Per James L. Hirsen, J.D., Ph.D Essay written in 1999, Government Gatekeepers Come After the Internet:
http://www.crossroad.to/Quotes/Hirsen-internet8-99.htmlHillary Rodham Clinton quote:
"We're all going to have to rethink how we deal with the Internet. As exciting as these new developments are, there are a number of serious issues without any kind of editing function or gatekeeping function... ."
According to Reuters (February 11, 1998), Hillary Rodham Clinton made this statement in Washington on February 11 in response to reporters who asked her whether she favored curbs on the Internet.
And so it was that on August 5, 1999, President Clinton signed Executive Order 13133. A new bureaucracy called a "working group" was established to devise ways in which the Internet could be policed.
The group, headed by Attorney General Janet Reno, was charged with the task of determining "the extent to which new technology tools, capabilities, or legal authorities may be required for effective investigation and prosecution of unlawful conduct that involves the use of the Internet."
In order to give Reno and her associates some means of justifying the assigned patrol duty, a law restricting political speech on the Internet was advanced in the form of the Shays-Meehan campaign finance bill currently proposed in Congress.
This piece of legislation turns out to be a direct attack on civic free speech. The vehicle chosen to mount the assault was the Federal Election Commission (FEC). Incredibly, upon passage of the bill the FEC would gain authorization to regulate certain types of political content anywhere on the World Wide Web.
It seems as though disregarding the Constitution, as well as recent Supreme Court holdings such as Buckley v. Valeo, are insufficient violations for the current crop of high-ranking officials. They also want to limit the easily accessible forum for political discourse that the Internet provides.
The scenario would play out something like this. If an individual wanted to use the Internet to discuss the ideology of a specific political candidate, that individual would first have to register with the FEC.
Before a person could set up a web site to furnish information about a candidate of choice, post a comment on an Internet bulletin board or even send an e-mail expressing an opinion, a name and address would have to be provided. Additionally, that person would have to register and make various disclosures to the FEC.
In the event that an individual were able to circumvent the eyes of the government by using encryption technology, the Department of Justice wants the authorization to surreptitiously break into private residences and incapacitate security apparatuses of computers. Complete penetration of any zone of privacy involving electronic information appears to be the ultimate goal.
One means that individuals have employed to ensure a semblance of technological seclusion is the use of encryption. This security device, though, complicates matters even further by creating a powerful electronic shield that places material completely beyond government penetration.
Encryption threatens one project in particular. In what sounds like an outtake from an Oliver Stone movie, a panel of the European Parliament has revealed that a secret international consortium consisting of the United States, United Kingdom, Canada, Australia and New Zealand have been monitoring one anothers’ citizens for years.
This group, code named Echelon, has been listening to all communications broadcast by satellite, microwave relays, the Internet and cable. Information is passed through computers, which sort out the data by looking for keywords in order to obtain details concerning, nations, businesses, organizations and individuals. The potential for abuse by governmental authorities is virtually unlimited.
We are in an era where attempts to manipulate the public are frequently employed, where crises are oftentimes manufactured to effectuate desired outcomes and solutions are conveniently provided by the inventors of said crises. In this manner, counterfeit heroes are created and clandestine objectives are accomplished.
........
:hide: Is this as surprising to some as it was to me? Hmmmmmmmmmm