traditional morality?
    • How to protect privacy and security?
    • What is the impact on trade? What is the impact of globalization?
    • How to assure the interoperability of clouds?

    It is a pity that the book did not use those questions as key themes to be addressed in each chapter.  And it is a pity that the book did not address the industrial economics issues so well put forward.  We cite p. 565:

    Another economic research question is how to assure the financial viability of the infrastructure.  The financial balance between infrastructure, services, and users is a critical issue.  The infrastructure is expensive and wants to be paid.  Some of the media services are young and want to be left to grow.  Users want to be served generously with free content and low-priced, flat-rate data service.  Fundamental economics of competition push towards price deflation, but market power, and maybe regulation, pull in another direction.  Developing countries want to see money from communications as they did in the days of traditional telecom.

    Surely the other chapters of the book could have addressed these issues, which are being discussed publicly, see for example section 4 of the Summary of the 2017 ITU Open Consultation on so-called Over-the-Top (OTT) services.

    Noam’s discussion of the forces that are leading to fragmentation (pp. 558-560) is excellent.  He does not cite Mueller’s recent book on the topic, no doubt because this chapter of the book was written before Mueller’s book was published.  Muller’s book focuses on state actions, whereas Noam gives a convincing account of the economic drivers of fragmentation, and how such increased diversity may not actually be a negative development.

    Some minor quibbles: Noam does not discuss the economic impact of adult entertainment, yet it is no doubt significant.  The off-hand remark at the bottom of p. 557 to the effect that unleashing demand for entertainment might solve the digital divide is likely not well taken, and in any case would have to be justified by much more data.

    1. The Economics of Internet Standards

    I found this to be the weakest chapter in the book.  To begin with, it is mostly descriptive and contains hardly any real economic analysis.  The account of the Cisco/Huawei battle over MPLS-TP standards (pp. 219-222) is accurate, but it would have been nice to know what the economic drivers were of that battle, e.g. size of the market, respective market shares, values of the respective products based on the respective standards, who stood to gain/lose what (and not just the manufacturers, but also the network operators), etc.

    But the descriptive part is also weak.  For example, the Introduction gives the misleading impression that IETF standards are the dominant element in the growth of the Internet, whereas it was the World Wide Web Consortium’s (W3C) HTML and successor standards that enabled the web and most of what we consider to be the Internet today.  The history on p. 213 omits contributions from other projects such as Open Systems Interconnection (OSI) and CYCLADES.

    Since the book is about economics, surely it should have mentioned on pp. 214 and 217 how the IETF has become increasingly influenced by dominant manufacturers, see pp. 148-152 of Powers, Shawn M., and Jablonski, Michael (2015) The Real Cyberwar: The Political Economy of Internet Freedom; as Noam puts the matter on p. 559 of the book: “The [Internet] technical specifications are set by the Steering Group of the Internet Engineering Task Force (IETF), a small group of 15 engineers, almost all employees of big companies around the world.”

    And surely it should have discussed in section 10.4 (p. 214) the economic reasons that lead to greater adoption of TCP/IP over the competing OSI protocol, such as the lower implementation costs due to the lack of security of TCP/IP, the lack of non-ASCII support in the early IETF protocols, and the heavy subsidies provided by the US Defence Projects Research Agency (DARPA) and by the US National Science Foundation (NSF), which are well known facts recounted on pp. 533-541 of the book.  In addition to not dealing with economic issues, section 10.4 is an overly simplified account of what really happened.

    Section 10.7 (p. 222) is again, surprisingly devoid of any semblance of economic analysis.  Further, it perpetuates a self-serving, one-sided account of the 2012 World Conference on International Telecommunications (WCIT), without once citing scholarly writings on the issue, such as my book The New International Telecommunication Regulations and the Internet: A Commentary and Legislative History (2013).  The authors go so far as to cite the absurd US House proposition to the effect that the Internet should be “free of government control” without noting that what the US politicians meant is that it should be “free of foreign government control”, because of course the US has never had any intent of not subjecting the Internet to US laws and regulations.

    Indeed, at present, hardly anybody seriously questions the principle that offline law applies equally online.  One would expect a scholarly work to do better than to cite inane political slogans meant for domestic political purposes.  In particular when the citations are not used to underpin any semblance of economic analysis.

    1. The Economics of the Internet: An Overview

    This chapter provides a solid and thorough introduction to the basics of the economics of the Internet.

    1. The Industrial Organization of the Internet

    This chapter well presents the industrial organization of the Internet, that is, how the industry is structured economically, how its components interact economically, and how that is different from other economic sectors.  As the authors correctly state (p. 24): “ … the tight combination of high fixed and low incremental cost, the pervasive presence of increasing returns, the rapidity and frequency of entry and exit, high rates of innovation, and economies of scale in consumption (positive network externalities) have created unique economic conditions …”.  The chapter explains well key features such as multi-sided markets (p. 31).  And it correctly points out (p. 25) that “while there is considerable evidence that technologically dynamic industries flourish in the absence of government intervention, there is also evidence of the complementarity of public policy and the performance of high-tech markets.”  That is explored in pp. 45 ff. and in subsequent chapters, albeit not always in great detail.

    1. The Internet as a Complex Layered System

    This is an excellent chapter, one of the best in the book.  It explains how, because of the layered nature of the Internet, simple economic theories fail to capture its complexities.  As the chapter says (p. 68), the Internet is best viewed as a general purpose infrastructure.

    1. A Network Science Approach to the Internet

    This chapter provides a sound and comprehensive description of the Internet as a network, but it does not go beyond the description to provide analyses, for example regarding regulatory issues.  However, the numerous citations in the chapter do provide such analyses.

    1. Peer Production and Cooperation

    This chapter is also one of the best chapters in the book.  It provides an excellent description of how value is produced on the Internet, through decentralization, diverse motivations, and separation of governance and management.  It covers, and explains the differences between, peer production, crowd-sourcing, collaborative innovation, etc.  On p. 87 it provides an excellent quantitative description and analysis of specific key industry segments.  The key governance patterns in peer production are very well summarized on pp. 108-109 and 112-113.

    1. The Internet and Productivity

    This chapter actually contains a significant amount of quantitative data (which is not the case for most of the other chapters) and provides what I would consider to be an economic analysis of the issue, namely whether, and if so how, the Internet has contributed to productivity.  As the chapter points out, we lack sufficient data to analyse fully the impacts of the development of information and communication technologies since 2000, but this chapter does make an excellent contribution to that analysis.

    1. Cultural Economics and the Internet

    This is a good introduction to supply, demand, and markets for creative goods and services produced and/or distributed via the Internet.  The discussion of two-sided markets on p. 155 is excellent.  Unfortunately, however, the chapter is mostly a theoretical description: it does not refer to any actual data or provide any quantitative analysis of what is actually happening.

    1. A Political Economy Approach to the Internet

    This is another excellent chapters, one of the best in the book.  I noted one missing citation to a previous analysis of key issues from the political economics point of view: Powers, Shawn M., and Jablonski, Michael (2015) The Real Cyberwar: The Political Economy of Internet Freedom.  But the key issues are well discussed in the chapter:

    • The general trend towards monopolies and oligopolies of corporate ownership and control affecting the full range of Internet use and development (p. 164).
    • The specific role of Western countries and their militaries in supporting and directing specific trajectories (p. 165).
    • How the general trend towards privatization made it difficult to develop the Internet as a public information utility (p. 169).
    • The impact on labour, in particular shifting work to users (p. 170).
    • The rise and dominance of the surveillance economy (where users become the product because their data is valuable) (p. 175).
    1. Competition and Anti-Trust in Internet Markets

    This chapter provides a very good overview of the competition and anti-trust issues related to the Internet, but it would have been improved if it had referred to the excellent discussion in Noam’s chapter “From the Internet of Science to the Internet of Entertainment.”  It would have been improved by referring to recent academic literature on the topic.  Nevertheless, the description of key online market characteristics, including that they are often two-sided, (p. 184) is excellent.  The description of the actual situation (including litigation) regarding search engines on p. 189 ff. is masterful: a superb example of the sort of real economic analysis that I would have liked to see in other chapters.

    The good discussion of network neutrality (p. 201) could have been improved by taking the next step and analysing the economic implications of considering whether the Internet infrastructure should be regulated as a public infrastructure and/or, for example, be subject to functional separation.

    1. The Economics of Copyright and the Internet

    This is an excellent introduction to the issues relating to copyright in the digital age.  It provides little data but that is because, as noted on pp. 238-241, there is a paucity of data for copyright, whereas there is more for patents.

    1. The Economics of Privacy, Data Protection and Surveillance

    As one would expect from its author, Ian Brown, this is an excellent discussion of the issues and, again, one of the best chapters in the book.  In particular, the chapter explains well and clearly (pp. 250 ff.) why market failures (e.g externalities, information asymmetries and anti-competitive market structures) might justify regulation (such as the European data privacy rules).

    1. Economics of Cybersecurity

    This chapter provides a very good overview of the economic issues related to cybersecurity, but, like most of the other chapters, it provides very little data and thus no detailed economic analysis.  It would have benefited from referring to the Internet Society’s 2016 Global Internet Report, which does provide data, and stresses the key market failures that result in the current lack of security of the Internet: information asymmetries (section 13.7.2 of the book) and externalities (section 13.7.3).

    However, the section on externalities fails to mention certain possible solutions, such as minimum security standards.  Minimum safety standards are imposed on many products, such as electrical appliances, automobiles, airplanes, pharmaceuticals, etc.  Thus it would have been appropriate for the book to discuss the economic implications of minimum security standards.  And also the economic implications of Microsoft’s recent call for a so-called Geneva Digital Convention.

    1. Internet Architecture and Innovation in Applications

    This chapter provides a very good description, but it suffers from considering the Internet in isolation, without comparing it to other networks, in particular the fixed and mobile telephone networks.  It would have been good to see a discussion and comparison of the economic drivers of innovation or lack of innovation in the two networks.  And also a discussion of the economic role of the telephony signalling network, Signalling System Seven (SS7) which enabled implementation of the widely used, and economically important, Short Messaging Service (SMS).

