Essay, Research Paper: Government And Internet


Free Government research papers were donated by our members/visitors and are presented free of charge for informational use only. The essay or term paper you are seeing on this page was not produced by our company and should not be considered a sample of our research/writing service. We are neither affiliated with the author of this essay nor responsible for its content. If you need high quality, fresh and competent research / writing done on the subject of Government, use the professional writing service offered by our company.

During the past decade, our
society has become based solely on the ability to move large amounts of
information across large distances quickly. Computerization has influenced
everyone's life. The natural evolution of computers and this need for ultra-fast
communications has caused a global network of interconnected computers to
develop. This global net allows a person to send E-mail across the world in mere
fractions of a second, and enables even the common person to access information
world-wide. With advances such as software that allows users with a sound card
to use the Internet as a carrier for long distance voice calls and video
conferencing, this network is key to the future of the knowledge society. At
present, this net is the epitome of the first amendment: free speech. It is a
place where people can speak their mind without being reprimanded for what they
say, or how they choose to say it. The key to the world-wide success of the
Internet is its protection of free speech, not only in America, but in other
countries where free speech is not protected by a constitution. To be found on
the Internet is a huge collection of obscene graphics, Anarchists' cookbooks and
countless other things that offend some people. With over 30 million Internet
users in the U.S. alone (only 3 million of which surf the net from home),
everything is bound to offend someone. The newest wave of laws floating through
law making bodies around the world threatens to stifle this area of spontaneity.
Recently, Congress has been considering passing laws that will make it a crime
punishable by jail to send "vulgar" language over the net, and to
export encryption software. No matter how small, any attempt at government
intervention in the Internet will stifle the greatest communication innovation
of this century. The government wants to maintain control over this new form of
communication, and they are trying to use the protection of children as a smoke
screen to pass laws that will allow them to regulate and censor the Internet,
while banning techniques that could eliminate the need for regulation.
Censorship of the Internet threatens to destroy its freelance atmosphere, while
wide spread encryption could help prevent the need for government intervention.
The current body of laws existing today in America does not apply well to the
Internet. Is the Internet like a bookstore, where servers cannot be expected to
review every title? Is it like a phone company who must ignore what it carries
because of privacy? Is it like a broadcasting medium, where the government
monitors what is broadcast? The trouble is that the Internet can be all or none
of these things depending on how it's used. The Internet cannot be viewed as one
type of transfer medium under current broadcast definitions. The Internet
differs from broadcasting media in that one cannot just happen upon a vulgar
site without first entering a complicated address, or following a link from
another source. "The Internet is much more like going into a book store and
choosing to look at adult magazines." (Miller 75). Jim Exon, a democratic
senator from Nebraska, wants to pass a decency bill regulating the Internet. If
the bill passes, certain commercial servers that post pictures of unclad beings,
like those run by Penthouse or Playboy, would of course be shut down immediately
or risk prosecution. The same goes for any amateur web site that features
nudity, sex talk, or rough language. Posting any dirty words in a Usenet
discussion group, which occurs routinely, could make one liable for a $50,000
fine and six months in jail. Even worse, if a magazine that commonly runs some
of those nasty words in its pages, The New Yorker for instance, decided to post
its contents on-line, its leaders would be held responsible for a $100,000 fine
and two years in jail. Why does it suddenly become illegal to post something
that has been legal for years in print? Exon's bill apparently would also
"criminalize private mail," ... "I can call my brother on the
phone and say anything--but if I say it on the Internet, it's illegal"
(Levy 53). Congress, in their pursuit of regulations, seems to have overlooked
the fact that the majority of the adult material on the Internet comes from
overseas. Although many U.S. government sources helped fund Arpanet, the
predecessor to the Internet, they no longer control it. Many of the new Internet
technologies, including the World Wide Web, have come from overseas. There is no
clear boundary between information held in the U.S. and information stored in
other countries. Data held in foreign computers is just as accessible as data in
America, all it takes is the click of a mouse to access. Even if our government
tried to regulate the Internet, we have no control over what is posted in other
countries, and we have no practical way to stop it. The Internet's predecessor
was originally designed to uphold communications after a nuclear attack by
rerouting data to compensate for destroyed telephone lines and servers. Today's
Internet still works on a similar design. The very nature this design allows the
Internet to overcome any kind of barriers put in its way. If a major line
between two servers, say in two countries, is cut, then the Internet users will
find another way around this obstacle. This obstacle avoidance makes it
virtually impossible to separate an entire nation from indecent information in
other countries. If it was physically possible to isolate America's computers
