NEWSLETTER no 4
|
|
REFLECTIONS ON THE DIGITAL SURGE |
Here
you see my most recent computer build, a Socket1700 with Windows11 and a
small AI capacity. It is working well
as my online computer. To its right,
you can just make out a 10-year old build with Win10 and never a hint of
trouble. My third active computer
Socket1200, runs linux on an experimental basis. |
There
are unsatisfactory features in the new build.
The case is designed for gaming so it has LED lights flashing around
the 6 or 8 fans. The internal
arrangements, wiring, etc, are difficult to follow
at build, but it nonetheless functions well.
|
Beyond
this, in coping with the internet for example, my abilities do not meet the
demands of the web; it is beyond my control.
External sources find it much too easy to place things on my computer
or upload data without my knowledge.
In short computer tech has almost completely outmanoeuvred me. So the comments that follow are based
primarily on my understanding of society and its politics, rather than on
technical expertise. |
|
Many of us are familiar with
the use of ‘Teams’ and ‘Zoom’, and smart phones of course, to enable so many
and various activities especially when, as recently, normal routines were
interrupted by the pandemic or even by unemployment surging. This development has brought digital
processes to the fore in the public mind.
That is very important and sets the scene for the following remarks. |
It
is well known that George Orwell spotted the interactive capabilities of
television in ‘1984’; that ‘Big Brother’ can address you personally and tell
you what to do while you keep your television on. Today, though current attention is more
focused on the collection of personal data and its transfer to government or
elsewhere, the possibility of personalised instructions emanating from the
state is not much further away. |
But
the most commonly recognised perils of interactive systems based on telecoms
and television broadcasting have related to interventions by private third
parties, either hackers or social ‘miscreants’ seeking to either to cause
damage to systems or to lead the young, or others, into trouble, possibly
financial, possibly social. I do not know
current figures but the scale of the ‘dark web’ is reputed to be
enormous. Many inform me that the
extent of the WWW and its hosted activities is impossible to determine but I
doubt this; the data is just not disclosed.
|
One
result of these changes has been the recent calls to ban smart phones from
primary schools and by implication from children of that age. I agree with this. Driving licenses are not issued before the age
of 17 and consumption of alcohol is again restricted for the young. With regard to mobile phone use and other
computer based activity ‘ban’ is too strong, but for primary head teachers to
be encouraged to discourage smart phones would be a good idea. Already legislation is taking steps in this
direction and not surprisingly for the undesirable backdrop to all internet
activity is now extremely troublesome.
|
Yet
a note of caution is in order. If
children struggle to learn to read, write and use numbers, then anything that
draws their interest in here is surely desirable. This consideration seems sensible and
should not be neglected. But it is not
altogether well conceived: learning takes place in stages and at primary
school level the focus should be on the immediate environment and physical
activity within it. I myself have
never used and do not intend to use the major social media facilities on the
web. |
Secondary
school is time enough for the digital world, for the new digital world poses
a challenge to all of us. My view of
learning is that it is a process that takes place in progressive stages. Thus the child’s learning ought to be
focussed on his or her relationship with the immediate physical world. Learning about ulterior realities, whether
of the telephone and television, or those more complex ones of digital processes
and the social worlds incorporated within, is a considerably more complicated
register, for a later, secondary, age.
|
In
an exactly parallel manner, tertiary education again brings in new registers
of understanding. The challenges and
opportunities here are formidable. The
Internet may give me information on some matter within a short space of time,
whilst, in a previous era, it took me hours to go to a library, find the
appropriate book and thus acquire the information I needed. |
Yet
my tentative conclusion here is that the digital world is of infernal
complexity and all of us, whether technically expert or not, will be leaning
for some time to come. A stand-alone
computer is all very well; but most digital activity is now online by means
of a smartphone and the WWW. If you
make a purchase online, three parties are involved, yourself, the retailer
and your bank or alternative payment agent.
This is not simple networking, if only because of the need to ensure
security. The recent cases of the CrowdStrike
outage and the Post Office/Fujitsu scandal are indicative of how far we still
have to go to get safe networking. |
But
just consider the home for a moment.