    In that context, it is important to note that SS7 is, as is the Internet, a connectionless packet-switched system.  So what distinguishes the two networks is more than technology: indeed, economic factors (such as how services are priced for end-users, interconnection regimes, etc.) surely play a role, and it would have been good if those had been explored.  In this context, see my paper “The Internet, its governance, and the multi-Stakeholder model”, Info, vol. 16. no. 2, March 2014.

    1. Organizational Innovations, ICTs and Knowledge Governance: The Case of Platforms

    As this excellent chapter, one of the best in the books, correctly notes, “platforms constitute a major organizational innovation” which has been “made possible by technological innovation”.

    As explained on pp. 338-339, platforms are one of the key components of the Internet economy, and this has recently been recognized by governments.  For example, the Legal Affairs Committee of the European Parliament adopted an Opinion in May 2017 that, among other provisions:

    Calls for an appropriate and proportionate regulatory framework that would guarantee responsibility, fairness, trust and transparency in platforms’ processes in order to avoid discrimination and arbitrariness towards business partners, consumers, users and workers in relation to, inter alia, access to the service, appropriate and fair referencing, search results, or the functioning of relevant application programming interfaces, on the basis of interoperability and compliance principles applicable to platforms.

    The topic is covered to some extent a European Parliament Committee Report on online platforms and the digital single market, (2016/2276(INI).  And by some provisions in French law.  Detailed references to the cited documents, and to other material relevant to platforms, are found in section 9 of my submission to the Working Group on Enhanced Cooperation.

    1. Interconnection in the Internet: Peering, Interoperability and Content Delivery

    This chapter provides a very good description of Internet interconnection, including a good discussion of the basic economic issues.  As do the other chapters, it suffers from a paucity of data, and does not discuss whether the current interconnection regime is working well, or whether it is facing economic issues.  The chapter does point out (p. 357) that “information about actual interconnection agreements … may help to understand how interconnection markets are changing …”, but fails to discuss how the unique barter structure of Internet interconnections, most of which are informal, zero-cost traffic sharing agreements, impedes the collection and publication of such information.

    The discussion on p. 346 would have benefited from an economic analysis of the advantages/disadvantages of considering the basic Internet infrastructure to be a basic public infrastructure (such as roads, water and electrical power distribution systems, etc.) and the economic tradeoffs of regulating its interconnection.

    Section 16.5.1 would have benefited from a discussion of the economic drivers behind the discussions in ITU that lead to the adoption of ITU-T Recommendation D.50 and its Supplements, and the economic issues arguing for and against implementation of the provisions of that Recommendation.

    1. Internet Business Strategies

    As this very good chapter explains, the Internet has had a dramatic impact on all types of businesses, and has given rise to “platformization”, that is the use of platforms (see chapter 15 above) to conduct business.  Platforms benefit from network externalities and enable two-sided markets.  The chapter includes a detailed analysis (pp. 370-372) of the strategic properties of the Internet that can be used to facilitate and transform business, such as scalability, ubiquity, externalities, etc.  It also notes that the Internet has changed the role of customers and both reduced and increased information asymmetries.  The chapter provides a very good taxonomy of Internet business models (pp. 372 ff.).

    1. The Economics of Internet Search

    The chapter contains a good history of search engines, and an excellent analysis of advertising linked to searches.  It provides theoretical models and explains the important of two-sided markets in this context.  As the chapter correctly notes, additional research will require access to more data than are currently available.

    1. The Economics of Algorithmic Selection on the Internet

    As this chapter correctly notes (p. 395), “algorithms have come to shape our daily lives and realities.”  They have significant economic implication and raise “significant social risks such as manipulation and data bias, threats to privacy and violations of intellectual property rights”.  A good description of different types of algorithms and how they are used is given on p. 399.  Scale effects and concentration are discussed (p. 408) and the social risks are explained in detail on pp. 411 ff.:

    • Threats to basic rights and liberties.
    • Impacts on the mediation of reality.
    • Challenges to the future development of the human species.

    More specifically:

    • Manipulation
    • Diminishing variety
    • Constraints on freedom of expression
    • Threats to data protection and privacy
    • Social discrimination
    • Violation of intellectual property rights
    • Possible adaptations of the human brain
    • Uncertain effects on humans

    In this context, see also the numerous references in section 1 of my submission to the Working Group on Enhanced Cooperation.

    The chapter includes a good discussion of different governance models and their advantages/disadvantages, namely:

    • Laissez-fair markets
    • Self-organization by business
    • Self-regulation by industry
    • State regulation
    1. Online Advertising Economics

    This chapter provides a good history of what some have referred to as the Internet’s original sin, namely the advent of online advertising as the main revenue source for many Internet businesses.  It explains how the Internet can, and does, improve the efficiency of advertising by targeting (pp. 430 ff.) and it includes a detailed analysis of advertising in relation to search engines (pp. 435 ff.).

    1. Online News

    As the chapter correctly notes, this is an evolving area, so the chapter mostly consists of a narrative history.  The chapter’s conclusion starts by saying that “the Internet has brought growth and dynamism to the news industry”, but goes on to note, correctly, that “the financial outlook for news providers, old or new, is bleak” and that, thus far, nobody has found a viable business model to fund the online news business.  It is a pity that this chapter does not cite McChesney’s detailed analysis of this issue and discuss his suggestions for addressing it.

    1. The Economics of Online Video Entertainment

    This chapter provides the history of that segment of the Internet industry and includes a valuable comparison and analysis of the differences between online and offline entertainment media (pp. 462-464).

    1. Business Strategies and Revenue Models for Converged Video Services

    This chapter provides a clear and comprehensive description of how an effect of convergence “is the blurring of lines between formerly separated media platforms such as over-the-air broadcasting, cable TV, and streamed media.”  The chapter describes ten strategies and six revenue models that have been used to cope with these changes.

    1. The Economics of Virtual Worlds

    This chapter provides a good historical account of the evolution of the internal reward system of games, which went from virtual objects that players could obtain by solving puzzles (or whatever) to virtual money that could be acquired only within the game, to virtual money that could be acquired with real-world money, to large professional factories that produce and sell objects to World of Wonders players in exchange for real-world money.  The chapter explores the legal and economic issues arising out of these situations (pp. 503-504) and gives a good overview of the research in virtual economies.

    1. Economics of Big Data

    This chapter correctly notes (p. 512) that big data is “a field with more questions than answers”.  Thus, logically, the chapter is mostly descriptive.  It includes a good account of two-sided markets (p. 519), and correctly notes (p. 521) that “data governance should not be construed merely as an economic matter but that it should also encompass a social perspective”, a position with which I wholeheartedly agree.  As the chapter says (p. 522), “there are some areas affected by big data where public policies and regulations do exist”, in particular regarding:

    • Privacy
    • Data ownership
    • Open data

    As the chapter says (p. 522), most evidence available today suggests that markets are not “responding rapidly to concerns of users about the (mis)use of their personal information”.  For additional discussion, with extensive references, see section 1 of my submission to the Working Group on Enhanced Cooperation.

    1. The Evolution of the Internet: A Socioeconomic Account

    This is a very weak chapter.  Its opening paragraph fails to consider the historical context of the development of the Internet, or its consequences.  Its second paragraph fails to consider the overt influence of the US government on the evolution of the Internet.  Section 26.3 fails to cite one of the most comprehensive works on the topic (the relation between AT&T and the development of the internet), namely Schiller, Dan (2014) Digital Depression: Information Technology and Information Crisis, University of Illinois Press.  The discussion on p. 536 fails to even mention the Open Systems Interconnection (OSI) initiative, yet that initiative undoubtedly affected the development of the Internet, not just by providing a model for how not to do things (too complex, too slow), but also by providing some basic technology that is still used to this day, such as X.509 certificates.

    Section 26.6, on how market forces affect the Internet, seems oblivious to the rising evidence that dominant market power, not competition, is shaping the future of the Internet, which appears surprising in light of the good chapter in the book on that very topic: “Competition and anti-trust in Internet markets.”  Page 547 appears to ignore the rising vertical integration of many Internet services, even though that trend is well discussed in Noam’s excellent chapter “From the Internet of Science to the Internet of Entertainment.”

    The discussion of the role of government on p. 548 is surprisingly lacunary, given the rich literature on the topic in general, and specific government actions or proposed actions regarding topics such as freedom of speech, privacy, data protection, encryption, security, etc. (see for example my submission to the Working Group on Enhanced Cooperation).

    This chapter should have started with the observation that the Internet was not conceived as a public network (p. 558) and build on that observation, explaining the socioeconomic factors that shaped its transformation from a closed military/academic network into a public network and into a basic infrastructure that now underpins most economic activities.

    _____

    Richard Hill is President of the Association for Proper internet Governance, and was formerly a senior official at the International Telecommunication Union (ITU). He has been involved in internet governance issues since the inception of the internet and is now an activist in that area, speaking, publishing, and contributing to discussions in various forums. Among other works he is the author of The New International Telecommunication Regulations and the Internet: A Commentary and Legislative History (Springer, 2014). He writes frequently about internet governance issues for The b2o Review Digital Studies magazine.

    Back to the essay

  • Richard Hill — Knots of Statelike Power (Review of Harcourt, Exposed: Desire and Disobedience in the Digital Age)

    Richard Hill — Knots of Statelike Power (Review of Harcourt, Exposed: Desire and Disobedience in the Digital Age)

    a review of Bernard Harcourt, Exposed: Desire and Disobedience in the Digital Age (Harvard, 2015)

    by Richard Hill

    ~

    This is a seminal and important book, which should be studied carefully by anyone interested in the evolution of society in light of the pervasive impact of the Internet. In a nutshell, the book documents how and why the Internet turned from a means to improve our lives into what appears to be a frightening dystopia driven by the collection and exploitation of personal data, data that most of us willingly hand over with little or no care for the consequences. “In our digital frenzy to share snapshots and updates, to text and videochat with friends and lovers … we are exposing ourselves‒rendering ourselves virtually transparent to anyone with rudimentary technological capabilities” (page 13 of the hardcover edition).

