NEWSLETTER no 4

 

 

 

 

 

 

 

 

 

 

     REFLECTIONS

 

     ON

 

     THE

 

     DIGITAL

 

     SURGE

 

 

 

Here you see my most recent computer build, a Socket1700 with Windows11 and a small AI capacity.  It is working well as my online computer.  To its right, you can just make out a 10-year old build with Win10 and never a hint of trouble.  My third active computer Socket1200, runs linux on an experimental basis.

There are unsatisfactory features in the new build.  The case is designed for gaming so it has LED lights flashing around the 6 or 8 fans.  The internal arrangements, wiring, etc, are difficult to follow at build, but it nonetheless functions well. 

Beyond this, in coping with the internet for example, my abilities do not meet the demands of the web; it is beyond my control.  External sources find it much too easy to place things on my computer or upload data without my knowledge.  In short computer tech has almost completely outmanoeuvred me.  So the comments that follow are based primarily on my understanding of society and its politics, rather than on technical expertise.

 

Many of us are familiar with the use of ‘Teams’ and ‘Zoom’, and smart phones of course, to enable so many and various activities especially when, as recently, normal routines were interrupted by the pandemic or even by unemployment surging.  This development has brought digital processes to the fore in the public mind.  That is very important and sets the scene for the following remarks.

It is well known that George Orwell spotted the interactive capabilities of television in ‘1984’; that ‘Big Brother’ can address you personally and tell you what to do while you keep your television on.  Today, though current attention is more focused on the collection of personal data and its transfer to government or elsewhere, the possibility of personalised instructions emanating from the state is not much further away.

But the most commonly recognised perils of interactive systems based on telecoms and television broadcasting have related to interventions by private third parties, either hackers or social ‘miscreants’ seeking to either to cause damage to systems or to lead the young, or others, into trouble, possibly financial, possibly social.  I do not know current figures but the scale of the ‘dark web’ is reputed to be enormous.  Many inform me that the extent of the WWW and its hosted activities is impossible to determine but I doubt this; the data is just not disclosed. 

One result of these changes has been the recent calls to ban smart phones from primary schools and by implication from children of that age.  I agree with this.  Driving licenses are not issued before the age of 17 and consumption of alcohol is again restricted for the young.  With regard to mobile phone use and other computer based activity ‘ban’ is too strong, but for primary head teachers to be encouraged to discourage smart phones would be a good idea.  Already legislation is taking steps in this direction and not surprisingly for the undesirable backdrop to all internet activity is now extremely troublesome. 

Yet a note of caution is in order.  If children struggle to learn to read, write and use numbers, then anything that draws their interest in here is surely desirable.  This consideration seems sensible and should not be neglected.  But it is not altogether well conceived: learning takes place in stages and at primary school level the focus should be on the immediate environment and physical activity within it.  I myself have never used and do not intend to use the major social media facilities on the web.

Secondary school is time enough for the digital world, for the new digital world poses a challenge to all of us.  My view of learning is that it is a process that takes place in progressive stages.  Thus the child’s learning ought to be focussed on his or her relationship with the immediate physical world.  Learning about ulterior realities, whether of the telephone and television, or those more complex ones of digital processes and the social worlds incorporated within, is a considerably more complicated register, for a later, secondary, age. 

In an exactly parallel manner, tertiary education again brings in new registers of understanding.  The challenges and opportunities here are formidable.  The Internet may give me information on some matter within a short space of time, whilst, in a previous era, it took me hours to go to a library, find the appropriate book and thus acquire the information I needed.

Yet my tentative conclusion here is that the digital world is of infernal complexity and all of us, whether technically expert or not, will be leaning for some time to come.  A stand-alone computer is all very well; but most digital activity is now online by means of a smartphone and the WWW.  If you make a purchase online, three parties are involved, yourself, the retailer and your bank or alternative payment agent.  This is not simple networking, if only because of the need to ensure security.  The recent cases of the CrowdStrike outage and the Post Office/Fujitsu scandal are indicative of how far we still have to go to get safe networking.

But just consider the home for a moment.  One person alone is likely to have, beside the TV, a computer and a mobile phone; if we disregard the extent of computer-related equipment in the car or other vehicle.  A family household will have several computers, mobile phones and a mass of IoT and networking equipment including cabling and hubs for wireless connections.  And all this is connected up to outside locations which may be able to intervene ubiquitously.  TVs too have internet and computer interfaces.  Mastery of all this equipment is likely to be demanding.  Software only appears to give us simple interfaces; but ‘at a click’ or ‘a few clicks away’ are easily found guidelines providing unreliable advice that is likely to lead you into trouble, if only that of making an unwanted payment.  The flood of advertising is beyond tolerable limits.  But the danger is more insidious: email attachments and malevolent websites also menace us.  My experience suggests that a computer online is wide open to external downloads; and there are frequent uploads being carried out which are not made on my instructions.  And the extent of the malevolent web is a cause for concern, for it does not accord with everyday social experience, which is perceived as relatively ‘safe’,

My point here is that with the new devices we are taking on far more than we bargained for and a long pause and cautious progress is called for.  Even relatively simple tasks may require more knowledge and understanding than is anticipated and caution, awareness and preparedness are in order.  Apply the same guidelines to the child or adolescent’s learning. 

Now think beyond the household for a minute.  Here at once the small firm or office with just two or three branches is dangerously exposed to external online interventions.  Maintaining digital systems and connectivity is likely to be more complex and costly than anticipated or budgeted for.  The challenges that today confront a small business, given the complexities of the digital world, may all too quickly be overwhelming.

Myself I do not have solutions to the challenges of the World Wide Web.  But if I can sketch out some of the main features at issue, that may be helpful.  The first thing to say about the web and related matters is that it engages human interest.  It is part of the social scene and a concern for government.  So it is thereby part of the social system and cannot be left to technicians.  Issues make their presence felt at once.  Which social system for instance.  The WWW transcends national boundaries and the state governments to which social systems are bound. 

In the ensuing paragraphs, I shall look a little closer at some of the points I have touched on above, including governance.  The two matters of central practical concern – firstly data holding and storage and secondly the interactive side of data including IoT and AI, I shall tackle in more depth in later parts.

 

THE DIGITAL SURGE

The surge in digital development largely emerged from the USA, Tim Berners-Lee notwithstanding.  With its control over the hardware, and software in the end, the USA achieved dominance and its pre-eminent digital corporations go beyond monopolies in terms of their power, extent of control and earnings.  Microsoft does well with Windows; yet its only competition is Unix-based either in the form of Apple or as found in the intractable, not to say garbled, Linux.  Competition from other countries is only slowly emerging.

Inter-government conflict in relation to the internet is increasing.  China, having entered the arena as a USA client engaging in manufacturing, is now seen as a competitor with menace.  Germany, Israel and the EU are all posing challenges.  Concerning IP (intellectual property) in the digital sphere, it may be noted today that the Australian government has just gone into a legal battle with Facebook.  It is passing legislation to make Facebook and others pay newspapers for reader access to news articles over which the newspaper retains copyright and to which Facebook etc. provide links at present free.  The EU has issued many challenges to the US corporations, especially over monopoly powers.  Russia is problematic as we only hear about its alleged hackers and other malicious agents and not about its own digital development. 

Russia is still illustrative of many problems.  The messaging program Telegram, currently in the news, is headed by CEO Pavel Durov.  Durov is a Russian-born billionaire, but now a French/Emirati citizen; he fled Russia in 2014 over Russian state demands for information on Ukrainian members of his previous program VKontakte.  He is resident in Paris while Telegram, is registered in BVI but its operations are based in Dubai.  Telegram claims nearly 1 billion members and the arrest relates to allegations of abuse (usual suspects).  Thus Telegram operates through several states and is responsible to no single government.  Macron was responsible for the arrest; Moscow has protested; Musk has protested.  It is noteworthy that when Putin invaded Ukraine, he cut off its networks with Russia; they were however quickly replaced by the USA’s Starlink program through the aegis of Elon Musk.