One person alone is likely to have, beside the TV, a computer and a
mobile phone; if we disregard the extent of computer-related equipment in the
car or other vehicle. A family
household will have several computers, mobile phones and a mass of IoT and
networking equipment including cabling and hubs for wireless
connections. And all this is connected
up to outside locations which may be able to intervene ubiquitously. TVs too have internet and computer
interfaces. Mastery of all this
equipment is likely to be demanding.
Software only appears to give us simple interfaces; but ‘at a click’
or ‘a few clicks away’ are easily found guidelines providing unreliable
advice that is likely to lead you into trouble, if only that of making an
unwanted payment. The flood of
advertising is beyond tolerable limits.
But the danger is more insidious: email attachments and malevolent
websites also menace us. My experience
suggests that a computer online is wide open to external downloads; and there
are frequent uploads being carried out which are not made on my instructions. And the extent of the malevolent web is a
cause for concern, for it does not accord with everyday social experience,
which is perceived as relatively ‘safe’, |
My
point here is that with the new devices we are taking on far more than we
bargained for and a long pause and cautious progress is called for. Even relatively simple tasks may require
more knowledge and understanding than is anticipated and caution, awareness
and preparedness are in order. Apply
the same guidelines to the child or adolescent’s learning. |
Now
think beyond the household for a minute.
Here at once the small firm or office with just two or three branches
is dangerously exposed to external online interventions. Maintaining digital systems and
connectivity is likely to be more complex and costly than anticipated or
budgeted for. The challenges that
today confront a small business, given the complexities of the digital world,
may all too quickly be overwhelming. |
Myself
I do not have solutions to the challenges of the World Wide Web. But if I can sketch out some of the main
features at issue, that may be helpful.
The first thing to say about the web and related matters is that it
engages human interest. It is part of
the social scene and a concern for government. So it is thereby part of the social system
and cannot be left to technicians.
Issues make their presence felt at once. Which social system for instance. The WWW transcends national boundaries and
the state governments to which social systems are bound. |
In
the ensuing paragraphs, I shall look a little closer at some of the points I
have touched on above, including governance.
The two matters of central practical concern – firstly data holding
and storage and secondly the interactive side of data including IoT and AI, I
shall tackle in more depth in later parts. |
|
THE DIGITAL
SURGE |
The
surge in digital development largely emerged from the USA, Tim Berners-Lee
notwithstanding. With its control over
the hardware, and software in the end, the USA achieved dominance and its
pre-eminent digital corporations go beyond monopolies in terms of their
power, extent of control and earnings.
Microsoft does well with Windows; yet its only competition is
Unix-based either in the form of Apple or as found in the intractable, not to
say garbled, Linux. Competition from
other countries is only slowly emerging. |
Inter-government
conflict in relation to the internet is increasing. China, having entered the arena as a USA
client engaging in manufacturing, is now seen as a competitor with
menace. Germany, Israel and the EU are
all posing challenges. Concerning IP
(intellectual property) in the digital sphere, it may be noted today that the
Australian government has just gone into a legal battle with Facebook. It is passing legislation to make Facebook
and others pay newspapers for reader access to news articles over which the
newspaper retains copyright and to which Facebook etc. provide links at
present free. The EU has issued many
challenges to the US corporations, especially over monopoly powers. Russia is problematic as we only hear about
its alleged hackers and other malicious agents and not about its own digital
development. |
Russia
is still illustrative of many problems.
The messaging program Telegram, currently in the news, is headed by
CEO Pavel Durov. Durov is a
Russian-born billionaire, but now a French/Emirati citizen; he fled Russia in
2014 over Russian state demands for information on Ukrainian members of his
previous program VKontakte. He is
resident in Paris while Telegram, is registered in BVI but its operations are
based in Dubai. Telegram claims nearly
1 billion members and the arrest relates to allegations of abuse (usual
suspects). Thus Telegram operates
through several states and is responsible to no single government. Macron was responsible for the arrest;
Moscow has protested; Musk has protested.
