Fixing Facebook, The Internet, Money, And Most Other Digital Stuff

Blockchains and other cryptographic protocols are useful for online payment processing and other digital exchange systems, and p2p protocols for decentralized or crowdsourced security validation are highly desirable features of a modern digital system of accounts. What I dislike about Bitcoin (the best-known blockchain implementation) is that it invites speculation just as if it were gold. A modern digital system of accounts is best served by a unit of account that is relatively free from intrinsic value and thus free from speculation.

My sense is that making a universal transaction accounting/auditing system (also known in distributed and p2p computing circles as a distributed ledger) part of a “native” internet protocol suite will make it more stable. If it is ubiquitous it becomes like air and people are less likely to speculate on air than on gold or bitcoins. Such a core Internet protocol would provide an automatic  “audit trail” of every applicable read and write transaction, including but not limited to every payment, that is posted.  Such a protocol could be used for many important applications:

  • intellectual property management, especially for individuals posting on blogs and social media
  • micro-payments such as those proposed by Jaron Lanier in Who Owns the Future
  • retail payment systems
  • international payment systems, exchanges, etc.

Because its use could become so ubiquitous it should be designed and built very openly and carefully by a large public institution such as W3C, or by open crowdsourcing — not by a lone entrepreneur or small shop. What I’m proposing is actually an upgrade to the internet protocol suite — the core internet protocols — that would maintain a link between every named resource and a metadata file. I’m not current enough on the tech to get more specific or detailed about the implementation. http://en.wikipedia.org/wiki/Internet_protocol_suite

The innovation I suggest is to permanently and unbreakably link every named resource (or its URI) on the Internet to its own metadata file. I call that file the metadata “tail” or “fork”. Such a file might be a flat file, a structured database, a distributed hash table, an encrypted block chain, etc. — I leave that to better software engineers than me. The link between the named resource and its metadata tail must be unbreakable for the life of the resource and the metadata must be inviolable. The link should be maintained as deeply in the internet core protocols as possible. It may be possible to implement the metadata store itself at a considerably higher layer to allow for easier updates to the data store technology. After all I am probably advocating the creation of trillions of gigabytes of metadata here. A sort of audit trail of practically every read or write operation on the Internet.

Every resource’s metadata file would contain the following metadata:

1. At the minimum: creation date and author

2. Other optional metadata might include owner (if other than author), ownership rights, expiration date, etc.

3. History (audit trail) of every read, write, copy, payment, etc. transaction involving that resource.

We know that getting money is a means to getting many things of value, not that it IS value. And its fungible and persistent (durable) so its very handy and convenient. We’d be hard pressed to design money without this convenience, fungibility, and durability and still get people to use it. That’s the catch 22 for people hoping to solve ANYTHING by inventing new forms of money or non-money or whatever.

But we do have some serious problems with old forms of money. So I nominate (with tongue in cheek) dried fish as the new international standard unit of accounts. No, make that coconuts. Or barrels of oil. Or Bitcoins. or killoWatt hours (kWh) of electricity … Whatever we choose, if its a finite natural or virtual thing in limited supply people will rush to acquire it and if possible “corner” the supply. So maybe its best to use something in unlimited supply, such as plain, immaterial numbers. Oops, no, people have been speculating on “the numbers game” forever.

The more I think about all this the more I think my proposal to update the internet core protocols to add an “audit trail” of all transactions is the only solution to our problems —  with money, with accounting fraud, with social media content rights,  and with lots of other difficult problems  too numerous to mention at this point.

Poor Richard

PS My only innovation (if it is such at all) is placing the link to the metadata repositories deeply into the internet core protocol stack and applying the protocol to potentially all reads and writes on the Internet, not just financial transactions. It may also be innovative (or not) to propose individual and distributed metadata repositories, possibly using blockchain cryptography, rather than a common repository, for each and every named resource on the Internet. The main problem to overcome is the volume of metadata. The current Bitcoin blockchain would probably break under such volumes.