The intricacies of the matter may be further illustrated by the example of the German telecoms agency the Bundesnetzagentur, which is currently demanding oversight of providers of messaging and email services.  In the past it has had responsibility for the telephone network.  Now it wishes to include service providers such as Google and Facebook.  This body is taking its case to the ECJ; if it wins, the implications are huge.  By demanding that these services generically be registered in Germany, it will gain regulatory oversight over many details of their functionality including security and privacy; all will be within its brief.  This is legitimate; the sovereign state has full authority over local communications. 

From a different perspective, China is witnessing growing conflicts between its own internet corporations who do not want to hand over data and the Chinese government which is demanding everything.  A mobile phone can trace a person’s movement relatively accurately, but GPS can do so better.  But who should control this data?  At present the internet is being directed towards facilitating the management of global society.  But it cannot be done.  Further it should be assumed that no device attached to a telecoms system whether landline or wireless is safe against external intervention.  Both state security and hackers have access to software that will enable intervention on any device you or I may own.  Within the USA, there is less evidence of corporate/government conflict – a sign perhaps of complete accord in their activities.

It is interesting to note that countries are widely found to use either own language keyboards or keyboards that can switch between English and own language with ease; China, Russia and the Arab-speaking world may be mentioned,  I myself can only use one alternative keyboard, French.

The issues involved in regulation can be seen quite clearly in relation to data movement.  It cannot be regulated by single national governments with regard to their own territories because the traffic is excessive and complex.  Microsoft has or is building a transatlantic cable.  Should all movement along this cable be subject to government scrutiny?  It is scarcely even possible to demand that each country‘s data is held within that country alone.  The cable is US property.  But once it touches land in another state, does jurisdiction lie with the second state or the originating state?  And if Microsoft for example owns a large data centre in the second state, should jurisdiction lie with the second state or the originating state? 

If a transatlantic cable such as Microsoft’s is owned by any of the other major tech companies, there is an evident danger that its data will be shipped back and forth from USA to UK.  Microsoft tells us that it has server farms or data centres established in the UK and so the separation between states is reliable.  The danger remains that the UK government has no authority over data belonging to UK citizens.  This problem may arise between any two countries in the world.  Currently it stresses the US government with regard to American data that may be transferred to China as in Tik-Tok or Huawei. 

That point emerges as a government concern but the personal concern is also important.  So the danger is two-fold: data may be transferred not just to the tech firm and by sale to its clients, but also to governments (in the plural).

 It needs to be asserted directly and forcibly that the World Wide Web is not an instrument that extends or enhances democracy.  It is an instrument of totalitarian control as George Orwell foresaw.  All data placed on the web and all transactions conducted through its systems can be observed by outside parties of which the most capable are government espionage and security systems, only matched by the very large digital technology corporations.  In this regard it should be recorded that Microsoft is engaged in Court battles with US government, not to mention the EU or others.  It seeks to protect clients’ data from government prying.  If encryption is seen to be effective, government will protest.

Furthermore, all domestic computers are open to backdoor intruders.  Any website can contain hidden code that can work on a private PC.  Cookies can contain code far beyond the functions normally accepted for cookies.  The claimed democratic pretensions of the web are false; the web is a powerful instrument of social control.  It works by harassment, through spam, malware, targeted advertising and offers scope for fraud at every opportunity, not least in financial matters.  It can be used as a channel for harassment way beyond the level of the telephone.

Moreover ownership is brought into question.  The principle of the hyperlink is to diffuse control and thus damage property rights.  The owner of a site can no longer be sure of owning it.  The owner may manage content; but in the end the webhost (whose structure itself may be unclear) owns the site and the long-term consequence may be that the webhost owns the originating business.  But the webhosting structure may not be clear.  The WWW now requires security certificates and this creates a new form of control.