It is noteworthy that when Putin invaded Ukraine, he cut off its
networks with Russia; they were however quickly replaced by the USA’s
Starlink program through the aegis of Elon Musk. |
The
intricacies of the matter may be further illustrated by the example of the
German telecoms agency the Bundesnetzagentur, which is currently demanding
oversight of providers of messaging and email services. In the past it has had responsibility for
the telephone network. Now it wishes
to include service providers such as Google and Facebook. This body is taking its case to the ECJ; if
it wins, the implications are huge. By
demanding that these services generically be registered in Germany, it will
gain regulatory oversight over many details of their functionality including
security and privacy; all will be within its brief. This is legitimate; the sovereign state has
full authority over local communications.
|
From
a different perspective, China is witnessing growing conflicts between its
own internet corporations who do not want to hand over data and the Chinese
government which is demanding everything.
A mobile phone can trace a person’s movement relatively accurately,
but GPS can do so better. But who
should control this data? At present
the internet is being directed towards facilitating the management of global
society. But it cannot be done. Further it should be assumed that no device
attached to a telecoms system whether landline or wireless is safe against
external intervention. Both state
security and hackers have access to software that will enable intervention on
any device you or I may own. Within
the USA, there is less evidence of corporate/government conflict – a sign
perhaps of complete accord in their activities. |
It
is interesting to note that countries are widely found to use either own
language keyboards or keyboards that can switch between English and own
language with ease; China, Russia and the Arab-speaking world may be
mentioned, I myself can only use one
alternative keyboard, French. |
The
issues involved in regulation can be seen quite clearly in relation to data
movement. It cannot be regulated by
single national governments with regard to their own territories because the
traffic is excessive and complex.
Microsoft has or is building a transatlantic cable. Should all movement along this cable be
subject to government scrutiny? It is
scarcely even possible to demand that each country‘s data is held within that
country alone. The cable is US
property. But once it touches land in
another state, does jurisdiction lie with the second state or the originating
state? And if Microsoft for example
owns a large data centre in the second state, should jurisdiction lie with
the second state or the originating state?
|
If
a transatlantic cable such as Microsoft’s is owned by any of the other major
tech companies, there is an evident danger that its data will be shipped back
and forth from USA to UK. Microsoft
tells us that it has server farms or data centres established in the UK and
so the separation between states is reliable.
The danger remains that the UK government has no authority over data
belonging to UK citizens. This problem
may arise between any two countries in the world. Currently it stresses the US government
with regard to American data that may be transferred to China as in Tik-Tok
or Huawei. |
That
point emerges as a government concern but the personal concern is also
important. So the danger is two-fold:
data may be transferred not just to the tech firm and by sale to its clients,
but also to governments (in the plural). |
It needs to be asserted directly and
forcibly that the World Wide Web is not an instrument that extends or
enhances democracy. It is an
instrument of totalitarian control as George Orwell foresaw. All data placed on the web and all
transactions conducted through its systems can be observed by outside parties
of which the most capable are government espionage and security systems, only
matched by the very large digital technology corporations. In this regard it should be recorded that
Microsoft is engaged in Court battles with US government, not to mention the
EU or others. It seeks to protect
clients’ data from government prying.
If encryption is seen to be effective, government will protest. |
Furthermore,
all domestic computers are open to backdoor intruders. Any website can contain hidden code that
can work on a private PC. Cookies can
contain code far beyond the functions normally accepted for cookies. The claimed democratic pretensions of the
web are false; the web is a powerful instrument of social control. It works by harassment, through spam,
malware, targeted advertising and offers scope for fraud at every
opportunity, not least in financial matters.
It can be used as a channel for harassment way beyond the level of the
telephone. |
Moreover
ownership is brought into question.
The principle of the hyperlink is to diffuse control and thus damage
property rights. The owner of a site
can no longer be sure of owning it.