Related:

Further Discussion:

  • Poor Richard: Debates about money, accounting, credit, debt, etc. seem mostly anachronistic to me. What we should be more concerned with designing is the digital micropayment economy (protocol) proposed by Jaron Lanier in “Who Owns the Future” and which I try to imagine one approach to in my rough note  Fixing Facebook, the Internet, Money, and other stuff
  • Edouard Bry: Poor Richard, what about large purchases like a car, a house?
  • Edouard Bry: Poor Richard, that proposal negates anonymity. Personally I believe total lack of anonymity is not realistic from a human perspective. It’s OK conceptually but it does not take enough into account the need for some privacy most human beings have…
  • Poor Richard: An Internet-wide micropayment system can be used for all purchases, large or small, but at the small end it provides a unique service that Jaron Lanier explains in “Who Owns the Future” and related videos.  Thus far Lanier is not well-liked by many of the P2P, FOSS and “free culture” people. Lanier does not describe the implementation of the system, which is what I have tried to address. No one has yet proposed any specific user interface details, but the user interface would allow all internet users to make and receive payments of any size — but of special importance it would permit very tiny payments of fractions of a cent for comparably small services and goods like clicking a “Like” button or for posting or reading a facebook post.
  • Poor Richard: Edouard Bry, do you think Poor Richard is someone who would abandon anonymity? No. The application must include strong cryptography and access controls for varying degrees of privacy for different applications. Like block chains, a micro-payment protocol will be used by a wide variety of applications in addition to micro-payments. An Internet-wide micro-payment system can be used for all purchases, large or small, but at the small end it provides a unique service that Jaron Lanier explains in “Who Owns the Future” and related videos. http://youtu.be/cCvf2DZzKX0 So far Lanier is not well-liked by many of the P2P, FOSS and “free culture” people. Lanier does not describe the implementation of the system, which is what I have tried to address. No one has yet proposed any specific user interface details that I know of, but the user interface would allow all internet users to make and receive payments of any size — but of special importance, it would permit very tiny payments of fractions of a cent for comparably small services and goods like clicking a “Like” button or for posting or reading a facebook post.
  • Andrew Bransford Brown: I kind of agree, however, it is an incremental process. You might have a look at http://promiselanguage.blogspot.com It solves the payment part. The structure might also solve the “metadata” issue you are referring to. “Promise Language”
  • Bernd Nurnberger: Interesting. Not sure I can agree in light of this: “Silicon Valley megacorps have no interest in transparency. They don’t want to talk to reporters who would ask them real question about their for-profit surveillance business operations. Why would they risk it when they can fall back a trusted crisis PR technique: shut the doors, don’t pick up the phone, lie low for a while and wait for the storm to pass.” 

  • Poor Richard: Andrew, the applications, like payment processing, could be incremental, but it is fundamental to my idea that the various applications I mentioned would all share a common back end that I call an automatic audit trail protocol for the Internet core protocol stack.
  • Richard Saunders: A world citizens movement and ultimately world governance could be set in motion simply by updating the internet core protocols to allow for secure “voting” on nearly all internet content
  • Adam Lake: Richard Saunders, why not use a protocol like email for p2p social networking with all data on personal servers?

  • Richard Saunders: Search “p2p email”. I haven’t investigated any of them, but it seems like a good idea for us to adopt p2p versions of the apps we use. That’s a different level of interaction than the core internet protocols which everyone uses automatically by default. They don;t need to make any decision or choice about it. Everyone worldwide is already using a common set of digital “tools” to interact with the internet therefore building a worldwide movement by using those common tools is as much a no-brainer as possible. I suspect there are forces within the internet governance community that fear the idea of building secure voting technology into the core internet protocol suite because of the potential disruption of all the old vested interests and powers.

  • Marco Fioretti: “secure internet voting” cannot exist, period. It’s not even wrong.