from the rest of the world, it would be devastating to our economy. Recently, a
major university attempted to regulate what types of Internet access its
students had, with results reminiscent of a 1960's protest. A research associate
at Carnegie Mellon University conducted a study of pornography on the school's
computer networks. Martin Rimm put together quite a large picture collection
(917,410 images) and he also tracked how often each image had been downloaded (a
total of 6.4 million). Pictures of similar content had recently been declared
obscene by a local court, and the school feared they might be held responsible
for the content of its network. The school administration quickly removed access
to all these pictures, and to the newsgroups where most of this obscenity is
suspected to come from. A total of 80 newsgroups were removed, causing a large
disturbance among the student body, the American Civil Liberties Union, and the
Electronic Frontier Foundation, all of whom felt this was unconstitutional.
After only half a week, the college had backed down, and restored the
newsgroups. This is a tiny example of what may happen if the government tries to
impose censorship (Elmer-Dewitt 102). Currently, there is software being
released that promises to block children's access to known X-rated Internet
newsgroups and sites. However, since most adults rely on their computer literate
children to setup these programs, the children will be able to find ways around
them. This mimics real life, where these children would surely be able to get
their hands on an adult magazine. Regardless of what types of software or
safeguards are used to protect the children of the Information age, there will
be ways around them. This necessitates the education of the children to deal
with reality. Altered views of an electronic world translate easily into altered
views of the real world. "When it comes to our children, censorship is a
far less important issue than good parenting. We must teach our kids that the
Internet is a extension and a reflection of the real world, and we have to show
them how to enjoy the good things and avoid the bad things. This isn't the
government's responsibility. It's ours (Miller 76)." Not all restrictions
on electronic speech are bad. Most of the major on-line communication companies
have restrictions on what their users can "say." They must respect
their customer's privacy, however. Private E-mail content is off limits to them,
but they may act swiftly upon anyone who spouts obscenities in a public forum.
Self regulation by users and servers is the key to avoiding government imposed
intervention. Many on-line sites such as Playboy and Penthouse have started to
regulated themselves. Both post clear warnings that adult content lies ahead and
lists the countries where this is illegal. The film and videogame industries
subject themselves to ratings, and if Internet users want to avoid government
imposed regulations, then it is time they begin to regulate themselves. It all
boils down to protecting children from adult material, while protecting the
first amendment right to free speech between adults. Government attempts to
regulate the Internet are not just limited to obscenity and vulgar language, it
also reaches into other areas, such as data encryption. By nature, the Internet
is an insecure method of transferring data. A single E-mail packet may pass
through hundreds of computers from its source to destination. At each computer,
there is the chance that the data will be archived and someone may intercept
that data. Credit card numbers are a frequent target of hackers. Encryption is a
means of encoding data so that only someone with the proper "key" can
decode it. "Why do you need PGP (encryption)? It's personal. It's private.
And it's no one's business but yours. You may be planning a political campaign,
discussing our taxes, or having an illicit affair. Or you may be doing something
that you feel shouldn't be illegal, but is. Whatever it is, you don't want your
private electronic mail (E-mail) or confidential documents read by anyone else.
There's nothing wrong with asserting your privacy. Privacy is as apple-pie as
the Constitution. Perhaps you think your E-mail is legitimate enough that
encryption is unwarranted. If you really are a law-abiding citizen with nothing
to hide, then why don't you always send your paper mail on postcards? Why not
submit to drug testing on demand? Why require a warrant for police searches of
your house? Are you trying to hide something? You must be a subversive or a drug
dealer if you hide your mail inside envelopes. Or maybe a paranoid nut. Do
law-abiding citizens have any need to encrypt their E-mail? What if everyone
believed that law-abiding citizens should use postcards for their mail? If some
brave soul tried to assert his privacy by using an envelope for his mail, it
would draw suspicion. Perhaps the authorities would open his mail to see what
he's hiding. Fortunately, we don't live in that kind of world, because everyone
protects most of their mail with envelopes. So no one draws suspicion by
asserting their privacy with an envelope. There's safety in numbers.
Analogously, it would be nice if everyone routinely used encryption for all
their E-mail, innocent or not, so that no one drew suspicion by asserting their
E-mail privacy with encryption. Think of it as a form of solidarity
(Zimmerman)." Until the development of the Internet, the U.S. government
controlled most new encryption techniques. With the development of faster home
computers and a worldwide web, they no longer hold control over encryption. New
algorithms have been discovered that are reportedly uncrackable even by the FBI
and the NSA. This is a major concern to the government because they want to
maintain the ability to conduct wiretaps, and other forms of electronic
surveillance into the digital age. To stop the spread of data encryption
software, the U.S. government has imposed very strict laws on its exportation.
One very well known example of this is the PGP (Pretty Good Privacy) scandal.
PGP was written by Phil Zimmerman, and is based on "public key"
encryption. This system uses complex algorithms to produce two codes, one for
encoding and one for decoding. To send an encoded message to someone, a copy of
that person's "public" key is needed. The sender uses this public key
to encrypt the data, and the recipient uses their "private" key to
decode the message. As Zimmerman was finishing his program, he heard about a
proposed Senate bill to ban cryptography. This prompted him to release his
program for free, hoping that it would become so popular that its use could not
be stopped. One of the original users of PGP posted it to an Internet site,
where anyone from any country could download it, causing a federal investigator
to begin investigating Phil for violation of this new law. As with any new
technology, this program has allegedly been used for illegal purposes, and the
FBI and NSA are believed to be unable to crack this code. When told about the
illegal uses of him programs, Zimmerman replies: "If I had invented an
automobile, and was told that criminals used it to rob banks, I would feel bad,
too. But most people agree the benefits to society that come from automobiles --
taking the kids to school, grocery shopping and such -- outweigh their
drawbacks." (Levy 56). Currently, PGP can be downloaded from MIT. They have
a very complicated system that changes the location on the software to be sure
that they are protected. All that needs to be done is click "YES" to
four questions dealing with exportation and use of the program, and it is there
for the taking. This seems to be a lot of trouble to protect a program from
spreading that is already world wide. The government wants to protect their
ability to legally wiretap, but what good does it do them to stop encryption in
foreign countries? They cannot legally wiretap someone in another country, and
they sure cannot ban encryption in the U.S. The government has not been totally
blind to the need for encryption. For nearly two decades, a government sponsored
algorithm, Data Encryption Standard (DES), has been used primarily by banks. The
government always maintained the ability to decipher this code with their
powerful supercomputers. Now that new forms of encryption have been devised that
the government can't decipher, they are proposing a new standard to replace DES.
This new standard is called Clipper, and is based on the "public key"
algorithms. Instead of software, Clipper is a microchip that can be incorporated
into just about anything (Television, Telephones, etc.). This algorithm uses a
much longer key that is 16 million times more powerful than DES. It is estimated
that today's fastest computers would take 400 billion years to break this code
using every possible key. (Lehrer 378). "The catch: At the time of
manufacture, each Clipper chip will be loaded with its own unique key, and the
Government gets to keep a copy, placed in escrow. Not to worry, though the
Government promises that they will use these keys to read your traffic only when
duly authorized by law. Of course, to make Clipper completely effective, the
next logical step would be to outlaw other forms of cryptography
(Zimmerman)." "If privacy is outlawed, only outlaws will have privacy.
Intelligence agencies have access to good cryptographic technology. So do the
big arms and drug traffickers. So do defense contractors, oil companies, and
other corporate giants. But ordinary people and grassroots political
organizations mostly have not had access to affordable "military
grade" public-key cryptographic technology. Until now. PGP empowers people
to take their privacy into their own hands. There's a growing social need for
it. That's why I wrote it (Zimmerman)." The most important benefits of
encryption have been conveniently overlooked by the government. If everyone used
encryption, there would be absolutely no way that an innocent bystander could
happen upon something they choose not to see. Only the intended receiver of the
data could decrypt it (using public key cryptography, not even the sender can
decrypt it) and view its contents. Each coded message also has an encrypted
signature verifying the sender's identity. The sender's secret key can be used
to encrypt an enclosed signature message, thereby "signing" it. This
creates a digital signature of a message, which the recipient (or anyone else)
can check by using the sender's public key to decrypt it. This proves that the
sender was the true originator of the message, and that the message has not been
subsequently altered by anyone else, because the sender alone possesses the
secret key that made that signature. "Forgery of a signed message is
infeasible, and the sender cannot later disavow his signature(Zimmerman)."
Gone would be the hate mail that causes many problems, and gone would be the
ability to forge a document with someone else's address. The government, if it
did not have alterior motives, should mandate encryption, not outlaw it. As the
Internet continues to grow throughout the world, more governments may try to
impose their views onto the rest of the world through regulations and
censorship. It will be a sad day when the world must adjust its views to conform
to that of the most prudish regulatory government. If too many regulations are
inacted, then the Internet as a tool will become nearly useless, and the
Internet as a mass communication device and a place for freedom of mind and
thoughts, will become non existent. The users, servers, and parents of the world
must regulate themselves, so as not to force government regulations that may
stifle the best communication instrument in history. If encryption catches on
and becomes as widespread as Zimmerman predicts it will, then there will no
longer be a need for the government to meddle in the Internet, and the biggest
problem will work itself out. The government should rethink its approach to the
censorship and encryption issues, allowing the Internet to continue to grow and