When the World Wide Web began it was widely lauded for the freedom of expression it allowed.  Today however, much that is posted on the internet and its sites has come under criticism for its abuse of free speech.  This includes expressions of violence and other aspects of fascism, such as racism, pornography and paedophilia and much else besides.  These areas of activity are extensive and unfortunately widely used; the dark web extends inappropriate use of the web to malware dissemination and illegal commerce such as drug trafficking.  But the fact that almost no socialist thought appears on the web suggests there is censorship at work; and it works on behalf of the political right.  The enormous body of triviality on the web begins to look suspect.

I discuss some aspects of data privacy and control below.  But one consequence of the above point is that the structure of the web is now such that the USA government has access to all data and transactions available on the web.  I think there will be a fight back but it will be weak and limited. 

It is necessary to emphasise how flawed the internet is.  A communications system on a global scale cannot be allowed to be biased or partisan in any area.  To create a WWW under the control of one country and covertly managed by that country, in terms of what communications are allowed to flow and what not, is to fail to create a universal system.  The WWW is designed to be an enormous spider’s web.  If you are not on it you are nothing, you are expendable.  If you are on it, you are known to the US government.

So at present that endeavour to be universal has failed.  As a result, we are seeing different states each setting up its own controls in terms of censorship and other prohibitions.  If the WWW is to succeed, it must function according to universal principles.  Yet the challenge is insurmountable:  The principle of no censorship, or at least no political censorship is unachievable.  Abolition of interventions of a malicious type; again unachievable.  Seditious words against one state may legitimately be banned by that state; but they are more than likely to be pressed by another.  There is an issue here of some substance. 

The primacy of social structure in relation to the internet and web underlies the following discussion.  The sheer scale of change in the technology of communications in recent years can only be expected to have an impact on the constitution of a state and on the political system directly and it is necessary to be alert to the danger contained in this possibility: the internet and web should be seen as systems of control.  The Internet and the World Wide Web are today’s vehicles of communication; but they are now recognised as having major faults.  The objectives of the early Internet included uncensored and free passage of communications.  But these goals have long since in practice been lost in the ideological and political conflicts between states and in abuse of these facilities by malicious or criminal agents. 

Internet and computer management cannot be left to the technicians alone.  Parallels between the old, pre-digital world and the new should be recognised.  Malware is a problem on the Internet beyond the limit of the tolerable; yet it replicates what was possible before.  The telephone could be used abusively and is today again, excessively.  Even door-step cold calling has been a problem in the past and nuisance callers are emerging again today.  These developments should not be ignored, for they make evident the breakdown of civil society.  Malicious activity on the Web is a human activity not a technical problem

The problem may be put like this.  The Internet and World Wide Web are structures of communication.  But these new structures have flaws beyond the tolerable.  Most of my communications will be on a person to person basis; and I will want to know about the receiver’s response to my communication.  Further that communication is not for third parties.  Nor should it be vulnerable to breaches by third parties.  Neither of these conditions are fulfilled at present and therefore the Internet fails in its primary purpose.  It cannot be overemphasised that the Internet, like the telephone, is a system of communication and communication is a two-way process.  Once the reciprocity of communication fails then the communication system has failed.  This is the condition of the Internet today.  If I send out a message and there are interventions in my communication, as e.g. all replies are blocked, or messages overheard, then that communications system has failed.

 I shall come on to the details of these matters later but let me start with a skeletal history of communications and exchange in simple terms.  For a study of past arrangements may give us some clues as to future development.  Yet past structures may prove to be wholly inadequate for future governance,

 

ISSUES OF GOVERNANCE

It is clear from the above discussion that the issue with the web is governance.  The necessary expertise demands more than just brilliant maths or other technical expertise, but it is still finite.  There are not many well designed websites.  To work technically is one thing; but for a user to navigate it with ease, is less often achieved.  I try to keep the design of this site as simple as possible: there are no cookies; and there is no advertising.