    As for “p2p versions of the apps we use”, and just for general reference (I have NO time to work on it for free, you are all sincerely welcome to do it yourself, or find somebody else who can!) here is a faster, much simpler way to get something similar soon. An intermediate but IMO unavoidable step towards real “p2p versions of the apps we use”: http://per-cloud.com

  • Richard Saunders: @Marco Fioretti “secure internet voting” cannot exist

    Marco, is your objection to the word “secure”? I mean it only in a relative sense. If relatively secure financial transactions can exist, relatively secure voting can exist on the internet, can it not?

  • Marco Fioretti: “If relatively secure financial transactions can exist, relatively secure voting can exist on the internet, can it not?”

    No.

    Financial transactions are relatively secure only because if they go wrong someone surely notices it, often immediately, and comes asking for a refund or repetition. With internet voting, it’s impossible to realize that something bad happened. Unless it’s not secret, which would be so bad to be half disgusting half ridiculous.

    It’s absolutely impossible to guarantee that all software+hw combinations used for voting by people who by and large use their birth date as password or never update software etc… would be free of trojans, keyloggers and such. This has proved tolerable for making online payments only for the reason in the previous paragraph, it could never happen with voting. People who couldn’t be bothered to vote could even never notice that their computer was infected to vote on their behalf.

    If voting happens outside a safe place, there is no protection from abuse as in any variation of “vote now what I tell you and never tell anybody, or I’ll shoot you”

    etc etc. So no, relatively secure voting CANNOT exist on the internet. Period. Believe me I do NOT want to offend, but it makes me sad to see how many people who apparently thought of this for more than 2 minutes still propose Internet voting.

    And above all: WHY? Let’s assume just for the fun of discussion that all I’ve said doesn’t exist: what would be the REAL advantage of internet voting?

  • Richard Saunders: @Marco “what would be the REAL advantage of internet voting?

    I use the word “voting” broadly to include things such as “liking” and rating (+1, -2, etc.). Using an encrypted distributed ledger provides an audit trail. My point is that an encrypted distributed ledger (perhaps some type of “blockchain”) should become part of the core internet protocols. This would allow the world to rate any internet content or to “vote” in some fashion on everything. Security is always relative, so higher value data would need more protection, just as now.

  • Melvin Carvalho: …Using the new structured data layer of the web, contracts, governance, anything that an be modelled with data can be created. When you look at the web, try not to think of giant corporations controlling it, or locking it down, it was made for everyone to do anything they want. Any use case you can imagine with a block chain is doable on the dencentralized web.
  • Richard Saunders: Melvin, structured data and linked data are typically defined by triples: subject – predicate – object. This does not automatically constitute a strongly secure distributed ledger. If that is what one is after they still have to build that somehow. If we want to create a strongly secure distributed ledger, a bitcoin-style blockchain may not be the best route. BUT WHAT IS?

Human Broadband Connections

Source: Wikimedia

[Note: this is a reposting of material that is buried rather deeply in two other essays on this blog, xTopia and  The Meaning of Life.]

We all know things we don’t know how to express in words. When we try, they often sound like cliches and tautologies. But sometimes progress comes through persistent interaction with a friend, a partner, or a colleague. Sometimes two heads or three heads are better than one. Sometimes people who spend a lot of time together develop special kinds of connections. If we live or work together long enough and closely enough we may begin to establish what I call human broadband connections. This may evolve further as we keep house, interact with nature, travel, solve problems, share adventures, meet challenges and survive crises together, until we can finish each others sentences. We are beginning to realize that such intimacy can gradually change the chemistry and structure of the nervous system and allow for progressively increasing inter-personal communication bandwidth and synchronization. One example is menstrual synchrony.

Some might consider it to be an interpersonal spiritual connection, but it is a natural phenomenon that I would call bio-cognitive development (bio-cognitive = body + brain) and psycho-neuro-synchronization.

Bio-cognitive development partners are two or more peers engaging in an in-person practice that focuses not on learning facts but developing and practicing bio-cognitive skills such as high-bandwidth psycho-neuro-synchronization. Perhaps a more self-explanatory term is “interpersonal neural synchronization”. As psycho-physiological intimacy and coordination increases over time, the bandwidth and synchronization of the bio-cognitive communication increase. Some of the coordinating feedback channels are:

.

