Thursday, May 21, 2020

The Leaders Of The Roman Catholic Church - 804 Words

Anabaptist Leaders Many religions came about during the Christian Reformation 16th and 17th century. Martin Luther opposed the Roman Catholic Church, Huldrych Zwingli led the protestant reformation in Switzerland, and this led to more radical reform in Switzerland led by Conrad Grebel with Anabaptists. One of the main causes of the reformation was individuals looking at the church and scriptures and seeing where things did not line up biblically. There was a distinct difference between the views of the Roman Catholic Church and Protestant Churches. Anabaptist however did not see themselves as Protestant or Catholic but rather a completely separate entity with their own set of beliefs and views. They felt that the church had strayed too far way form the scriptures and wanted to return to the early church. They held the Sermon on the Mount is such high regards which in itself went against the Church and State being together in their beliefs. The Anabaptist felt that the State should gr ant religious liberty and in doing so they were willing to suffer and die rather than go against their beliefs imposed by the state. This lead to several Anabaptist leaders and followers to be martyred because of their strong belief in Doctrine and their beliefs to return to the Early Church where the State and Church were separate. The reason the Anabaptist held doctrine is such high accord was because they felt they should be able to make the choice as to what they can believe and not beShow MoreRelatedFactors that Cause The Great Schism Essay examples1175 Words   |  5 Pagesdivision in Christianity took place in 1054 CE between the Orthodox and Roman Catholic churches. This event is known as the Great Schism. The two areas of disagreement that caused the division were: * Who should be leader of the Christian Church? * The way in which the Trinity was to be understood. Christians in the West believed that the Pope should be the leader of the Christian Church. This was because he was the successor to St Peter. The Christians inRead MoreThe Importance of the Renaissance to the Reformation in Germany1263 Words   |  6 PagesThe Importance of the Renaissance to the Reformation in Germany The reformation was a movement that fundamentally challenged the authority of the Roman Catholic Church. The role of the clergy was undermined and the relationships between national countries and the Roman Catholic Church were threatened. The renaissance began in Italy during the fifteenth and sixteenth centuries through patronage and the flourishing society, and Rome achieved cultural prominence. It laterRead MoreReasons Why The Roman Catholics And The Eastern Orthodox Split1327 Words   |  6 PagesThere are many logical reasons why the Roman Catholics and the Eastern Orthodox split. Those in Constantinople and those in Rome believed to head the Church as the state. The Eastern areas of the Church used Greek in the church while the West used Latin, automatically this lead divergence in thought. The difference fueled confusion. The Eastern Church did not accept the claims of supremacy made by the pope. The remaining Churches were, despite several temporary periods of schism united until 1054Read MoreThe Role Of Monastic And The Problem Of Christian Conversions For Pagan Societies1286 Words   |  6 PagesThis historical study will examine the problems of monastic issues in preservation of roman civilization and the problem of Christian conversions for pagan societies in Europe during the early Medieval period of Europe. The purpose of Euro pean monasteries was to act in accordance with the Church of Rome’s policy to preserve Roman traditions in government and Christian practices in primarily pagan tribal communities. During this time, the primary writings of St. Benedict define the purpose of theRead MoreThe Great Leader Was Martin Luther1251 Words   |  6 PagesShields). This well-known quote emphasizes the importance of working together. However, â€Å"strength in numbers† would never be achieved without a great leader. Great leaders are the basis for success in all aspects of society because without someone to lead, plans cannot be executed and ideas remain mere thoughts in people’s minds. One such great leader was Martin Luther, a German theologian, who is credited with beginning the Protestant reformation. Part of the reason why his name is so readily associatedRead MoreThe Rise Of The Church1332 Words   |  6 Pagesthe rise of the Church in Rome it is imperative to recall that the center of the Christianity had been destroyed in AD 70, when the army of Titus destroyed Jerusalem. Looking for leadership, the Christians would have immediately sought out those in Rome as it was the center of power and capitol of the Empire. In the first and second centuries, all roads did indeed lead to Rome. The second reason that Christians looked to Rome for leadership is because they believed that the church would come fromRead MoreRoman Catholic And Eastern Orthodox Church1030 Words   |  5 PagesRoman Catholics and Eastern Orthodox Catholics once included a solitary Christian church with two focuses of force, Rome and Constantinople. Known as the Great Schism, was the official split between Roman Catholics and Eastern Orthodox Church. The Church split along doctrinal, religious, phonetic, political, and geographic lines, and the central break as never been mended. Though the Church split because of their differences, they still had some things that were similar. The Roman Catholic andRead MoreThe Spread Of Christianity And Western Europe1637 Words   |  7 Pagesthe life, teachings, death, and resurrection of Jesus Christ, and those who follow him are called Christians.† â€Å"Christianity has many different branches that accompany a variety of beliefs and practices.† The three major branches of Christianity are Roman Catholicism, Eastern Orthodoxy, and Protestantism, all of which have several smaller categories within each of these branches. Both of these religions share several views and ideas, but they also have their differences. First off, the beginning ofRead MoreThe Reformation And The Reformation1421 Words   |  6 Pagesthe Catholic Church many people were dissatisfied about their faith during the Renaissance. This led to a period called the Reformation, which began in 1517. The Reformation was led by radical critics Martin Luther and John Calvin, who questioned the teachings and practices of the Roman Catholic Church, due to their selling of indulgences and stray from the Bible. The Reformation started in central Europe and spread to encompass most of the continent, during which time people left the Roman CatholicRead MoreChhi 301 Papacy Paper1697 Words   |  7 PagesRAMIFICATIONS OF THE PAPACY’S POWER IN ROME Church History 301 April 20, 2014    Ramifications of the Papacy’s Power in Rome The papacy – the office held by the pope as head of the Catholic Church - gained great power from the sixth through eighth centuries, and there are several reasons for this surge in influence. Starting around 590, Pope Gregory I sought to convert Teutonic invaders to Christianity. Islam was also in play, as it had taken over most of Asia and Africa. According to

Wednesday, May 6, 2020

How the American Revolution Changed American Society Essay

From 1763 to 1789 the American Colonies underwent a radical transformation into an independent self governing nation. British debt accumulated from the French and Indian War brought colonists into conflict with the mother country over a variety of social, political and economic issues. However, the outcome of the American Revolution was not a radical departure from America had been prior to 1763 but later, with the introduction of the constitution, developed unto a revolutionary society. At the end of the American Revolutionary War in 1789, the colonies were free from British rule and a new nation was born. The Articles of Confederation created a new American Republic which was only replaced with a more democratic government under the†¦show more content†¦Most colonials did not want to separate from the crown, but as time progressed, these atrocities made them question their authority. Revolutionaries like Thomas Payne argued that colonies should break free from England. Pay ne argued that it was unnatural for an island to control an entire continent and compared to the Earth orbiting the Moon. Revolutionaries like this helped push the colonies to fight back and gain their independence. The newly freed colonies drafted the Articles of Confederation based on the political philosophy of republicanism. This was the idea that a government should be controlled by the people and not a monarchy or aristocracy with inherited powers. A large government would lead to tyranny but a weak one would lead to anarchy. The only way republicanism would work is if the people were willing to put the public interest above their own self interest. Even though history had shown a true republic to fail and was only successful on a small scale, Americans viewed themselves as special. Their government wouldnt crumble like the Romains because the American people were virtuous enough to defeat the British, they would be virtuous enough to support the republic. (Could add 3,d,iii a nd 3,d,iv) Looking at the government that was in place before the 1763 and the government setup by the Articles onShow MoreRelatedHow the American Revolution Changed American Society Essay559 Words   |  3 PagesThe American Revolution changed the political and social aspects of the United States. After the war ended many things changed in the states. From the political stand point women still had power but gained a few rights after the war and since the states where now free from British rule they could now create their own form of central government and elected a leader. On the social and economical side the belief of egalitarianism was widely being accepted, and mercantilism ended so the colonies wereRead More The Radical Changes Resulting from the American Revolution Essay1156 Words   |  5 Pageslearning about the American Revolution. Although it contains the word â€Å"revolution† in its name, there are many who don’t consider the American Revolution a real r evolution. After considering the definition of a revolution – a radical change of an entire system, usually by war, resulting in a change of the way of life of the people involved – and the American society before and after the American Revolution, it is obvious that those who don’t consider the American Revolution a revolution are mistaken.Read MoreThe Changes that Came About after the American Revolution739 Words   |  3 Pages After the American Revolution, Americans, who were free of British control, started to reevaluate politics, the economy and society. The American Revolution changed American considerably politically because Americans rely on democracy rather than monarchy, socially because the roles of certain social groups experienced a nuance change, and economically because the Americans freed themselves from having to send their raw materials to England and created their own currency. With these changes alsoRead MoreTo What Extent Did the American Revolution Fundamentally Change American Society?851 Words   |  4 Pageswhat extent did the American Revolution fundamentally change American society? In your answer, be sure to address the political, social and economic effects of the Revolution in the period from 1775 to 1800. After the American Revolution, Americans, who were free of British control, started to reevaluate politics, the economy and society. After breaking away from what they thought was a corrupt and evil government, Americans changed how they wanted to govern their society, even though they ultimatelyRead MoreWas The American Revolution Revolutionary?1549 Words   |  7 Pagesextent was the American Revolution revolutionary, one must define qualifications to accredit such a revolution. Is a revolution defined as a complete and utmost overthrow of an established government by a new regime? Or is a revolution defined as a subversive change in societal values/roles that changes the structures of a pre-existing social order? Or possibly both? In light of both definitions, one can evaluate that the American Revolution was indeed revolutionary because American colonists wereRead MoreLinda Kerber s Women Of The Republic1269 Words   |  6 PagesInformation): Date:â€Æ' The ideals by the Republicans which came into the limelight after the Revolutionary War would set into motion a revolution not just in the United States but in many countries across the world. Linda Kerber’s ‘Women of the Republic’ is a demonstration of the paradigm shift in relation to the US social and political structures after the American Revolution. Kerber observes that not only did the war provide more opportunities to women but also set a platform for women to chart the wayRead MoreEssay about Mary Pauls Letters951 Words   |  4 PagesEssay Assignment: Market Revolution During the nineteenth century, America went through a number of social, economic and political changes. Revolutions in manufacturing and commerce led to substantial economic growth. Several cultural movements reformed American society. Mary Paul, once just a normal girl from Vermont, led a life that was shaped by the changes of the 1800s. The information gathered from Mary Pauls letters to her father make it clear that Marys life experiences turned her intoRead MoreIndustrial Revolution After The Civil War956 Words   |  4 Pages The Inusterial Revolution after the Civil War Between 18-19th centuries after the Civil War, a chain of events occurred that brought about several changes in the way that people lived and worked in the United States.This period ranges from the time when cities started growing rapidly because human hand labor was drastically changed to machine labor. These events started the American Industrial Revolution, which later affected African American socially, economically and politically. However, manyRead MoreAp Us History Dbq Essay786 Words   |  4 Pagesthe American Revolution, Americans, who had just broken free from the British, completely changed their politics, economy and society. The Founders decided to change how they wanted to run their society, even though, in the end, they went back to a more powerful federal government like Britain. Most people’s daily lives didn’t change much but the principles from the revolution made some try to look for better financial opportunities. Women, slaves, and loyalists we re changed a lot in society. WomenRead MoreRevolutions are usually described as â€Å"radical† events. A â€Å"radical† event is defined as one that700 Words   |  3 PagesRevolutions are usually described as â€Å"radical† events. A â€Å"radical† event is defined as one that greatly changes the political, cultural, social, and/or economic nature of a society. I believe that the American Revolution was a radical event that dramatically changed our society. There were many impacts to the changes such as slavery, primogeniture, the Articles of Confederation, republican motherhood, and government. This was the time in life, that we as America gained our independence from Britain

The Laws of Cyberspace †Lawrence Lessig Free Essays

The Laws of Cyberspace Lawrence Lessig †  Draft 3  ©Lessig 1998: This essay was presented at the Taiwan Net ’98 conference, in Taipei, March, 1998. †  Jack N. and Lillian R. We will write a custom essay sample on The Laws of Cyberspace – Lawrence Lessig or any similar topic only for you Order Now Berkman Professor for Entrepreneurial Legal Stud- ies, Harvard Law School. Thanks to Tim Wu for extremely helpful comments on an earlier draft. Lessig: The Laws of Cyberspace Draft: April 3, 1998 Before the revolution, the Tsar in Russia had a system of internal passports. The people hated this system. These passports marked the estate from which you came, and this marking determined the places you could go, with whom you could associate, what you could be. The passports were badges that granted access, or barred access. They controlled what in the Russian state Russians could come to know. The Bolsheviks promised to change all this. They promised to abolish the internal passports. And soon upon their rise to power, they did just that. Russians were again free to travel where they wished. Where they could go was not determined by some document that they were required to carry with them. The abolition of the internal passport symbolized freedom for the Russian people — a democratization of citizenship in Russia. This freedom, however, was not to last. A decade and a half later, faced with the prospect of starving peasants flooding the cities looking for food, Stalin brought back the system of internal passports. Peasants were again tied to their rural land (a restriction that remained throughout the 1970s). Russians were once again restricted by what their passport permitted. Once again, to gain access to Russia, Russians had to show something about who they were. *** Behavior in the real world — this world, the world in which I am now speaking — is regulated by four sorts of constraints. Law is just one of those four constraints. Law regulates by sanctions imposed ex post — fail to pay your taxes, and you are likely to go to jail; steal my car, and you are also likely to go to jail. Law is the prominent of regulators. But it is just one of four. Social norms are a second. They also regulate. Social norms — understandings or expectations about how I ought to behave, enforced not through some centralized norm enforcer, but rather through the understandings and expectations of just about everyone within a particular community — direct and constrain my behavior in a far wider array of contexts than any law. Norms say what clothes I will wear — a suit, not a dress; they tell you to sit quietly, and politely, for at least 40 minutes while I speak; they or- 2 Lessig: The Laws of Cyberspace Draft: April 3, 1998 ganize how we will interact after this talk is over. Norms guide behavior; in this sense, they function as a second regulatory constraint. The market is a third constraint. It regulates by price. The market limits the amount that I can spend on clothes; or the amount I can make from public speeches; it says I can command less for my writing than Madonna, or less from my singing than Pavarotti. Through the device of price, the market sets my opportunities, and through this range of opportunities, it regulates. And finally, there is the constraint of what some might call nature, but which I want to call â€Å"architecture. † This is the constraint of the world as I find it, even if this world as I find it is a world that others have made. That I cannot see through that wall is a constraint on my ability to know what is happening on the other side of the room. That there is no access-ramp to a library constrains the access of one bound to a wheelchair. These constraints, in the sense I mean here, regulate. To understand a regulation then we must understand the sum of these four constraints operating together. Any one alone cannot represent the effect of the four together. *** This is the age of the cyber-libertarian. It is a time when a certain hype about cyberspace has caught on. The hype goes like this: Cyberspace is unavoidable, and yet cyberspace is unregulable. No nation can live without it, yet no nation will be able to control behavior in it. Cyberspace is that place where individuals are, inherently, free from the control of real space sovereigns. It is, in the words of James Boyle, the great techno-â€Å"gotcha† — nations of the world, you can’t live with out it, but nations of the world, when you’ve got it, you won’t live long with it. My aim today is a different view about cyberspace. My aim is to attack this hype. For in my view, the world we are entering is not a world of perpetual freedom; or more precisely, the world we are entering is not a world where freedom is assured. Cyberspace has the potential to be the most fully, and extensively, regulated space that we have ever known — anywhere, at any time in our history. It has the potential to be the antithesis of a space of freedom. And unless we understand this potential, unless we see how this might be, we are likely to sleep through this transition from freedom into 3 Lessig: The Laws of Cyberspace Draft: April 3, 1998 control. For that, in my view, is the transition we are seeing just now. Now I want to make this argument by using the two introductions that I began with today — the story about Bolshevik Russia, and the idea about regulation. For they together will suggest where cyberspace is going, and more importantly, just how we can expect cyberspace to get there. First the idea: Just as in real space, behavior in cyberspace is regulated by four sorts of constraints. Law is just one of those constraints. For the hype notwithstanding, there is law just now in cyberspace — copyright law, or defamation law, or sexual harassment law, all of which constrain behavior in cyberspace in the same way that they constrain behavior in real space. There are also, perhaps quite surprisingly, norms in cyberspace — rules that govern behavior, and expose individuals to sanction from others. They too function in cyberspace as norms function in real space, threatening punishments ex post by a community. And so too with the market. The market constrains in cyberspace, just as in real space. Change the price of access, the constraints on access differ. Change the structure of pricing access, and the regulation of marginal access shifts dramatically as well. But for our purposes, the most significant of these four constraints on behavior in cyberspace is the analog to what I called architecture in real space: This I will call code. By code, I simply mean the software and hardware that constitutes cyberspace as it is—the set of protocols, the set of rules, implemented, or codified, in the software of cyberspace itself, that determine how people interact, or exist, in this space. This code, like architecture in real space, sets the terms upon which I enter, or exist in cyberspace. It, like architecture, is not optional. I don’t choose whether to obey the structures that it establishes — hackers might choose, but hackers are special. For the rest of us, life in cyberspace is subject to the code, just as life in real space is subject to the architectures of real space. The substance of the constraints of code in cyberspace vary. But how they are experienced does not vary. In some places, one must enter a password before one gains access; in other places, one can enter whether identified or not. In some places, the transactions that one engages produce traces that link the transactions 4 Lessig: The Laws of Cyberspace Draft: April 3, 1998 back to the individual; in other places, this link is achieved only if the individual chooses. In some places, one can select to speak a language that only the recipient can hear (through encryption); in other places, encryption is not an option. The differences are constituted by the code of these different places. The code or software or architecture or protocols of these spaces set these features; they are features selected by code writers; they constrain some behavior by making other behavior possible. And in this sense, they, like architecture in real space, regulate behavior in cyberspace. Code and market and norms and law together regulate in cyberspace then as architecture and market and norms and law regulate in real space. And my claim is that as with real space regulation, we should consider how these four constraints operate together. An example — a contrast between a regulation in real space, and the same regulation in cyberspace — will make the point more clearly. Think about the concern in my country (some might call it obsession) with the regulation of indecency on the net. This concern took off in the United State early in 1995. Its source was an extraordinary rise in ordinary users of the net, and therefore a rise in use by kids, and an even more extraordinary rise in the availability of what many call â€Å"porn† on the net. An extremely controversial (and fundamentally flawed) study published in the Georgetown University Law Review reported the net awash in porn. Time and Newsweek both ran cover stories articles about its availability. And senators and congressmen were bombarded with demands to do something to regulate â€Å"cybersmut. † No doubt the fury at the time was great. But one might ask, why this fury was so great about porn in cyberspace. Certainly, more porn exists in real space than in cyberspace. So why the fury about access to porn in a place to which most kids don’t have access? To understand the why, think for a second about the same problem as it exists in real space. What regulates the distribution of porn in real space? First: In America, laws in real space regulate the distribution of porn to kids— laws requiring sellers of porn to check the age of 5 Lessig: The Laws of Cyberspace Draft: April 3, 1998 buyers, or laws requiring that sellers locate in a section of the city likely to be far from kids. But laws are not the most significant of the constraints on the distribution of porn to kids. More important than laws are norms. Norms constrain adults not to sell porn to kids. Even among porn distributors this restriction is relatively effective. And not just social norms. The market too, for porn costs money, and as kids have no money. But the most important real space constraint is what I’ve called architecture. For all of these other regulations in real space depend on this constraint of architecture. Laws and norms and market can discriminate against kinds in real space, since it is hard in real space to hide that you are a kid. Of course, a kid can don a mustache, and put on stilts, and try to enter a porn shop to buy porn. But for the most part, disguises will fail. For the most part, it will be too hard to hide that he is a kid. Thus, for the most part, constraints based on being a kid are constraints that can be effective. Cyberspace is different. For even if we assume that the same laws apply to cyberspace as to real space, and even if we assume that the constraints of norms and the market carried over as well, even so, there remains a critical difference between the two spaces. For while in real space it is hard to hide that you are a kid, in cyberspace, hiding who you are, or more precisely, hiding features about who you are is the simplest thing in the world. The default in cyberspace is anonymity. And because it is so easy to hide who one is, it is practically impossible for the laws, and norms, to apply in cyberspace. For for these laws to apply, one has to know that it is a kid one is dealing with. But the architecture of the space simply doesn’t provide this information. Now the important point is to see the difference, and to identify its source. The difference is a difference in what I want to call the regulability of cyberspace — the ability of governments to regulate behavior there. As it is just now, cyberspace is a less regulable space than real space. There is less that government can do. The source of this difference in regulability is a difference in the architecture of the space — a difference in the code that constitutes cyberspace as it is. Its architecture, my claim is, renders it essentially unregulable. 6 Lessig: The Laws of Cyberspace Draft: April 3, 1998 Or so it did in 1995, and in 1996, when the U. S. Congress eventually got around to passing its attempt to deal with this problem—the Communications Decency Act. I’m going to talk a bit about what happened to that statute, but I first want to mark this period, and set it off from where we are today. It was the architecture of cyberspace in 1995, and 1996 that made it essentially unregulable. Let’s call that architecture Net 95 — as in 1995 — and here are its features: So long as one had access to Net95, one could roam without identifying who one was. Net95 was Bolshevik Russia. One’s identity, or features, were invisible to the net then, so one could enter, and explore, without credentials—without an internal passport. Access was open and universal, not conditioned upon credentials. It was, in a narrow sense of the term, an extraordinary democratic moment. Users were fundamentally equal. Essentially free. It was against this background — against the background of the net as it was — Net95 — that the Supreme Court then considered the Communications Decency Act. Two lower courts had struck the statute as a violation of the right to freedom of speech. And as millions watched as the court considered arguments on the case — watched in cyberspace, as the arguments were reported, and debated, and critiqued. And in June, last year, the Court affirmed the decision of the lower courts, holding the statute unconstitutional. Just why it was unconstitutional isn’t so important for our purposes here. What is important is the rhetoric that lead the court to its conclusion. For the decision hung crucially on claims about the architecture of the net as it was — on the architecture, that is, of Net95. Given that architecture, the court concluded, any regulation that attempted to zone kids from porn would be a regulation that was too burdensome on speakers and listeners. As the net was, regulation would be too burdensome. But what was significant was that the court spoke as if this architecture of the net as it was — Net 95 — was the only architecture that the net could have. It spoke as if it had discovered the nature of the net, and was therefore deciding the nature of any possible regulation of the net. 7 Lessig: The Laws of Cyberspace Draft: April 3, 1998 But the problem with all this, of course, is that the net has no nature. There is no single architecture that is essential to the net’s design. Net95 is a set of features, or protocols, that constituted the net at one period of time. But nothing requires that these features, or protocols, always constitute the net as it always will be. And indeed, nothing in what we’ve seen in the last 2 years should lead us to think that it will. An example may make the point more simply. Before I was a professor at Harvard, I taught at the University of Chicago. If one wanted to gain access to the net at the university of Chicago, one simply connected one’s machine to jacks located throughout the university. Any machine could be connected to those jacks, and once connected, any machine would then have full access to the internet. Access was anonymous, and complete, and free. The reason for this freedom was a decision by the administration. For the Provost of the University of Chicago is Geof Stone, a former dean of the University of Chicago Law School, and a prominent free speech scholar. When the University was designing its net, the technicians asked the provost whether anonymous communication should be permitted. The provost, citing a principle that the rules regulating speech at the university would be as protective of free speech as the first amendment, said yes: One would have the right to communicate at the university anonymously, because the first amendment to the constitution would guarantee the same right vis-a-vis the government. From that policy decision flowed the architectural design of the University of Chicago’s net. At Harvard, the rules are different. One cannot connect one’s machine to the net at Harvard unless one’s machine is registered — licensed, approved, verified. Only members of the university community can register their machine. Once registered, all interactions with the network are potentially monitored, and identified to a particular machine. Indeed, anonymous speech on this net is not permitted — against the rule. Access can be controlled based on who someone is; and interaction can be traced, based on what someone did. The reason for this design is also due to the decision of an administrator — though this time an administrator less focused on the protections of the first amendment. Controlling access is the ideal at Harvard; facilitating access was the ideal at Chicago; tech- 8 Lessig: The Laws of Cyberspace Draft: April 3, 1998 nologies that make control possible were therefore chosen at Harvard; technologies that facilitate access chosen at Chicago. Now this difference between the two networks is quite common today. The network at the University of Chicago is the architecture of the internet in 1995. It is, again, Net95. But the architecture at Harvard is not an internet architecture. It is rather an intranet architecture. The difference is simply this — that within an intranet, identity is sufficiently established such that access can be controlled, and usage monitored. The underlying protocols are still TCP/IP — meaning the fundamental or underlying protocols of the internet. But layered on top of this fundamental protocol is a set of protocols facilitating control. The Harvard network is the internet plus, where the plus mean the power to control. These two architectures reflect two philosophies about access. They reflect two sets of principles, or values, about how speech should be controlled. They parallel, I want to argue, the difference between political regimes of freedom, and political regimes of control. They track the difference in ideology between West and East Germany; between the United States and the former Soviet Republic; between the Republic of China, and Mainland China. They stand for a difference between control and freedom — and they manifest this difference through the architecture or design of code. These architectures enable political values. They are in this sense political. Now I don’t offer this example to criticize Harvard. Harvard is a private institution; it is free, in a free society, to allocate its resources however it wishes. My point instead is simply to get you to see how architectures are many, and therefore how the choice of one is political. And how, at the level of a nation, architecture is inherently political. In the world of cyberspace, the selection of an architecture is as important as the choice of a constitution. For in a fundamental sense, the code of cyberspace is its constitution. It sets the terms upon which people get access; it sets the rules; it controls their behavior. In this sense, it is its own sovereignty. An alternative sovereignty, competing with real space sovereigns, in the regulation of behavior by real space citizens. But the United States Supreme Court treated the question of architecture as if the architecture of this space were given. It spoke as if there were only one design for cyberspace — the design it had. 9 Lessig: The Laws of Cyberspace Draft: April 3, 1998 In this, the Supreme Court is not alone. For in my view, the single greatest error of theorists of cyberspace — of pundits, and especially lawyers thinking about regulation in this space — is this error of the Supreme Court. It is the error of naturalism as applied to cyberspace. It is the error of thinking that the architecture as we have it is an architecture that we will always have; that the space will guarantee us liberty, or freedom; that it will of necessity disable governments that want control. This view is profoundly mistaken. Profoundly mistaken because while we celebrate the â€Å"inherent† freedom of the net, the architecture of the net is changing from under us. The architecture is shifting from an architecture of freedom to an architecture of control. It is shifting already without government’s intervention, though government is quickly coming to see just how it might intervene to speed it. And where government is now intervening, it is intervening in a way designed to change this very same architecture — to change it into an architecture of control, to make it, as I’ve said, more regulable. While pundits promise perpetual freedom built into the very architecture of the net itself, technicians and politicians are working together to change that architecture, to move it away from this architecture of freedom. As theorists of this space, we must come to understand this change. We must recognize the political consequences of this change. And we must take responsibility for these consequences. For the trajectory of the change is unmistakable, and the fruit of this trajectory, poison. As constitutionalists, we must then confront a fundamentally constitutional uestion: if there is a choice between architectures of control and architectures of freedom, then how do we decide these constitutional questions? If architectures are many, then does the constitution itself guide us in the selection of such architectures? In my view, constitutional values do implicate the architecture of this space. In my view, constitutional values should guide us in our design of this space. And in my view, constitutional values should limit the types of regulability that this architecture permits. But my view is absent in thinking about government’s role in cyberspace. Indeed, my nation — for many years the symbol of freedom in world where such freedom was rare — has become a leader in pushing the architecture of the internet from an archi- 10 Lessig: The Laws of Cyberspace Draft: April 3, 1998 tecture of freedom to an architecture of control. From an architecture, that is, that embraced the traditions of freedom expressed in our constitutional past, to an architecture that is fundamentally anathema to those traditions. But how? How can the government make these changes? How could the government effect this control? Many can’t see how government could effect this control. So in the few minutes remaining in my talk today, I want show you how. I want to sketch for you a path from where we are to where I fear we are going. I want you to see how these changes are possible and how government can help make them permanent. Return then with me to the idea that began this essay — the point about the different modalities of constraint — and notice something important about that idea that we have not so far remarked. I said at the start that we should think of law as just one of four modalities of constraint; that we should think of it as just one part of the structure of constraint that might be said to regulate. One might take that to be an argument about law’s insignificance. If so many forces other than law regulate, this might suggest that law itself can do relatively little. But notice what should be obvious. In the model I have described law is regulating by direct regulation — regulating an individual through the threat of punishment. But law regulates in other ways as well. It regulates, that is, indirectly as well as directly. And it regulates indirectly when it regulates these other modalities of constraint, so that they regulate differently. It can, that is, regulate norms, so norms regulate differently; it can regulate the market, so that the market regulates differently; and it can regulate architecture, so that architecture regulates differently. In each case, the government can coopt the other structures, so that they constrain to the government’s end. The same indirection is possible in cyberspace. But here, I suggest, the indirection will be even more significant. For here the government can not only regulate indirectly to advance a particular substantive end of the government. More significantly, the government can regulate to change the very regulability of the space. The government, that is, can regulate the architectures of cyberspace, so that behavior in cyberspace becomes more regulable — 11 Lessig: The Laws of Cyberspace Draft: April 3, 1998 indeed, to an architecture potentially more regulable than anything we have known in the history of modern government. Two examples will make the point — one an example of the government regulating to a particular substantive end, and the second, following from the first, an example of the government regulating to increase regulability. The first is the regulation of encryption. The government’s concern with encryption has been with the technology’s use in protecting privacy — its ability to hide the content of communications from the eyes of an eavesdropping third party, whether that third party is the government, or a nosy neighbor. For much of the history of the technology, the American government has heavily regulated the technology; for a time it threatened to ban its use; it has consistently banned its export (as if only Americans understand higher order mathematics); and for a period it hoped to flood the market with a standard encryption technology that would leave a backdoor open for the government to enter. The most recent proposals are the most significant. Last November, the FBI proposed a law that would require manufacturers to assure that any encryption system have built within it either a key recovery ability, or an equivalent back door, so that government agents could, if they need, get access to the content of such communications. This is government’s regulation of code, indirectly to regulate behavior. It is indirect regulation in the sense that I described before, and from a constitutional perspective — it is brilliant. Not brilliant because its ends are good; brilliant because the American constitution, at least, offers very little control over government regulation like this. The American constitution offers little protections against the government’s regulation of business; and given the interests of business, such regulations are likely to be effective. My second example follows from the first. For a second use of encryption is identification — as well as hiding what someone says, encryption, through digital certificates, can be used to authenticate who some it. With the ability to authenticate who someone is, the government could tell where someone comes from, or how old they are. And with this ability — through certifying IDs — passports on the information superhighway — governments could far more easily regulate behavior on this highway. 12 Lessig: The Laws of Cyberspace Draft: April 3, 1998 It would recreate the power to control behavior — recreate the power to regulate. Note what both regulations would achieve. Since the US is the largest market for internet products, no product could hope to succeed unless it were successful in the United States. Thus standards successfully imposed in the US becomes standards for the world. And these standards in particular would first facilitate regulation, and second, assure that communications on the internet could be broken into by any government that followed the procedures outlined in the bill. But the standards that those government would have to meet are not the standards of the US constitution. They are whatever standard local government happen to have — whether that government be the government of Mainland China, or Switzerland. The effect is that the United States government would be exporting an architecture that facilitates control, and control not just by other democratic governments, but by any government, however repressive. And by this, the US would move itself from a symbol of freedom, to a peddler of control. Having won the cold war, we would be pushing the techniques of our cold war enemies. *** How should we respond? How should you — as sovereigns independent of the influence of any foreign government — and we, as liberal constitutionalists respond? How should we respond to moves by a dominant political and economic power to influence the architecture of the dominant architecture of regulation by code — the internet? Sovereigns must come to see this: That the code of cyberspace is itself a kind of sovereign. It is a competing sovereign. The code is itself a force that imposes its own rules on people who are there, but the people who are there are also the people who are here — citizens of the Republic of China, citizens of France, citizens of every nation in the world. The code regulates them, yet they are by right subject to the regulation of local sovereigns. The code thus competes with the regulatory power of local sovereigns. It competes with the political choices made by local sovereigns. And in this competition, as the net becomes a dominant place for business and social life, it will displace the regulations of local sovereigns. You as sovereigns were afraid of the competing influence of na- 13 Lessig: The Laws of Cyberspace Draft: April 3, 1998 tions. Yet a new nation is now wired into your telephones, and its influence over your citizens is growing. You, as sovereigns, will come to recognize this competition. And you should come to recognize and question the special ole that the United States is playing in this competition. By virtue of the distribution of resources controlling the architecture of the net, the United States has a unique power over influencing the development of that architecture. It is as the law of nature were being written, with the United States at the authors side. This power creates an important responsibility for the United States — and you must assure that it exercises its power responsibly. The problem for constitutionalists — those concerned to preserve social and political liberties in this new space — is more difficult. For return to the story that began this talk — the world of internal passports. One way to understand the story I’ve told today about cyberspace is in line with this story about the Tsar’s Russia. The birth of the net was the revolution itself; life under Net95 was life in Bolshevik Russia (the good parts at least, where internal passports were eliminated); the Net as it is becoming is Stalin’s Russia, where internal passports will again be required. Now there’s a cheat to that story — a rhetorical cheat that tends to obscure an important fact about real space life. For we all live in the world of internal passports. In the United States, in many places, one cannot live without a car; one can’t drive a car without a license; a license is an internal passport: It says who you are, where you come from, how old you are, whether you’ve recently been convicted of a crime; it links your identity to a database that will reveal whether you’ve been arrested (whether convicted or not) or whether any warrants for your arrest in any jurisdiction in the nation are outstanding. The license is the internal passport of the modern American state. And no doubt its ability to control or identify is far better than the Tsar’s Russia. But in the United States — at least for those who don’t appear to be immigrants, or a disfavored minority — the burden of these passports is slight. The will to regulate, to monitor, to track, is not strong enough in the United States to support any systematic effort to use these passports to control behavior. And the will is not strong enough because the cost of such control is so great. There are not checkpoints at each corner; one isn’t required to register 14 Lessig: The Laws of Cyberspace Draft: April 3, 1998 when moving through a city; one can walk relatively anonymously around most of the time. Technologies of control are possible, but in the main far too costly. And this costliness is, in large part, the source of great freedom. It is inefficiency in real space technologies of control that yield real space liberty. But what if the cost of control drops dramatically. What if an architecture emerges that permits constant monitoring; an architecture that facilitates the constant tracking of behavior and movement. What if an architecture emerged that would costlessly collect data about individuals, about their behavior, about who they wanted to become. And what if the architecture could do that invisibly, without interfering with an individuals daily life at all? This architecture is the world that the net is becoming. This is the picture of control it is growing into. As in real space, we will have passports in cyberspace. As in real space, these passports can be used to track our behavior. But in cyberspace, unlike realspace, this monitoring, this tracking, this control of behavior, will all be much less expensive. This control will occur in the background, effectively and invisibly. Now to describe this change is not to say whether it is for the good or bad. Indeed, I suggest that as constitutionalists, we must acknowledge a fundamental ambiguity in our present political judgments about liberty and control. I our peoples are divided in their reaction to this picture of a system of control at once perfect, and yet invisible. Many would say of this system — wonderful. All the better to trap the guilty, with little burden on the innocent. But there are many as well who would say of this system — awful. That while professing our ideals of liberty and freedom from government, we would have established a system of control far more effective than any in history before. So the response to all this is not necessarily to give up the technologies of control. The response is not to insist that Net95 be the perpetual architecture of the net. The response instead is to find a way to translate what is salient and important about present day liberties and constitutional democracy into this architecture of the net. The point is to be critical of the power of this sovereign—this emerging sovereign—as we are properly critical of the power of any sovereign. What are these limits: As government takes control or influences the architecture of the code of the net, at a minimum, we 15 Lessig: The Laws of Cyberspace Draft: April 3, 1998 must assure that government does not get a monopoly on these technologies of control. We must assure that the sorts of checks that we build into any constitutional democracy get built into regulation by this constitution — the code. We must assure that the constraints of any constitutional democracy — the limits on efficiency constituted by Bills of Rights, and systems of checks and balances — get built into regulation by code. These limits are the â€Å"bugs† in the code of a constitutional democracy — and as John Perry Barlow says, we must build these bugs into the code of cyberspace. We must build them in so that they, by their inefficiency, might recreate some of the protections we have long known. *** Cyberspace is regulated ? by laws, but not just by law. The code of cyberspace is one of these laws. We must come to see how this code is an emerging sovereign — omnipresent, omnipotent, gentle, efficient, growing — and that we must develop against this sovereign the limits that we have developed against real space sovereigns. Sovereigns will always say — real space as well as cyberspace — that limits, and inefficiencies — bugs — are not necessary. But things move too quickly for such confidence. My fear is not just that against this sovereign, we have not yet developed a language of liberty. Nor that we haven’t the time to develop such language. But my fear is that we sustain the will — the will of free societies for the past two centuries, to architect constitutions to protect freedom, efficiencies notwithstanding. 16 How to cite The Laws of Cyberspace – Lawrence Lessig, Essay examples