    The book meets its goals (25) of tracing the emergence of a new architecture of power relations; to document its effects on our lives; and to explore how to resist and disobey (but this last rather succinctly). As the author correctly says (28), metaphors matter, and we need to re-examine them closely, in particular the so-called free flow of data.

    As the author cogently points out, quoting Media Studies scholar Siva Vaidhyanathan, we “assumed digitization would level the commercial playing field in wealthy economies and invite new competition into markets that had always had high barriers to entry.” We “imagined a rapid spread of education and critical thinking once we surmounted the millennium-old problems of information scarcity and maldistribution” (169).

    “But the digital realm does not so much give us access to truth as it constitutes a new way for power to circulate throughout society” (22). “In our digital age, social media companies engage in surveillance, data brokers sell personal information, tech companies govern our expression of political views, and intelligence agencies free-ride off e-commerce. … corporations and governments [are enabled] to identify and cajole, to stimulate our consumption and shape our desires, to manipulate us politically, to watch, surveil, detect, predict, and, for some, punish. In the process, the traditional limits placed on the state and on governing are being eviscerated, as we turn more and more into marketized malleable subjects who, willingly or unwillingly, allow ourselves to be nudged, recommended, tracked, diagnosed, and predicted by a blurred amalgam of governmental and commercial initiative” (187).

    “The collapse of the classic divide between the state and society, between the public and private sphere, is particular debilitating and disarming. The reason is that the boundaries of the state had always been imagined in order to limit them” (208). “What is emerging in the place of separate spheres [of government and private industry] is a single behemoth of a data market: a colossal market for personal data” (198). “Knots of statelike power: that is what we face. A tenticular amalgam of public and private institutions … Economy, society, and private life melt into a giant data market for everyone to trade, mine, analyze, and target” (215). “This is all the more troubling because the combinations we face today are so powerful” (210).

    As a consequence, “Digital exposure is restructuring the self … The new digital age … is having profound effects on our analogue selves. … it is radically transforming our subjectivity‒even for those, perhaps even more, who believe they have nothing to fear” (232). “Mortification of the self, in our digital world, happens when subjects voluntarily cede their private attachments and their personal privacy, when they give up their protected personal space, cease monitoring their exposure on the Internet, let go of their personal data, and expose their intimate lives” (233).

    As the book points out, quoting Software Freedom Law Center founder Eben Moglen, it is justifiable to ask whether “any form of democratic self-government, anywhere, is consistent with the kind of massive, pervasive, surveillance into which the United States government has led not only its people but the world” (254). “This is a different form of despotism, one that might take hold only in a democracy: one in which people loose the will to resist and surrender with broken spirit” (255).

    The book opens with an unnumbered chapter that masterfully reminds us of the digital society we live in: a world in which both private companies and government intelligence services (also known as spies) read our e-mails and monitor our web browsing. Just think of “the telltale advertisements popping up on the ribbon of our search screen, reminding us of immediately past Google or Bing queries. We’ve received the betraying e-mails in our spam folders” (2). As the book says, quoting journalist Yasha Levine, social media has become “a massive surveillance operation that intercepts and analyses terabytes of data to build and update complex psychological profiles on hundreds of millions of people all over the world‒all of it in real time” (7). “At practically no cost, the government has complete access to people’s digital selves” (10).

    We provide all this data willingly (13), because we have no choice and/or because we “wish to share our lives with loved ones and friends” (14). We crave digital connections and recognition and “Our digital cravings are matched only by the drive and ambition of those who are watching” (14). “Today, the drive to know everything, everywhere, at every moment is breathtaking” (15).

    But “there remain a number of us who continue to resist. And there are many more who are ambivalent about the loss of privacy or anonymity, who are deeply concerned or hesitant. There are some who anxiously warn us about the dangers and encourage us to maintain reserve” (13).

    “And yet, even when we hesitate or are ambivalent, it seems there is simply no other way to get things done in the new digital age” (14), be it airline tickets, hotel reservations, buying goods, booking entertainment. “We make ourselves virtually transparent for everyone to see, and in so doing, we allow ourselves to be shaped in unprecedented ways, intentionally or wittingly … we are transformed and shaped into digital subjects” (14). “It’s not so much a question of choice as a feeling of necessity” (19). “For adolescents and young adults especially, it is practically impossible to have a social life, to have friends, to meet up, to go on dates, unless we are negotiating the various forms of social media and mobile technology” (18).

    Most have become dulled by blind faith in markets, the neoliberal mantra (better to let private companies run things than the government), fear of terrorism‒dulled into believing that, if we have nothing to hide, then there is nothing to fear (19). Even though private companies, and governments, know far more about us than a totalitarian regime such as that of East Germany “could ever have dreamed” (20).

    “We face today, in advanced liberal democracies, a radical new form of power in a completely altered landscape of political and social possibilities” (17). “Those who govern, advertise, and police are dealing with a primary resource‒personal data‒that is being handed out for free, given away in abundance, for nothing” (18).

    According to the book “There is no conspiracy here, nothing untoward.” But the author probably did not have access to Shawn M. Powers and Michael Jablonski’s The Real Cyberwar: The Political Economy of Internet Freedom (2015), published around the same time as Harcourt’s book, which shows that actually the current situation was created, or at least facilitated, by deliberate actions of the US government (which were open, not secret), resulting in what the book calls, quoting journalist James Bamford, “a surveillance-industrial empire” (27).

    The observations and conclusions outlined above are meticulously justified, with numerous references, in the numbered chapters of the book. Chapter 1 explains how analogies of the current surveillance regime to Orwell’s 1984 are imperfect because, unlike in Orwell’s imagined world, today most people desire to provide their personal data and do so voluntarily (35). “That is primarily how surveillance works today in liberal democracies: through the simplest desires, curated and recommended to us” (47).

    Chapter 2 explains how the current regime is not really a surveillance state in the classical sense of the term: it is a surveillance society because it is based on the collaboration of government, the private sector, and people themselves (65, 78-79). Some believe that government surveillance can prevent or reduce terrorist attacks (55-56), never mind that it might violate constitutional rights (56-57), or be ineffective, or that terrorist attacks in liberal democracies have resulted in far fewer fatalities than, say, traffic accidents or opiod overdose.

    Chapter 3 explains how the current regime is not actually an instantiation of Jeremy Bentham’s Panopticon, because we are not surveilled in order to be punished‒on the contrary, we expose ourselves in order to obtain something we want (90), and we don’t necessarily realize the extent to which we are being surveilled (91). As the book puts it, Google strives “to help people get what they want” by collecting and processing as much personal data as possible (103).

    Chapter 4 explains how narcissism drives the willing exposure of personal data (111). “We take pleasure in watching [our friends], ‘following’ them, ‘sharing’ their information‒even while we are, unwittingly, sharing our every keyboard stroke” (114). “We love watching others and stalking their digital traces” (117).

    Yet opacity is the rule for corporations‒as the book says, quoting Frank Pasquale (124-125), “Internet companies collect more and more data on their users but fight regulations that would let those same users exercise some control over the resulting digital dossiers.” In this context, it is worth noting the recent proposals, analyzed here, here, and here, to the World Trade Organization that would go in the direction favored by dominant corporations.

    The book explains in summary fashion the importance of big data (137-140). For an additional discussion, with extensive references, see sections 1 of my submission to the Working Group on Enhanced Cooperation. As the book correctly notes, “In the nineteenth century, it was the government that generated data … But now we have all become our own publicists. The production of data has become democratized” (140).

    Chapter 5 explains how big data, and its analysis, is fundamentally different from the statistics that were collected, analyzed, and published in the past by governments. The goal of statistics is to understand and possibly predict the behavior of some group of people who share some characteristics (e.g. they live in a particular geographical area, or are of the same age). The goal of big data is to target and predict individuals (158, 161-163).

    Chapter 6 explains how we have come to accept the loss of privacy and control of our personal data (166-167). A change in outlook, largely driven by an exaggerated faith in free enterprise (168 and 176), “has made it easier to commodify privacy, and, gradually, to eviscerate it” (170). “Privacy has become a form of private property” (176).

    The book documents well the changes in the US Supreme Court’s views of privacy, which have moved from defending a human right to balancing privacy with national security and commercial interests (172-175). Curiously, the book does not mention the watershed Smith vs. Maryland case, in which the US Supreme Court held that telephone metadata is not protected by the right to privacy, nor the US Electronic Communications Privacy Act, under which many e-mails are not protected either.

    The book mentions the incestuous ties between the intelligence community, telecommunications companies, multinational companies, and military leadership that have facilitated the implementation of the current surveillance regime (178); these ties are exposed and explained in greater detail in Powers and Jablonski’s The Real Cyberwar. This chapter ends with an excellent explanation of how digital surveillance records are in no way comparable to the old-fashioned paper files that were collected in the past (181).

    Chapter 7 explores the emerging dystopia, engendered by the fact that “The digital economy has torn down the conventional boundaries between governing, commerce, and private life” (187). In a trend that should be frightening, private companies now exercise censorship (191), practice data mining on scales that are hard to imagine (194), control worker performance by means beyond the dreams of any Tayorlist (196), and even aspire to “predict consumer preferences better than consumers themselves can” (198).

    The size of the data brokerage market is huge and data on individuals is increasingly used to make decision about them, e.g. whether they can obtain a loan (198-208). “Practically none of these scores [calculated from personal data] are revealed to us, and their accuracy is often haphazard” (205). As noted above, we face an interdependent web of private and public interests that collect, analyze, refine, and exploit our personal data‒without any meaningful supervision or regulation.

    Chapter 8 explains how digital interactions are reconfiguring our self-images, our subjectivity. We know, albeit at times only implicitly, that we are being surveilled and this likely affects the behavior of many (218). Being deprived of privacy affects us, much as would being deprived of property (229). We have voluntarily given up much of our privacy, believing either that we have no choice but to accept surveillance, or that the surveillance is in our interests (233). So it is our society as a whole that has created, and nurtures, the surveillance regime that we live in.