.

.Voice modulation, body language , airborne chemicals, and physical contact all stimulate the release of a wide array of neurotransmitters and other hormones throughout the body. These change the states of neural networks, nerves, and tissues throughout the body. That much is established fact.

Image: bigthink.com

My additional hypothesis is that all these channels of communication can gradually come into greater synchronization between people. Its similar to the way higher data throughput is achieved between nodes in a communication network as they each synchronize to the same timing, states, and protocols. The rate at which this happens between people and the degree to which it happens depends on the innate psycho-physiological characteristics of the participants as well as their acquired proficiencies. When well developed, interpersonal bio-cognitive communication bandwidth may change as much as the difference between a 300 baud asynchronous modem connection and a 10-gigabit broadband connection.

The importance of shared activity to developing bio-cognitive intimacy and high communication bandwidth can’t be over-emphasized. Important activities include, but aren’t limited to: singing and dancing, eating and drinking (especially alcohol), domestic housekeeping (especially kitchen work), manual labor (gardening/farm work, carpentry, etc.), professional work, artistic collaboration, dialog/debate, sports and recreation (camping is great), traveling, and adventure. Sharing risks and crises is especially effective for promoting empathy and trust. The more time participants spend together the better. Sharing living quarters and workplaces is especially effective, within the limits of intimacy fatigue. And of course if these things are done mindfully, with the intention of developing high-bandwidth intimacy, and with appropriate methods and skills, excellent results are possible. I have achieved such intimacy with several individuals and small groups who lived and worked together.

“There is almost a sensual longing for communion with others who have a large vision. The immense fulfillment of the friendship between those engaged in furthering the evolution of consciousness has a quality impossible to describe.”
-Pierre Teilhard de Chardin

As my friend Natural Lefty points out, on some level this is common sense and I am merely stating a truism of social psychology: people who hang together synchronize their language, culture, and behavior to some extent. This can have survival advantages but it can also have negative consequences such as excessive conformity or “group-think”. It can promote cooperation or it can lead to intra-group or inter-group conflicts. Even members of a well-organized wolf pack may attack each other savagely. So the devil is in the details–what are the actual empirical effects of cognitive synchronization and development in practice, on the ground. What effects prove positive and what effects lead to negative consequences. The process of distinguishing between the positive and negative results, maximizing one and minimizing the other, can be thought of as a process of quality control and continuous improvement.

To achieve continuous improvement and positive quality control, we should systematize and instrument our intentional community of self-study and self-development. We should consciously formalize our group dynamics in a context of systems science and rigorous experimental design. Process transcends objectives, but measurable objectives provide important feedback for process improvement.

The prerequisites for bio-cognitive development and psycho-neuro-synchronization of groups are motivation, opportunity, and resources. It is important that various conditions and tools are provided.

One way to provide conditions for bio-cognitive group development is to establish venues for the kinds of activities mentioned above, in which those activities can be offered to the public and simultaneously shared by a residential staff group. Another approach is to establish intentional communities. These can be urban or rural.

In addition to the shared activities mentioned above, some of the possible tools and techniques for bio-cognitive development and psycho-neuro-synchronization include:

These and many other tools can be used for increasing adult brain plasticity and promoting emotional and physiological states that enhance learning, memory, and neural network integration. Conducted in groups they can also promote psycho-neuro-synchronization and bio-cognitive group intimacy.

All this provides a matrix for accelerated cultural and cognitive evolution that is independent of gross brain anatomy. (Lets face it, we aren’t getting bigger brains any time soon.) Nonetheless, there is good reason to hope that radical self-knowledge, bio-cognitive development, neuro-physiological practice, and psycho-neuro-synchronization may all work together to promote developmental changes in the brain’s micro-structure and its operational patterns. We can try to examine and consciously modify various aspects of our irrationality, automaticity, implicit associations, cognitive biases, etc. With all these tools and techniques we may have a shot at developing a kind of persistent group consciousness capable of hosting perceptions and representations of reality and establishing behavioral innovations and capabilities well beyond the confines of the mainstream culture and language.

