Open Code and Open Societies: Values of Internet Governance

Total Page:16

File Type:pdf, Size:1020Kb

Open Code and Open Societies: Values of Internet Governance OPEN CODE AND OPEN SOCIETIES: VALUES OF INTERNET GOVERNANCE LAWRENCE LESSIG* Pierre de Fermat was a lawyer and an amateur mathematician. He published one paper in his life—an anonymous article written as an appendix to a colleague’s book. But while he published little, he thought lots about the open questions of mathematics of his time. And in 1630, in the margin of his father’s copy of Diophantus’ Arithmetica, he scribbled next to an obscure theorem (“Xn+Yn=Zn has no non-zero integer solutions for N>2”): “I have discovered a truly remarkable proof which this margin is too small to contain.”1 It’s not clear that Fermat had a proof at all. Indeed, in all his mathematical papers, there was but one formal proof. But whether a genius mathematician or not, Fermat was clearly a genius self- promoter, for it is this puzzle that has made Fermat famous. For close to four hundred years, the very best mathematicians in the world have tried to pen the proof that Fermat forgot. In the early 1990s, after puzzling on and off about the problem since he was a child, Andrew Wiles believed that he had solved Fermat’s Last Theorem. He published his results—on the Internet, as well as other places—but very soon afterwards, a glitch was discovered. The proof was flawed. So he withdrew his claim to having solved Fermat’s Theorem. But he could not withdraw the proof. It was out there, in the ether of the Internet, and could not be erased. It was in the hands of many people, some of whom continued to work on the proof, even though flawed. And after extensive and engaged exchange on the Net, the glitch was undone. The problem in Wiles’ proof was fixed. Fermat’s Last Theorem was solved.2 * Jack N. and Lillian R. Berkman Professor for Entrepreneurial Legal Studies, Harvard Law School. Thanks to Hal Abelson, Scott Bradner, David Johnson, Henry Perritt, and Richard Stallman for comments on an earlier draft. 1.See <http://www-groups.dcs.st-and.ac.uk/~history/HistTopics/Fermat’s_last_theorem. html>; see also AMIR D. ACZEL, FERMAT’S LAST THEOREM: UNLOCKING THE SECRET OF AN ANCIENT MATHEMATICAL PROBLEM 6 (1996). 2. See SIMON SINGH, FERMAT’S ENIGMA: THE EPIC QUEST TO SOLVE THE WORLD’S GREATEST MATHEMATICAL PROBLEM (1997). 101 102 CHICAGO-KENT LAW REVIEW [Vol. 74:__ * * * There’s something of a movement going on out there—called by some the Free Software Movement (as founder, Richard Stallman puts it, free in the sense of “free speech,” not in the sense of “free beer”3), and by others, the Open Source Software Movement.4 The differences are important, but so are the commonalties strong. Both aim for a world in which the fundamental software—the code— governing the Internet is software that is “open”—code whose source is available to all, to be taken, to be modified, and to be improved. The arguments for open code are many; the reasons favoring it, different. Most argue its virtue is efficiency: that the product of this open development, like the product of any open society—this code that has revealed its flaws by revealing its source, and that has been improved by revealing its source—is more robust, more efficient, more reliable, code than the product of any closed process. Better code is the promise, and in a world where computers are as reliable as electricity in Italy, this indeed is a valuable promise. But it is not my aim here to discuss its efficiency; my aim is its values.5 My question in the few minutes that I can have your attention is this: Can we learn something from the values of the Open Source or Free Software Movement that would teach us something about Internet governance, and governance generally? * * * Governance: to many, this idea of Internet governance will seem quite odd. This weird interactive television that somehow got connected to wildly confused libraries—what could it mean to speak about governance here? But I mean governance in a very general sense. If you want to set up a server on the World Wide Web, you must register and receive a 3. Richard Stallman is the founder of this extraordinary movement and is truly its constituting force. See Amy Harmon, The Rebel Code, NY TIMES MAG., Feb. 21, 1999, at __; Andrew Leonard, Maverick Richard Stallman Keeps the Faith—and Gives Bill Gates the Finger (Aug. 31, 1998) <http://www.salonmagazine.com/21st/feature/1998/08/cov_31feature. html>. 4. The present keepers of the keys for this branch of the Free Software Movement are Eric Raymond and Bruce Perens, who founded opensource.org. See <http://www.opensource. org/board.html>. 5. I therefore completely agree with Stallman that the issues raised by this movement are primarily issues of value first. See Richard Stallman, Reevaluating Copyright: The Public Must Prevail, 75 OR. L. REV. 291 (1996); see also Lawrence Lessig, The Limits in Open Code: Regulatory Standards and the Future of the Net, 14 BERKELEY J. L. & TECH. 759 (1999). 1999] OPEN CODE AND OPEN SOCIETIES 103 name—a domain name—from an Internet registry, right now a company called Network Solutions.6 This procedure is the product of governance in the sense that I mean. When you connect to a site on the World Wide Web, your machine transmits to the site on the Web an address—your Internet Protocol (“IP”) address—so that the machine on the Web can find you in return.7 This protocol is the product of governance in the sense I mean. When you connect to a site with this IP address, the IP address need not provide information to identify who you are; it can be dynamic rather than static; it can be a proxy rather than real—nothing requires that the other side learn anything real about you.8 This is the product of governance in the sense I mean. In each cases, the governance at stake is in part a governance that has been brought about by a certain architecture in the Internet. It is the code’s design that IP addresses are used to identify locations on the Net; other designs could have been chosen. It is the code’s design that only the IP address is needed to connect to a site; a different design, requiring greater security, could have been selected. Thus in part, the governance that I mean is a governance brought about through code.9 But obviously, governance is not just code. It was not software that chose Network Solutions as the domain name registry—it was the United States government, by a contract that shifted the 6. See <http://www.netsol.com/nsi>. 7. “In order for Internet computers to recognize and transmit data between each other, these data must be sent via special protocols. A protocol is a formal description of message formats and the rules two computers must follow to exchange those messages.” <http:// www.nus.sg/Publ/internet_guide/protocol.html>. 8.See BERNARD ROBIN ET AL., EDUCATOR’S GUIDE TO THE WEB 165-66 (1997) (defining a proxy server as a computer that intercepts Internet traffic and has the ability to keep users from accessing outside Web pages). 9. I am using the term “code” here far more loosely than software engineers would. I mean by code the instructions or control built into the software and hardware that constitutes the Net. I include within that category both the code of the Internet protocols (embraced within TCP/IP) and also the code constituting the application space that interacts with TCP/IP. Code of the latter sort is often referred to, in Jerome Saltzer’s terminology, as code at the “end.” “For the case of the data communication system, this range includes encryption, duplicate message detection, message sequencing, guaranteed message delivery, detecting host crashes, and delivery receipts. In a broader context the argument seems to apply to many other functions of a computer operating system, including its file system.” Jerome H. Saltzer et al., End-to-End Arguments in System Design, in INNOVATIONS IN INTERNETWORKING 195 (Craig Partridge ed., 1988). More generally, this layer would include any applications that might interact with the Network (browsers, e-mail programs, file transfer clients) as well as operating system platforms upon which these applications might run. In the analysis that follows, the most important “layer” for my purposes will be the layer above the IP layer. This is because the most sophisticated regulations will occur at this level, given the Net’s adoption of Saltzer’s end-to-end design. 104 CHICAGO-KENT LAW REVIEW [Vol. 74:__ responsibility from the late John Postel.10 It was not software that established the protocols for the World Wide Web. It was a group of Internet decision-makers who put a recommendation for this design into circulation, and then recognized it as adopted.11 These decision- makers were people; some of them are responsible to “the People”; their name was not Hal 2000. Thus governance in the sense that I mean is a mix of the regulations of code and the regulations of bodies that regulate this code. It is both machine and man. But these “regulators” regulate in ways that are very different. They are different from each other, and they are different from the regulations of real-space governments. We should understand this difference. * * * First, think a bit more about code—about the way that code regulates. Lawyers don’t like to think much about how code regulates.
Recommended publications
  • Hal Abelson Education: Princeton AB (Summa Cum Laude)
    Hal Abelson Education: Princeton A.B. (summa cum laude) 1969 MIT Ph.D. (Mathematics) 1973 Professional Appointments: 1994–present MIT Class of 1922 Professor MIT 1991–present Full Professor of Computer Sci. and Eng. MIT 1982–1991 Associate Professor of Electrical Eng. and Computer Sci. MIT 1979–1982 Associate Professor, Dept. of EECS and Division for Study and Res. in Education MIT 1977–1979 Assistant Professor, Dept. of EECS and DSRE MIT 1974–1979 Lecturer, Dept. of Mathematics and DSRE MIT 1974–1979 Instructor, Dept. of Mathematics and DSRE MIT Selected publications relevant to this proposal: 1. “Transparent Accountable Data Mining: New Strategies for Privacy Protection,” with T. Berners- Lee, C. Hanson, J, Hendler, L. Kagal, D. McGuinness, G.J. Sussman, K. Waterman, and D. Weitzner. MIT CSAIL Technical Report, 2006-007, January 2006. 2. “Information Accountability,” with Daniel J. Weitzner, Tim Berners-Lee, Joan Feigenbaum, James Hendler, and Gerald Jay Sussman, MIT CSAIL Technical Report, 2007-034, June 2007. Available at http://hdl.handle.net/1721.1/37600. 3. “The Creation of OpenCourseWare at MIT,” J. Science Education and Technology, May, 2007. 4. Structure and Interpretation of Computer Programs, Hal Abelson, Gerald Jay Sussman and Julie Sussman, MIT Press and McGraw-Hill, 1985, (published translations in French, Polish, Chinese, Japanese, Spanish, and German). Second Edition, 1996. 5. “The Risks of Key Recovery, Key Escrow, and Trusted Third-Party Encryption,” with Ross Ander- son, Steven Bellovin, Josh Benaloh, Matt Blaze, Whitfield Diffie, John Gilmore, Peter Neumann, Ronald Rivest, Jeffrey Schiller, and Bruce Schneier, in World Wide Web Journal, vol. 2, no.
    [Show full text]
  • Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress
    Order Code RL32114 Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Updated January 29, 2008 Clay Wilson Specialist in Technology and National Security Foreign Affairs, Defense, and Trade Division Botnets, Cybercrime, and Cyberterrorism: Vulnerabilities and Policy Issues for Congress Summary Cybercrime is becoming more organized and established as a transnational business. High technology online skills are now available for rent to a variety of customers, possibly including nation states, or individuals and groups that could secretly represent terrorist groups. The increased use of automated attack tools by cybercriminals has overwhelmed some current methodologies used for tracking Internet cyberattacks, and vulnerabilities of the U.S. critical infrastructure, which are acknowledged openly in publications, could possibly attract cyberattacks to extort money, or damage the U.S. economy to affect national security. In April and May 2007, NATO and the United States sent computer security experts to Estonia to help that nation recover from cyberattacks directed against government computer systems, and to analyze the methods used and determine the source of the attacks.1 Some security experts suspect that political protestors may have rented the services of cybercriminals, possibly a large network of infected PCs, called a “botnet,” to help disrupt the computer systems of the Estonian government. DOD officials have also indicated that similar cyberattacks from individuals and countries targeting economic,
    [Show full text]
  • What Every Citizen Should Know About DRM, A.K.A. “Digital Rights Management”
    What Every Citizen Should Know About DRM, a.k.a. “Digital Rights Management” By Mike Godwin Senior Technology Counsel Public Knowledge PUBLIC KNOWLEDGE NEW AMERICA FOUNDATION What Every Citizen Should Know About DRM, a.k.a. “Digital Rights Management” By Mike Godwin Senior Technology Counsel Public Knowledge NEW AMERICA FOUNDATION Washington, DC Acknowledgements This “DRM primer” would not have come about without the author’s having worked with an informal “Risks of Copy Protection” expert group that includes Ed Felten, Matt Blaze, Phil Karn, Steve Bellovin, Bruce Schneier, Alan Davidson, John Morris, Hal Abelson, and Bill Cheswick. Two members of the group — Ed Felten and Matt Blaze — deserve special thanks for framing a number of copy-protection technology issues with such clarity that I have to some extent reproduced that clarity here. Phil Karn similarly deserves special thanks for his discussion of the extent to which peer-to-peer file-sharing is a feature of the Inter- net’s fundamental design. Andy Moss and Aaron Burstein each made a wide range of helpful comments and observations on earlier drafts of this primer. I’m particularly grateful to my boss, Gigi Sohn, for giving me the opportunity to explore the landscape of digital rights management and to develop further some of my ideas about the directions in which DRM may take us. I’m also thankful for the support and feedback of my other fellow staff members at Public Knowledge — Sarah Brown, Alex Curtis, Ann Dev- ille, and Nathan Mitchler. I consider myself fortunate to be backed by such a knowledgeable and resourceful team; each of my colleagues contributed in many ways to the development of this project, and all of them read this paper in various stages of development and offered helpful corrections and suggestions.
    [Show full text]
  • Author and Activist Lawrence Lessig
    Big Money Bulletin Author and reform activist Lawrence Lessig Inside to headline WDC annual meeting on May 2 Harvard University professor and campaign finance reform crusader Page 2 Lawrence Lessig will be the keynote speaker for the Democracy Supreme Court drops another bomb Campaign’s annual membership meeting to be held on Friday, May 2. Wisconsin communities move to amend Lessig is the author of Republic, Lost: How Money Corrupts Congress Page 3 — And a Plan to Stop It and founder of the national group Rootstrikers. Change in leadership coming at WDC He is the driving force behind the New Hampshire Rebellion that started Less for voters, more for lobbyists with a 185-mile walk across the state and now is working to make sure that every federal candidate in the 2016 primaries is asked one question: Page 4 “How are YOU going to end the system of corruption in Washington, Kissing the ring in Vegas D.C.?” Lessig also is well known for his dynamic TED talks. TED stands for Technology, Entertainment and Design and is a nonprofit devoted to spreading ideas, usually in the form of short, powerful talks of 18 minutes or less. Started in 1984, the group’s mission is promoted through conferences and videos in more than 100 languages that cover topics from science to April 2014 business to global issues. Edition No. 89 This year’s WDC membership meeting is being held at Madison’s Barrymore Theatre, located at 2090 Atwood Avenue on the city’s near east side. On the Web: Registration will begin at 5:30 p.m., with the evening’s program starting www.wisdc.org at 6.
    [Show full text]
  • CNN/WMUR/UNH Tracking Poll -1- January/February, 2016 1
    Conducted by the University of New Hampshire Survey Center Interviews with 914 adults in New Hampshire conducted by land line and cellular telephone on January 27-30, 2016 including 409 who say they plan to vote in the Republican presidential primary and 347 respondents who say they plan to vote in the Democratic presidential primary. The margin of sampling error for results based on Republican primary voters is plus or minus 4.8 percentage points and for results based on Democratic primary voters is plus or minus 5.3 percentage points. EMBARGOED FOR RELEASE: Sunday, January 31 at 6:00 p.m. CNN/WMUR/UNH Tracking Poll -1- January/February, 2016 1. (UNDECLARED / INDEPENDENT LIKELY VOTERS ONLY) “"Which Presidential primary election do you think you will vote in ... the Republican Primary or the Democratic Primary?" PROBE: “As of RIGHT NOW, which primary do you think you will vote in?” Dec. Jan. Jan. 2015 13-18 27-30 REPUBLICAN PRIMARY 48% 44% 47% DEMOCRATIC PRIMARY 38% 48% 42% UNDECIDED 14% 8% 11% CNN/WMUR/UNH Tracking Poll -2- January/February, 2016 2. (REPUBLICAN PRIMARY VOTERS ONLY:) “Have you definitely decided who you will vote for in the New Hampshire primary … are you leaning toward someone … or have you considered some candidates but are still trying to decide?” June Sept Dec Jan Jan. 2015 2015 2015 13-18 27-30 DEFINITELY DECIDED 8% 13% 18% 31% 39% LEANING TOWARD SOMEONE 17% 28% 26% 26% 24% STILL TRYING TO DECIDE 75% 59% 56% 43% 37% 3. (REPUBLICAN PRIMARY VOTERS ONLY:) "I’m going to read you the names of the candidates who are either running or considering running for the Republican nomination.
    [Show full text]
  • THE FUTURE of IDEAS This Work Is Licensed Under a Creative Commons Attribution-Noncommercial License (US/V3.0)
    less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page i THE FUTURE OF IDEAS This work is licensed under a Creative Commons Attribution-Noncommercial License (US/v3.0). Noncommercial uses are thus permitted without any further permission from the copyright owner. Permissions beyond the scope of this license are administered by Random House. Information on how to request permission may be found at: http://www.randomhouse.com/about/ permissions.html The book maybe downloaded in electronic form (freely) at: http://the-future-of-ideas.com For more permission about Creative Commons licenses, go to: http://creativecommons.org less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page iii the future of ideas THE FATE OF THE COMMONS IN A CONNECTED WORLD /// Lawrence Lessig f RANDOM HOUSE New York less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page iv Copyright © 2001 Lawrence Lessig All rights reserved under International and Pan-American Copyright Conventions. Published in the United States by Random House, Inc., New York, and simultaneously in Canada by Random House of Canada Limited, Toronto. Random House and colophon are registered trademarks of Random House, Inc. library of congress cataloging-in-publication data Lessig, Lawrence. The future of ideas : the fate of the commons in a connected world / Lawrence Lessig. p. cm. Includes index. ISBN 0-375-50578-4 1. Intellectual property. 2. Copyright and electronic data processing. 3. Internet—Law and legislation. 4. Information society. I. Title. K1401 .L47 2001 346.04'8'0285—dc21 2001031968 Random House website address: www.atrandom.com Printed in the United States of America on acid-free paper 24689753 First Edition Book design by Jo Anne Metsch less_0375505784_4p_fm_r1.qxd 9/21/01 13:49 Page v To Bettina, my teacher of the most important lesson.
    [Show full text]
  • Fostering Learning in the Networked World: the Cyberlearning Opportunity and Challenge
    Inquiries or comments on this report may be directed to the National Science Foundation by email to: [email protected] “Any opinions, findings, conclusions and recommendations expressed in this report are those of the Task Force and do not necessarily reflect or represent the views of the National Science Foundation.” Fostering Learning in the Networked World: The Cyberlearning Opportunity and Challenge A 21st Century Agenda for the National Science Foundation1 Report of the NSF Task Force on Cyberlearning June 24, 2008 Christine L. Borgman (Chair), Hal Abelson, Lee Dirks, Roberta Johnson, Kenneth R. Koedinger, Marcia C. Linn, Clifford A. Lynch, Diana G. Oblinger, Roy D. Pea, Katie Salen, Marshall S. Smith, Alex Szalay 1 We would like to acknowledge and give special thanks for the continued support and advice from National Science Foundation staff Daniel Atkins, Cora Marrett, Diana Rhoten, Barbara Olds, and Jim Colby. Andrew Lau of the University of California at Los Angeles provided exceptional help and great spirit in making the distributed work of our Task Force possible. Katherine Lawrence encapsulated the Task Force’s work in a carefully crafted Executive Summary. Fostering Learning in the Networked World: The Cyberlearning Opportunity and Challenge A 21st Century Agenda for the National Science Foundation Science Foundation the National for A 21st Century Agenda Report of the NSF Task Force on Cyberlearning Table of Contents Executive Summary...............................................................................................................................................................................................................................5
    [Show full text]
  • A Critique of Abelson and Sussman Why Calculating Is Better Than
    A critique of Abelson and Sussman - or - Why calculating is better than scheming Philip Wadler Programming Research Group 11 Keble Road Oxford, OX1 3QD Abelson and Sussman is taught [Abelson and Sussman 1985a, b]. Instead of emphasizing a particular programming language, they emphasize standard engineering techniques as they apply to programming. Still, their textbook is intimately tied to the Scheme dialect of Lisp. I believe that the same approach used in their text, if applied to a language such as KRC or Miranda, would result in an even better introduction to programming as an engineering discipline. My belief has strengthened as my experience in teaching with Scheme and with KRC has increased. - This paper contrasts teaching in Scheme to teaching in KRC and Miranda, particularly with reference to Abelson and Sussman's text. Scheme is a "~dly-scoped dialect of Lisp [Steele and Sussman 19781; languages in a similar style are T [Rees and Adams 19821 and Common Lisp [Steele 19821. KRC is a functional language in an equational style [Turner 19811; its successor is Miranda [Turner 1985k languages in a similar style are SASL [Turner 1976, Richards 19841 LML [Augustsson 19841, and Orwell [Wadler 1984bl. (Only readers who know that KRC stands for "Kent Recursive Calculator" will have understood the title of this There are four language features absent in Scheme and present in KRC/Miranda that are important: 1. Pattern-matching. 2. A syntax close to traditional mathematical notation. 3. A static type discipline and user-defined types. 4. Lazy evaluation. KRC and SASL do not have a type discipline, so point 3 applies only to Miranda, Philip Wadhr Why Calculating is Better than Scheming 2 b LML,and Orwell.
    [Show full text]
  • The Computer As a Teaching Tool: Promising Practices. Conference Report (Cambridge, Massachusetts, July 12-13, 1984)
    DOCUMENT RESUME ED 295 g'6 IR 013 322 AUTHOR McDonald, Joseph P.; And Others TITLE The Computer as a Teaching Tool: Promising Practices. Conference Report (Cambridge, Massachusetts, July 12-13, 1984). CR85-10. INSTITUTION Educational Technology Center, Cambridge, MA. SPONS AGENCY Education Collaborative for Greater Boston, Inc., Cambridge, Mass. PUB DATE Apr 85 NOTE 25p.; For a report of a related conference, see IR 013 326. PUB TYPE Collected Works - Conference Proceedings (021) -- Reports - Descriptive (141) EDRS PRICE MF01/PC01 Plus Postage. DESCRIPTORS *Computer Assisted Instruction; *Computer Literacy; Computer Simulation; Curriculum Development; Elementrry Secondary Education; *Language Arts; *Mathematics Instruction; Microcomputers; Professional Development; Research Needs; *Science Instruction; Teacher Education; Teacher Role IDENTIFIERS Reality ABSTRACT This report of a 1984 conference on the computer as a teaching tool provides summaries of presentations on the role of the computer in the teaching of science, mathematics, computer literacy, and language arts. Analyses of themes emerging from the conference are then presented under four headings: (1) The Computer and the Curriculum (the computer keeps learning connected to experience; the computer provides access to the underlying disciplines of subjects; the computer challenges the curricular status quo; and the computer aids implementation of the curriculum); (2) The Computer and Reality (computer-based models and simulations only imperfectly represent reality; a program may mask operations that students should experience to give depth and stability to their learning; and computers sometimes need to be used in conjunction with other, more concrete, experiences); (3) Perspectives on Teaching Practice (teaching is rooted in a teacher's own interests, need to understand, and social commitment; and teaching is, to a significant extent, a product of circumstance, not an entirely rational enterprise); and (4) Teachers' Professional Development (strategies and goals are needed for teacher training).
    [Show full text]
  • Lawrence Lessig
    TRANSCRIPT Money in Politics 2009 Conference Pre-Luncheon Keynote Presentation: Lawrence Lessig Susan Liss: I'm director of the Democracy Program at the Brennan Center and our campaign finance work falls under our side of the aisle called Democracy. I am incredibly thrilled to be working with fantastic colleagues and I really want to thank all of my colleagues who have put this program together today. My mind is just twirling on the things that we can do and we've only had one panel and two wonderful kickoff speakers. I'm here to introduce our keynote, and we are delighted and honored that professor Lawrence Lessig from Stanford Law School has been willing to fly across the country to share his knowledge with us. I know many of you are very familiar with his contributions to this field already. He is currently a professor of law at Stanford Law School and the founder of the school's Center for Internet and Society. He is one of the foremost intellectuals on intellectual property and intellectual property law and the Internet; from what I understand that tremendous knowledge base has seguewayed into a fascination and interest with these very important underlying issues involving campaign finance reform. He will be moving to Harvard to start a study on ethics and to start a center on ethics and institutional corruption in the fall. We are really very honored and so pleased to welcome him here and thank him for coming. Professor Lessig. Lawrence Lessig: Thank you very much. The advertisements for this conference said that the first keynote would provide some statistics and I, quote, "would provide slides" so here I am to provide the slides.
    [Show full text]
  • Computer Science Logo Style Beyond Programming
    Computer Science Logo Style Beyond Programming Brian Harvey Computer Science Logo Style SECOND EDITION Volume 3 Beyond Programming The MIT Press Cambridge, Massachusetts London, England 1997 by the Massachusetts Institute of Technology The Logo programs in this book are copyright 1997 by Brian Harvey. These programs are free software; you can redistribute them and/or modify them under the terms of the GNU General Public License as published by the Free Software Foundation; either version 2 of the License, or (at your option) any later version. These programs are distributed in the hope that they will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License (printed in the ®rst volume of this series) for more details. For information on program diskettes for PC and Macintosh, please contact the Marketing Department, The MIT Press, 55 Hayward Street, Cambridge, Massachusetts, 02142. Copyright credits for quoted material on page 349. This book was typeset in the Baskerville typeface. The cover art is an untitled mixed media acrylic monotype by San Francisco artist Jon Rife, copyright 1994 by Jon Rife and reproduced by permission of the artist. Library of Congress Cataloging-in-Publication Data Harvey, Brian, 1949± Computer Science Logo Style / Brian Harvey. Ð 2nd ed. p. cm. Includes indexes. Contents: v. 1. Symbolic computing. Ð v. 2. Advanced techniques Ð v. 3. Beyond programming. ISBN 0±262±58151±5 (set : pbk. : alk. paper). Ð ISBN 0±262±58148±5 (v. 1 : pbk. : alk. paper). Ð ISBN 0±262±58149±3 (v.
    [Show full text]
  • Forbidden Feeds: Government Controls on Social Media in China
    FORBIDDEN FEEDS Government Controls on Social Media in China 1 FORBIDDEN FEEDS Government Controls on Social Media in China March 13, 2018 © 2018 PEN America. All rights reserved. PEN America stands at the intersection of literature and hu- man rights to protect open expression in the United States and worldwide. We champion the freedom to write, recognizing the power of the word to transform the world. Our mission is to unite writers and their allies to celebrate creative expression and defend the liberties that make it possible. Founded in 1922, PEN America is the largest of more than 100 centers of PEN International. Our strength is in our membership—a nationwide community of more than 7,000 novelists, journalists, poets, es- sayists, playwrights, editors, publishers, translators, agents, and other writing professionals. For more information, visit pen.org. Cover Illustration: Badiucao CONTENTS EXECUTIVE SUMMARY 4 INTRODUCTION : AN UNFULFILLED PROMISE 7 OUTLINE AND METHODOLOGY 10 KEY FINDINGS 11 SECTION I : AN OVERVIEW OF THE SYSTEM OF SOCIAL MEDIA CENSORSHIP 12 The Prevalence of Social Media Usage in China 12 Digital Rights—Including the Right to Free Expression—Under International Law 14 China’s Control of Online Expression: A Historical Perspective 15 State Control over Social Media: Policy 17 State Control over Social Media: Recent Laws and Regulations 18 SECTION II: SOCIAL MEDIA CENSORSHIP IN PRACTICE 24 A Typology of Censored Topics 24 The Corporate Responsibility to Censor its Users 29 The Mechanics of Censorship 32 Tibet and
    [Show full text]