As with the world of communications, governance concerns the authority that controls it.  But, one must insist, all exchange is, to a point, uncontrolled; it is a matter between two parties and further control is an extraneous factor, even if attempts at control are often made.  One significant implication is that the parties to a communication have a responsibility; if either party is negligent, the process breaks down.  A second significant consequence is that third party interventions may be expected.  It is not responsible to set up an organisation such as one of the social media websites and expect the machinery to function without regard to the social responsibilities.  This expectation of machine automation is one of the most frequently found goals of technicians but it seldom is able to exclude human responsibility.  Not even AI can do that and misuse of any digital technology involving deception for gain or harm is fraudulent and criminal.

In the past, with regard to telecoms, two international bodies set rules: the International Postal Union (1874 at Berne) and the International Telecommunication Union (1865 at Geneva), The IPU, under its current name the UPU (Universal Postal Union), has been criticised for its rules being obsolete, the problem being apparently that they work to the advantage of developing countries.  The ITU today par exemple determines technicalities of telephony.  The G2, G3, G4 and G5 standards are approved, though not developed, by the ITU.

Individual states have their own bodies for these purposes.  The USA has the FCC (Federal Communications Commission) to oversee all cable and wireless communications within the USA, generally inter-state; and also communications to and from the USA.  The bodies responsible for the internet are in substance the American ICANN, W3C and Nominet.  ICANN sets the address system covering both the original 32-bit IPv4 and the expanded 64-bit IPv6.  Nominet UK handles registrations for UK domains including ‘.uk’ and ‘.co.uk’.  A further body, the Public Internet Registry which controls registration of ‘.org’ names, is in process of being sold by the Internet Society to private equity in the form of Ethos Capital.  This is clearly wrong in principle and forces into public view important questions about the ownership and management of the Internet.  Capitalism should not control the registration of names that are likely to include many non-capitalist organisations.

Further bodies take an interest in these matters: WTO and NATO to start with.  The WTO in the digital sphere is mainly concerned with IP rights and clearly this area of interest extends more widely than the digital.  But it is also developing a position on the transfer of data from country to country and this has growing significance.  NATO focusses on malware and cyber attacks.  Here there is a problem in tracing the sources of attacks; the use of fronts to conceal the real origins of an attack may throw NATO itself into confusion.  Others are emerging.  As reported by the Financial Times on 27/9/24, the USA’s FCC (Federal Communications Commission) has supervisory powers over some if not all the satellites in low orbit.  Of these Starlink (owned by SpaceX in turn owned by Elon Musk) runs over 6000, all sent up within the past 5 years.  The European Space Policy Institute also has an interest in the matters. 

It is clear that today’s digital developments demand considerable advance over past procedures that were effective in regulation.  None of the established bodies are up to the issues of the new digital world.

Yet development of the WWW and Internet should be in principle under government-sponsored and UN-connected bodies and not dominated by industrial corporations.  It cannot be over-emphasised that governments contain elements of democratic process and are subject to public scrutiny and audit; corporations with audited accounts are subject only to minimal scrutiny and many have buried important matters in unscrutinised zones, whether private equity, off-shore accounts or where-ever.

But many covert bodies whether state or hacker appear also to take a close interest.  States seek to intervene in Web processes both for purposes of control such as censorship or in relation to subversion as in sponsored hacking.  It is claimed that there is no means of control and no over-riding authority; that you cannot even know how many websites there are.  But there are means of properly managing such a network – they depend on complex computers and specially designed software and this is beyond lay knowledge not least my own.  These are matters that need to be looked into further, and more information should be in the public domain.  Should a nation’s constitution specify rules with regard to modern communications?

This has implications for the structure of the state in a globalised world and it is this matter I wish to consider.  The technical advances since about 1900 have enormous implications for communications over increased distances and, as a further result, aspects of the structure of the state begin to appear in a new light.  The question therefore must be asked: what are the implications of contemporary communications for the structure of the state?  And how are global communications to be managed?