This just might help us keep each other alive a few decades longer.

Poor Richard

Related PRA 2.0 Posts:

Related Resources

The Open Internet and Its Enemies

English: A stereotypical caricature of a villa...

Internet Freedom? Yes, of course…(Photo credit: Wikipedia)

“Can we in fact proceed or accept the outcome of any MS [multistakeholder governance] process without a very close re-examination and structuring of those processes; that is, to develop a means for providing appropriate safeguards against contamination, subversion, distortion or interest capture by or on behalf of one or another of the significant players whose interests in Internet development may be quite the opposite of the open, inclusive, transparent Internet that is the evident goal for most of those particularly from Civil Society who espouse MSism so passionately?”

The Open Internet Society and Its Enemies: Can Multistakeholderism Survive “Information Dominance”? | Gurstein’s Community Informatics.

 

The Internet Society, one of the active players in the debate on Internet governance, says this:

Each year, the Internet Governance Forum (IGF) provides all stakeholders a unique opportunity to discuss openly critical emerging Internet-related issues.

This year’s overarching IGF theme is: “Building Bridges” – Enhancing Multistakeholder Cooperation for Growth and Sustainable Development”

As part of its engagement at the IGF, the Internet Society strongly supports the fundamentals of the open and sustainable Internet:

-Open Global standards for unleashed innovation;
-Open to Everyone: a freedom-enhancer for every Internet user;
-Open for Business and Economic progress;
-Open and Multistakeholder governance for transparent inclusion.

That sounds so very nice, vague, and naive (or maybe disingenuous). The bottom line: regardless of internet governance institutions, structures, or players we need to identify bad actors and deal with them appropriately.

Wikipedia says of multistakeholder governance:

“Multistakeholderism is a framework and means of engagement, it is not a means of legitimization. Legitimization comes from people, from work with and among people.”

So how do we identify good faith (bona fides) and bad faith (mala fides)?

One thing that comes to mind is “profiling” the way the FBI profiles serial killers on TV, that is, looking for behavior patterns that correlate with other bad actors in the past.

However we do it, we need definitions and tests of good faith and bad faith with some kind of empirical metrics.

BTW I think the US government fails all conceivable tests of good faith and should be put in the penalty box indefinitely.

PR

Rage against the algorithms | mathbabe

“[A]lgorithms are becoming ever more important in society, for everything from search engine personalizationdiscriminationdefamation, and censorship online, to how teachers are evaluated, how markets work, how political campaigns are run, and even how something like immigration is policed. Algorithms, driven by vast troves of data, are the new power brokers in society, both in the corporate world as well as in government.

“They have biases like the rest of us. And they make mistakes. But they’re opaque, hiding their secrets behind layers of complexity. How can we deal with the power that algorithms may exert on us? How can we better understand where they might be wronging us? […]

“Algorithms are essentially black boxes, exposing an input and output without betraying any of their inner organs. You can’t see what’s going on inside directly, but if you vary the inputs in enough different ways and pay close attention to the outputs, you can start piecing together some likeness for how the algorithm transforms each input into an output. The black box starts to divulge some secrets.”

More… via Guest post: Rage against the algorithms | mathbabe.

The natural history of knowledge

Natural History

(Photo credit: Wikipedia)

Commenting on:

And Now A Word From Our Sponsor …

Does your dualism lose its flavor on the bedpost overnight?
Unblock your inquiry with a dose of Peirce’s Elixir Triadic❢

Inquiry Driven Systems : Are There Apps For That?

In which Jon Awbrey raises the subject of the “Relationship between emergent-evolved systems and engineered systems.”

That points toward what I like to call the “natural history” of cognition, inquiry, logic, mathematics, language, etc. We might learn things from the natural, sequential development of such faculties and systems that could be either prescriptive or proscriptive for modern engineering practice.

I like looking for the earliest and simplest instances of things. Unfortunately the early natural history of most things is largely unknown. Take the evolution of the triangle or the number three in human cognition, for example. But even in the absence of historical data we might gain something from thought experiments or inferences about what the evolutionary sequence might have been in the light of things we do know about the human bio-computer.

Incidentally, thinking about threes and triangles, the basic transistor (perhaps a fairly close man-made analogue of a primitive neuron or a even a bit of DNA) that we now “print” with exotic nano-particle ink is a thing with a tripartite configuration. I guess such three-part structure actually applies to most switches, many instances of which greatly predate biology.

Animation of the structure of a section of DNA...

Structure of a section of DNA. (Photo credit: Wikipedia)

And commenting on a related post on Jon’s blog, Inquiry into Inquiry, Definition and Determination : 10 :

“Suffice it to say that a sign endeavors to represent, in part at least, an Object, which is therefore in a sense the cause, or determinant, of the sign even if the sign represents its object falsely.” — Charles S. Peirce

Typically symbols or signs are objects of higher compression (or lower resolution or complexity) than the objects they represent, but in some cases the reverse may be true.

I think of knowledge as consisting of networks of associations. If each association has a probability and each network has a geometry, then the structure of knowledge isn’t much different from the structure of physical stuff. Perhaps we will find a sort of quantum mechanics or geometrodynamics of knowledge.

Presumably the brain uses a wide variety of relatively specialized algorithms and heuristics (evolved and learned) depending on the kinds of signs, objects or data types and structures involved in a task.

fractal Von_Koch_curve

(Photo credit: Wikipedia)

How useful Is fractal geometry for representing recursive networks of objects-associations?

A mirror of silver and glass makes no critical analysis of what it reflects, but we think that few (if any) reflections are perfect. When light reflected from objects in our field of vision enters the eye a series of additional reflections are created by our optical and visual systems. The eye and brain apply adaptive-corrective algorithms all along the way. Among these are associations with previously recorded and computed objects, signs, rules, etc.that provide context and some critical analysis — a comprehensive (in some degree) grasp. Many “leaps and grasps” have occurred before we are consciously aware of an image at all.

What we know or comprehend about something is largely (wholly?) based on comparisons and contrasts (positive and negative associations) with other stuff we already know. Following the development of knowledge backwards to its origins, the original vestige of prior knowledge presumably comes somehow from the DNA and possibly other materials of the fertilized embryonic germ cell and this is inherited by the first neuroblasts that go on to form the brain.

Contrasts and comparisons (associations) are fundamental operations of the biochemical machines that run up and down the DNA chains making DNA repairs, copying it, building proteins based on it, etc. At the biochemical level reflections (associations) typically come in the form of positively or negatively matching shapes and electromagnetic charges.

I think we agree that the geometry of the basic unit of association is triadic. I tend to think of it most often in terms of two nodes and a connecting line, the basic unit of a network; rather than as a triangle. A triangle, it seems, has more than three parts (3 sides + 3 vertices + 3 angles + an enclosed area = 10 parts — at least!).

Poor Richard

“Internet Freedom” and Post-Snowden Global Internet Governance

“Internet Freedom” and Post-Snowden Global Internet Governance

by Michael Gurstein

And so we have the upcoming 8th session of the Internet Governance Forum (IGF) in Bali with many of the main [“Internet Freedom”] protagonists having been more or less completely discredited…

So, what will be discussed at the IGF apart from the usual empty rhetoric about capacity building for LDC’s and legitimate campaigns against online skullduggery of the spam, kiddieporn, phishing variety?

Perhaps I could make a modest suggestion for the discussion. Perhaps we could discuss “Internet Freedom” but Internet Freedom in a post-Snowden world and without the hypocrisy and sanctimony of the previous discussions.