Emler-Dewitt, Philip. "Censoring Cyberspace: Carnegie Mellon's Attempt
to Ban Sex from it's Campus Computer Network Sends A Chill Along the Info
Highway." Time 21 Nov. 1994; 102-105. Lehrer, Dan. "The Secret
Sharers: Clipper Chips and Cypherpunks." The Nation 10 Oct. 1994; 376-379.
"Let the Internet Backlash Begin." Advertising Age 7 Nov. 1994; 24.
Levy, Steven. "The Encryption Wars: is Privacy Good or Bad?" Newsweek
24 Apr. 1995; 55-57. Miller, Michael. "Cybersex Shock." PC Magazine 10
Oct. 1995; 75-76. Wilson, David. "The Internet goes Crackers."
Education Digest May 1995; 33-36. Zimmerman, Phil. (1995). Pretty Good Privacy
v2.62, [Online]. Available Ftp: Directory: pub/pgp/dist File:

Good or bad? How would you rate this essay?
Help other users to find the good and worthy free term papers and trash the bad ones.
Like this term paper? Vote & Promote so that others can find it

Get a Custom Paper on Government:

Free papers will not meet the guidelines of your specific project. If you need a custom essay on Government: , we can write you a high quality authentic essay. While free essays can be traced by Turnitin (plagiarism detection program), our custom written papers will pass any plagiarism test, guaranteed. Our writing service will save you time and grade.

Related essays:

School choice will improve education in America. Public schools are grossly inefficient, and are not educating many of America's youths adequately. Schools that are run independent from local governme...
Government / Gun Control
control is an action of the government that is supposed to reduce crime. Congress has passed many laws on this subject and there really has not been an effect. Gun control has been a controversial iss...
Government / Gun Control
1988, handguns killed 7 people in Great Britain, 19 in Sweden, 53 in Switzerland, 25 in Israel, 13 in Australia, 8 in Canada, and 8,915 in the United States. These figures are shocking and there does...
The two former presidents Warren G. Harding and Calvin Coolige were alike in some ways and different in others. President Harding was a news paper owner from Ohio. He was chosen as the Rep. candidate ...
Government / Impeachment
or even the threat of it, has always seemed to give the president more power. In times of war Americans often readily give more power to the president, but once the crisis is over the public then bec...