    As shown in Chapter 9, that regime is a form of digital incarceration. We are surveilled even more closely than are people obliged by court order to wear electronic tracking devices (237). Perhaps a future smart watch will even administer sedatives (or whatever) when it detects, by analyzing our body functions and comparing with profiles downloaded from the cloud, that we would be better off being sedated (237). Or perhaps such a watch will be hijacked by malware controlled by an intelligence service or by criminals, thus turning a seemingly free choice into involuntary constraints (243, 247).

    Chapter 10 show in detail how, as already noted, the current surveillance regime is not compatible with democracy. The book cites Tocqueville to remind us that democracy can become despotic, and result is a situation where “people lose the will to resist and surrender with broken spirit” (255). The book summarily presents well-known data regarding the low voter turnouts in the United States, a topic covered in full detail in Robert McChesney’s  Digital Disconnect: How Capitalism is Turning the Internet Against Democracy (2014) which explains how the Internet is having a negative effect on democracy. Yet “it remains the case that the digital transparency and punishment issues are largely invisible to democratic theory and practice” (216).

    So, what is to be done? Chapter 11 extols the revelations made by Edward Snowden and those published by Julian Assange (WikiLeaks). It mentions various useful self-help tools, such as “I Fight Surveillance” and “Security in a Box” (270-271). While those tools are useful, they are not at present used pervasively and thus don’t really affect the current surveillance regime. We need more emphasis on making the tools available and on convincing more people to use them.

    As the book correctly says, an effective measure would be to carry the privatization model to its logical extreme (274): since personal data is valuable, those who use it should pay us for it. As already noted, the industry that is thriving from the exploitation of our personal data is well aware of this potential threat, and has worked hard to attempt to obtain binding international norms, in the World Trade Organization, that would enshrine the “free flow of data”, where “free” in the sense of freedom of information is used as a Trojan Horse for the real objective, which is “free” in the sense of no cost and no compensation for those the true owners of the data, we the people. As the book correctly mentions, civil society organizations have resisted this trend and made proposals that go in the opposite direction (276), including a proposal to enshrine the necessary and proportionate principles in international law.

    Chapter 12 concludes the book by pointing out, albeit very succinctly, that mass resistance is necessary, and that it need not be organized in traditional ways: it can be leaderless, diffuse, and pervasive (281). In this context, I refer to the work of the JustNet Coalition and of the fledgling Internet Social Forum (see also here and here).

    Again, this book is essential reading for anybody who is concerned about the current state of the digital world, and the direction in which it is moving.

    _____

    Richard Hill is President of the Association for Proper internet Governance, and was formerly a senior official at the International Telecommunication Union (ITU). He has been involved in internet governance issues since the inception of the internet and is now an activist in that area, speaking, publishing, and contributing to discussions in various forums. Among other works he is the author of The New International Telecommunication Regulations and the Internet: A Commentary and Legislative History (Springer, 2014). He writes frequently about internet governance issues for The b2o Review Digital Studies magazine.

    Back to the essay

  • Richard Hill — The Root Causes of Internet Fragmentation

    Richard Hill — The Root Causes of Internet Fragmentation


    a review of Scott Malcomson, Splinternet: How Geopolitics and Commerce Are Fragmenting the World Wide Web
      (OR Books, 2016)
    by Richard Hill
    ~

    The implicit premise of this valuable book is that “we study the past to understand the present; we understand the present to guide the future.” In that light, the book makes a valuable contribution by offering a sound and detailed historical survey of aspects of the Internet which are not well-known nor easily accessible outside the realms of dedicated internet research. However, as explained below, the author has not covered some important aspects of the past and thus the work is incomplete as a guide to the future. This should not be taken as criticism, but as a call for the author, or other scholars, to complete the work.

    The book starts by describing how modern computers and computer networks evolved from the industrialization of war and in particular due to the advantages that could be gained by automating the complex mathematical calculations required for ballistics on the one hand (computers) and by speeding up communications between elements of armed forces on the other hand (networks). Given the effectiveness of ICTs for war, belligerents before, during, and after World War II heavily funded research and development of those technologies in the military context, even if much of the research was outsourced to the private sector.

    Malcomson documents how the early founders of what we now call computer science were based in the USA and were closely associated with US military efforts: “the development of digital computing was principally an unintended byproduct of efforts to improve the accuracy of gunfire against moving targets” (49).

    Chapter 1 ends with an account of how Cold War military concerns (especially so-called mutual assured destruction by nuclear weapons) led to the development of packet switched networks in order to interconnect powerful computers: ARPANET, which evolved to become the Internet.

    Chapter 2 explores a different, but equally important, facet of Internet history: the influence of the anti-authoritarian hacker culture, which started with early computer enthusiasts, and fully developed in the 1970s and 1980s, in particular in the West Coast (most famously documented in Steven Levy’s 1984 book Hackers: Heroes of the Computer Revolution). The book explains the origins of the venture capitalism that largely drove the development of ICTs (including the Internet) as private risk capital replaced state funding for research and development in ICTs.

    The book documents the development of the geek culture’s view that computers and networks should be “an instrument of personal liberation and create a frictionless, alternative world free from the oppressing state” (101). Malcomson explains how this led to the belief that the Internet should not be subject to normal laws, culminating in Barlow’s well known utopian “Declaration of the Independence of Cyberspace,” and explains how such ideas could not, and did not survive. The chapter concludes: “The subculture had lost the battle. Governments and large corporations would now shape the Internet” (137). But, as the book notes later (171), it was in fact primarily one government, the US government, that shaped the Internet. And, as Shawn Powers and Michael Jablonski explain in The Real Cyberwar, the US used its influence to further its own geopolitical and global economic goals.

    Chapter 3 explores the effects of globalization, the weakening of American power, the rise of competing powers, and the resulting tensions regarding US dominance of ICTs in general and the Internet in particular. It also covers the rise of policing of the Internet induced by fear of “terrorists, pedophiles, drug dealers, and money launderers” (153).

    We have come full circle: a technology initially designed for war is now once again used by the military to achieve its aims, the so-called “war on terror.” So there is a tension between three different forces, all of which were fundamental to the development of ICTs (including the Internet): the government, military, and security apparatus; more-or-less anarchic technologists; and dominant for-profit companies (which may have started small, but can quickly become very large and dominant – at least for a few years until they are displaced by newcomers).

    As the subtitle indicates, the book is mostly about the World Wide Web, so some of the other aspects of the history of the Internet are not covered. For example, there is no mention of the very significant commercial and political battles that took place between proponents of the Internet and proponents of the Open Systems Interconnection (OSI) suite of standards; this is a pity, because the residual effects of those battles are still being felt today. Nor does the book explore the reasons for and effects of the transition of the management of the Internet from the US Department of Defense to the US Department of Commerce (even if it correctly notes that the chief interest of the Clinton administration “was in a thriving Internet that would lead to new industries and economic growth” [133]).

    Malcomson explains well how there were four groups competing for influence in the late 1990s: technologists, the private sector, the US government, and other governments, and notes how the US government was in an impossible situation, since it could not credibly argue simultaneously that other governments (or intergovernmental organizations such as the ITU) should not influence the Internet while it itself formally supervised the management and administration of the domain name system (DNS). However, he does not explain how the origins of the DNS, its subsequent development, or how its management and administration were unilaterally hijacked by the US, leading to much of the international tension that has bedeviled discussions on Internet governance since 1998.

    Regarding the World Wide Web, the book does not discuss how the end-to-end principle and its premise of secure end devices resulted in unforeseen consequences (such as spam, cybercrime, and cyberattacks) when unsecure personal computers became the dominant device connected via the Internet. Nor does it discuss how the lack of billing mechanisms in the Internet protocol suite has led to the rise of advertising as the sole revenue generation mechanism and the consequences of that development.

    The book analyses the splintering (elsewhere called fragmentation) brought about by the widespread adoption of proprietary systems operating system and their associated “apps”, and by mass surveillance. As Malcomson puts the matter, mass surveillance “was fatal to the universality of the web, because major web companies were and are global but cannot be both global and subject to the intricate agendas of US intelligence and defense institutions, whose purpose is to defend national interests, not universal interests” (160).

    However, the book does not discuss in any depth other sources of splintering, such as calls by some governments for national control over some portions of the Internet, or violations of network neutrality, or zero rating. Yet the book notes that the topic of network neutrality had been raised by Vice President Gore as early as 1993: “Without provisions for open access, the companies that own the networks could use their control of the networks to ensure that their customers only have access to their programming. We have already seen cases where cable company owners have used their monopoly control of their networks to exclude programming that competes with their own. Our legislation will contain strong safeguards against such behavior” (124). As we know, the laws called for in the last sentence were never implemented, and it was only in 2015 that the Federal Communication Commission imposed network neutrality. Malcomson could have used his deep knowledge of the history of the Internet to explain why Gore’s vision was not realized, no doubt because of the tensions mentioned above between the groups competing for influence.

    The book concludes that the Internet will increasingly cease to be “an entirely cross border enterprise”(190), but that the benefits of interoperability will result in a global infrastructure being preserved, so that “a fragmented Internet will retain aspects of universality” (197).

    As mentioned above, the book provides an excellent account of much of the historical origins of the World Wide Web and the disparate forces involved in its creation. The book would be even more valuable if it built on that account to analyze more deeply and put into context trends (which it does mention) other than splintering, such as the growing conflict between Apple, Google et al. who want no restrictions on data collection and encryption (so that they can continue to collect and monetize data), governments who want no encryption so they can censor and/or surveil, and governments who recognize that privacy is a human right, that privacy rules should be strengthened, and that end-users should have full ownership and control of their data.

    Readers keen to understand the negative economic impacts of the Internet should read Dan Schiller’s Digital Depression, and readers keen to understand the negative impacts of the Internet on democracy should read Robert McChesney’s Digital Disconnect. This might lead some to believe that we have would up exactly where we didn’t want to be: “government-driven, corporate-interest driven, profit-driven, monopoly-driven.” The citation (from Lyman Chapin, one of the founders of the Internet Society), found on p. 132 of Malcomson’s book, dates back to 1991, and it reflects what the technologists of the time wanted to avoid.

    To conclude, it is worth noting the quotation on page 57 from Norbert Wiener: “Just as the skilled carpenter, the skilled mechanic, the skilled dressmaker have in some degree survived the first industrial revolution, so the skilled scientist and the skilled administrator might survive the second [the cybernetic revolution]. However, taking the second revolution as accomplished, the average human of mediocre attainments has nothing to sell that is worth anyone’s money to buy. The answer, of course, is to have a society based on human values other than buying and selling.”

    Wiener thus foresaw the current fundamental trends and dilemmas that have been well documented and analyzed by Robert McChesney and John Nichols in their new book People Get Ready: The Fight Against a Jobless Economy and a Citizenless Democracy (Nation Books, 2016).

    There can be no doubt that the current trends are largely conditioned by the early history of ICTs (and in particular of the Internet) and its roots in military applications. Thus Splinternet is a valuable source of material that should be carefully considered by all who are involved in Internet policy matters.
    _____

    Richard Hill is President of the Association for Proper internet Governance, and was formerly a senior official at the International Telecommunication Union (ITU). He has been involved in internet governance issues since the inception of the internet and is now an activist in that area, speaking, publishing, and contributing to discussions in various forums. Among other works he is the author of The New International Telecommunication Regulations and the Internet: A Commentary and Legislative History (Springer, 2014). He writes frequently about internet governance issues for The b2 Review Digital Studies magazine.

    Back to the essay

  • Dissecting the “Internet Freedom” Agenda

    Dissecting the “Internet Freedom” Agenda

    Shawn M. Powers and Michael Jablonski, The Real Cyber War: The Political Economy of Internet Freedoma review of Shawn M. Powers and Michael Jablonski, The Real Cyber War: The Political Economy of Internet Freedom  (University of Illinois Press, 2015)
    by Richard Hill
    ~
    Disclosure: the author of this review is thanked in the Preface of the book under review.

    Both radical civil society organizations and mainstream defenders of the status quo agree that the free and open Internet is threatened: see for example the Delhi Declaration, Bob Hinden’s 2014 Year End Thoughts, and Kathy Brown’s March 2015 statement at a UNESCO conference. The threats include government censorship and mass surveillance, but also the failure of governments to control rampant industry concentration and commercial exploitation of personal data, which increasingly takes the form of providing “free” services in exchange for personal information that is resold at a profit, or used to provide targeted advertising, also at a profit.

    In Digital Disconnect, Robert McChesney has explained how the Internet, which was supposed to be a force for the improvement of human rights and living conditions, has been used to erode privacy and to increase the concentration of economic power, to the point where it is becoming a threat to democracy. In Digital Depression, Dan Schiller has documented how US policies regarding the Internet have favored its geo-economic and geo-political goals, in particular the interests of its large private companies that dominate the information and communications technology (ICT) sector worldwide.

    Shawn M. Powers and Michael Jablonski’s seminal new book The Real Cyber War takes us further down the road of understanding what went wrong, and what might be done to correct the situation. Powers, an assistant professor at Georgia State University, specializes in international political communication, with particular attention to the geopolitics of information and information technologies. Jablonski is an attorney and presidential fellow, also at Georgia State.

    There is a vast literature on internet governance (see for example the bibliography in Radu, Chenou, and Weber, eds., The Evolution of Global Internet Governance), but much of it is ideological and normative: the author espouses a certain point of view, explains why that point of view is good, and proposes actions that would lead to the author’s desired outcome (a good example is Milton Mueller’s well researched but utopian Networks and States). There is nothing wrong with that approach: on the contrary, such advocacy is necessary and welcome.

    But a more detached analytical approach is also needed, and Powers and Jablonski provide exactly that. Their objective is to help us understand (citing from p. 19 of the paperback edition) “why states pursue the policies they do”. The book “focuses centrally on understanding the numerous ways in which power and control are exerted in cyberspace” (p. 19).

    Starting from the rather obvious premise that states compete to shape international policies that favor their interests, and using the framework of political economy, the authors outline the geopolitical stakes and show how questions of power, and not human rights, are the real drivers of much of the debate about Internet governance. They show how the United States has deliberately used a human rights discourse to promote policies that further its geo-economic and geo-political interests. And how it has used subsidies and government contracts to help its private companies to acquire or maintain dominant positions in much of the ICT sector.

    Jacob Silverman has decried the “the misguided belief that once power is arrogated away from doddering governmental institutions, it will somehow find itself in the hands of ordinary people”. Powers and Jablonski dissect the mechanisms by which vibrant government institutions deliberately transferred power to US corporations in order to further US geo-economical and geo-political goals.

    In particular, they show how a “freedom to connect” narrative is used by the USA to attempt to transform information and personal data into commercial commodities that should be subject to free trade. Yet all states (including the US) regulate, at least to some extent, the flow of information within and across their borders. If information is the “new oil” of our times, then it is not surprising that states wish to shape the production and flow of information in ways that favor their interests. Thus it is not surprising that states such as China, India, and Russia have started to assert sovereign rights to control some aspect of the production and flow of information within their borders, and that European Union courts have made decisions on the basis of European law that affect global information flows and access.

    As the authors put the matter (p. 6): “the [US] doctrine of internet freedom … is the realization of a broader [US] strategy promoting a particular conception of networked communication that depends on American companies …, supports Western norms …, and promotes Western products.” (I would personally say that it actually supports US norms and US products and services.) As the authors point out, one can ask (p. 11): “If states have a right to control the types of people allowed into their territory (immigration), and how its money is exchanged with foreign banks, then why don’t they have a right to control information flows from foreign actors?”

    To be sure, any such controls would have to comply with international human rights law. But the current US policies go much further, implying that those human rights laws must be implemented in accordance with the US interpretation, meaning few restrictions on freedom of speech, weak protection of privacy, and ever stricter protection for intellectual property. As Powers and Jablonski point out (p. 31), the US does not hesitate to promote restrictions on information flows when that promotes its goals.

    Again, the authors do not make value judgments: they explain in Chapter 1 how the US deliberately attempts to shape (to a large extent successfully) international policies, so that both actions and inactions serve its interests and those of the large corporations that increasingly influence US policies.

    The authors then explain how the US military-industrial complex has morphed into an information-industrial complex, with deleterious consequences for both industry and government, consequences such as “weakened oversight, accountability, and industry vitality and competitiveness”(p. 23) that create risks for society and democracy. As the authors say, the shift “from adversarial to cooperative and laissez-faire rule making is a keystone moment in the rise of the information-industrial complex” (p. 61).

    As a specific example, they focus on Google, showing how it (largely successfully) aims to control and dominate all aspects of the data market, from production, through extraction, refinement, infrastructure and demand. A chapter is devoted to the economics of internet connectivity, showing how US internet policy is basically about getting the largest number of people online, so that US companies can extract ever greater profits from the resulting data flows. They show how the network effects, economies of scale, and externalities that are fundamental features of the internet favor first-movers, which are mostly US companies.

    The remedy to such situations is well known: government intervention: widely accepted regarding air transport, road transport, pharmaceuticals, etc., and yet unthinkable for many regarding the internet. But why? As the authors put the matter (p. 24): “While heavy-handed government controls over the internet should be resisted, so should a system whereby internet connectivity requires the systematic transfer of wealth from the developing world to the developed.” But freedom of information is put forward to justify specific economic practices which would not be easy to justify otherwise, for example “no government taxes companies for data extraction or for data imports/exports, both of which are heavily regulated aspects of markets exchanging other valuable commodities”(p. 97).

    The authors show in detail how the so-called internet multi-stakeholder model of governance is dominated by insiders and used “under the veil of consensus’” (p. 136) to further US policies and corporations. A chapter is devoted to explaining how all states control, at least to some extent, information flows within their territories, and presents detailed studies of how four states (China, Egypt, Iran and the USA) have addressed the challenges of maintaining political control while respecting (or not) freedom of speech. The authors then turn to the very current topic of mass surveillance, and its relation to anonymity, showing how, when the US presents the internet and “freedom to connect” as analogous to public speech and town halls, it is deliberately arguing against anonymity and against privacy – and this of course in order to avoid restrictions on its mass surveillance activities.

    Thus the authors posit that there are tensions between the US call for “internet freedom” and other states’ calls for “information sovereignty”, and analyze the 2012 World Conference on International Telecommunications from that point of view.

    Not surprisingly, the authors conclude that international cooperation, recognizing the legitimate aspirations of all the world’s peoples, is the only proper way forward. As the authors put the matter (p. 206): “Activists and defenders of the original vision of the Web as a ‘fair and humane’ cyber-civilization need to avoid lofty ‘internet freedom’ declarations and instead champion specific reforms required to protect the values and practices they hold dear.” And it is with that in mind, as a counterweight to US and US-based corporate power, that a group of civil society organizations have launched the Internet Social Forum.

    Anybody who is seriously interested in the evolution of internet governance and its impact on society and democracy will enjoy reading this well researched book and its clear exposition of key facts. One can only hope that the Council of Europe will heed Powers and Jablonski’s advice and avoid adopting more resolutions such as the recent recommendation to member states by the EU Committee of Ministers, which merely pander to the US discourse and US power that Powers and Jablonski describe so aptly. And one can fondly hope that this book will help to inspire a change in course that will restore the internet to what it might become (and what many thought it was supposed to be): an engine for democracy and social and economic progress, justice, and equity.
    _____

    Richard Hill is President of the Association for Proper internet Governance, and was formerly a senior official at the International Telecommunication Union (ITU). He has been involved in internet governance issues since the inception of the internet and is now an activist in that area, speaking, publishing, and contributing to discussions in various forums. Among other works he is the author of The New International Telecommunication Regulations and the Internet: A Commentary and Legislative History (Springer, 2014). He writes frequently about internet governance issues for The b2 Review Digital Studies magazine.

    Back to the essay

  • The Internet vs. Democracy

    The Internet vs. Democracy

    Robert W. McChesney, Digital Disconnect: How Capitalism Is Turning the Internet Against Democracya review of Robert W. McChesney, Digital Disconnect: How Capitalism Is Turning the Internet Against Democracy  (The New Press, 2014)
    by Richard Hill
    ~
    Many of us have noticed that much of the news we read is the same, no matter which newspaper or web site we consult: they all seem to be recycling the same agency feeds. To understand why this is happening, there are few better analyses than the one developed by media scholar Robert McChesney in his most recent book, Digital Disconnect. McChesney is a Professor in the Department of Communication at the University of Illinois at Urbana-Champaign, specializing in the history and political economy of communications. He is the author or co-author of more than 20 books, among the best-known of which are The Endless Crisis: How Monopoly-Finance Capital Produces Stagnation and Upheaval from the USA to China (with John Bellamy Foster, 2012), The Political Economy of Media: Enduring Issues, Emerging Dilemmas (2008), Communication Revolution: Critical Junctures and the Future of Media (2007), and Rich Media, Poor Democracy: Communication Politics in Dubious Times (1999), and is co-founder of Free Press.

    Many see the internet as a powerful force for improvement of human rights, living conditions, the economy, rights of minorities, etc. And indeed, like many communications technologies, the internet has the potential to facilitate social improvements. But in reality the internet has recently been used to erode privacy and to increase the concentration of economic power, leading to increasing income inequalities.

    One might have expected that democracies would have harnessed the internet to serve the interests of their citizens, as they largely did with other technologies such as roads, telegraphy, telephony, air transport, pharmaceuticals (even if they used these to serve only the interests of their own citizens and not the general interests of mankind).

    But this does not appear to be the case with respect to the internet: it is used largely to serve the interests of a few very wealthy individuals, or certain geo-economic and geo-political interests. As McChesney puts the matter: “It is supremely ironic that the internet, the much-ballyhooed champion of increased consumer power and cutthroat competition, has become one of the greatest generators of monopoly in economic history” (131 in the print edition). This trend to use technology to favor special interests, not the general interest, is not unique to the internet. As Josep Ramoneda puts the matter: “We expected that governments would submit markets to democracy and it turns out that what they do is adapt democracy to markets, that is, empty it little by little.”

    McChesney’s book explains why this is the case: despite its great promise and potential to increase democracy, various factors have turned the internet into a force that is actually destructive to democracy, and that favors special interests.

    McChesney reminds us what democracy is, citing Aristotle (53): “Democracy [is] when the indigent, and not the men of property are the rulers. If liberty and equality … are chiefly to be found in democracy, they will be best attained when all persons alike share in the government to the utmost.”

    He also cites US President Lincoln’s 1861 warning against despotism (55): “the effort to place capital on an equal footing with, if not above, labor in the structure of government.” According to McChesney, it was imperative for Lincoln that the wealthy not be permitted to have undue influence over the government.

    Yet what we see today in the internet is concentrated wealth in the form of large private companies that exert increasing influence over public policy matters, going to so far as to call openly for governance systems in which they have equal decision-making rights with the elected representatives of the people. Current internet governance mechanisms are celebrated as paragons of success, whereas in fact they have not been successful in achieving the social promise of the internet. And it has even been said that such systems need not be democratic.

    What sense does it make for the technology that was supposed to facilitate democracy to be governed in ways that are not democratic? It makes business sense, of course, in the sense of maximizing profits for shareholders.

    McChesney explains how profit-maximization in the excessively laissez-faire regime that is commonly called neoliberalism has resulted in increasing concentration of power and wealth, social inequality and, worse, erosion of the press, leading to erosion of democracy. Nowhere is this more clearly seen than in the US, which is the focus of McChesney’s book. Not only has the internet eroded democracy in the US, it is used by the US to further its geo-political goals; and, adding insult to injury, it is promoted as a means of furthering democracy. Of course it could and should do so, but unfortunately it does not, as McChesney explains.

    The book starts by noting the importance of the digital revolution and by summarizing the views of those who see it as an engine of good (the celebrants) versus those who point out its limitations and some of its negative effects (the skeptics). McChesney correctly notes that a proper analysis of the digital revolution must be grounded in political economy. Since the digital revolution is occurring in a capitalist system, it is necessarily conditioned by that system, and it necessarily influences that system.

    A chapter is devoted to explaining how and why capitalism does not equal democracy: on the contrary, capitalism can well erode democracy, the contemporary United States being a good example. To dig deeper into the issues, McChesney approaches the internet from the perspective of the political economy of communication. He shows how the internet has profoundly disrupted traditional media, and how, contrary to the rhetoric, it has reduced competition and choice – because the economies of scale and network effects of the new technologies inevitably favor concentration, to the point of creating natural monopolies (who is number two after Facebook? Or Twitter?).

    The book then documents how the initially non-commercial, publicly-subsidized internet was transformed into an eminently commercial, privately-owned capitalist institution, in the worst sense of “capitalist”: domination by large corporations, monopolistic markets, endless advertising, intense lobbying, and cronyism bordering on corruption.

    Having explained what happened in general, McChesney focuses on what happened to journalism and the media in particular. As we all know, it has been a disaster: nobody has yet found a viable business model for respectable online journalism. As McChesney correctly notes, vibrant journalism is a pre-condition for democracy: how can people make informed choices if they do not have access to valid information? The internet was supposed to broaden our sources of information. Sadly, it has not, for the reasons explained in detail in the book. Yet there is hope: McChesney provides concrete suggestions for how to deal with the issue, drawing on actual experiences in well functioning democracies in Europe.

    The book goes on to call for specific actions that would create a revolution in the digital revolution, bringing it back to its origins: by the people, for the people. McChesney’s proposed actions are consistent with those of certain civil society organizations, and will no doubt be taken up in the forthcoming Internet Social Forum, an initiative whose intent is precisely to revolutionize the digital revolution along the lines outlined by McChesney.

    Anybody who is aware of the many issues threatening the free and open internet, and democracy itself, will find much to reflect upon in Digital Disconnect, not just because of its well-researched and incisive analysis, but also because it provides concrete suggestions for how to address the issues.

    _____

    Richard Hill, an independent consultant based in Geneva, Switzerland, was formerly a senior official at the International Telecommunication Union (ITU). He has been involved in internet governance issues since the inception of the internet and is now an activist in that area, speaking, publishing, and contributing to discussions in various forums. Among other works he is the author of The New International Telecommunication Regulations and the Internet: A Commentary and Legislative History (Springer, 2014). He frequently writes about internet governance issues for The b2 Review Digital Studies magazine.

    Back to the essay

  • "Internet Freedom": Digital Empire?

    "Internet Freedom": Digital Empire?

    Dan Schiller, Digital Depression: Information Technology and Economic Crisisa review of Dan Schiller, Digital Depression: Information Technology and Economic Crisis  (University of Illinois Press, 2014)
    by Richard Hill
    ~
    Disclosure: the author of this review is mentioned in the Acknowledgements section of the reviewed book.

     

     

     

     

     

    Computers and telecommunications have revolutionized and disrupted all aspects of human activity, and even behavior. The impacts are broad and profound, with important consequences for governments, businesses, non-profit activities, and individuals. Networks of interconnected computer systems are driving many disruptive changes in business practices, information flows, and financial flows. Foremost amongst those networks is the Internet, much of which is global, or at least trans-national.

    According to some, the current governance arrangement for the Internet is nearly ideal. In particular, its global multi-stakeholder model of governance has resulted in a free and open Internet, which has enabled innovation and driven economic growth and well-being around the world. Others are of the view that things have not worked out that well. In particular, the Internet has resulted in mass surveillance by governments and by private companies, in monopolization, commodification and monetization of information and knowledge, in inequitable flows of finances between poor and rich countries, and in erosion of cultural diversity; further, those with central positions of influence have used it to consolidate power and to establish a new global regime of control and exploitation, under the guise of favoring liberalization, while in reality reinforcing the dominance and profitability of major corporations at the expense of the public interest, and the overarching position of certain national interests at the expense of global interests and well being.  [1]

    Dan Schiller’s book helps us to understand how rational and well-informed people can hold such diametrically opposing views. Schiller dissects the history of the growth of recent telecommunications networks and shows how they have significantly (indeed, dramatically) affected economic and political power relations around the world. And how, at the same time, US policies have consistently favored capital over labor, and have resulted in transfers of vast sums from developing countries to developed countries (in particular through interest on loans).

    2013 Berlin PRISM Demonstrations
    Participants wearing Edward Snowden and Chelsea Manning masks at 2013 Berlin protests against NSA PRISM program (image source: Wikipedia)

    Schiller documents in some detail how US policies that ostensibly promote the free flow of information around the world, the right of all people to connect to the Internet, and free speech, are in reality policies that have, by design, furthered the geo-economic and geo-political goals of the US, including its military goals, its imperialist tendencies, and the interests of large private companies based (if not always headquartered, at least for tax purposes) in the US. For example, strict copyright protection is held to be consistent with the free flow of information, as is mass surveillance. Cookies and exploitation of users’ personal data by Internet companies are held to be consistent with privacy rights (indeed, as Schiller shows, the US essentially denies the existence of the right to personal privacy for anything related to the Internet). There should be no requirements that data be stored locally, lest it escape the jurisdiction of the US surveillance apparatus. And very high profits and dominant positions in key Internet markets do not spark anti-trust or competition law investigations, as they might in any other industry.

    As Schiller notes, great powers have historically used communication systems to further their economic and strategic interests, so why should the US not so use the Internet? Thus stated, the matter seems obvious. But the matter is rarely thus stated. On the contrary, the Internet is often touted as a generous gift to the world’s people, able to lift them out of poverty and oppression, and to bring them the benefits of democracy and (or) free markets. Schiller’s carefully researched analysis is thus an important contribution.