Perhaps we could discuss Internet Freedom as Freedom from undue and unaccountable surveillance; Internet Freedom as true Freedom of Expression where the forces of repression whether in Langley or in Moscow or Shanghai are made transparent and accountable; where Internet Freedom is anchored in the rule of law–not the, shall we say, rather “flexible” law of the world’s single superpower, but a rule of law to which all are expected to adhere and where mechanisms are in place to ensure that, to the degree possible, all are responsive and accountable; where Internet Freedom is not just for some but where it’s responsibilities and most importantly its protections are available for all of us — “foreigners” or no– and where all have some degree of input into how those laws are constructed and administered; where Internet Freedom does not mean that actions on and through the Internet will be subverted and directed simply to further enrich the already obscenely enriched, but rather to ensure that the benefits including financial benefits accruing from the Internet serve to reduce global inequalities.

I look for those who a year ago, were so eager to rally forces in support of Internet Freedom, to rally again to this somewhat battered standard; but now, one that is rather less naive and rather more reflective of the underlying reality of this technology enabled world in which we live. — Michael Gurstein [full article:  “Internet Freedom” and Post-Snowden Global Internet Governance]

[Is freedom just another word for the law of the jungle, the war of all against all, and might makes right? Instead of naive or disingenuous “freedom” rhetoric, we need the transparent, even-handed, rule of law starting with a Universal Internet Bill of Rights or “Internet Magna Carta.” The primary danger is always that lawmaking and enforcement can be hijacked by special interests. –PR]

Related PRA 2.0 posts

The Internet, Global Governance, and the Surveillance State in a Post-Snowden World (The Internet is Not Your Friend, Get Over It)

[This essay presents the issues without the spin and hyperbole common to most partisan and ideologically biased commentary. –PR]

Mike Gurstein’s “Post Script” is a good summary of the essay:

The dilemma of how to respond to the Snowden revelations–the loss of innocence with respect to the Internet, the very real threat of a totalized Surveillance (and Command and Control) Society–is a very real and immediate one.

Unfortunately none of the approaches so far being suggested seem capable of dealing with the realities which are being faced.

Challenges to these actions on the basis of existing laws (or constitutional guarantees) seem to be countered by processes of legalization and revision of constitutional interpretation (and very much depend on the existence of an enforceable rule of law which in some national jurisdictions at least seems questionable).

Arguments that current grassroots initiatives might scale sufficiently to present a form of counter-power or alternative technology/techno-social structures seem highly optimistic at best (open for example to intervention and manipulation as they might become successful and an apparent threat).

Technical solutions concerning encryption and structuring/restructuring of existing infrastructures appear dependent on the active involvement of significant technical and corporate bodies/individuals who to this point have been either complacent or even complicit in the developments noted above.

The development of broad framework agreements towards governing the Internet and the broad technical and telecommunications infrastructure are seen by many as quite unrealistic, however, they might provide the only realistic hope.  Their significance would be not so much in the capacity to enforce these agreements (the incapacity of existing of oversight and control structures in the face of political force, technology drive, personal and corporate interests and collective insecurities are not such as to lead to a great of optimism in this direction).  Rather their significance would come through the process of their formulation as nations and their citizenries globally would need to be confronted with the quite stark choice of acceptance of a Surveillance (and Command and Control) State or of a rule of law enforced through transparency and democratic oversight.  –Mike Gurstein

 

Related PRA 2.0 posts:

Gurstein's Community Informatics

Much has been made of the role that the Internet is playing in restructuring the way in which governance is executed both at the national and the global levels. The role of the Internet in supporting the rise of wide-spread autocrat-challenging movements in the Arab world, the role of the Internet in enabling middle class protests against out of touch officials and political structures in democracies, the power of the Internet to sway elections and directly influence policies are all obvious and widely commented upon.

Equally significant is the role of the Internet in creating global initiatives and global consciousness in a variety of areas–in supporting global movements in civil society; in making borders largely irrelevant in the transmission of information–importantly including images and direct communications; in allowing for the extremely low cost and largely frictionless sharing of experiences, good practices and how to’s in the whole range of areas…

View original post 3,506 more words

%d bloggers like this: