Asserting Power over Technology in an Era of Leaky Bits

Illustration by Tom White/9 Surf Studios

llustration by Tom White/9 Surf Studios

Return to main article:

Looking at cyberspace from 50,000 feet, we are going to be choosing between two alternative worldviews. In one view of the world, information ubiquity is the natural state; the bits will always leak. There are digital tools, such as encryption and anonymous routing, to make the flows of bits less dangerous to us and less conducive to surveillance and commercial exploitation. But fundamentally, in this worldview, people must be responsible for themselves. They need to learn homespun safety lessons: Don’t give away data about yourself if you don’t want it abused. Don’t believe what you read on a Web site if it’s anonymous and can’t be traced. Don’t believe that anyone, even the government, can collect vast amounts of information and keep it all secret forever.

In this worldview the most important thing society can do is to teach people how to take care of themselves, how not to overreact to misfortunes, how to capitalize on the potential of the revolution without assuming its risks.

In the alternative view, information, for all its usefulness, is a fundamentally dangerous substance. It must be bottled up, dammed, diverted, and origin labeled, or packaged and sold for money, even if it is a century old. This is the world of 1984, except that the information sources are in private hands, not just government hands, and the information users are commercial as well as governmental. This is the world in which the response to every problem is a regulation, or an agency, or perhaps a hardware feature. This is the world of Green Dam spyware and censorship software—China’s modern Index Librorum Prohibitorum. It is also the world of central Internet monitoring in Australia (for obscenity) and France (for copyright infringement, in spite of the provision in Article 19 of the UN General Assembly’s 1948 “Universal Declaration of Human Rights” to “receive and impart information and ideas through any media and regardless of frontiers”). It is the world in which the most open societies use the tools of the most repressive, and citizens of democracies are grateful for the safety and prosperity they are promised.

Commercial and governmental forces make it easy to forget how much power we have over how technologies will shape our future. All of us who live in free societies share that power, and especially the young, who can decide what kind of world they want to inhabit.

We can help make that choice through the political process, by watching what laws are enacted by state and national governments. We can help make it by our choices as consumers, by what we say about the features present in, and missing from, the devices and technologies we buy. We can make it by what we have to say about the workings of the institutions and businesses of which we are a part. We can resist those expurgated dictionaries and those Web sites that want to know things you do not want to tell them. We can speak up. We can leave the box on the shelf. We can click “I don’t agree.”

Whatever we choose, we should not let one world or the other evolve because others—especially governments and corporations—have made the choice for us. The revolution has its delights, but we need to think beyond them—think how they work, who has the data, and what they can do with it. We need to use our rationality, our knowledge, and our education to shape the world in which we and our children and our children’s children will live.

Adapted from The Harvard Sampler: Liberal Education for the Twenty-First Century, edited by Jennifer M. Shephard, Stephen M. Kosslyn, and Evelynn M. Hammonds, to be published October 2011 by Harvard University Press. Copyright © 2011 by the President and Fellows of Harvard College. All rights reserved.

From “The Internet and Hieronymus Bosch: Fear, Protection, and Liberty in Cyberspace,” by Harry R. Lewis, Gordon McKay professor of computer science, an adaptation of the final lecture in his course Quantitative Reasoning 48, “Bits,” subsequently offered as Empirical and Mathematical Reasoning 12, under the same title, and as Computer Science E-2 in the Harvard Extension School.

Read more articles by: Harry R. Lewis

You might also like

John Manning Appointed Interim Provost

Harvard Law School dean moves to central administration

Facebook’s Failures

Author and tech journalist Jeff Horwitz speaks at Harvard.

Kevin Young Named 2024 Harvard Arts Medalist

Museum director and poet to be honored April 24

Most popular

Convocation 2017: What Should an Education Be at Such a Moment?

Speakers reflect on the goals of a liberal arts university. 

Nicco Mele

The director of the Shorenstein Center on how the Internet came to mean so much to him. 

Found in Translation

Maureen Freely ’74, longtime translator of Orhan Pamuk, shares the nuances of bringing a text from one language to another.

More to explore

Photograph of Winthrop Bell 1910

Winthrop Bell

Brief life of a philosopher and spy: 1884-1965

Illustration of people talking to each other with colorful thought bubbles above their heads

Talking about Talking

Fostering healthy disagreement

Vacationing with a Purpose

New England “summer camps” for adults