These points need to be investigated.  In the contemporary world where large scale structures are familiar, old models of communications are obsolete.  Many corporations still work on the assumption that communication is between line manager and subordinate.  Horizontal communication is disapproved.  This is wrong – both horizontal and vertical communication are needed.  Team work and group work may be introduced, yet the hierarchy remains all important.  For an employee not to know the salary of a colleague is still a common occurrence today.  And for no procedure of communication to be recognised when materials pass from department to department in the manufacturing process is dysfunctional.

Germany and China are two states that have both asserted their independence and autonomy in relation to the Web and in the case of China the USA is challenging China’s assertive autonomy forcefully.  It is clear that all modern communications dilute state borders.  The sovereign state is challenged to control modern communications whether telephone, radio, television, or World Wide Web.

Historically, political theory has always treated of the city state as the fundamental community in which political organisation takes place.  But the development of two distinct state structures, that of the local state (whether city, dukedom, or nation) on the one hand, and that of international trade on the other, occurred in the era of the Roman Empire.  It also paralleled the emergence of the nation state at a later date in Europe.  The Mediterranean was the main centre of commerce in the classical and early Christian world.  The Silk Road was perhaps the first great international trade route, but its governance is unknown to us.  The Hanseatic League of medieval Northern Europe may be similar.  A more recent innovation in international trade is the oil or gas pipeline.  And of course the most recent communications innovation is the Internet and undersea cable, though mobile phone and satellite or tower are not insignificant.  There is needed an authority in this regard that is not at present to be found.

The physical structure is fundamental.  For he who controls the physical structure controls the communications.  The 20th century saw the spread of telephone cables on a gigantic scale; and also of the control structures through which the telephone companies manage the cables and the activity through them.  Today new submarine cables are still being laid.  Besides that already mentioned in relation to Microsoft, there are new submarine cables, owned by Vodafone in SE Asia, under the ocean; by Google and Orange working together to lay a new cable across the Atlantic from USA to France.  Google altogether is currently laying seven cables.  There are issues of security about cabling, from both external physical interference and from internal software interventions. 

Wireless constitutes a different form of transmission.  Parallel but different problems arise in relation to range of transmission, security of content, and mode of use, not to mention allocation and use of spectrum.

In general terms, communications need more study.  Sociology in broad practice is focussed on structure – the hierarchy of social classes and specific institutions like schools, workplaces, and bureaucracies.  But the structures, and especially the processes of communications are largely ignored (except for the Press but the focus of study is the organisation rather than its daily product).

One may quickly list some systems or modes of communication: Post Office, BBC, other radio and TV, regulatory authorities, non-public radio and TV, telephone, whether BT or other telcos, mobile, and non-regular modes of publication outside the realm of print, as on the Internet.

One must always remember the scale is global.  And it is this dimension that causes these developments to give rise to a new set of issues.  Communication is always systematic; that is, it only arises where two parties are present and, further, a procedural code is necessary for communication to be effective.  Even in a very simple instance, communication can break down; for example, if one party fails to follow procedures even for reasons of absence or negligence, let alone mischief.  Further communication is normally between two autonomous parties; it is not necessarily part of a chain of command.  With the telephone, there are two parties, the caller and the receiver.  There is or could be a third, the telco or the tapper.  Either could record a conversation between the two main parties, or otherwise intervene.  It is the same with email. 

Further all international economic activity has a political dimension on account of increased use of economic weapons – sanctions and boycotts.  My view at this point in time is that IT has gone through a ballooning process not unlike galloping inflation.  It has distorted an already flawed financial system out of proportion in relation to the material and human needs of the world’s peoples.  It should be approached with caution; both aspects the technology and the social/political have enormous implications and there is much learning here for everyone. 

I shall continue this discussion in further comments from time to time.  A second part will focus on data, its management and regulation.  A further part three will give more attention to matters of digital governance.  Lastly those very contemporary topics of IoT, Crypto and AI will be given attention.

 

 

 

 

 

Peter Collier, October 2024

Return to Start page