The owner may manage content; but in the end the webhost (whose structure
itself may be unclear) owns the site and the long-term consequence may be
that the webhost owns the originating business. But the webhosting structure may not be
clear. The WWW now requires security
certificates and this creates a new form of control. |
When
the World Wide Web began it was widely lauded for the freedom of expression
it allowed. Today however, much that
is posted on the internet and its sites has come under criticism for its
abuse of free speech. This includes
expressions of violence and other aspects of fascism, such as racism,
pornography and paedophilia and much else besides. These areas of activity are extensive and
unfortunately widely used; the dark web extends inappropriate use of the web
to malware dissemination and illegal commerce such as drug trafficking. But the fact that almost no socialist thought
appears on the web suggests there is censorship at work; and it works on
behalf of the political right. The
enormous body of triviality on the web begins to look suspect. |
I
discuss some aspects of data privacy and control below. But one consequence of the above point is
that the structure of the web is now such that the USA government has access
to all data and transactions available on the web. I think there will be a fight back but it
will be weak and limited. |
It
is necessary to emphasise how flawed the internet is. A communications system on a global scale
cannot be allowed to be biased or partisan in any area. To create a WWW under the control of one
country and covertly managed by that country, in terms of what communications
are allowed to flow and what not, is to fail to create a universal
system. The WWW is designed to be an
enormous spider’s web. If you are not
on it you are nothing, you are expendable.
If you are on it, you are known to the US government. |
So
at present that endeavour to be universal has failed. As a result, we are seeing different states
each setting up its own controls in terms of censorship and other
prohibitions. If the WWW is to succeed,
it must function according to universal principles. Yet the challenge is insurmountable: The principle of no censorship, or at least
no political censorship is unachievable.
Abolition of interventions of a malicious type; again unachievable. Seditious words against one state may
legitimately be banned by that state; but they are more than likely to be
pressed by another. There is an issue
here of some substance. |
The
primacy of social structure in relation to the internet and web underlies the
following discussion. The sheer scale
of change in the technology of communications in recent years can only be
expected to have an impact on the constitution of a state and on the
political system directly and it is necessary to be alert to the danger
contained in this possibility: the internet and web should be seen as systems
of control. The Internet and the World
Wide Web are today’s vehicles of communication; but they are now recognised
as having major faults. The objectives
of the early Internet included uncensored and free passage of
communications. But these goals have
long since in practice been lost in the ideological and political conflicts
between states and in abuse of these facilities by malicious or criminal
agents. |
Internet
and computer management cannot be left to the technicians alone. Parallels between the old, pre-digital
world and the new should be recognised.
Malware is a problem on the Internet beyond the limit of the
tolerable; yet it replicates what was possible before. The telephone could be used abusively and
is today again, excessively. Even
door-step cold calling has been a problem in the past and nuisance callers
are emerging again today. These
developments should not be ignored, for they make evident the breakdown of
civil society. Malicious activity on
the Web is a human activity not a technical problem |
The
problem may be put like this. The
Internet and World Wide Web are structures of communication. But these new structures have flaws beyond
the tolerable. Most of my
communications will be on a person to person basis; and I will want to know
about the receiver’s response to my communication. Further that communication is not for third
parties. Nor should it be vulnerable
to breaches by third parties. Neither
of these conditions are fulfilled at present and therefore the Internet fails
in its primary purpose. It cannot be
overemphasised that the Internet, like the telephone, is a system of
communication and communication is a two-way process. Once the reciprocity of communication fails
then the communication system has failed.
This is the condition of the Internet today. If I send out a message and there are
interventions in my communication, as e.g. all replies are blocked, or
messages overheard, then that communications system has failed. |
I shall come on to the details of these
matters later but let me start with a skeletal history of communications and
exchange in simple terms. For a study
of past arrangements may give us some clues as to future development. Yet past structures may prove to be wholly
inadequate for future governance, |
|
ISSUES
OF GOVERNANCE |
It
is clear from the above discussion that the issue with the web is
governance. The necessary expertise
demands more than just brilliant maths or other technical expertise, but it
is still finite. There are not many
well designed websites. To work
technically is one thing; but for a user to navigate it with ease, is less
often achieved. I try to keep the
design of this site as simple as possible: there are no cookies; and there is
no advertising. |
As
with the world of communications, governance concerns the authority that
controls it. But, one must insist, all
exchange is, to a point, uncontrolled; it is a matter between two parties and
further control is an extraneous factor, even if attempts at control are
often made. One significant
implication is that the parties to a communication have a responsibility; if
either party is negligent, the process breaks down. A second significant consequence is that
third party interventions may be expected.
It is not responsible to set up an organisation such as one of the
social media websites and expect the machinery to function without regard to
the social responsibilities. This
expectation of machine automation is one of the most frequently found goals
of technicians but it seldom is able to exclude human responsibility. Not even AI can do that and misuse of any
digital technology involving deception for gain or harm is fraudulent and
criminal. |
In
the past, with regard to telecoms, two international bodies set rules: the
International Postal Union (1874 at Berne) and the International
Telecommunication Union (1865 at Geneva), The IPU, under its current name the
UPU (Universal Postal Union), has been criticised for its rules being
obsolete, the problem being apparently that they work to the advantage of
developing countries. The ITU today par exemple determines technicalities
of telephony. The G2, G3, G4 and G5
standards are approved, though not developed, by the ITU. |
Individual
states have their own bodies for these purposes. The USA has the FCC (Federal Communications
Commission) to oversee all cable and wireless communications within the USA,
generally inter-state; and also communications to and from the USA. The bodies responsible for the internet are
in substance the American ICANN, W3C and Nominet. ICANN sets the address system covering both
the original 32-bit IPv4 and the expanded 64-bit IPv6. Nominet UK handles registrations for UK
domains including ‘.uk’ and ‘.co.uk’. A further body, the Public Internet
Registry which controls registration of ‘.org’ names, is in process of being
sold by the Internet Society to private equity in the form of Ethos
Capital. This is clearly wrong in
principle and forces into public view important questions about the ownership
and management of the Internet.
Capitalism should not control the registration of names that are
likely to include many non-capitalist organisations. |
Further
bodies take an interest in these matters: WTO and NATO to start with. The WTO in the digital sphere is mainly
concerned with IP rights and clearly this area of interest extends more
widely than the digital. But it is
also developing a position on the transfer of data from country to country and
this has growing significance. NATO focusses
on malware and cyber attacks. Here
there is a problem in tracing the sources of attacks; the use of fronts to
conceal the real origins of an attack may throw NATO itself into confusion. Others are emerging. As reported by the Financial Times on 27/9/24,
the USA’s FCC (Federal Communications Commission) has supervisory powers over
some if not all the satellites in low orbit.
Of these Starlink (owned by SpaceX in turn owned by Elon Musk) runs
over 6000, all sent up within the past 5 years. The European Space Policy Institute also
has an interest in the matters. |
It
is clear that today’s digital developments demand considerable advance over
past procedures that were effective in regulation. None of the established bodies are up to
the issues of the new digital world. |
Yet
development of the WWW and Internet should be in principle under
government-sponsored and UN-connected bodies and not dominated by industrial
corporations. It cannot be
over-emphasised that governments contain elements of democratic process and
are subject to public scrutiny and audit; corporations with audited accounts
are subject only to minimal scrutiny and many have buried important matters
in unscrutinised zones, whether private equity, off-shore accounts or where-ever. |
But
many covert bodies whether state or hacker appear also to take a close
interest. States seek to intervene in
Web processes both for purposes of control such as censorship or in relation
to subversion as in sponsored hacking.
It is claimed that there is no means of control and no over-riding
authority; that you cannot even know how many websites there are. But there are means of properly managing
such a network – they depend on complex computers and specially designed
software and this is beyond lay knowledge not least my own. These are matters that need to be looked
into further, and more information should be in the public domain. Should a nation’s constitution specify
rules with regard to modern communications? |
This
has implications for the structure of the state in a globalised world and it
is this matter I wish to consider. The
technical advances since about 1900 have enormous implications for
communications over increased distances and, as a further result, aspects of
the structure of the state begin to appear in a new light. The question therefore must be asked: what
are the implications of contemporary communications for the structure of the
state? And how are global
communications to be managed? |
These
points need to be investigated. In the
contemporary world where large scale structures are familiar, old models of
communications are obsolete. Many
corporations still work on the assumption that communication is between line
manager and subordinate. Horizontal
communication is disapproved. This is
wrong – both horizontal and vertical communication are needed. Team work and group work may be introduced,
yet the hierarchy remains all important.
