Artificial Intelligence & American Copyright Law: Analyzing the Copyright Office’s AI Report

Copyright Office’s AI Report: The Good, The Bad, and The Controversial

The Copyright Office just dropped Part 3 of its AI report, which aimed at addressing certain copyright law in regards to Artificial Intelligence. The thing that’s got everyone talking is the fact that the report was supposed to tackle infringement issues head on, but instead teased us by saying that answer will come up in “Part 4” that is expected to be released at a later date. Let’s dive into what was actually discussed.

Legal Theory: A Case by Case Basis

The report’s central thesis is a pretty straightforward legal theory. Basically, they recommend that there will be no blanket rule on whether training AI on copyrighted content constitutes infringement or fair use. Everything gets the case by case treatment, which is both realistic and frustrating depending on where you sit. That’s because most lawyers like clear bright line rules backed up by years of precedent, but when attempting to make legal frameworks regarding emerging technologies, the brightline approach is easier said than done.

The report acknowledges that scraping content for training data is different from generating outputs, and those are different from outputs that get used commercially. Each stage implicates different exclusive rights, and each deserves separate analysis. So in essence, what’s  actually useful here is the recognition that AI development involves multiple stages, each with its’ unique copyright implications.

This multi stage approach makes sense, but it also means more complexity for everyone involved. Tech companies can’t just assume that fair use covers everything they’re doing and content creators can’t assume it covers nothing. The devil is in the details.

Transformative Use Gets Complicated

The report reaffirms that various uses of copyrighted works in AI training are “likely to be transformative,” but then immediately complicates things by noting that transformative doesn’t automatically mean fair. The fairness analysis depends on what works were used, where they came from, what purpose they served, and what controls exist on outputs.

This nuanced approach is probably correct legally, but it’s also a nightmare for anyone trying to build AI systems at scale. You can’t just slap a “transformative use” label on everything and call it a day. The source of the material matters, and whether the content was pirated or legally obtained can factor into the analysis. So clearly purpose also matters since commercial use and research use will likely yield different results in the copyright realm. Control and mitigation matter in this context because developing the necessary guardrails is paramount to preventing direct copying or market substitution.

Nothing too revolutionary here, but the emphasis on these factors signals that the Copyright Office is taking a more sophisticated approach than some of the more simplistic takes we’ve seen from various opinions on this matter. This should be reassuring since a one size fits all approach at such an early stage of developing AI could stifle innovation. However if things are left to be too uncontrolled copyrighted works may face infringements to their copyright.

The Fourth Factor Controversy

Here’s where things get interesting and controversial. The report takes an expansive view of the fourth fair use factor: which is the effect on the potential market for the copyrighted work. That is because too many copyrighted works flooding the market brings fears of market dilution, lost licensing opportunities, and broader economic impacts.

The Office’s position is that the statute covers any “effect” on the potential market, which is broad interpretation. But that broad interpretation has a reason, they are worried about the “speed and scale” at which AI systems can generate content, creating what they see as a “serious risk of diluting markets” for similar works. Imagine an artist creates a new masterpiece only to get it copied by an AI model which makes the piece easily recreatble by anyone, diluting the value of the original masterpiece. These types of things are happening on the market today.

This gets particularly thorny when it comes to style. The report acknowledges that copyright doesn’t protect style per se, but then argues that AI models generating “material stylistically similar to works in their training data” could still cause market harm. That’s a fascinating tension, you can’t copyright a style but you might be able to claim market harm from AI systems that replicate it too effectively. It is going to be interesting to see how a court applies these rules in the coming future.

This interpretation could be a game-changer, and not necessarily in a good way for AI developers. If every stylistic similarity becomes a potential market harm argument, the fair use analysis becomes much more restrictive than many in the tech industry have been assuming.

The Guardrails

One of the more practical takeaways from the report is its emphasis on “guardrails” as a way to reduce infringement risk. The message is clear: if you’re building AI systems, you better have robust controls in place to prevent direct copying, attribution failures, and market substitution.

This is where the rubber meets the road for AI companies. Technical safeguards, content filtering, attribution systems, and output controls aren’t just up to the discretion of the engineers anymore they’re becoming essential elements of any defensible fair use argument.

The report doesn’t specify exactly what guardrails are sufficient, which leaves everyone guessing. But the implication is clear: the more you can show you’re taking steps to prevent harmful outputs, the stronger your fair use position becomes. So theoretically if a model has enough guardrails they may be able to mitigate their damages if the model happens to accidently output copyrighted works.

RAG Gets Attention

The report also dives into Retrieval Augmented Generation (RAG), which is significant because RAG systems work differently from traditional training approaches. Instead of baking copyrighted content into model weights, RAG systems retrieve and reference content dynamically.

This creates different copyright implications: potentially more like traditional quotation and citation than wholesale copying. But it also creates new challenges around attribution, licensing, and fair use analysis. The report doesn’t resolve these issues, but it signals that the Copyright Office is paying attention to the technical details that matter.

Licensing

The report endorses voluntary licensing and extended collective licensing as potential solutions, while rejecting compulsory licensing schemes or new legislation “for now.” This is probably the most politically palatable position, but it doesn’t solve the practical problems.

Voluntary licensing sounds great in theory, but the transaction costs are enormous when you’re dealing with millions of works from thousands of rights holders. Extended collective licensing might work for some use cases, but it requires coordination that doesn’t currently exist in most creative industries.

The “for now” qualifier is doing a lot of work here. It suggests that if voluntary solutions don’t emerge, more aggressive interventions might be on the table later.

The Real Stakes

What makes this report particularly significant isn’t just what it says, but what it signals about the broader policy direction. The Copyright Office is clearly trying to thread the needle between protecting creators and enabling innovation, but the emphasis on expansive market harm analysis tilts toward the protection side.

For AI companies, this report is a warning shot. The days of assuming that everything falls under fair use are over. The need for licensing, guardrails, and careful legal analysis is becoming unavoidable.

For content creators, it’s a mixed bag. The report takes their concerns seriously and provides some theoretical protection, but it doesn’t offer the clear-cut prohibitions that some have been seeking.

The real test will come in the courts, where these theoretical frameworks meet practical disputes. But this report will likely influence how those cases get decided, making it required reading for anyone in the AI space.

As we can see AI and copyright law is becoming only more and more complex. The simple answers that everyone wants don’t exist, and this report makes that abundantly clear. The question now is whether the industry can adapt to this new reality or whether we’re heading for a collision that nobody really wants.

An American Sovereign Wealth Fund: The Key to American Prosperity?

President Donald Trump has officially signed into law the creation of a U.S. sovereign wealth fund. This is one of the few of his controversial executive orders that have been signed that may have a bit of merit when it comes to addressing the affordability crisis the United States is facing.

A sovereign wealth fund is a government investment fund that pools and manages a nation’s revenues, often derived from natural resources, trade surpluses, or foreign exchange reserves, to generate long term wealth and stabilize the economy. Several economic powerhouses have a wealth fund: Norway,  Singapore, Saudi Arabia, and the United Arab Emirates (Dubai Fund) have used SWFs to diversify their economies, invest in global assets, and provide financial security for the youth. These funds have enabled these nations to achieve high levels of economic stability, global influence, & sustained growth, even during periods of global economic uncertainty, all while empowering their citizenry.

Trump signing the Executive Order 2/3/2023

The fund with the most long term exposure and demonstrated long term practical excellence is Singapore’s Central Provident Fund.

Singapore’s Central Provident Fund (CPF) offers a noteworthy model for the US. In the 1960s, Singapore faced significant economic challenges that necessitated comprehensive reforms. When Singapore became independent the nation faced significant economic challenges. Over 70% of households lived in overcrowded conditions, with a third residing in shanty towns on the city’s outskirts, and more than half of the population was illiterate. The situation was further exacerbated by a heavy influx of immigrants prior to Singapore’s expulsion from the Malaysian political union, leading to an unemployment rate of approximately 15-20%. (Asian Development Bank).

Fast forward 50 years, and Singapore’s transformation is remarkable. The literacy rate has soared to 97.65% as of 2021. The nation consistently ranks at the top globally in educational assessments for math, science, and reading. Unemployment has plummeted to around 2%, significantly lower than the global average of approximately 6%. Additionally, about 90.7% of Singaporeans are homeowners, a stark contrast to the United States, where the homeownership rate is at approximately 50%. This extraordinary progress can be largely attributed to the determination and hard work of Singapore’s populace,  as well as the Central Provident Fund. (Asian Development Bank).

The Central Provident Fund

Singapore’s exponential growth after establishment of CPF

Prime Minister Lee Kuan Yew recognized the potential of the existing Central Provident Fund (CPF), established in 1955 during British colonial rule, as a tool to address economic challenges. The Fund was originally designed as a compulsory savings scheme for retirement, the CPF required contributions from both employers and employees. Unlike traditional social security systems funded by taxes, the CPF allowed individuals to own and control their savings, providing flexibility in how funds were utilized. This structure enabled citizens to manage their accounts while also engaging with private banking institutions.

In 1968, the government expanded the CPF’s scope to include housing, permitting withdrawals for the purchase of government flats. This policy not only addressed housing shortages but also fostered social stability and economic growth. Over time, the CPF’s functions further extended to cover healthcare and education, ensuring that citizens’ basic needs were met and allowing them to focus on personal development and community engagement. These strategic expansions of the CPF were instrumental in transforming Singapore’s economy and enhancing the well-being of its population (Asian Development Bank, n.d.).

After the CPF expanded its focus to housing, enabling citizens to use their savings to purchase government built housing units the homeownership rate is now up to 90% in Singapore. For the U.S., a sovereign wealth fund could potentially support housing initiatives, allowing Americans to leverage tax advantaged savings for home purchases, thereby fostering ownership and equity building. (International Monetary Fund).

Beyond housing, the CPF encompasses healthcare and education, allowing citizens to allocate savings toward medical insurance and lifelong learning. This approach reduces financial burdens and enhances productivity by alleviating concerns over essential services. A U.S. sovereign wealth fund could adopt similar strategies, offering dedicated accounts for healthcare and education expenses, possibly with employer matched contributions to accelerate wealth accumulation. (International Monetary Fund).

Implementing such a system in the U.S. presents significant challenges and hurdles . Political resistance to state managed savings programs and the complexities of federalism could impede adoption. Additionally, effective management is crucial to prevent issues like corruption or market volatility. Nevertheless, the potential benefits such as; reduced wealth inequality, increased productivity, and a buffer against economic downturns- are alluring. (PricewaterhouseCoopers).

While the executive order establishing a U.S. sovereign wealth fund is still in its early stages, Singapore’s CPF demonstrates that integrating state oversight with individual agency can transform citizens into stakeholders. For modern Americans burdened by housing costs, medical debt, and student loans, a similar fund could offer substantial relief and innovate on America’s financial institutions in a positive way.

Richard E. Carroll explores the potential for sovereign wealth funds at both the state and federal levels in the United States as a solution to financial challenges. At the state level, 20 U.S. states have established SWFs to manage natural resource revenues and benefit their citizens. For example the Alaska Permanent Fund, established in 1976, is the most well known, currently valued at over $5 billion. Many Alaskans get dividends from this fund, giving them expendable income for education or subsistence needs. New Mexico has done something similar, reducing the tax burden of the average citizen by about $1,000. I for one am a firm advocate for a SWF.

The Fund could be used to invest in infrastructure projects, such as roads, bridges, renewable energy, and broadband, creating jobs and stimulating economic growth. However, generally Americans are skeptical of government run programs, particularly those involving personal savings and investments. Therefore, building public trust would be essential for the fund’s success, perhaps including an opt out for citizens would be beneficial, but after their decision to opt out they should not be eligible to receive any benefits from the program- which is within their right. However, if the fund is managed properly, a steady stream of income from the SWF, the federal government could reduce income, corporate, or sales taxes, which could in theory put money back into the pockets of citizens and businesses. In essence America would be paying you for contributing positively to the American economy.

Having outlined all of that, the key question is whether the U.S. can adapt this model at the Federal level complicated by its diverse landscape. Time will tell.

Sources:

______________________________________________

  • International Monetary Fund. (2020). Sovereign wealth funds and public savings: Lessons from global models.  

The Truth On The H-1B Visa Program: Myths vs. Reality & The Need For Reform.

There’s been a debate raging regarding an immigration program known as the H1b visa program. The H1b program is a program used to source specialized foreign workers into jobs that require specialized skills such as tech or engineering.  Two prominent individuals in the tech and political sphere spurred the debate. Republicans, Vivek Ramasway and Elon Musk, claimed the program was necessary because Americans were ‘too dumb and stupid’ to do the high level work America desperately needs to continue to be the haven of scientific research, innovation, and technical development. I suspect they thought this messaging would go down well with their MAGA base- it did not.  

Instead, countless Americans from backgrounds ranging from CEOs of tech companies, common workers, and Democrats challenged Vivek & Elon’s assertions that Americans were too stupid to work in tech and high skilled labor jobs.

This inspired people to dig into the H1b visa program since a lot of the visas issued are within the public domain. What was revealed was a long list of fraud, discriminatory hiring, and deceptive practices. For example, it was found that several big companies such as Google and Apple settled multi million dollar settlements acknowledging they discriminated against American workers by undercutting them to hire cheaper foreign nationals from countries they preferred, mainly India, a country known for poor working conditions and subservient workers who do not fight labor abuses. Furthermore, it seems over 70% of H1b visas have been allocated to India at a disproportionate rate in comparison to other nations.

Here, we dissect four common misconceptions about the H1B visa, providing a clearer picture of its impact and operation.

Misconception 1: H1B is Necessary Because Americans Are Dumb

This sweeping statement is not only offensive but also a gross oversimplification of the program’s purpose. People claim the H1B visa aims to address specific skill shortages in fields like STEM, where there might be a lack of local talent or where companies need highly specialized skills. But that is not the case, the narrative of a skill shortage is often a facade for wage suppression, rather than an actual need for foreign talent due to intellectual inadequacy of Americans.

Numerous reports from the Economic Policy Institute highlight that the labor market’s dynamics are more complex, involving wage competition rather than a lack of skilled U.S. workers. The truth to the matter is that it is not about intelligence and more about under cutting American workers to hirer cheaper labor abroad. Simply put companies might find it more cost effective or convenient to employ foreign nationals rather than investing in domestic training or offering competitive wages to American workers.

American universities consistently produce graduates in STEM fields who are highly skilled, thanks to top tier education and research opportunities. Moreover, the U.S. has a rich ecosystem of tech education beyond traditional universities, including coding bootcamps, online learning platforms, and community colleges, which are turning out a steady stream of tech professionals equipped with the latest skills. The adaptability of the American workforce is a key factor; many professionals from diverse backgrounds are successfully transitioning into tech roles through reskilling and upskilling programs. The tech industry’s expansion across the U.S., not just in Silicon Valley, further supports the idea that domestic talent is abundant and capable. This diversity in tech roles, from software development to cybersecurity, means there’s a broad spectrum of jobs being filled by American workers. The issue, therefore, isn’t a shortage of American talent ready for tech jobs but rather ensuring that companies invest in this domestic workforce through competitive hiring practices, rather than automatically defaulting to hiring from abroad under the H1B visa program for cost efficiencies.

Misconception 2: H1B Gets the Best and Brightest

While the H1B visa does aim to attract highly skilled workers, the reality on the ground often differs from this ideal. Not every H1B visa holder is necessarily at the pinnacle of their profession. Research from UC Berkeley has shown that a substantial number of these workers are engaged in routine tasks rather than innovative or high level work, challenging the notion that the program solely brings in top tier talent. The Immigration Innovation Act of 2018 sought to refine this by prioritizing education and skills, but implementation has been inconsistent.

Research from UC Berkeley has shown that a substantial number of these workers are engaged in routine tasks rather than innovative or high level work, challenging the notion that the program solely brings in top tier talent. The Immigration Innovation Act of 2018 sought to refine this by prioritizing education and skills, but implementation has been inconsistent.

Further, Indian nationals and companies have been found engaging in widespread fraud, falsifying academic and work records, stealing from h1b salaries. Over the years, several high profile cases have come to light, highlighting a pattern of misuse and potential fraud. Companies like Infosys, TCS (Tata Consultancy Services), and Wipro, all Indian IT giants, have faced legal scrutiny for practices that include falsifying job roles, underpaying workers, and engaging in what’s colloquially known as the “bench and switch” scheme. This involves bringing workers into the country under the pretense of a specific job that does not exist, only to place them with another company or keep them on “bench” (unpaid or underpaid time) until a project becomes available.

One of the most significant cases involved Infosys, which in 2017 agreed to pay $34 million for allegedly misusing B1 visas instead of the more scrutinized H1B visas, thereby circumventing legal processes and wage regulations. Similarly, there have been instances where Indian consultancies were accused of submitting multiple applications for the same candidate to increase their chances in the H1B lottery, a practice that undermines the system’s integrity. This “gaming” of the lottery has been widely discussed on platforms like X, where users like @USTechWorkers have pointed out how these actions make the visa process a nightmare for genuine applicants.

Moreover, individual cases of fraud have been documented, such as the arrest of Ashish Sawhney in 2020, accused of a $21 million H1B visa fraud conspiracy by generating profits through fraudulent visa applications. Another case involved three Indian-origin men who pleaded guilty in 2024 to visa fraud, having operated a tech staffing firm that submitted fake job offers to secure H1B visas. These fraudulent activities not only exploit the visa system but also impact American workers by potentially displacing them with less expensive labor or filling positions with workers who might not meet the actual job requirements.

The broader implications include not just the legal ramifications for those involved but also a tarnished image of the H1B program, which was meant to benefit both the U.S. economy and the global talent pool.

Misconception 3: H1B Is A Fully Fair Practice with No Civil Rights Issues

There’s mounting evidence that the H1B visa could be part of a broader issue of workplace discrimination. Legal actions against companies like Cognizant, where a federal jury found discriminatory practices against non-Indian workers, illustrate this concern.

The U.S. Department of Labor and bodies like the EEOC are tasked with ensuring compliance with anti-discrimination laws, yet there are persistent allegations of preferential treatment for certain nationalities, particularly from India, in tech hiring. This raises significant civil rights questions about fairness and equality in employment opportunities.

The U.S. Department of Labor and the EEOC are tasked with ensuring compliance with anti-discrimination laws, yet there are persistent allegations and court dececiosn proving that preferential treatment for certain

nationalities, particularly from India, in tech hiring exists. This raises significant civil rights questions about fairness and equality in employment opportunities. The misuse of the H1B visa for cost-cutting rather than talent acquisition could lead to systemic discrimination against U.S. workers or workers from other nations, potentially violating civil rights by creating a workforce that does not reflect the diversity or merit of the broader talent pool.

Misconception 4: Indians Are Just Good at IT, Hence More H1B Visas

The dominance of Indian nationals in receiving H1B visas in the tech sector isn’t solely due to their aptitude in IT. Instead, it might reflect discriminatory practices by some firms. Indian IT consultancies have been accused of bias towards hiring from their own country, not just for cultural fit but also to leverage lower labor costs. This practice has led to lawsuits, with companies like Infosys and Wipro facing legal scrutiny for potentially discriminatory hiring practices.

While India has shown growth in its IT sector, its overall ranking in the World Competitiveness Yearbook by the Institute for Management Development (IMD) for IT infrastructure and digital competitiveness has not always placed India at the top. For instance, in the 2022 rankings, India was at 37th place, indicating it lags behind several countries in terms of overall IT competitiveness.  Reports from companies like NASSCOM have pointed out that only a fraction of engineering graduates are employable in industries needing high-level IT skills.

Despite India’s significant strides in adopting and developing technologies such as  machine learning, and blockchain, there’s a stark contrast in the skill readiness of its engineering workforce. Specifically, a report from TeamLease digital, an Indian research firm, indicates that only 2.5% of Indian engineers possess AI skills, and a mere 5.5% have basic programming capabilities. This statistic is alarming considering the technological ambitions of the nation and the USA’s receipt of their technical workers. The implications of this skills gap are profound. For India to maintain its competitive edge in the global tech landscape, it must not only invest in technology but also ensure that its workforce is equipped to leverage these advancements. For the USA we under utlizie the h1b program and undercut Americans who can actually do the job.

Big Tech and H1B Visas: A Closer Look

The involvement of big tech companies in H1B visa hiring practices adds another layer to this discussion. These tech giants are significant employers of H1B workers, with a notable number from India. Allegations of discriminatory hiring practices have surfaced, with lawsuits against companies like Google and Amazon for allegedly favoring foreign nationals, particularly from India, over U.S. workers. These companies have faced criticism for potentially sidelining American talent in favor of visa holders, which could be seen as an economic strategy to reduce labor costs. Despite diversity initiatives, the high reliance on

For example, Google, settled a lawsuit with the U.S. Department of Labor in 2018 for $11 million, accused of favoring H1B visa holders over American workers, indicating a systemic bias in hiring that might prioritize cost over local talent. Similarly, Amazon has faced allegations suggesting a preference for foreign workers through the H1B program, potentially at lower wages, though specific legal outcomes or settlements directly tied to these practices are less publicly documented. While not directly connected to H1B issues, Meta (formerly Facebook) has also been embroiled in allegations of broader discriminatory employment practices, which could indirectly influence perceptions of its visa hiring strategies.

The H1B visa program is not without its merits, offering a pathway for global talent to contribute to American innovation. Further Indian nationals have worked hard and contributed to the American economy in tremendous ways. However, it’s crucial to dispel myths with facts, understand the nuances of discrimination claims, and ensure that the program benefits both the economy and all workers fairly. The ongoing discussions and legal battles are essential in shaping a visa system that truly reflects the values of merit, diversity, and justice.

Overall one thing is certain: H1b reform is necessary if America wants to continue to prosper in the future.


Sources

  1. Economic Policy Institute Reports on Labor Market Dynamics
    • Economic Policy Institute. “H-1B Visa Program: Frequently Asked Questions.” epi.org.
  2. UC Berkeley Research on H-1B Visa
    • Mithas, Sunil, et al. “Skill Requirements in the H-1B Visa Program: Evidence from Job Postings.” UC Berkeley Research Papers, berkeley.edu.
  3. Infosys Legal Case
    • U.S. Department of Justice. “Infosys Agrees to Pay $34 Million to Settle Allegations of Visa Fraud and Abuse.” DOJ Press Release, 2017. justice.gov.
  4. Tata Consultancy Services (TCS) and Discrimination Allegations
    • Gupta, P. “Discrimination Allegations Against TCS.” Legal News, law360.com.
  5. Cognizant Discrimination Case
    • U.S. Equal Employment Opportunity Commission. “Cognizant Discrimination Verdict.” EEOC Case Files, eeoc.gov.
  6. Infosys and Other Companies’ Practices
    • National Association of Software and Service Companies (NASSCOM). “IT Practices and Worker Dynamics.” NASSCOM Reports, nasscom.in.
  7. Bench and Switch Schemes
    • Choudhury, Prithwiraj. “Gaming the H-1B Visa Lottery.” Research Papers, Harvard Business School. hbs.edu.
  8. TeamLease Digital Report on Indian Engineers
    • TeamLease Digital. “State of India’s Engineering Talent: AI and Programming Readiness.” TeamLease Research, teamlease.com.
  9. World Competitiveness Yearbook Rankings
    • Institute for Management Development. “World Competitiveness Yearbook: IT Infrastructure Rankings.” imd.org.
  10. Google Discrimination Settlement
    • U.S. Department of Labor. “Google Settles Allegations of Discrimination with $11 Million Fine.” DOL Press Release, 2018. dol.gov.
  11. Meta/Facebook Broader Employment Discrimination Issues
    • Lev-Ram, Michal. “Facebook Pays $14 Million to Settle Discrimination Allegations.” Fortune, 2021. fortune.com.
  12. Fraud Cases Involving H-1B Visa Holders
    • U.S. Immigration and Customs Enforcement. “Ashish Sawhney Arrested for H-1B Visa Fraud.” ICE Press Release, 2020. ice.gov.
  13. U.S. Tech Workers Advocacy
    • U.S. Tech Workers. “Investigations Into H-1B Fraud and Discrimination.” ustechworkers.com.
  14. Immigration Innovation Act of 2018
    • U.S. Congress. “Immigration Innovation Act (I-Squared).” Congressional Research Service Reports. congress.gov.
  15. Reports on Wage Competition and Visa Abuse
    • Hira, Ron. “The H-1B Program: Changes Needed to Better Protect U.S. and Foreign Workers.” Testimony Before the Senate Judiciary Committee, 2019. judiciary.senate.gov.
  16. National Foundation for American Policy
    • Anderson, Stuart. “H-1B Visas and America’s Global Competitiveness.” NFAP Policy Briefs. nfap.com.
  17. NASSCOM Reports on Employability
    • National Association of Software and Service Companies. “Analysis of STEM Education and Employability.” nasscom.in.
  18. EEOC and Labor Law Compliance
    • Equal Employment Opportunity Commission. “Discrimination Issues and Foreign Labor.” EEOC Reports. eeoc.gov.
  19. Indian IT Industry and Competitiveness

Robert Moses: The Unelected Master Planner

Robert Moses is a figure that’s relatively obscure to the general public. However his influence has had a lasting impact throughout the United States. He would be paramount in engineering how cities in the States were structured, effectively influencing how and where Americans would spend their money.

Who was Robert Moses? Well, to start, he was unelected public official who held about 12 positions in the Greater New York city area. His stints in public office span from 1924-66. The positions he held had tremendous influence over urban planning. Urban planners aren’t often thought of as being political behemoths but Robert Moses’s tenure in these positions forces us to reconsider the influence unelected politicians may have over society.

Mr. Moses was a relentless, effective, and a calculated worker. His ability to start and finish public projects is arguably unmatched within the scope of American history. Furthermore, his ability to manipulate power goes far beyond the scope of anything Machiavelli could have imagined within a democratic republic. Robert Moses wasn’t fully understood or recognized outside of New York until the publication of Rob Caro’s Pulitzer winning book The Power Broker. The book gives us a grandiose look into the Moses. Robert Caro spent years researching for his book which spans roughly 1,300 pages. His scholarship, alongside with years of historical developments since the initial publication, are what guide my analysis on Robert Moses. Through our investigation of Robert Moses we will come to understand how a lot of cities in the United States mirror each other in terms of structure and societal development. And, albeit indirectly, an analysis of Moses forces us to consider a few philosophical questions when it comes to ideal local governance in the United States. But before we attempt to get understand why these two inquires are relevant , we have to investigate the rise of Robert Moses.

 Robert Moses assent spanned various societal backgrounds. His tenure in public office spans three major historical events in the United States. Moses held positions during the economic boom of the 1920s, a crippling Depression in the 1930’s, World War II, and the subsequent post war economic boom.

The 1920’s: The Rise to Power

After finishing up his PhD at Columbia University, Moses decides to enter New York politics as a political idealist motivated to make change. A story familiar to many young professionals who aim to change the “old guard” within political systems. Moses had plenty of issues he wanted to grapple over. The society he was living in was corrupt, had little to no consumer protection, and certain industries were dominated by monopolies. He briefly worked for the Bureau of Municipal Research and with the U.S. Food Commission. But soon he realized that philosophical theories and logic, no matter how beneficial, wouldn’t take you far when it came to political advancement. His initial propositions were brushed under the rug by the seasoned veterans of government. Though his theoretical understanding of politics would come in handy from time to time, his practical education of political power would be where he was able to hone the craft of political power.

After a series of fortunate events  Moses found himself appointed as the chief of staff to a woman named Belle Moskowitz. She was the leader of a commission tasked with organizing New Yorks administrative structure. A responsibility which came with significant power. It’s worthy to note Belle Moskowitz wasn’t elected by anyone. Rather, Moskowitz was appointed by Alfred Smith the Governor of New York. Smith was of course elected. I include these details not to be redundantly informative but rather to highlight the opaque nature of local government when it comes to transparency. People who you may assume are in control are passing that responsibility to an “advisor”, meaning there are various puppeteers pulling the strings. Moses’s time with Moskowitz is where he would learn the “tricks of the trade” in terms local governance. After managing to impress Alfred Smith through the early 1920’s, Moses found himself appointed to his first positions of power. The appointments would lead him to a notorious political squabble with an eventual US president, Mr. Franklin Delano Roosevelt.

The Appointed One & The Fight with Roosevelt.

In 1924 Moses was appointed as the leader of both the Long Island State Park Commission and State Council of Parks. Moses actually drafted the legislation that created the power of these commission earlier in his career. Personally, when I read the names of these positions I didn’t immediately think POWER.  But let’s remember that Moses was calculated.  He strategically used the power that he did have to gain even more power. Being head of these political bodies allowed him unprecedented control over land-use and highway construction. Behind the scenes he usurped control over certain political entities from elected officials. Moses would lobby constituents, politicians, and special interest groups into allowing him to have independent control over land-use and highway development commissions. Overtime he began to resemble a mini dictator. However, his power wouldn’t go unchallenged.

LC645-600Border
Young Roosevelt.

Franklin Roosevelt, at the time leader of the Taconic State Parkway Commission, had a political spat with Moses. It all started when Roosevelt had a plan to build a parkway through a region of New York City called the Hudson Valley. Moses had different plans. He managed to funnel all the funds from Roosevelt’s project to his own project. Moses was able to keep the funding to Roosevelt’s project so low that it could barely even maintain operations. Roosevelt complained to the governor that Moses was “skinning” Smith’s administration alive. But nothing happened. Eventually, Roosevelt became governor and eventually his parkway project was completed. Roosevelt had another goal in mind, and that was to remove Moses from power. But the removal of Moses was almost impossible by the time Roosevelt became governor. Robert Moses had set up a powerful base of political independence by using legislation, public funding, the press, and young political reformers to support his positions. He would later spearhead a commission which aimed to consolidate 187 separate agencies into eighteen departments. In just 10 year’s Moses was able to absorb power from potential opponents and build a powerful network to get his projects done. But this was just the start there was much more to come from Robert Moses.

The Depression & Beyond

During the 1930’s the United States suffered an economic depression. During this economic catastrophe Robert Moses would blossom. Ironically, his former rival actually enabled this via New Deal legislation lead by President Roosevelt. Moses was granted even more executive and monetary incentive to solidify his power by the Federal Government. Roosevelt, not forgetting his political tenure in New York, attempted to get Moses ousted by making federal funds available only if Moses was removed from office. Moses wasn’t threatened. He told the press of Roosevelts demands. Subsequently, the Federal Government had to stop after increasing public pressure. But as World War II was being waged, Robert Moses’s influence on New York City began to take shape.  The Master Builder started to work on his vision. One unnamed federal official commented on Moses during this era saying:

“Because Robert Moses was so far ahead of anyone else in the country, he had greater influence on urban renewal in the United States – on how the program developed and on how it was received by the public – than any other single person.”

That quote gives us an insight on the magnitude of power Moses had. He was responsible for many projects ranging from the United Nations Headquarters, Shea Stadium, and the Pratt Institute. But he also led initiatives to spur more highway developments, suburban housing developments, strip malls, and other public amenities. Moses got even better at getting projects done. A common strategy involved starting projects knowing that financially they couldn’t be accomplished , but he would leverage political clout in order to manipulate political officials to complete his projects anyway. While in the depression his projects employed a largely jobless populous during the Great Depression. During this era, he held numerous public positions at the same time. None of the positions required him to be publicly elected.

WWII & The New America

The world dramatically changed after World War II. The United States emerged as an economic and political powerhouse within the International community.  Moses understood this and he wanted to further influence the new world around him. His goal for NYC was one that attempted to integrate an urban center to suburban areas which would all be interconnected via parkways. The bureaucrat’s vision would influence America for the years to come.

After World War II America’s social community began to change. Women entered the work force in droves, the nation was in better economic shape than a lot of nations in the world, and the ideal of “Americanness” began to solidify. What do I mean by Americanness? I mean white picket fences, increased home & automobile ownership, and the development of mass consumerism. After WWII plenty of soldiers came home to start anew. They were incentivized to start “nuclear” families, to buy homes, develop their market skills, and most importantly to spend money in order to expand the American economy. Robert Moses was fully aware of this societal shift. He saw the traditional layout of American cities as archaic and counter intuitive to the world’s economic demands. Small retail owners were dismissed in favor of shopping behemoths

download (1)
Robert Moses and NYC Mayor Jimmy Walker.

such as Macy’s, Sears, and the advent of the shopping mall. Local restaurants were forgotten as Dairy Queen and McDonalds slowly became staples in the American diet. Automobiles slowly eliminated the reliance on public transport, allowing people to buy suburban properties further away from NYC.  Moses preferred a sprawl model over concentrated urban communities. And he developed plenty of projects to incentivize the sprawl model. New Yorkers, such as Robert Caro, criticize Moses for destroying New York neighborhoods in favor of vast highways that connected the suburbs to the City. When developing these projects Moses displaced hundreds of thousands of people, destroyed economic centers, and arguably community identity. This led critics to surmise that Moses perhaps preferred automobiles and shopping centers over people. Furthermore, Moses played a part in depleting New York’s resources to develop his projects.  But despite that, the Moses model was in demand in post war America. Plenty of public officials from around the country demanded Robert Moses’s expertise in developing their city plans. This may explain why many American cities, especially in the Midwest, mirror each other in a plethora of ways.

In hindsight Moses’s city planning was a perfect model for a globalized economy. It was predictable; generally people would work a similar hourly schedule, consistently consume products from publicly traded corporations, and, by driving, consumers would

download
Robert Moses

support the gas, oil, and automobile industry. This model has its merits. It’s predicable, safe, and allows people to consume their preferred products. However, a community too reliant on the Moses model is more susceptible to global economic crises. This isn’t just a theoretical proposition, practical examples are evident when we look at Detroit and Las Vegas during the 2008 financial crisis. But it’d be remiss to not mention how many new and innovative developments Moses was responsible for. He was able to engineer and execute massive urban plans that did help a considerable amount of people. But at the expense of displacing many people out of their communities. But one of the most disturbing things about Robert Moses is his ability to become an immensely influential political figure without having to get elected into political office.

Moses’s story forces us to think about the type of local (& perhaps national) governments people would prefer. Do we prefer governments that can be taken over by “Mosesesque” figures in order to get long term, and perhaps beneficial, projects done? Or do we want a system that is a bit more decentralized which doesn’t allow any one sole “political will” to dominate? Whatever you prefer, each has its positive and negative implication.

Which begs a peripheral question: How much do YOU know about the unelected officials in your local government? A question to consider.

Sources:

Power Broker by Robert Caro

ROBERT MOSES AND THE RISE OF NEW YORK THE POWER BROKER IN PERSPECTIVE by KENNETH T. JACKSON

A Consumer’s Republic: The Politics of Mass Consumption in Postwar America by Lizabeth Cohen

https://www.pbs.org/wnet/need-to-know/environment/the-legacy-of-robert-moses/16018/

http://fordhampoliticalreview.org/the-legacy-of-robert-moses/

America’s Forgotten Civil War: Colorado’s Coalfield War

     The first article of the new five part Forgotten American History series! The Forgotten American History series aims to introduce readers to the less commonly known aspects of American history. The first edition takes us to Colorado! Hope you enjoy. 

 

 

Colorado’s Coalfield War is one of the most violent yet obscure events in American history. Which is a bit puzzling since The Coalfield War has all the allure of the quintessential American story. It has divisiveness, the quest for the American dream, violence, and an underdog. The Coalfield War took place after a rapid economic boom in the United States. The early 20th century saw the development of notable business magnates. Some you are most likely familiar with such as Andrew Carnegie, John D. Rockefeller, and Henry Ford. During their time they were commonly referred to as ‘industrialist”. That’s mainly due to the economic supremacy they had on industries such as fossil fuel, manufacturing, and transportation. The business strategies commonly used by these magnates were monopolistic. Common techniques used to monopolize included unilateral corporate acquisitions, price controls, and wage suppression. However, a new social development would attempt to countervail the monopolistic tendencies of these business tycoons.  The development being worker’s unions.

Laborers in the early 20th century worked in abhorrent conditions. An unnamed worker who grew up in one of Pennsylvania’s mining communities provides an account on what life was like for a miner:

Our daily life is not a pleasant one. When we put on our oil soaked suit in the morning we can’t guess all the dangers which threaten our lives. We walk sometimes miles to the place- to the man way or traveling way, or to the mouth of the shaft on top of the slope. Add then we enter the darkened chambers of the mines. On our right and on our left we see the logs that keep up the top and support the sides which may crush us into shapeless masses, as they have done to many of our comrades. We get old quickly. Powder, smoke, after-damp, bad air- all combine to bring furrows to our faces and asthma to our lungs.”

Wages were often not paid in US dollars. Rather, workers were paid with metallic strips which were redeemable in company stores. A stark contrast to how modern wage payment is facilitated. Furthermore, workers often lived at their work sites. Worker’s would often build their own dwellings which ranged from tents to shacks. This led to the development of work specific settlements.  In addition, workers often lacked representation in terms of corporate boardrooms. However, workers unions began to spring up providing an opportunity for representation. Exploited laborers could finally voice their frustration en masse.

Colorado’s Coalfield War gives us a perfect opportunity to examine the early relationship between industrialists and workers unions. The stereotypical relationship is often framed idealistically. The cliché often goes like this; workers are in discontent due to their impoverished work situation.  They then begin to band together and organize. Managers are often against organizing but after some convincing they slowly join the workers’ cause. And in one harmonious swoop the workers walk over to administrative offices and demand that the industrialist improve conditions. The industrialist, understanding the gravity of the situation, then succumbs to their demands. And after both parties reach an agreement. But realistically it was never that straightforward.  Colorado’s Coalfield War will give us a realistic glimpse of how a lot of early labor disputes panned out in the United States.

The story of Colorado’s Coalfield War begins in the coal mines of southern Colorado during the 1910’s. Colorado’s coal industry at the time was booming. So much so that roughly 10 percent of the state’s population was employed by the coal sector. At the time coal was highly profitable due to the demand of America’s expanding railroad system which needed coal to fuel their engines. One of the nation’s richest people were involved

Apr20family-298x300
One of Colorado’s mining families that was living in a tent community

in the coal industry. For example, John D. Rockefeller Jr (heir to John D. Rockefeller) recognized an opportunity to capitalize and acquired ownership of the Colorado Fuel and Iron company (CFI).

Coal mining for the CFI was physically arduous and hazardous work. CFI’s coal miners were under a considerable amount of fatal risk compared to other American coal miners. Statistically, miners in Colorado were twice as likely to die on the job compared to their peers in other states. That’s not to say that the other states were a pleasant place work. But Colorado’s coal mines were considerably risky. The fear of explosion, suffocation and collapsing mines was the reality for many coal miners . Ironically, Colorado had some of the best mining laws in the country. But Colorado’s mining laws were rarely enforced. The United States House Committee on Mines once declared:

Colorado has good mining laws and such that ought to afford protection to the miners as to safety in the mine if they were enforced, yet in this State the percentage of fatalities is larger than any other, showing there is undoubtedly something wrong in reference to the management of its coal mines

Furthermore, mining labor in Colorado was egregiously exploited. Worker’s were paid for the tonnage of coal produced. However, their “dead work” (maintenance, supply runs, and infrastructure repairs) were unpaid.

By 1913, 10,000 of Colorado’s miners had enough with their work environment and decided to strike. The strikers attempted to unionize via the United Mine Workers of America. They demanded improved work conditions, better wages, strict enforcement of Colorado’s mining laws, and union recognition. The CFI responded by rejecting all of the union’s demands.

 

Ludlow_Death_Car
Baldwin- Felts employees with an armored car.

There were considerable measures taken to countervail unionization. The CFI employed strikebreakers to keep the company running. The company evicted strikers from their company homes forcing the striker to build tents for their families nearby. Under Rockefellers orders, the CFI hired Baldwin- Felts Detective Agency (a private detective agency) to harass the strikers.  The agency would shine spotlight on tents, fire live ammunition at strikers’ tents, and patrolled the tent communities with an armored vehicle that had a machine gun mounted unto it. Clearly these were terror tactics. The strikers were unphased. Strikers responded to the terror tactics by taking up arms and defending their tents. Eventually, the skirmishes were acknowledged by the governor of Colorado and he responded by sending the National Guard to the tent community in Ludlow. The strikers were under the impression that the National Guard was there to protect them. But several hundred strikers were arrested by them and often beat the strikers. The National Guard would add more fuel to the fire when they discovered that a strikebreaker had been murdered. The National Guard had been financed by the CFI to cover the expenses of deployment, so they had an implicit obligation to make sure the CFI’s interests were met. One day while the tent dwellers were at funerals commemorating two infants, the National Guard began to dismantle the tent community. However, the community members rebuilt the tents and they continued the strike, persevering through the winter. However, things would come to a boiling point on April of 1914.

The Ludlow Massacre

On April 20th 1914, two national guard posts were deployed on top of a hill, encircling the Ludlow tent community. They deployed an armed post with a machine gun overlooking the strikers. No one is exactly sure what instigated the violence. Some historical records suggest that the National Guard was demanding the release of a

Masses_1914_John_Sloan
The Masses cover art depicting the Ludlow Massacre

hostage, but the strikers refused to give the hostage up. One of the sides then opened fire (it’s unclear who fired the first shot). Nevertheless, a battle would ensue which lasted the whole day. The casualties included high ranking union members such as Louis Tikas. Innocent bystanders (mainly women and children) hid in their tents to avoid the gunfire. The strikers retreated. The National guard then went to the tents, doused them with kerosene, and set them on fire. One of the tents that were set on fire housed 11 children and 2 women. The women and children all died, they were either burned or suffocated to death. These casualties were deemed a massacre by several periodicals in Colorado. The news of the National Guard’s atrocities would then spread across the nation like wild fire.

   Height of The Coalfield War

In Denver, the United Mine Workers declared “A Call to Arms”. They suggested that all union members should gather all “arms and ammunition legally available.” . Subsequently an insurgency would take place in Colorado. Three hundred armed strikers marched from all over Colorado to the Ludlow area. When they made it, the insurgents cut telephone and telegraph wires. And they prepared for battle. The New York Times described the event as such:

“With the deadliest weapons of civilization in the hands of savage-mined men, there can be no telling to what lengths the war in Colorado will go unless it is quelled by force … The President should turn his attention from Mexico long enough to take stern measures in Colorado

Furthermore, in an act of solidarity railroad workers refused to transport National Guard soldiers from Trinidad to Ludlow via railway. Up north in Colorado Springs, union

CC-X-60543
Colorado National Guardsman at an Outpost in Southern Colorado.

miners walked off their jobs and set off to Trinidad. They carried revolvers, rifles, and shotguns. Support was even shown on the East Coast. In New York City, picketers marched in front of the Rockefeller office located on 26 Broadway, New York City. However, these demonstrations were quickly quashed by local law enforcement.

When all the miners met in southern Colorado violence naturally ensued. They attacked antiunion town officials, supervisors/guards, and strikebreakers. Sporadic violence was rampant in southern Colorado as the miners carried out targeted killings, the statistical figures on fatalities vary considerably. So, a precise number can’t be drawn on how many people died. The insurgents also damaged a considerable amount of mining infrastructure.  The Associated Press estimated the financial losses at $18 million (which is about $450,239,203 in 2019).  The CFI alone lost $1.6 million. They were also able to strategically take control of an area that was roughly 50 miles long and 5 miles wide. However, this control didn’t last long. President Woodrow Wilson dispatched federal troops to Colorado, and the miners subsequently surrendered.

         Aftermath

After the Coalfield Wars, Congress held hearings with John D. Rockefeller Jr, union leaders, and several high-ranking members of the National Guard. Though atrocities were recognized by both sides during the hearing, no one was ever formally indicted for their crimes. Unfortunately, a lot of the tangible benefits the strikers were fighting didn’t materialize.  But all wasn’t lost. Rockefeller, feeling political pressure, lead an initiative so workers could have internal representation in the CFI. A measure akin to modern internal corporate arbitration. He also created an internal company union. And encouraged internal social services such as creating a YMCA for the Mining department. During this era, the YMCA played a substantial role in influencing morality and promoting athletic activity within American communities. But it’s important to remember these measures are a far cry from what the original demands the UMWA fought for. It can be argued that these measures were a bit of strategic marketing from Rockefeller. Think about internal company unions will always have corporate interest in mind. So full workers representation isn’t fulfilled. But there is a silver lining, the UMWA gained 4,000 new  members.

In all the Coalfield War gives us an interesting look into the dynamic relationship between industrialists, the government, and workers. Namely, that when disenfranchised workers sought better work conditions that undermined corporate interests, considerable measures were taken to curtail workers goals. Measures which would disgusts modern American sentiments.  Hiring private companies to terrorize workers, bringing in government officials to suppress workers, and massacring innocent bystanders would likely surprise many American households in the 21st century. We also get a key insight on what happens when “the people” get pushed too far in terms of getting their grievances acknowledged. Violent civil disobedience.

 

I’ll leave readers with song lyrics about the Ludlow massacre by Woody Guthrie:

It was early springtime when the strike was on,

800px-Ludlow_Monument_Cropped
Ludlow Memorial

They drove us miners out of doors,

Out from the houses that the Company owned,

We moved into tents up at old Ludlow.

 

I was worried bad about my children,

Soldiers guarding the railroad bridge,

Every once in a while a bullet would fly,

Kick up gravel under my feet.

 

We were so afraid you would kill our children,

We dug us a cave that was seven foot deep,

Carried our young ones and pregnant women

Down inside the cave to sleep.

 

That very night your soldiers waited,

Until all us miners were asleep,

You snuck around our little tent town,

Soaked our tents with your kerosene

 

 

 

Works Cited:

https://coloradoencyclopedia.org/article/ludlow-massacre

https://www.zinnedproject.org/news/tdih/ludlow-massacre/

https://www.pbs.org/wgbh/americanexperience/features/rockefellers-ludlow/

https://upcolorado.com/university-press-of-colorado/item/download/301_0c3ef02f967b1fa4d978737d608bc159

The Ludlow Massacre: Class, Warfare, and Historical Memory in Southern Colorado by Mark Walker (Historical Archaeology Vol. 37, No. 3, Remembering Landscapes of Conflict (2003), pp. 66-80)

A Miner’s Story The Independent, LIV (June 12, 1902), 1407-10. (http://www.digitalhistory.uh.edu/voices/social_history/14miner.cfm)

Thales & Heraclitus: What Russell Got Wrong.

Bertrand Russell Chiefing A Pipe.

    Often Bertrand Russell is revered in the mainstream philosophical community. And rightly so, the work he’s done in the fields of logic, linguistics, and mathematics have had a profound impact on the world. His influence has led him to be credited as the founder of analytic philosophy. But people often forget that Russell was also interested in history, so much so that he penned a lengthy history of Western Philosophy, which he called A History of Western Philosophy. This article will discuss Bertrand Russell’s account of Heraclitus and Thales. Two philosophers who came before Plato and Aristotle. The reason such a discussion is necessary is due to the fact that Russell may not be giving an accurate portrayal of either philosopher in his book. The reason being is that Russel relies on problematic sources to back his claims. This piece will attempt to outline the thoughts Russell had on these thinkers, and then we will criticize certain elements of his arguments. But in order to conduct a proper analysis we must understand the overal goal of Russel book.

    In the History of Western Philosophy  Bertrand Russell attempts to provide a coherent timeline for western philosophical thought. He claims that in order to successfully attempt such a project a specific method of analysis must be used. A method which is “philosophical”. By “philosophical” Russell means that he’ll attempt to synthesize the historical development of two different styles of inquiry, those being scientific and theological traditions (Russell Xiii). Both have different functions, but yet throughout history they’ve reinforced one another in various ways. For Russel, theology is useful because it allows us to make “speculation on matters as to which definite knowledge has, so far, been unascertainable.”(Russell Xiii). In other words, theology allows human reason to explore the unknowable. Now on the other hand, science allows human reason to explore the knowable (Russell Xiv). According to Russell, both have limitations; theology induces dogmatic belief (which he disapproves of), while science tells us what we can in fact know but “what we can know is little” (Russell xiv). Having acknowledged their flaws, Russell proceeds to argue that the development of human intellectual history has been shaped by those two methods of inquiry interacting with one another over time. Theology picks up the methodological flaw inherent in science, and vice versa. It’s this symmetric relationship which allows Russell to put various thinkers in dialogue with one another. Giving readers a coherent narrative to follow in terms of the development of western philosophical thought. But Russell’s methods have drawn scrutiny amongst critics. Frederick Copleston, a contemporary of Russel, acknowledged that “[Russell] treatment of a number of important philosophers is both inadequate and misleading.”. The inadequacy and misleading nature of Russell’s work is evident in his description of two philosophers who came before Socrates, Thales and Heraclitus.  

 

Bertrand’s Thales

Image result for thales
Thales the “scientist”

    In order to understand and identify the “inadequate and misleading” elements of Russel’s work we must analyze his descriptions of certain philosophers. Some of the problematic elements of his descriptions can be found when he describes Thales, a thinker who was active in the 6th century BCE. To be frank, little is known about Thales specific work, as none of his writing survived. But despite that fact, society can get a general idea about Thales by reading some second hand accounts about his teachings.  Russell provides an introduction to Thales, writing: 

“There is…ample reason to feel respect for Thales, though perhaps rather as a man of science than as a philosopher in the modern sense of the word.” (Russell 24)

This sentence should warrant our attention because we can analyze and infer a few things from Russell’s statement. One, that Bertrand holds Thales in high regard compared to the other philosopher of that particular era. And secondly, we should hold a favorable opinion on him because compared to these philosophers Thales is a “man of science”. Why does Russell feel this way? Well, it all stems from a theory attributed to Thales which professes that everything is made of water. A problematic theory to credit onto Thales in the first place, but the reason for that will be addressed in a different section in this paper. Russell explains that Thales’s theory of water shouldn’t be taken as some “foolish” hypothesis but rather as a scientific hypothesis (Russell 26). 

Now the reason he feels like Thales warrants such high praise is due to some scientific discoveries made while he wrote his book. While Russell was writing his book in the 20th century, the scientific consensus seemed to match well with Thales water theory. The consensus was largely contingent on the fact that the theoretical work done by the scientist Willaim Prout on atoms was true. Prout hypothesized that the hydrogen atom was the only fundamental element of the universe. Furthermore, he said that the atoms of other elements were actually just collection of different hydrogen atoms (Rosenfeld). This is similar to Thales’s theory since hydrogen is a pretty important component when it comes to water, but is different since Prout specifies the element hydrogen.  So this background information helps explain why Russell felt so confident in Thales. And explains assertions such as this: 

The statement that everything is made of water is to be regarded as a scientific hypothesis… Twenty years ago, the received view was that everything is made of hydrogen, which is two thirds water…. His [Thales] science and his philosophy were both crude, but they were such as to stimulate both thought and observation.” (Russell 26)

Now the last part of that sentence describes how his science and philosophy were “crude” but are acceptable since they aimed to stimulate both thought and observation. So, one can infer that theoretical frameworks which stimulate thought and observation, are ones which Russell approves of. But Russell also lets readers know what kind of frameworks he doesn’t appreciate. That leads us to Russell’s description of Heraclitus. 

Bertrand’s Heraclitus

Related image
Heraclitus the “mystic”

    The way Heraclitus is portrayed in Russell’s book plays on the theme of science and theology interacting with each other overtime. Russell generally views Heraclitus in a negative light, but acknowledges the difficulty science has had in refuting Heraclitus’s theory of perpetual flux. Additionally, Heraclitus is strangely categorized as “mystical” rather than “scientific”. Russell describes the nature of Heraclitus thought as such: 

Heraclitus, though an Ionian, was not in the scientific tradition of the Milesians. He was a mystic, but of a peculiar kind. He regarded fire as the fundamental substance, everything… is born by the death of something else “ (Russell 41)

Russell doesn’t give us a clear reason why Heraclitus shouldn’t be considered scientific, but we can imply that it’s due to his heavy reliance on intuition and speculation. Heraclitus brand of mysticism is categorized as reforming the religion of his day (Russell 42). Additionally, elements of Heraclitus doctrine are criticized by Russell. Specifically he attacks Heraclitus views on war, contempt for mankind, and his disapproval of democracy. 

Now having outlined what Russell says about these thinkers. It’s time to shift focus on what Russell may have gotten wrong when discussing these philosophers.  For instance we can use the reasoning Bertrand used to praise Thales to talk about Heraclitus as a “scientific thinker”. Additionally, we can also conceive as Thales as a “mystic”. Furthermore, we can learn to understand how Russell came to these conceptions when investigating the sources he decided to use. 

 

Analysis of Russell’s claims 

  Our criticism of Russell should begin with looking at what kind of information Russell based his critiques on. He’s pretty transparent in letting the readers know where he got his information from, writing: 

“According to Aristotle, he thought that water is the original substance out of which all others are formed; and he maintained that the earth rests on water”(Russell 26)

But there’s an issue with Russell’s apparent transparency. In the next paragraph he goes on to take Aristotle’s account as pure fact, and basis his entire scientific description of Thales on it. Never once does the problematic nature of Aristotle’s account of Thales get mentioned. But thankfully, recent scholarship done by Frede tells us why Aristotle’s writings on Thales aren’t to be taken as absolute fact. Frede explains that:

it is not Aristotle’s aim to provide an account of his origin of philosophy and its evolution for its own sake, to satisfy his and his readers own historical interests “(Frede 503)

Basically, Frede notes that Aristotle wasn’t entirely fair when it came down to providing accurate descriptions of certain thinkers, but rather was using their doctrines to validate his work (Frede). Now having considered that fact Thales can be seen as a mystic because not a lot of his doctrine was written down, and getting an accurate description of his work is difficult. But the school of thought he was a part of (the Milesian school) had mystical tendencies that Bertrand speaks of.  Additionally, Aryeh Finkelberg notes that: 

“Heraclitus, and other early Greek thinkers, did not set out to found philosophy and science, or pave the way for Aristotle—who has long been criticized “for reading his philosophical concerns into the early thinkers (Finkelberg, Heraclitus and Thales’ Conceptual Scheme). “So the method Bertrand uses to put them in dialogue together is problematic since none of these thinkers thought of themselves as either scientists, philosophers or mystics.

    Now having mentioned the problematic nature of the sources, I will provide  sources which allow us to think of Thales as a “mystic” and Heraclitus as a “scientist”. To begin I will refer to a source used by Russell himself- Aristotle. As noted previously Russell relies on Aristotle’s account of Thales to prove that the thinker was indeed scientific. But he conveniently leaves out an account that could hint at him being less “scientific”. In Aristotle’s work On the Soul  Thales is framed as a thinker who’s influenced by “mysticism” and attempts to explain the world via religious terms.  The account goes as such: 

“Thales too (as far as we can judge from people’s memoirs) apparently took the soul to be a principle of movement…Some say that the universe is shot through with soul, which is perhaps why Thales too though that all things were full of Gods”( Aristotle, On the Soul 405a)

There’s a lot to unpack from this phrase. Firstly, Aristotle is relying on testimonials from various people to get Thales’s account on souls. So we can infer that Thales Soul/Movement Theory was one that was known and discussed among contemporaries that were familiar with Thales. Secondly, we can see that Thales theory is based on metaphysical concepts (soul), and that these concepts have at least some effect on our material world (movement). And lastly, we can surmise that Thales’s world view largely consists of things having Gods within them. Arguably, this is a pretty “mystical” way to perceive reality. But from this phrase it’s unclear if Gods and Soul are in the same realm in terms of metaphysics. From the quote, soul is something metaphysical since it’s “principal of movement” and not movement itself. But Gods can be seen as both physical and metaphysical, since the universe being “shot with Soul” would have impact if whether things were filled with Gods or not. But it’s unclear from this reading if Gods are physical, metaphysical, or both. What we can clearly analyze is that Thales does have some mystical element in his analysis. Rendering Russell’s description as inadequate and a bit misleading. 

    Furthermore, Thales theory of water as the fundamental source of everything isn’t necessarily true. He may have never postulated that. Aristotle explains that he did indeed say that water is the fundamental source, but he also claims that he may not have seen it that way after all. Explaining that the earth and water could be reinforcing each other as elements ( Aristotle,On the Heavens, 292-294b). Thales could’ve easily believed that there didn’t need to be one principal element that’s responsible for everything. For all we know Thales could’ve theorized that several elements contributed to the forces of the world. But because Aristotle is using Thales to justify his own theories, conceptualizing him as a philosopher who believes that one fundamental source is responsible for everything is necessary in order to legitimize Aristotle’s views . 

    Let’s transition over to Heraclitus, aka the “mystical” thinker. Firstly, I’d like to mention that Russell dismissal of the claim that “everything is fire” and approval of “everything is water” is absurd. The way he justifies his reasoning, though understandable, is equally as silly. He uses Prout’s work on atoms to back up that claim but you could do the same for Heraclitus. After all everything in the universe emits heat, and if we understand fire to mean “element that emits heat”, then (considering 21st century physics) Heraclitus theory shouldn’t be taken as foolish either. Further, he can been seen as scientific due to observations such as these: 

Sea: water most pure and most tainted, drinkable and wholesome for fish, but undrinkable and poisonous for people”( Hippolytus, Refutation of All Heresies,)

&

Corpses should be disposed of more readily than dung” (Strabo, Geography).

The first quote is an empirical observation on how one element can nourish one animal but yet be dangerous to another. While the second can be interpreted as a public service announcement that corpses are as unsanitary as dung. Though not completely “scientific” in our modern use of the term, these statements are observations on the general nature of the world, and are valid. Thales allegedly made similar observations but Russell holds him in higher esteem compared to Heraclitus. 

    In all we can see that Bertrand Russell’s claims in the  History of Western Philosophy are problematic. Mainly because the notion that these thinkers were either scientific or mystical are inaccurate conceptions in the first place,since the thinkers didn’t even see themselves as such. And since we can conceptualize each thinker as both a “mystic” and “scientist” Russel’s analysis is misleading. Furthermore, the evidence used by Russell isn’t the best since the source itself, Aristotle, is biased.

 

 

 

 

Source(s):

Frede, Michael. “Aristotle’s Account of the Origins of Philosophy – Oxford Handbooks.” Oxford Handbooks – Scholarly Research Reviews, 27 Apr. 2018, http://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780195146875.001.0001/oxfordhb-9780195146875-e-20.

“Heraclitus and Thales’ Conceptual Scheme.” Heraclitus and Thales’ Conceptual Scheme | Reading Religion, 31 May 2017, readingreligion.org/books/heraclitus-and-thales-conceptual-scheme.

Rosenfeld, Louis. “William Prout: Early 19th Century Physician-Chemist.” Clinical Chemistry, Clinical Chemistry, 1 Apr. 2003, clinchem.aaccjnls.org/content/49/4/699.

Russell, Bertrand. History of Western Philosophy. Routledge, 2015.

 

Aristotle: On the Soul and On the Heavens

 

Hippolytus: Refutation of All Heresies,

 

Strabo: Geography

 

 

 

 

 

 

A Brief Critique of Locke: Deconstruction and Reconstruction

words in their primary or immediate signification stand for nothing but the ideas in the mind of him that uses them (p. 146).”

The quote above is taken out of the work called An Essay Concerning Human Understanding by John Locke. Specifically, the quote is from Book III which talks about how humans come to understand words and communicate ideas to one another. From the quote above the reader can get a general idea of John Locke’s theory on words. We can reason that Locke thinks words are equal to ideas when he says “Words in the their primary…. signification stand for nothing BUT ideas in the mind…”. Additionally, he goes on to explain that humans are endowed with various thoughts that are supposed to benefit other people. But there’s a catch, these thoughts are all locked up within the individual. Despite this dilemma, words allow these ideas to become unlocked from the individual. According to Locke the unlocking process is what allows society to flourish (Chapter ii sec1. Pg 146 Locke). From that readers are compelled to conceptualize language as a phenomenon which instructs and provides knowledge in order for society to flourish. Furthermore, sharing ideas would be living in accordance with human nature, since he also believes that humans are inherently designed to be sociable (Chap I sec 1 pg 145). Since for Locke ideas are used to be sociable, that means words have utility as well. He argues there are two use values when it comes to recording words: 1. it aids memory 2. It brings ideas out in the open where others can see them (Chapter ii sec 2 pg 146). But words would become too idiosyncratic if people conceived of their own “markings” to translate their ideas. So words that flourish are a “mark” which are universally recognized. Locke explains this notion by saying:

nobody can apply a word, as a mark, immediately to anything else. For that would involve making the word be a sign of his own conceptions, …applying the word as a mark of a thing involves applying it intending it to stand for that thing, which means applying it with an accompanying thought about the word’s significance.”

So if you want an idea to universally stand for a certain mark that means one must find a mark within the world which can generally signify the idea you are trying to convey. This process is what facilitates proper communication with others. So, for example,  if “x” signified the idea “car” in a certain society, then another mark such as “y” (y= not car) would be inappropriate to use for car since “y” isn’t generally understood to mean car. Though Locke has interesting reasons to justify his views on words and ideas, that doesn’t exempt his arguments from criticism.

One objection to Locke’s reasoning would be one that challenges the claim that recording words aid personal memory. While yes, generally this may seem true, readers should analyze the full extent of this claim. Let’s consider a brief example. Imagine an individual who has trouble with long term memory but is proficient at remembering locations. Now let’s say this person is attending a speech and wants to remember the way the orator was talking, and so writes down “Remember the address”. Later on in the week the person finds the paper and reads what he had written. According to Locke the words written down on the paper should aid our forgetful person in remembering the infliction of the orator. But problems arise considering the fact the person is proficient at remembering locations. So he reads it and thinks “Right, it was 5th street”. On the surface this seems like it aided his memory but his initial intention was to remember the infliction of the orators voice, and not the location. After all the person is already good at remembering locations and didn’t necessarily need the words to remind him where the speech was. This could be mitigated by recording his voice (since address (location) and address (speech style) can have different pronunciations). But this would be problematic if the person voice recorded words like “councilor/counselor” or “bank”. Because these words sound the same, the forgetful individual might still find trouble in remembering what they meant.

Another detail we must pay attention to in Locke’s reasoning is the concept that when we write symbols to denote ideas we are doing this to share ideas with others. This once again is generally true. And we get a qualifier on why sometimes it may not be true, since popular symbols must be used to signify ideas (“x”= car example above). So Locke successfully explains why sometimes people don’t understand words that explain ideas. The symbols are too idiosyncratic. But he fails to go deeper on what makes these symbols generally understood in the first place. It’s not as if when human’s with linguistic capacity look at objects they immediately have word impressions of that object. Quite plainly, when you look at a dog in the real world, the brains initial impression doesn’t initially stimulate the cognitive impression of “dog!”. And if you were to pan over to a chair your brain doesn’t exclaim “chair!”. It just understands these objects as such. The word and the object here don’t seem to be directly linked to one another in terms of recognizing objects in our consciousness. But nonetheless these names exist and we have formulated them, so in that sense Locke is correct in saying words are ideas. But it’s wrong to say the inverse, that ideas are words. Mainly because objects in themselves don’t contain the property “word”. But rather, this cognitive property assignment comes from humans. He acknowledges the arbitrary nature of word denotation but still believes that the impressions of objects warrant an automatic denotation. But this isn’t an accurate conceptions of human cognitive thinking. We don’t get impressions from objects in the world and immediately think “this object is that”, rather the brain seems to conduct a process of pattern recognition. The brain’s process seems to fall under reasoning like this “this object is this object, which generally falls under this set of symbols/sound in the world”. This distinction, though small, opens up the scope of Locke’s inquiry into the human mind. Here, we can begin to understand the creatures we are. We aren’t creatures who cognitively just process objects and translate them to ideas, but rather we do that and then inquire about its relationship in the world. This process happens quickly, and most humans master this skill by around the age of 3. That’s how we are able to come closer to understanding each others intentions. Animals are generally good at understanding intentions. Humans obviously fall in that category too, but we are different in that we are able to connect patterns with certain sounds and symbols. Let’s imagine, I invite you over for dinner but I don’t speak your language. Now, I could be standing at a table with some spaghetti on a plate and I can point to it and say “fleeblah” and then have another family member come to it and say “fleeblah”, and a person who has never even heard “fleeblah” uttered can reason the sound “fleeblah” has something to do with that spaghetti. Now if I go even further and open up my phone and google many pictures of spaghetti. And then point and say “fleeblah” that person is inclined to understand that when I utter “fleeblah” I am intending to put the idea spaghetti into their head. This recognition of intention should warrant our attention when we speak about human cognition and language. It seems as if when humans utter/ write words we are intending to put ideas into other people’s cognition. This turns Locke’s assertion that words are used to bring ideas out in the social world, into a question of “what do humans intend with words when they try to bring ideas out in the social world?”. A question which may be tackled in a future post.

The Development of Cyber Law: Past and Future

The Development of Cyber Law: Past and Future

Cyber law is often seen as a developing field in terms of international law. And rightly so, considering that the internet is a relatively new development in human history. However, that’s not to say that there isn’t development within the field of cyber law. The field encompasses a broad range of topics such as Intellectual property, data privacy, censorship etc, and some laws regarding cyber law are clearly defined. But despite that, this paper will narrow the scope in terms of where cyber law is the least developed, arguably that is within the context of data privacy and unauthorized access. These laws are often the least developed because they used to be enforced by legislation that covered traditional communication networks, such as mail and phone networks. But since data and unauthorized access is  the least developed that means they are often the most abused by agents committing cybercrimes. Feasibly, this is mainly due to the fact that these sectors lack enforcement and detection methods. However, in regions where cyber law is most enforceable have decided to back enforcement and detection mechanisms that allow their  cyber law to be practically enforced. But in order to understand how that’s possible a bit of background information on cybercrime and cyber law is necessary.

 

Background

Cybercrime has existed since the 1970’s in the form of network attacks on phone companies. Hackers would infiltrate telephone networks enabling them to create connection, reroute calls, and use payphones for free (The History of Phone Phreaking).  This early era of hacking was a problem due to the lack of legislation that could act as a guide for law enforcement to accurately charge criminals. Arguably, it was the lack of legislation on hacking which allowed computer hackers to hone their techniques of network infiltration and data theft. The reason why that’s so can be observed in the late 1980s, where the intensity of large system attacks became more abundant and destructive. One of these major system hacks was perpetuated by a group known as 414. It may come as a surprise that this group wasn’t a group of hardened criminals, but rather 6 teenagers from Milwaukee, Wisconsin. These teenagers managed to hack high profile systems ranging from a nuclear power to banks (Stor). The intentions of the hackers didn’t seem maligned, since they didn’t steal any info from these systems. But the 414 hacks weren’t harmless either since they cost a research company $1,500 after the hackers deleted some billing records. But other major hacks weren’t as harmless. The notorious Morris worm is a prime example of the harmful effects of unwarranted network infiltration. The reason that’s the case is that it the Morris Worm was one of the first hacks that was distributed to the public internet (Sack). The worm was created by Robert Morris a Graduate student at Cornell in order to showcase the security problems of the internet, the worm would go on to cause in-between $100,000- $10,000,000 in damage by infiltrating networks and causing them to become non-operational (Newman). Clifford Stoll, one of the people responsible for purging the worm, described the Morris worm as such:

“I surveyed the network, and found that two thousand computers were infected within fifteen hours. These machines were dead in the water—useless until disinfected. And removing the virus often took two days.” (Sack)

Additionally, one of Stoll’s colleagues says that 6,000 computers were infected, which may not seem like much but only 60,000 computers were connected  to the internet at that time. Meaning 10% of the internet was infected (Sack). Such attacks would force legislators to address the problems of cybercrime, specifically network infiltration. One of the first pieces of comprehensive cyber law to address these issues was the Computer Fraud and Abuse Act enacted by the United States congress.

Computer Fraud and Abuse Act

After a lieu of cyber-attacks plagued the world, the U.S Congress decided to specifically address cybercrime. Prior to the Computer Fraud and Abuse Act (CFAA) cybercrime was prosecuted under mail and fraud, however that proved uncomprehensive. The CFAA’s framework defined what cybercrime entailed. One of the pioneering things the legislation did was define what kinds of computers were off limits to data infiltration. According United States code, In Title 18, Section 1030 of CFAA a computer is unlawful to hack if that computer is:

“(A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or

(B) which is used in interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.” -18 U.S. Code § 1030 – Fraud and related activity in connection with computers (Cornell)

Basically, stealing information from a computer that effects the United States via interstate or foreign commerce/communication is forbidden. These specifications were enough to convict various individuals who committed cybercrimes in the late 1980s. Interestingly enough, Robert Morris was the first person to be convicted for violating the Computer Fraud and Abuse Act. Specifically, because he intended to infiltrate several computers without authorization which negatively affected economics and communication within the US (Newman). Arguably, the enforcement power of the CPAA may have been the essential precedent needed for the international community in terms of creating sufficient cyber laws.

Budapest Convention on Cybercrime

In November 2001, the first international convention on cybercrime took place. The scope of the Budapest Convention on Cyber Crime (BCC), unlike the CPA, had a wide range because it addressed: IP law, fraud, and child pornography. However, the convention also found it important to address what unlawful access to a computer constituted, defining it as:

“..A Party may require that the offence be committed by infringing security measures, with the intent of obtaining computer data or other dishonest intent, or in relation to a computer system that is connected to another computer system.” -Article 2 of BCC (Council Of Europe)

Here, arguably, the BCC is more specific then the CPAA in terms of defining unlawful access. The reason being is that it ignores the economic/ social effects and directly addresses what unlawful access is which would be:

“..the intent of obtaining computer data or other dishonest intent…to a computer system that is connected to another computer system”.

The BCC ignores the economic/ social effects because some hacks may not influence the economy or society, by keeping the CPAA definition, the scope of data infiltration would’ve been limited to social and economic consequences on specific nations.  Furthermore, the BCC’s unlawful access clause has been a topic of discussion for legal entities and private corporations.

Modern Developments

     EU v Facebook

The precedent set by the BCC on data infiltration remains relevant in contemporary times. Especially when considering the role private corporations have in data security.  This is evident when taking Facebook’s recent big data breach into consideration. In order to understand why Facebook could potentially be an important catalyst to cybercrime we need to understand Facebook’s role on the internet. Simply put, Facebook is a social media website which connects private users via a public platform, but despite it being a public platform users’ can share data privately.  However, controversy emerged after users’ data was allegedly being misdirected and sold to third parties without user’s complete consent(Guzenko). This is a clear violation of the BCC’s definition of unlawful system infiltration. The reason that could be so is that since Facebook is in charge of maintaining data security for their users, that would mean Facebook selling data without user’s consent would constitute unlawful data infiltration according to article 2 of the BCC. Additionally, Facebook was hacked by a third party and millions of users’ data was exposed without user consent. After this particular hack the European Union decided to step in and reprimand Facebook via a 1 billion euro fine (Schnechner). The EU argues Facebook didn’t do enough to protect users’ data from infiltration, but such accusations do little for cyberlaw. The reason for that is that the EU could always argue that an entity “didn’t do enough” to protect user data, and supplement that reasoning with a fine. Rather, since cyberlaw is a relatively new field, legal entities ought to cooperate with influential players within the cyber world in order to create viable solutions to cybercrimes. The EU accusations assume that Facebook is the entity which allows 3rd parties to access user’s data, but actually it’s the users themselves who allow it. Restricting one’s data is an option if a user changes their privacy settings. Additionally, It’s unrealistic to expect Facebook to curtail the behavior of its one billion users, some users may be more susceptible to data hackers due to their ignorance on data security. The reasoning the EU expels on to Facebook would be similar to this: If an EU citizen were to steal property from another citizen then the EU itself would be held accountable for allowing that to occur, and thus deserves to be fined. This is so because Facebook is similar to the EU, in that it’s a microcosm of different sets of people behaving in ways they can’t totally predict. So instead of focusing on how specific internet services operate, focus should be shifted to network self-enforcement. A prime example of that shift of focus would be China’s comprehensive self-regulating internet network.

China’s Internet Network

Modern cybercrime has evolved in terms of the magnitude of attacks. However, in the 21st century cyber attacks, particularly on infrastructure, are not only possible but prevalent (Schmitt). An example of such an attack is explained by Tomas Ball, a contributor to the Computer Business Review

in December 2015 a massive power outage hit the Ukraine, and it was found to be the result of a supervisory control and data acquisition (SCADA) cyber-attack. This instance left around 230,000 people in the West of the country without power for hours…chaos was sewn using spear phishing emails, a low tech approach to launch such an attack; this trend is relevant today, with phishing still being used against critical infrastructure.” (Ball).

That’s only one case, but hacks on critical infrastructure can range from manipulating data which changes the chemical composition of drugs being manufactured, or to infiltrating a dam and redirecting electricity (Schmitt). Countries have implemented measures to mitigate and respond to this risk on critical infrastructure. A notable response to this problem has been from the Chinese government. China has been able to mitigate the risk of data infiltration by regulating its domestic network via legislation and technology. This may seem like a normal approach, but China is unique in the sense that it’s network is reinforced by technology which actively implements its cyber legislation. It’s difficult to understand the full scope of how China is able to do this (since the government isn’t transparent on how the network fully operates) but there are things that are clearly observable in terms of how data transfer is controlled. Firstly, data transfer in China is purposefully slowed. This is important because it allows the Chinese network to detect potential disturbances before they fully manifest, so infiltration could be detected much easier (Chew). Secondly, as mentioned before, the system self regulates. The Chinese government implements its own filters by creating comprehensive state tech that enforces Chinese law. However, China also puts heavy pressure on Chinese firms to self-regulate content, meaning that a firm that deals within the cyber world must follow the cyber laws or face a shutdown of business or a hefty fine. This is similar to how the EU went about dealing with Facebook, the only key difference being that the EU lacks its own data enforcement technology (Chew).   And lastly, China’s network will respond to infringements of their cyber law by quickly “poisoning” unlawful data connections. An example of this would be if a hacker wanted to infiltrate some data network the connection would immediately be detected as a “poisonous connection” and thereby the hacker would be cut off from that connection (Chew). Arguably this is what sets China’s cyber network apart from everyone else, the ability to actively regulate data under their legal framework. Though it’s worthy to note that China’s network indeed does well in terms of enforcing its cyber law by regulating data, but that doesn’t mean the network is exempt from criticism.

China’s cyber network is rather effective in terms of enforcing its cyber law, however it has been used to disenfranchise its own civilian population. Qiang Xiao an internet researcher at UC Berkeley describes China’s internet network as such

…it has consistently and tirelessly worked to improve and expand its ability to control online speech and to silence voices that are considered too provocative or challenging to the status quo.”(Xiao). But such things, unfortunately, should be expected. After all it makes sense for illiberal governments to manifest illiberal computer networks. But such realities shouldn’t deter liberal government from trying to conceptualize and develop internet networks which enforce cyber law. This is a lot easier said than done because it’s easier to enforce authoritarian cyber law than more liberal law (Schmitt).”

Mainly, due to the fact that the amount of computing power needed to create a liberal network would be immense. In conjunction with it being so massive, economic factors come into play when determining how effective cyber law is enforced in a region, leaving poorer liberal nations behind. Despite that, developments in quantum computing can allow for massive amounts of data to be processed and it’s getting cheaper as it develops (IBM). Not only that but quantum computing opens up the door for the network to self-learn, enabling better self-enforcement (IBM). Such features may intrigue governments who want to enforce a Common Law internet network since it can self-learn off of old legal precedents. So in the future enforceable cyber for liberal governments is definitely a possibility, and perhaps a necessity if strong cyber law is to be properly enforced.

In conclusion, since there are problems with enforcement and efficiency of cyber law, internet networks which actively enforce cyber law using the internet network itself are necessary to achieve practical cyber data enforcement. Different legal jurisdictions would naturally have different laws concerning their respective internet networks, therefore various network legal structures would need to exist to facilitate their cyber laws. Developments in quantum computing may pave the way for networks to regulate themselves.

Works Cited

“18 U.S. Code § 1030 – Fraud and Related Activity in Connection with Computers.” LII / Legal Information Institute, Legal Information Institute, http://www.law.cornell.edu/uscode/text/18/1030.

Ball, Tom. “Top 5 Critical Infrastructure Cyber Attacks.” Computer Business Review, Computer Business Review, 18 Jan. 2018, http://www.cbronline.com/cybersecurity/top-5-infrastructure-hacks/.

“Budapest Convention on Cybercrime.” Council of Europe, Council of Europe, http://www.coe.int/en/web/conventions/full-list/-/conventions/rms/0900001680081561.

Chew, Wei Chun. “How It Works: Great Firewall of China – Wei Chun Chew – Medium.” Medium.com, Medium, 1 May 2018, medium.com/@chewweichun/how-it-works-great-firewall-of-china-c0ef16454475.

Guzenko, Ivan. “The Third-Party Data Crisis: How the Facebook Data Breach Affects the Ad Tech.” MarTechSeries, 5 July 2018, martechseries.com/mts-insights/guest-authors/the-third-party-data-crisis-how-the-facebook-data-breach-affects-the-ad-tech/.

“The History Of Phone Phreaking.” The History of Phone Phreaking — FAQ, http://www.historyofphonephreaking.org/faq.php.

Newman, Jon O. “UNITED STATES of America, Appellee, v. Robert Tappan MORRIS, Defendant–Appellant.” Stanford Law, stanford.edu/~jmayer/law696/week1/Unites%20States%20v.%20Morris.pdf.

Sack, Harald. “The Story of the Morris Worm – First Malware Hits the Internet.” SciHi Blog, 3 Nov. 2018, scihi.org/internet-morris-worm/.

Schechner, Sam. “Facebook Faces Potential $1.63 Billion Fine in Europe Over Data Breach.” The Wall Street Journal, Dow Jones & Company, 30 Sept. 2018, http://www.wsj.com/articles/facebook-faces-potential-1-63-billion-fine-in-europe-over-data-breach-1538330906.

Schmitt , Michael N. “Cyberspace and International Law: The Penumbral Mist of Uncertainty.” Harvard Law Review, harvardlawreview.org/2013/04/cyberspace-and-international-law-the-penumbral-mist-of-uncertainty/.

Stor, Will. “The Kid Hackers Who Starred in a Real-Life WarGames.” The Telegraph, Telegraph Media Group, 16 Sept. 2015, http://www.telegraph.co.uk/film/the-414s/hackers-wargames-true-story/.

“What Is Quantum Computing?” What Is Quantum Computing? , IBM, http://www.research.ibm.com/ibm-q/learn/what-is-quantum-computing/.

Xiao, Qiang. “Recent Mechanisms of State Control over the Chinese Internet – Xiao Qiang.” China Digital Times CDT, chinadigitaltimes.net/2007/07/recent-mechanisms-of-state-control-over-the-chinese-internet-xiao-qiang/.

The JFK Files: The Main Takeaways

Recently, The National Archives released thousands of classified government records on the John F. Kennedy assassination on October 23rd and November 3rd of 2017. Giving way for thousands of academics, journalists, & conspiracy theorists to sort through the ample amounts data. Though a great deal of the material is riddled with bureaucratic jargon, code names, and of course redacted info, the releases give an in depth and transparent look on these intelligence agencies at the time.

However, it’s worthy to note that thousands of other pages are being withheld for atleast 6 months. This coming after some slight pressure from the American intelligence community. Nonetheless, the recent releases have proved promising. The files cover a broad range of topics from detailing how intelligence was gathered from a stripper named “Kitty”, a 20 page “analysis” on Dr Martin Luther King, and even some  creative ideas on how Cuban leader Fidel Castro should be assassinated. But the main focus of this article will be on the intelligence gathered by the FBI and CIA in the midst of the JFK assassination. Here are 4 things the public should know about the recent releases.

 

1. The Anonymous Call

An intelligence cable from a CIA station in London received intel gathered by MI-5 (Britain’s Security Service) about a strange call a local news reporter received. On November 22, 1963 a senior reporter from the Cambridge News received a call from an anonymous caller who said “(The Reporter) should call the American Embassy in London for some big news” the caller promptly hung up. About 25 minutes later president John F Kennedy was assassinated.

The senior reporter said he’d never received a call like that ever in his life and the MI-5 went so far as to say he was ” (A) sound and loyal person with no security record”. The MI-5 found it worthy to also note that this call was similar to other calls received by various other journalist involving the Dr Ward Case ( a case which dealt with a sexual scandal & espionage that could’ve crippled the British government in 1963)

2. Oswald’s Visa Talk: Phone Call Intercepts from the Soviet & Cuban embassies

In the weeks prior to the murder of JFK Lee Harvey Oswald attempted to secure visas from Cuba and the Soviet Union while in Mexico City.  Both embassies seemed to try to help him get these long term visa’s despite his “terrible, hardly recognizable Russian” and poor Spanish. Silvia Duran (Cuban Consulate worker) was the first to be engaged in discussion with Oswald over a long term visa possibilities in Cuba. She tries to assist him in obtaining a Russian visa in order to make getting a Cuban Visa easier. She phones the Russian embassy and tries to see if they can come to some agreement over Oswald’s visa dilemma. Oswald claimed to be a part of a “pro-Cuban group”, but Silvia couldn’t get a visa for him initially because” he (knew) no one in Cuba” . Furthermore, obtaining a Russian Visa would take a long time, and evidently Oswald wasn’t worthy enough of a Russian recommendation. That didn’t stop his efforts.  Oswald would then go through a series of phone calls with Russian officials about his visa status (one being Kostikov a KGB Agent specialized in assassination). However a man called Obyedkov abruptly hangs up on him in the middle of a conversation about a telegram.

Now why is this whole visa situation important? Well, clearly it shows us that Oswald was trying to relocate to either Cuba or Russia. But that raises more questions. Specifically, what were his motivations for obtaining these visas? Was he trying to obtain them as an escape plan for him to use after his assassination plot? Or was he trying to defect to these countries for other purposes?

Moreover, “Obyedkov” hanging up on Oswald should be a cause for further questioning. Was “Obyedkov” simply frustrated with Oswald, did he finally find out about Oswald’s self caused hospitalization back when he visited the USSR, or was he aware of something else?

 

 

3. November 24, 1963: Tell ’em It was Oswald.

This document is the least legible of the documents covered in this article and was written around 45 minutes after Oswald died. Oddly, it has no title, the author of this document isn’t named (But it can be assumed the words came from Hoover) , and it’s prefaced with “Mr J. Edgar Hoover said as follows”.

Th Document starts off in a rather blunt tone the first sentence says ” There is nothing further on the Oswald case except that he is dead.” It goes on to talk about Jack Ruby as Oswald’s murder, and briefly mentions his background. In addition, it seems as if Hoover was worried that Dallas Police officials were revealing too much information on Oswald and Ruby. Hoover feared it could potentially compromise the legal process.

In the third to last paragraph Hoover seems to be concerned about “…having something issued so we can convince the public that Oswald is the real assassin.”. The paragraph goes on to talk about how the FBI could persuade the Attorney General that Oswald was the guy by using “pictures, laboratory work etc”. That would then lead the public to believe Oswald did it.

 

4. The Watson and Hoover Soviet MEMO

A couple sources working covertly in high Soviet and KGB positions offered some insight on how the Soviet government reacted to the Kennedy assassination.

The Soviets believed that the assassination wasn’t orchestrated by one man, but rather a highly organized “ultraright” group wishing to initiate a coup. In conjunction, they were fearful that some irresponsible general from the USA would launch a missile at the USSR. This coupled with other concerns instantly put the Soviet Union in a state of national alert.

The Soviets knew that Oswald was in the USSR for a period of time but they described him as “a neurotic maniac who was disloyal to his own country and everything else”. Additionally, they noted that he wasn’t involved in any organization in the Soviet Union and never received citizenship.

Also, the agents were able to infiltrate a high level KGB meeting, headed by Boris Ivanov (head of KGB)  in New York City. Ivanov felt that the recent assassination was a problem for the KGB. And that this problem needed to be brought to every KGB agents attention until it was solved. The KGB also felt that the assassination couldn’t have been conducted by a sole perpetrator. The agency then put forth a plan to gather as much data possible about any possible group that could’ve executed the assassination plot.

Furthermore, Ivanov emphasized collecting as much intel about Lyndon B Johnson as possible. Quite frankly the Soviets knew nothing about him. They wanted an in depth search on “his background, his past working experience and records in congress..”.

2 years later the KGB met again in NYC after gathering  intelligence about President Johnson. The source states that (per the instructions from Moscow) the KGB was in possession of data that would prove LBJ was responsible for the JFK assassination.

The document concludes with notes on several critical reports about the Warren Commission by Soviet media outlets.

 

Despite these main points, there is still plenty more to be uncovered by the recent data release. And the files that have revealed valuable information have in effect raised even more questions.

 

Feel free to indulge in the first hand declassified sources below. 

 

 

 

 

The Anonymous Call: https://www.archives.gov/files/research/jfk/releases/docid-32389606.pdf

VISA TALK: https://www.archives.gov/files/research/jfk/releases/104-10010-10249.pdf

TELL ‘EM IT WAS OSWALD: https://www.archives.gov/files/research/jfk/releases/docid-32263509.pdf

WATSON and HOOVER MEMO:  https://www.archives.gov/files/research/jfk/releases/docid-32204484.pdf