    Schiller provides context by tracing the origins of the current financial and economic crises, pointing out that it is paradoxical that growing investments in Information and Communication Technologies (ICTs), and the supposed resultant productivity gains, did not prevent a major global economic crisis. Schiller explains how transnational corporations demanded liberalization of the terms on which they could use their private networks, and received then, resulting in profound changes in commodity chains, that is, the flow of production of goods and services. In particular, there has been an increase in transnational production, and this has reinforced the importance of transnational corporations. Further, ICTs have changed the nature of labor’s contribution to production, enabling many tasks to be shifted to unskilled workers (or even to consumers themselves: automatic teller machines (ATMs), for example, turn each of us into a bank clerk). However, the growth of the Internet did not transcend the regular economy: on the contrary, it was wrapped into the economy’s crisis tendencies and even exacerbated them.

    Schiller gives detailed accounts of these transformations in the automotive and financial industries, and in the military. The study of the effect of ICTs on the military is of particular interest considering that the Internet was originally developed as a military project, and that it is currently used by US intelligence agencies as a prime medium for the collection of information.

    Schiller then turns to telecommunications, explaining the very significant changes that took place in the USA starting in the late 1970s. Those changes resulted in a major restructuring of the dominant telecommunications playing field in the US and ultimately led to the growth of the Internet, a development which had world-wide effects. Schiller carefully describes the various US government actions that initiated and nurtured those changes, and that were instrumental in exporting similar changes to the rest of the world.

    Next, he analyzes how those changes affected and enabled the production of the networks themselves, the hardware used to build the networks and to use them (e.g. smartphones), and the software and applications that we all use today.

    Moving further up the value chain, Schiller explains how data-mining, coupled with advertising, fuels the growth of the dominant Internet companies, and how this data-mining is made possible only by denying data privacy, and how states use the very same techniques to implement mass surveillance.

    Having described the situation, Schiller proceeds to analyze it from economic and political perspectives. Given that the US was an early adopter of the Internet, it is not surprising that, because of economies of scale and network effects, US companies dominate the field (except in China, as Schiller explains in detail). Schiller describes how, given the influence of US companies on US politics, US policies, both domestic and foreign, are geared to allowing, or in fact favoring, ever-increasing concentration in key Internet markets, which is to the advantage of the US and its private companies–and despite the easy cant about decentralization and democratization.

    The book describes how the US views the Internet as an extraterritorial domain, subject to no authority except that of the US government and that of the dominant US companies. Each dictates its own law in specific spheres (for example, the US government has supervised, up to now, the management of Internet domain names and addresses; while US companies dictate unilateral terms and conditions to their users, terms and conditions that imply that users give up essentially all rights to their private data).

    Schiller describes how this state of affairs has become a foreign policy objective, with the US being willing to incur significant criticism and to pay a significant political price in order to maintain the status quo. That status quo is referred to as “the multi-stakeholder model”, in which private companies are essentially given veto power over government decisions (or at least over the decisions of any government other than the US government), a system that can be referred to as “corporatism”. Not only does the US staunchly defend that model for the Internet, it even tries to export it to other fields of human activity. And this despite, or perhaps because, that system allows companies to make profits when possible (in particular by exploiting state-built infrastructure or guarantees), and to transfer losses to states when necessary (as for example happened with the banking crisis).

    Schiller carefully documents how code words such as “freedom of access” and “freedom of speech” are used to justify and promote policies that in fact merely serve the interests of major US companies and, at the same time, the interests of the US surveillance apparatus, which morphed from a cottage industry into a major component of the military-industrial complex thanks to the Internet. He shows how the supposed open participation in key bodies (such as the Internet Engineering Task Force) is actually a screen to mask the fact that decisions are heavily influenced by insiders affiliated with US companies and/or the US government, and by agencies bound to the US as a state.

    As Schiller explains, this increasing dominance of US business and US political imperialism have not gone unchallenged, even if the challenges to date have mostly been rhetorical (again, except for China). Conflicts over Internet governance are related to rivalries between competing geo-political and geo-economic blocks, rivalries which will likely increase if economic growth continues to be weak. The rivalries are both between nations and within nations, and some are only emerging right now (for example, how to tax the digital economy, or the apparent emerging divergence of views between key US companies and the US government regarding mass surveillance).

    Indeed, the book explains how the challenges to US dominance have become more serious in the wake of the Snowden revelations, which have resulted in a significant loss of market share for some of the key US players, in particular with respect to cloud computing services. Those losses may have begun to drive the tip of a wedge between the so-far congruent goals of US companies and the US government

    In a nutshell, one can sum up what Schiller describes by paraphrasing Marx: “Capitalists of the world, unite! You have nothing to lose but the chains of government regulation.” But, as Schiller hints in his closing chapter, the story is still unfolding, and just as things did not work out as Marx thought they would, so things may not work out as the forces that currently dominate the Internet wish they will. So the slogan for the future might well be “Internet users of the world, unite! You have nothing to lose but the chains of exploitation of your personal data.”

    This book, and its extensive references, will be a valuable reference work for all future research in this area. And surely there will be much future research, and many more historical analyses of what may well be some of the key turning points in the history of mankind: the transition from the industrial era to the information era and the disruptions induced by that transition.

    _____

    Richard Hill, an independent consultant based in Geneva, Switzerland, was formerly a senior official at the International Telecommunication Union (ITU). He has been involved in internet governance issues since the inception of the internet and is now an activist in that area, speaking, publishing, and contributing to discussions in various forums. Among other works he is the author of The New International Telecommunication Regulations and the Internet: A Commentary and Legislative History (Springer, 2014). An earlier version of this review first appeared on Newsclick.

    Back to the essay
    _____

    1. From item 11 of document WSIS+10/4/6 of the preparatory process for the WSIS+10 High Level Event, which provided “a special platform for high-ranking officials of WSIS (World Summit on the Information Society) stakeholders, government, private sector, civil society and international organizations to express their views on the achievements, challenges and recommendations on the implementation” of various earlier internet governance initiatives backed by the International Telecommunications Union (ITU), the United Nations specialized agency for information and communications technologies, and other participants in the global internet governance sphere.

    Back to the essay

  • The People’s Platform by Astra Taylor

    The People’s Platform by Astra Taylor

    image

    Or is it? : Astra Taylor’s The People’s Platform

    Review by Zachary Loeb

    ~

    Imagine not using the Internet for twenty-four hours.

    Really: no Internet from dawn to dawn.

    Take a moment to think through the wide range of devices you would have to turn off and services you would have to avoid to succeed in such a challenge. While a single day without going online may not represent too outlandish an ordeal such an endeavor would still require some social and economic gymnastics. From the way we communicate with friends to the way we order food to the way we turn in assignments for school or complete tasks in our jobs – our lives have become thoroughly entangled with the Internet. Whether its power and control are overt or subtle the Internet has come to wield an impressive amount of influence over our lives.

    All of which should serve to raise a discomforting question – so, who is in control of the Internet? Is the Internet a fantastically democratic space that puts the power back in the hands of people? Is the Internet a sly mechanism for vesting more power in the hands of the already powerful, whilst distracting people with a steady stream of kitschy content and discounted consumerism? Or, is the Internet a space relying on levels of oft-unseen material infrastructures with a range of positive and negative potentialities? These are the questions that Astra Taylor attempts to untangle in her book The People’s Platform: Taking Back Power and Culture in the Digital Age (Metropolitan Books, 2014). It is the rare example of a book where the title itself forms a thesis statement of sorts: the Internet was and can be a platform for the people but this potential has been perverted, and thus there needs to be a “taking back” of power (and culture).

    At the outset Taylor locates her critique in the space between the fawning of the “techno-optimists” and the grousing of the “techno-skeptics.” Far from trying to assume a “neutral” stance, Taylor couches her discussion of the “techno” by stepping back to consider the social, political, and economic forces that shape the “techno” reality that inspires optimism and skepticism. Taylor, therefore, does not build her argument upon a discussion of the Internet as such but builds her argument around a discussion of the Internet as it is and as it could be. Unfortunately the “as it currently is” of this “new media” evinces that: “Corporate power and the quest for profit are as fundamental to new media as old.” (8)

    Thus Taylor sets up the conundrum of the Internet – it is at once a media platform with a great deal of democratic potential, and yet this potential has been continually appropriated for bureaucratic, technocratic, and indeed plutocratic purposes.

    Over the course of The People’s Platform Taylor moves from one aspect of the Internet (and its related material infrastructures) to another – touching upon a range of issues from the Internet’s history, to copyright and the way it has undermined “cultural creators” ability to earn a living, the way the Internet persuades and controls, across the issues of journalism and e-waste, to the ways in which the Internet can replicate the misogyny and racism of the offline world.

    With her background as a documentary filmmaker (she directed the film The Examined Life [which is excellent]) Taylor is skilled in cutting deftly from one topic to the next, though this particular experience also gives her cause to dwell at length upon the matter of how culture is created and supported in the digital age. Indeed as a maker of independent films Taylor is particularly attuned to the challenges of making culturally valuable content in a time when free copies spread rapidly on-line. Here too Taylor demonstrates the link to larger economic forces – there are still highly successful “stars” and occasional stories of “from nowhere” success, but the result is largely that those attempting to eke out a nominal subsistence find it increasingly challenging to do so.

    As the Internet becomes the principle means of dissemination of material “cultural creators” find themselves bound to a system wherein the ultimate remuneration rarely accrues back to them. Likewise the rash of profit-driven mergers and shifting revenue streams has resulted in a steady erosion of the journalistic field. It is not – as Taylor argues – that there is a lack of committed “cultural creators” and journalists working today, it is that they are finding it increasingly difficult to sustain their efforts. The Internet, as Taylor describes it, is certainly making many people enormously wealthy but those made wealthy are more likely to be platform owners (think Google or Facebook) than those who fill those platforms with the informational content that makes them valuable.

    Though the Internet may have its roots in massive public investment and though the value of the Internet is a result of the labor of Internet users (example: Facebook makes money by selling advertisements based on the work you put it in on your profile), the Internet as it is now is often less of an alternative to society than it is a replication. The biases of the offline world are replicated in the digital realm, as Taylor puts it:

    “While the Internet offers marginalized groups powerful and potentially world-changing opportunities to meet and act together, new technologies also magnify inequality, reinforcing elements of the old order. Networks do not eradicate power: they distribute it in different ways, shuffling hierarchies and producing new mechanisms of exclusion.” (108)

    Thus, the Internet – often under the guise of promoting anonymity – can be a site for an explosion of misogyny, racism, classism, and an elitism blossoming from a “more-technologically-skilled-than-thou” position. There are certainly many “marginalized groups” and individuals trying to use the Internet to battle their historical silencing, but for every social justice minded video there is a comment section seething with the grunts of trolls. Meanwhile behind this all stand the same wealthy corporate interests that enjoyed privileged positions before the rise of the Internet. These corporate forces can wield the power they gain from the Internet to steer and persuade Internet users in such a way that the “curated experience” of the Internet is increasingly another way of saying, “what a major corporation thinks you (should) want.”

    image

    Breaking through the ethereal airs of the Internet, Taylor also grounds her argument in the material realities of the digital realm. While it is true that more and more people are increasingly online, Taylor emphasizes that there are still many without access and that the high-speed access enjoyed by some is not had by one and all. Furthermore, all of this access, all of these fanciful devices, all of these democratic dreams are reliant upon a physical infrastructure shot through with dangerous mining conditions, wretched laboring facilities, and toxic dumps where discarded devices eventually go to decay. Those who are able to enjoy the Internet as a positive feature in their day to day life are rarely the same people who worked in the mines, the assembly plants, or who will have to live on the land that has been blighted by e-waste.

    While Taylor refuses to ignore the many downsides associated with the Internet age she remains fixed on its positive potential. The book concludes without offering a simplistic list of solutions but nevertheless ends with a sense that those who care about the Internet’s non-corporate potential need to work to build a “sustainable digital future” (183). Though there are certainly powerful interests profiting from the current state of the Internet the fact remains that (in a historical sense) the Internet is rather young, and there is still time to challenge the shape it is taking. Considering what needs to be done, Taylor notes: “The solutions we need require collective, political action.” (218)

    It is a suggestion that carries a sentiment that people can band together to reassert control over the online commons that are steadily being enclosed by corporate interests. By considering the Internet as a public utility (a point being discussed at the moment in regards to Net Neutrality) and by focusing on democratic values instead of financial values – it may be possible for people to reverse (or at least slow) the corporate wave which is washing over the Internet.

    After all, the Internet is the result of massive public investment, why is it that it has been delivered into corporate hands? Ultimately, Taylor concludes (in a chapter titled “In Defense of the Commons: A Manifesto for Sustainable Culture”) that if people want the Internet to be a “people’s platform” that they will have to organize and fight for it (“collective, political”). In a time when the Internet is an important feature of society, it makes a difference if the Internet is an open “people’s platform” or a highly (if subtly) controlled corporate theme park. “The People’s Platform” requires people who care to raise their voices…such as the people who have read Astra Taylor’s book, perhaps.

    * * * * *

    With The People’s Platform Astra Taylor has made an effective and interesting contribution to the discussion around the nature of the Internet and its future. By emphasizing a political and economic critique she is able to pull the Internet away from a utopian fantasy in order to analyze it in terms of the competing forces that have shaped (and continue to shape) it. The perspective that Taylor brings, as a documentary filmmaker, allows her to drop the journalistic façade of objectivity in order to genuinely and forcefully engage with issues pertaining to the compensation of cultural creators in the age of digital dissemination. Whilst the sections that Taylor writes on the level of misogyny one encounters online and the section on e-waste make this book particularly noteworthy. Though each chapter of The People’s Platform could likely be extended into an entire book, it is in their interconnections that Taylor is able to demonstrate the layers of interconnected issues that are making such a mess of the Internet today. For the problem facing the online realm is not just corporate control – it is a slew of issues that need to be recognized in total (and in their interconnected nature) if any type of response is to be mounted.

    Though The People’s Platform is ostensibly about a conflict regarding the future of the Internet, the book is itself a site of conflicting sentiments. Though Taylor – at the outset – aims to avoid aligning herself with the “cheerleaders of progress” or “the prophets of doom” (4) the book that emerges is one that is in the stands of the “cheerleaders of progress” (even if with slight misgivings about being in those stands). The book’s title suggests that even with all of the problems associated with the Internet it still represents something promising, something worth fighting to “take back.” It is a point that is particularly troublesome to consider after Taylor’s description of labor conditions and e-waste. For one of the main questions that emerges towards the end of Taylor’s book – though it is not one she directly poses – makes problematic the book’s title, that question being: which “people” are being described in “the people’s platform?”

    image

    It may be tempting to answer such a question with a simplistic “well, all of the people” yet such a response is inadequate in light of the way that Taylor’s book clearly discusses the layers of control and dominance one finds surrounding the Internet. Can the Internet be “the people’s platform” for writers, journalists, documentary filmmakers, and activists with access to digital tools? Sure. But what of those described in the e-waste chapter – people living in oppressive conditions and toiling in factories where building digital devices puts them at risk of cancer or disassembling such devices poisons them and their families? Those people count as well, but those upon whom “the people’s platform” is built seem to be crushed beneath it, not able to get on top of it – to stand on “the people’s platform” is to stand on the hunched shoulders of others. It is true that Taylor takes this into account in emphasizing that something needs to be done to recognize and rectify this matter – but insofar as the material tools “the people” use to reach the Internet are built upon the repression and oppression of other people, it sours the very notion of the Internet as “the people’s platform.”

    This in turn raises another question: what would a genuine “people’s platform” look like? In the conclusion to the book Taylor attempts to answer this question by arguing for political action and increased democratic control over the Internet; however, one can easily imagine classifying the Internet as a “public utility” without doing anything to change the laboring conditions of those who build devices. Indeed, the darkly amusing element of The People’s Platform is that Taylor answers this question brilliantly on the second page of her book and then spends the following two hundred and thirty pages ignoring this answer.

    Taylor begins The People’s Platform with an anecdote about her youth in the pre-Internet (or pre-high speed Internet) era, wherein she recalls working on a small personally assembled magazine (a “zine”) which she would then have printed and distribute to friends and a variety of local shops. Looking back upon her time making zines, Taylor writes:
    “Today any kid with a smartphone and a message has the potential to reach more people with the push of a button that I did during two years of self-publishing.” (2)

    These lines from Taylor come only a sentence after she considers how her access to easy photocopying (for her zine) made it easier for her than it had been for earlier would-be publishers. Indeed, Taylor recalls:

    “a veteran political organizer told me how he and his friends had to sell blood in order to raise the funds to buy a mimeograph machine so they could make a newsletter in the early sixties.” (2)

    There are a few subtle moments in the above lines (from the second page of Taylor’s book) that say far more about a “people’s platform” than they let on. It is true that a smartphone gives a person “the potential to reach more people” but as the rest of Taylor’s book makes clear – it is not necessarily the case that people really do “reach more people” online. There are certainly wild success stories, but for “any kid” their reach with their smartphone may not be much greater than the number of people reachable with a photocopied zine. Furthermore, the zine audience might have been more engaged and receptive than the idle scanner of Tweets or Facebook updates – the smartphone may deliver more potential but actually achieve less.

    Nevertheless, the key aspects is Taylor’s comment about the “veteran political organizer” – this organizer (“and his friends”) were able to “buy a mimeograph machine so they could make a newsletter.” Is this different from buying a laptop computer, Internet access, and a domain name? Actually? Yes. Yes, it is. For once those newsletter makers bought the mimeograph machine they were in control of it – they did not need to worry about its Terms of Service changing, about pop-up advertisements, about their movements being tracked through the device, about the NSA having installed a convenient backdoor – and frankly there’s a good chance that the mimeograph machine they purchased had a much longer life than any laptop they would purchase today. Again – they bought and were able to control the means for disseminating their message, one cannot truly buy all of the means necessary for disseminating an online message (when one includes cable, ISP providers, etc…).

    The case of the mimeograph machine and the Internet is the question of what types of technologies represent genuine people’s platforms and which result in potential “people’s platforms” (note the quotation marks)? This is not to say that mimeograph machines are perfect (after all somebody did build that machine) but when considering technology in a democratic sense it is important to puzzle over whether or not (to borrow Lewis Mumford’s terminology) the tool itself is “authoritarian” or “democratic.” The way the Internet appears in Taylor’s book – with its massive infrastructure, propensity for centralized control, material reality built upon toxic materials – should at the very least make one question to what extent the Internet is genuinely a democratic “people’s” tool. Or, whether or not it is simply such a tool for those who are able to enjoy the bulk of the benefits and a minimum of the downsides. Taylor clearly does not want to be accused of being a “prophet of doom” – or of being a prophet for profit – but the sad result is that she jumps over the genuine people’s platform she describes on the second page in favor of building an argument for a platform that, by book’s end, seems to hardly be one for “the people” in any but a narrow sense of “the people.”

    The People’s Platform: Taking Back Power and Culture in the Digital Age is a well written, solidly researched, and effectively argued book that raises many valuable questions. The book offers no simplistic panaceas but instead forces the reader to think through the issues – oftentimes by forcing them to confront uncomfortable facts about digital technologies (such as e-waste). As Taylor uncovers and discusses issue after bias after challenge regarding the Internet the question that haunts her text is whether or not the platform she is describing – the Internet – is really worthy of being called “The People’s Platform”? If so, to which “people” does this apply?

    The People’s Platform is well worth reading – but it is not the end of the conversation. It is the beginning of the conversation.

    And it is a conversation that is desperately needed.

    __

    The People’s Platform: Taking Back Power and Culture in the Digital Age
    by Astra Taylor
    Metropolitan Books, 2014

    __

    Zachary Loeb is a writer, activist, librarian, and terrible accordion player. He earned his MSIS from the University of Texas at Austin, and is currently working towards an MA in the Media, Culture, and Communications department at NYU. His research areas include media refusal and resistance to technology, ethical implications of technology, alternative forms of technology, and libraries as models of resistance. Using the moniker “The Luddbrarian” Loeb writes at the blog librarianshipwreck, which is where this review originally appeared.