For an employee not to know the salary of a colleague is still a
common occurrence today. And for no
procedure of communication to be recognised when materials pass from
department to department in the manufacturing process is dysfunctional. |
Germany
and China are two states that have both asserted their independence and
autonomy in relation to the Web and in the case of China the USA is
challenging China’s assertive autonomy forcefully. It is clear that all modern communications
dilute state borders. The sovereign
state is challenged to control modern communications whether telephone, radio,
television, or World Wide Web. |
Historically,
political theory has always treated of the city state as the fundamental
community in which political organisation takes place. But the development of two distinct state
structures, that of the local state (whether city, dukedom, or nation) on the
one hand, and that of international trade on the other, occurred in the era
of the Roman Empire. It also
paralleled the emergence of the nation state at a later date in Europe. The Mediterranean was the main centre of
commerce in the classical and early Christian world. The Silk Road was perhaps the first great
international trade route, but its governance is unknown to us. The Hanseatic League of medieval Northern
Europe may be similar. A more recent
innovation in international trade is the oil or gas pipeline. And of course the most recent
communications innovation is the Internet and undersea cable, though mobile
phone and satellite or tower are not insignificant. There is needed an authority in this regard
that is not at present to be found. |
The
physical structure is fundamental. For
he who controls the physical structure controls the communications. The 20th century saw the spread of
telephone cables on a gigantic scale; and also of the control structures
through which the telephone companies manage the cables and the activity
through them. Today new submarine
cables are still being laid. Besides
that already mentioned in relation to Microsoft, there are new submarine
cables, owned by Vodafone in SE Asia, under the ocean; by Google and Orange
working together to lay a new cable across the Atlantic from USA to
France. Google altogether is currently
laying seven cables. There are issues
of security about cabling, from both external physical interference and from
internal software interventions. |
Wireless
constitutes a different form of transmission.
Parallel but different problems arise in relation to range of
transmission, security of content, and mode of use, not to mention allocation
and use of spectrum. |
In
general terms, communications need more study. Sociology in broad practice is focussed on
structure – the hierarchy of social classes and specific institutions like
schools, workplaces, and bureaucracies.
But the structures, and especially the processes of communications are
largely ignored (except for the Press but the focus of study is the
organisation rather than its daily product). |
One
may quickly list some systems or modes of communication: Post Office, BBC,
other radio and TV, regulatory authorities, non-public radio and TV,
telephone, whether BT or other telcos, mobile, and non-regular modes of
publication outside the realm of print, as on the Internet. |
One
must always remember the scale is global.
And it is this dimension that causes these developments to give rise
to a new set of issues. Communication
is always systematic; that is, it only arises where two parties are present
and, further, a procedural code is necessary for communication to be effective. Even in a very simple instance,
communication can break down; for example, if one party fails to follow
procedures even for reasons of absence or negligence, let alone mischief. Further communication is normally between
two autonomous parties; it is not necessarily part of a chain of
command. With the telephone, there are
two parties, the caller and the receiver.
There is or could be a third, the telco or the tapper. Either could record a conversation between
the two main parties, or otherwise intervene.
It is the same with email. |
Further
all international economic activity has a political dimension on account of
increased use of economic weapons – sanctions and boycotts. My view at this point in time is that IT
has gone through a ballooning process not unlike galloping inflation. It has distorted an already flawed
financial system out of proportion in relation to the material and human
needs of the world’s peoples. It
should be approached with caution; both aspects the technology and the social/political
have enormous implications and there is much learning here for everyone. |
I
shall continue this discussion in further comments from time to time. A second part will focus on data, its
management and regulation. A further
part three will give more attention to matters of digital governance. Lastly those very contemporary topics of
IoT, Crypto and AI will be given attention. |
|
Peter
Collier, October 2024