You are on page 1of 4

Fordham Law School

FLASH: The Fordham Law Archive of Scholarship and History

Faculty Scholarship

2017

Digitocracy
Joel R. Reidenberg
Fordham University School of Law, jreidenberg@law.fordham.edu

Follow this and additional works at: https://ir.lawnet.fordham.edu/faculty_scholarship

Part of the Law Commons

Recommended Citation
Joel R. Reidenberg, Digitocracy, 60 Comm. ACM 26 (2017)
Available at: https://ir.lawnet.fordham.edu/faculty_scholarship/948

This Article is brought to you for free and open access by FLASH: The Fordham Law Archive of Scholarship and
History. It has been accepted for inclusion in Faculty Scholarship by an authorized administrator of FLASH: The
Fordham Law Archive of Scholarship and History. For more information, please contact
tmelnick@law.fordham.edu.
V
viewpoints

DOI:10.1145/3126489 Joel R. Reidenberg

Law and Technology


Digitocracy
Considering law and governance in the digital age.

D
I G I TA L T E CH N OLOGIE S H AV E rules for citizens’ interactions online. The Internet’s Promise
unleashed profound forces Where public-sector surveillance and Without a doubt, the Internet revolu-
changing and reshaping private-sector tracking are so pervasive, tionized the dissemination of informa-
rule making in the democ- citizens lose the ability to control the tion and the ability of individuals to
racies of the information disclosure of their thoughts, friends, engage with each other. The euphoria
society. Today, we are witnessing a activities, and no longer have privacy. surrounding the early days of the Inter-
transformative period for law and Where lone coders wreak massive hav- net’s expansion into the public sphere
governance in the digital age. Elected oc for private gain or for opposition to predicted that technology would ex-
representative government and demo- governmental policies, they can use pand democracy and empower citizens
cratically chosen rules vie for author- their information resources to reject around the world. The conventional
ity with new players who have emerged majority rule. Where technology can wisdom thought citizen participation
from the network environment. At the protect the anonymity of wrongdoers, would multiply online with e-govern-
same time, network technologies have rule-breakers can escape accountabil- ment, and the public would have better
unraveled basic foundational prereq- ity. In short, the modern information oversight of the state thanks to new ca-
uisites for the rule of law in democracy society destroys one of the most fun- pabilities for monitoring administra-
like privacy, freedom of association, damental truths of any democracy that tive and executive actions. The power
and government oversight. The digital “the power to make the laws rests with of the Internet to disseminate informa-
age, thus, calls for the emergence of a those chosen by the people.”a tion from one to millions and the pow-
Digitocracy—a new set of more complex er of the Internet to foster conversa-
governance mechanisms assuring pub- a King v. Burwell, 135 S. Ct. 2480, 2496 (2015). tions seemed an unstoppable force for
lic accountability for online power held democratic discourse. Popular move-
by state and nonstate actors through ments like the Arab Spring, the Occupy
the creation of new checks and bal- We are witnessing Movement, and the Bernie Sanders
ances among a more diverse group of U.S. presidential campaign illustrated
players than democracy’s traditional a transformative that information technologies could
grouping of a representative legisla- period for law indeed significantly enhance and en-
ture, executive branch, and judiciary. able political organizing on a new,
Where Google and Facebook know and governance unprecedented scale. Many expected
more than most spy agencies about the in the digital age. that mechanisms like open electronic
lives of millions of citizens as well as the proceedings for rule making and open
inner workings of companies and gov- data for government transparency
ernments, information powerhouses would herald better representative gov-
and platforms can establish their own ernment and decision making.

26 COM MUNICATIO NS O F TH E AC M | S EPTEM BER 201 7 | VO L . 60 | N O. 9


viewpoints

The Internet’s technical infrastruc- ternet in our daily lives has effectively circumvent traditional political checks
ture turns out to challenge the promise demonstrated new vulnerabilities. The and balances and the public’s over-
of the political empowerment of citi- Internet’s infrastructure has already sight of government suffers irrepara-
zens. Just as network technologies of- displaced three key areas essential to bly. For example, in Oakland, CA, the
fered organizational tools for political the rule of law in democracy: sover- police engaged in a mass-scale surveil-
empowerment, the technologies them- eignty, government accountability, lance program to geo-locate thousands
selves provided the means to reverse the and respect for law. Internet technolo- of mobile phones using stingray devic-
hope that the Internet would be a one- gies restructure a state’s ability to pre- es without any judicial approval and, in
way pro-democracy force. Network in- scribe and assure the enforcement of New York City, the police program to
frastructure proved that it could be used law. Governments forfeit sovereignty record drivers through traffic cams and
to frustrate empowerment dreams. to networks when services like cloud smart city sensors also escapes judicial
Egypt, for example, pulled the plug on computing transcend borders and oversight. At the same time, technolog-
the Internet for several days during the enable organizations to choose rules ically enabled leaks and wide dissemi-
Arab Spring uprisings to block political in the blink of an eye. Network archi- nation of non-public activities of gov-
organizing; Brazil shut down WhatsApp tecture enables technology develop- ernment through sites like WikiLeaks
for 48 hours; local police in the U.S. used ers and service providers to embed may jeopardize legitimate functions
stealth Stingray technology to engage in rules for online activities through of government such as international
large-scale geo-surveillance of citizens. infrastructure choices. For example, relations and active law enforcement
And, at the same time, Twitter bots cloud service providers like Dropbox investigations. Snowden’s leaks, for
flooded social media in order to shut make determinations every day on example, are reported to have endan-
IMAGE BY ALICIA KUBISTA /A ND RIJ BORYS ASSOCIAT ES

down political dialog or to falsify sup- the security of users’ data. These en- gered the lives of British M16 agents in
port for candidates, while hate and bul- cryption decisions determine the very Russia and China.
lying flourish online. In short, the Inter- capability of states to examine user Laws lose their authority when gov-
net has embedded the means to block data in lawful investigations. ernments can no longer control the
political empowerment and discourse. Network infrastructure undermines use of power to enforce rules and hack-
the oversight and accountability of ers have control over weapons of mass
Undermining Democracy government. While open government disruption. Network infrastructure
In the intervening years since the early technologies enable greater transpar- removes the state’s monopoly on the
euphoria over the Internet’s political ency of public institutions, electronic use of coercive, police power to enforce
potential, the embedding of the In- tools also empower governments to rules and protect its citizens. Technol-

SE PT E MB E R 2 0 1 7 | VO L. 6 0 | N O. 9 | C OM M U N IC AT ION S OF T HE ACM 27
viewpoints

ogy allows lone-wolf actors unchecked for privacy have become more power-
by states to create and deploy weapons ful in people’s lives than rules from the
of mass disruption whether through Beyond undermining democratic constitutional framework.
malware, ransomware, or botnets. For key aspects of Business organizations are likely to
example, hospitals across the U.S. in serve as counterweights to govern-
the spring of 2016 faced a wave of ran- the rule of law, ment power. Google’s Transparency
somware attacks that left some in a the Internet Report, Apple’s defiance of an FBI re-
“state of emergency.” ISIS uses crowd quest for encryption keys, and Micro-
sourcing to sow terror in the U.S. and infrastructure has soft’s challenge to U.S. government
Europe. Simultaneously, the infrastruc- toppled critical access to foreign-based servers each
ture empowers private actors to engage reflect a check on the state’s intrusive-
in vigilante actions. The underground substantive legal ness. And, individuals like Snowden
group, Anonymous, recently illustrat- pillars of democracy. may serve as counterweights to states
ed such actions when they threatened and businesses. Individuals and as-
an electronic attack against ISIS fol- sociations of individuals have direct
lowing the Paris massacres in Novem- authority when they coalesce with on-
ber 2016. In essence, individuals and line tools ranging from social media to
associations now have tools—outside hacktivism as they perceive the need
the ability of state control—to enforce to interject and amplify their end goals
their choices and rules online in ways online. All while national government
that are independent of the state. To rapid and widespread dissemination provides checks on overreaching pri-
be sure when a Texas college discov- of harmful content, while wrongdo- vate actors. Where each actor from a
ered in 2015 that Facebook provided ers can shield their activities from ac- state to an individual can assure mass
better real-time information for an on- countability through encryption and disruption online, fair governance will
campus police emergency than 911, it anonymity tools. At the same time, free- require co-existence among the rule-
becomes clear the state has even lost dom of expression limits the authority making actors.
control over basic information it needs of states to ban nefarious online con- At the core, the assurance of public
to protect its citizens. tent. In the U.S., for example, there is accountability online is the key objec-
Beyond undermining key aspects of no public recourse for the rapid growth tive of Digitocracy. The mechanisms
the rule of law, the Internet’s infrastruc- of anti-Semitic Twitter accounts. Users for states, private actors and citizens
ture has toppled critical, substantive must appeal to the social media firms to co-exist as rule-makers in the net-
legal pillars of democracy. Freedom of who, in turn, then decide what to sup- worked society are likely to be defined
thought and association as well as pub- press or censor. By contrast, in Europe, in unexpected ways incorporating no-
lic safety are essential elements of de- platforms bear more legal responsibil- tions of federalism, multistakeholder
mocracy and privacy is a prerequisite. ity for content, but firms are often left governance, and subsidiarity. These
Yet, the network infrastructure con- in the same position as an all-powerful tools will draw the boundaries of rule-
tradicts the basic tenents of freedom censor. In effect, government is un- making authority among the state ac-
of association and privacy. Network able to suppress the vile and corrosive tors, platform operators, corporate orga-
functionality works thanks to ubiqui- online material that threatens citizens nizations, and empowered users. Each
tous data surveillance. The resulting without resorting to oppressive, anti- actor, whether state or non-state, has an
transparency of citizens to those in the democratic controls. important role to prevent overreaching
network undermine both state and citi- by the other actors. In essence, Digitoc-
zen’s respect for the rule of law. States The Opportunity of Digitocracy racy constructs a more multifaceted
lose important checks and balances The information society lacks a model set of interwoven checks and balances
against omnipotent acquisition of in- of governance suited to the digital age. to establish limits on the powers of
formation and citizen’s freedom of Going forward, the digital age will need both state and non-state actors and a
thought and association are undercut. a new system of checks and balances reliance on both to protect the public
Counterintuitively, public safety and for its political decision making—a good. For our future, now is the time
security are also destabilized by the “Digitocracy”—offering the opportuni- to begin the robust public discussion
transparency when stalkers, social en- ty to develop new governing principles on our means of governance in the
gineering hackers, and cyberwarriors that articulate who regulates what to digital age.
find the informational keys to success preserve public accountability online.
readily accessible online. Our challenge is how to construct Joel R. Reidenberg (jreidenberg@law.fordham.edu) is the
Stanley D. and Nikki Waxberg Chair and Professor of Law,
Freedom of expression is another the appropriate checks and balances. Fordham University, Director, Fordham Center on Law and
cornerstone of democracy. Yet, de- Digitocracy’s dynamic will be much Information Policy, and Visiting Research Affiliate, Center
for Information Technology Policy, Princeton University.
mocracies have a capability problem more complex than the analog world.
dealing with socially destructive con- Online private rule making like Twit- The author is preparing a book on this topic to be
tent like hate, threats, and cyberbul- ter’s decisions regarding censorship, published by Yale University Press.
lying that jeopardize public order and Adobe’s technical protections on digi-
individual safety. Technology allows tal content, and Facebook’s settings Copyright held by author.

28 COMMUNICATIO NS O F TH E ACM | S EPTEM BER 201 7 | VO L . 60 | N O. 9

You might also like