📄 the constitution in cyberspace.txt
字号:
Contemporary writers from Michel Foucault, in *The Archaeologyof Knowledge*, through George Lakoff, in *Women, Fire, and DangerousThings*, use Borges' Chinese encyclopedia to illustrate a range ofdifferent propositions, but the *core* proposition is the supposedarbitrariness -- the political character, in a sense -- of allculturally imposed categories. At one level, that proposition expresses a profound truth andmay encourage humility by combating cultural imperialism. Atanother level, though, the proposition tells a dangerous lie: itsuggests that we have descended into the nihilism that so obsessedNietzsche and other thinkers -- a world where *everything* isrelative, all lines are up for grabs, all principles andconnections are just matters of purely subjective preference or,worse still, arbitrary convention. Whether we believe that killinganimals for food is wrong, for example, becomes a questionindistinguishable from whether we happen to enjoy eating beans,rice and tofu. This is a particularly pernicious notion in a era when we passmore and more of our lives in cyberspace, a place where, almost bydefinition, our most familiar landmarks are rearranged or disappearaltogether -- because there is a pervasive tendency, even (andperhaps especially) among the most enlightened, to forget that thehuman values and ideals to which we commit ourselves may indeed beuniversal and need not depend on how our particular cultures, orour latest technologies, carve up the universe we inhabit. It wasmy very wise colleague from Yale, the late Art Leff, who onceobserved that, even in a world without an agreed-upon God, we canstill agree -- even if we can't "prove" mathematically -- that"napalming babies is wrong." The Constitution's core values, I'm convinced, need not betransmogrified, or metamorphosed into oblivion, in the dim recessesof cyberspace. But to say that they *need* not be lost there ishardly to predict that they *will* not be. On the contrary, withoutfurther thought and awareness of the kind this conference mightprovide, the danger is clear and present that they *will* be. The "event horizon" against which this transformation mightoccur is already plainly visible: Electronic trespassers like Kevin Mitnik don't stop withcracking pay phones, but break into NORAD -- the North AmericanDefense Command computer in Colorado Springs -- not in a *WarGames*movie, but in real life. Less challenging to national security but more ubiquitouslythreatening, computer crackers download everyman's credit history>from institutions like TRW; start charging phone calls (and more)to everyman's number; set loose "worm" programs that shut downthousands of linked computers; and spread "computer viruses"through everyman's work or home PC. It is not only the government that feels threatened by"computer crime"; both the owners and the users of privateinformation services, computer bulletin boards, gateways, andnetworks feel equally vulnerable to this new breed of invisibletrespasser. The response from the many who sense danger has beenswift, and often brutal, as a few examples illustrate. Last March, U.S. Secret Service agents staged a surprise raidon Steve Jackson Games, a small games manufacturer inAustin, Texas, and seized all paper and electronic drafts of itsnewest fantasy role-playing game, *GURPS[reg.t.m.] Cyberpunk*,calling the game a "handbook for computer crime." By last Spring, up to one quarter of the U.S. TreasuryDepartment's investigators had become involved in a project ofeavesdropping on computer bulletin boards, apparently trackingnotorious hackers like "Acid Phreak" and "Phiber Optik" throughwhat one journalist dubbed "the dark canyons of cyberspace." Last May, in the now famous (or infamous) "Operation Sun Devil,"more than 150 secret service agents teamed up with stateand local law enforcement agencies, and with security personnel>from AT&T, American Express, U.S. Sprint, and a number of theregional Bell telephone companies, armed themselves with over twodozen search warrants and more than a few guns, and seized 42computers and 23,000 floppy discs in 14 cities from New York toTexas. Their target: a loose-knit group of people in their teensand twenties, dubbed the "Legion of Doom." I am not describing an Indiana Jones movie. I'm talking aboutAmerica in the 1990s.The Problem The Constitution's architecture can too easily come to seemquaintly irrelevant, or at least impossible to take very seriously,in the world as reconstituted by the microchip. I propose today tocanvass five axioms of our constitutional law -- five basicassumptions that I believe shape the way American constitutionalscholars and judges view legal issues -- and to examine how theycan adapt to the cyberspace age. My conclusion (and I will try notto give away too much of the punch line here) is that the Framersof our Constitution were very wise indeed. They bequeathed us aframework for all seasons, a truly astonishing document whoseprinciples are suitable for all times and all technologicallandscapes.Axiom 1:There is a Vital Difference*Between Government and Private Action* The first axiom I will discuss is the proposition that theConstitution, with the sole exception of the Thirteenth Amendmentprohibiting slavery, regulates action by the *government* rather thanthe conduct of *private* individuals and groups. In an article Iwrote in the Harvard Law Review in November 1989 on "The Curvatureof Constitutional Space," I discussed the Constitution'smetaphor-morphosis from a Newtonian to an Einsteinian andHeisenbergian paradigm. It was common, early in our history, tosee the Constitution as "Newtonian in design with its carefullycounterpoised forces and counterforces, its [geographical andinstitutional] checks and balances." (103 *Harv. L. Rev.* at 3.) Indeed, in many ways contemporary constitutional law is stilltrapped within and stunted by that paradigm. But today at leastsome post-modern constitutionalists tend to think and talk in thelanguage of relativity, quantum mechanics, and chaos theory. Thismay quite naturally suggest to some observers that theConstitution's basic strategy of decentralizing and diffusing powerby constraining and fragmenting governmental authority inparticular has been rendered obsolete. The institutional separation of powers among the three federalbranches of government, the geographical division of authoritybetween the federal government and the fifty state governments, therecognition of national boundaries, and, above all, the sharpdistinction between the public and private spheres, become easy toderide as relics of a simpler, pre-computer age. Thus Eli Noam, inthe First Ithiel de Sola Pool Memorial Lecture, delivered lastOctober at MIT, notes that computer networks and networkassociations acquire quasi-governmental powers as they necessarilytake on such tasks as mediating their members' conflictinginterests, establishing cost shares, creating their own rules ofadmission and access and expulsion, even establishing their own *defacto* taxing mechanisms. In Professor Noam's words, "networksbecome political entities," global nets that respect no state orlocal boundaries. Restrictions on the use of information in onecountry (to protect privacy, for example) tend to lead to export ofthat information to other countries, where it can be analyzed andthen used on a selective basis in the country attempting torestrict it. "Data havens" reminiscent of the role played by theSwiss in banking may emerge, with few restrictions on the storageand manipulation of information. A tempting conclusion is that, to protect the free speech andother rights of *users* in such private networks, judges must treatthese networks not as associations that have rights of their own*against* the government but as virtual "governments" in themselves-- as entities against which individual rights must be defended inthe Constitution's name. Such a conclusion would be misleadinglysimplistic. There are circumstances, of course, whennon-governmental bodies like privately owned "company towns" oreven huge shopping malls should be subjected to legislative andadministrative controls by democratically accountable entities, oreven to judicial controls as though they were arms of the state --but that may be as true (or as false) of multinational corporationsor foundations, or transnational religious organizations, or evensmall-town communities, as it is of computer-mediated networks.It's a fallacy to suppose that, just because a computer bulletinboard or network or gateway is *something like* a shopping mall,government has as much constitutional duty -- or even authority --to guarantee open public access to such a network as it has toguarantee open public access to a privately owned shopping centerlike the one involved in the U.S. Supreme Court's famous *PruneYardShopping Center* decision of 1980, arising from nearby San Jose. The rules of law, both statutory and judge-made, through whicheach state *allocates* private powers and responsibilities themselvesrepresent characteristic forms of government action. That's why astate's rules for imposing liability on private publishers, or fordeciding which private contracts to enforce and which ones toinvalidate, are all subject to scrutiny for their consistency withthe federal Constitution. But as a general proposition it is onlywhat *governments* do, either through such rules or through theactions of public officials, that the United States Constitutionconstrains. And nothing about any new technology suddenly erasesthe Constitution's enduring value of restraining *government* aboveall else, and of protecting all private groups, large and small,>from government. It's true that certain technologies may become sociallyindispensable -- so that equal or at least minimal access to basiccomputer power, for example, might be as significant aconstitutional goal as equal or at least minimal access to thefranchise, or to dispute resolution through the judicial system,or to elementary and secondary education. But all this means (orshould mean) is that the Constitution's constraints on governmentmust at times take the form of imposing *affirmative duties* toassure access rather than merely enforcing *negative prohibitions*against designated sorts of invasion or intrusion. Today, for example, the government is under an affirmativeobligation to open up criminal trials to the press and the public,at least where there has not been a particularized finding thatsuch openness would disrupt the proceedings. The government isalso under an affirmative obligation to provide free legalassistance for indigent criminal defendants, to assure speedytrials, to underwrite the cost of counting ballots at electiontime, and to desegregate previously segregated school systems. Butthese occasional affirmative obligations don't, or shouldn't, meanthat the Constitution's axiomatic division between the realm ofpublic power and the realm of private life should be jettisoned. Nor would the "indispensability" of information technologiesprovide a license for government to impose strict content, access,pricing, and other types of regulation. *Books* are indispensable tomost of us, for example -- but it doesn't follow that governmentshould therefore be able to regulate the content of what goes ontothe shelves of *bookstores*. The right of a private bookstore ownerto decide which books to stock and which to discard, which books todisplay openly and which to store in limited access areas, shouldremain inviolate. And note, incidentally, that this needn't makethe bookstore owner a "publisher" who is liable for the wordsprinted in the books on her shelves. It's a common fallacy toimagine that the moment a computer gateway or bulletin board beginsto exercise powers of selection to control who may be on line, itmust automatically assume the responsibilities of a newscaster, a
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -