Artificial Intelligence & American Copyright Law: Analyzing the Copyright Office’s AI Report

Copyright Office’s AI Report: The Good, The Bad, and The Controversial

The Copyright Office just dropped Part 3 of its AI report, which aimed at addressing certain copyright law in regards to Artificial Intelligence. The thing that’s got everyone talking is the fact that the report was supposed to tackle infringement issues head on, but instead teased us by saying that answer will come up in “Part 4” that is expected to be released at a later date. Let’s dive into what was actually discussed.

Legal Theory: A Case by Case Basis

The report’s central thesis is a pretty straightforward legal theory. Basically, they recommend that there will be no blanket rule on whether training AI on copyrighted content constitutes infringement or fair use. Everything gets the case by case treatment, which is both realistic and frustrating depending on where you sit. That’s because most lawyers like clear bright line rules backed up by years of precedent, but when attempting to make legal frameworks regarding emerging technologies, the brightline approach is easier said than done.

The report acknowledges that scraping content for training data is different from generating outputs, and those are different from outputs that get used commercially. Each stage implicates different exclusive rights, and each deserves separate analysis. So in essence, what’s  actually useful here is the recognition that AI development involves multiple stages, each with its’ unique copyright implications.

This multi stage approach makes sense, but it also means more complexity for everyone involved. Tech companies can’t just assume that fair use covers everything they’re doing and content creators can’t assume it covers nothing. The devil is in the details.

Transformative Use Gets Complicated

The report reaffirms that various uses of copyrighted works in AI training are “likely to be transformative,” but then immediately complicates things by noting that transformative doesn’t automatically mean fair. The fairness analysis depends on what works were used, where they came from, what purpose they served, and what controls exist on outputs.

This nuanced approach is probably correct legally, but it’s also a nightmare for anyone trying to build AI systems at scale. You can’t just slap a “transformative use” label on everything and call it a day. The source of the material matters, and whether the content was pirated or legally obtained can factor into the analysis. So clearly purpose also matters since commercial use and research use will likely yield different results in the copyright realm. Control and mitigation matter in this context because developing the necessary guardrails is paramount to preventing direct copying or market substitution.

Nothing too revolutionary here, but the emphasis on these factors signals that the Copyright Office is taking a more sophisticated approach than some of the more simplistic takes we’ve seen from various opinions on this matter. This should be reassuring since a one size fits all approach at such an early stage of developing AI could stifle innovation. However if things are left to be too uncontrolled copyrighted works may face infringements to their copyright.

The Fourth Factor Controversy

Here’s where things get interesting and controversial. The report takes an expansive view of the fourth fair use factor: which is the effect on the potential market for the copyrighted work. That is because too many copyrighted works flooding the market brings fears of market dilution, lost licensing opportunities, and broader economic impacts.

The Office’s position is that the statute covers any “effect” on the potential market, which is broad interpretation. But that broad interpretation has a reason, they are worried about the “speed and scale” at which AI systems can generate content, creating what they see as a “serious risk of diluting markets” for similar works. Imagine an artist creates a new masterpiece only to get it copied by an AI model which makes the piece easily recreatble by anyone, diluting the value of the original masterpiece. These types of things are happening on the market today.

This gets particularly thorny when it comes to style. The report acknowledges that copyright doesn’t protect style per se, but then argues that AI models generating “material stylistically similar to works in their training data” could still cause market harm. That’s a fascinating tension, you can’t copyright a style but you might be able to claim market harm from AI systems that replicate it too effectively. It is going to be interesting to see how a court applies these rules in the coming future.

This interpretation could be a game-changer, and not necessarily in a good way for AI developers. If every stylistic similarity becomes a potential market harm argument, the fair use analysis becomes much more restrictive than many in the tech industry have been assuming.

The Guardrails

One of the more practical takeaways from the report is its emphasis on “guardrails” as a way to reduce infringement risk. The message is clear: if you’re building AI systems, you better have robust controls in place to prevent direct copying, attribution failures, and market substitution.

This is where the rubber meets the road for AI companies. Technical safeguards, content filtering, attribution systems, and output controls aren’t just up to the discretion of the engineers anymore they’re becoming essential elements of any defensible fair use argument.

The report doesn’t specify exactly what guardrails are sufficient, which leaves everyone guessing. But the implication is clear: the more you can show you’re taking steps to prevent harmful outputs, the stronger your fair use position becomes. So theoretically if a model has enough guardrails they may be able to mitigate their damages if the model happens to accidently output copyrighted works.

RAG Gets Attention

The report also dives into Retrieval Augmented Generation (RAG), which is significant because RAG systems work differently from traditional training approaches. Instead of baking copyrighted content into model weights, RAG systems retrieve and reference content dynamically.

This creates different copyright implications: potentially more like traditional quotation and citation than wholesale copying. But it also creates new challenges around attribution, licensing, and fair use analysis. The report doesn’t resolve these issues, but it signals that the Copyright Office is paying attention to the technical details that matter.

Licensing

The report endorses voluntary licensing and extended collective licensing as potential solutions, while rejecting compulsory licensing schemes or new legislation “for now.” This is probably the most politically palatable position, but it doesn’t solve the practical problems.

Voluntary licensing sounds great in theory, but the transaction costs are enormous when you’re dealing with millions of works from thousands of rights holders. Extended collective licensing might work for some use cases, but it requires coordination that doesn’t currently exist in most creative industries.

The “for now” qualifier is doing a lot of work here. It suggests that if voluntary solutions don’t emerge, more aggressive interventions might be on the table later.

The Real Stakes

What makes this report particularly significant isn’t just what it says, but what it signals about the broader policy direction. The Copyright Office is clearly trying to thread the needle between protecting creators and enabling innovation, but the emphasis on expansive market harm analysis tilts toward the protection side.

For AI companies, this report is a warning shot. The days of assuming that everything falls under fair use are over. The need for licensing, guardrails, and careful legal analysis is becoming unavoidable.

For content creators, it’s a mixed bag. The report takes their concerns seriously and provides some theoretical protection, but it doesn’t offer the clear-cut prohibitions that some have been seeking.

The real test will come in the courts, where these theoretical frameworks meet practical disputes. But this report will likely influence how those cases get decided, making it required reading for anyone in the AI space.

As we can see AI and copyright law is becoming only more and more complex. The simple answers that everyone wants don’t exist, and this report makes that abundantly clear. The question now is whether the industry can adapt to this new reality or whether we’re heading for a collision that nobody really wants.

An American Sovereign Wealth Fund: The Key to American Prosperity?

President Donald Trump has officially signed into law the creation of a U.S. sovereign wealth fund. This is one of the few of his controversial executive orders that have been signed that may have a bit of merit when it comes to addressing the affordability crisis the United States is facing.

A sovereign wealth fund is a government investment fund that pools and manages a nation’s revenues, often derived from natural resources, trade surpluses, or foreign exchange reserves, to generate long term wealth and stabilize the economy. Several economic powerhouses have a wealth fund: Norway,  Singapore, Saudi Arabia, and the United Arab Emirates (Dubai Fund) have used SWFs to diversify their economies, invest in global assets, and provide financial security for the youth. These funds have enabled these nations to achieve high levels of economic stability, global influence, & sustained growth, even during periods of global economic uncertainty, all while empowering their citizenry.

Trump signing the Executive Order 2/3/2023

The fund with the most long term exposure and demonstrated long term practical excellence is Singapore’s Central Provident Fund.

Singapore’s Central Provident Fund (CPF) offers a noteworthy model for the US. In the 1960s, Singapore faced significant economic challenges that necessitated comprehensive reforms. When Singapore became independent the nation faced significant economic challenges. Over 70% of households lived in overcrowded conditions, with a third residing in shanty towns on the city’s outskirts, and more than half of the population was illiterate. The situation was further exacerbated by a heavy influx of immigrants prior to Singapore’s expulsion from the Malaysian political union, leading to an unemployment rate of approximately 15-20%. (Asian Development Bank).

Fast forward 50 years, and Singapore’s transformation is remarkable. The literacy rate has soared to 97.65% as of 2021. The nation consistently ranks at the top globally in educational assessments for math, science, and reading. Unemployment has plummeted to around 2%, significantly lower than the global average of approximately 6%. Additionally, about 90.7% of Singaporeans are homeowners, a stark contrast to the United States, where the homeownership rate is at approximately 50%. This extraordinary progress can be largely attributed to the determination and hard work of Singapore’s populace,  as well as the Central Provident Fund. (Asian Development Bank).

The Central Provident Fund

Singapore’s exponential growth after establishment of CPF

Prime Minister Lee Kuan Yew recognized the potential of the existing Central Provident Fund (CPF), established in 1955 during British colonial rule, as a tool to address economic challenges. The Fund was originally designed as a compulsory savings scheme for retirement, the CPF required contributions from both employers and employees. Unlike traditional social security systems funded by taxes, the CPF allowed individuals to own and control their savings, providing flexibility in how funds were utilized. This structure enabled citizens to manage their accounts while also engaging with private banking institutions.

In 1968, the government expanded the CPF’s scope to include housing, permitting withdrawals for the purchase of government flats. This policy not only addressed housing shortages but also fostered social stability and economic growth. Over time, the CPF’s functions further extended to cover healthcare and education, ensuring that citizens’ basic needs were met and allowing them to focus on personal development and community engagement. These strategic expansions of the CPF were instrumental in transforming Singapore’s economy and enhancing the well-being of its population (Asian Development Bank, n.d.).

After the CPF expanded its focus to housing, enabling citizens to use their savings to purchase government built housing units the homeownership rate is now up to 90% in Singapore. For the U.S., a sovereign wealth fund could potentially support housing initiatives, allowing Americans to leverage tax advantaged savings for home purchases, thereby fostering ownership and equity building. (International Monetary Fund).

Beyond housing, the CPF encompasses healthcare and education, allowing citizens to allocate savings toward medical insurance and lifelong learning. This approach reduces financial burdens and enhances productivity by alleviating concerns over essential services. A U.S. sovereign wealth fund could adopt similar strategies, offering dedicated accounts for healthcare and education expenses, possibly with employer matched contributions to accelerate wealth accumulation. (International Monetary Fund).

Implementing such a system in the U.S. presents significant challenges and hurdles . Political resistance to state managed savings programs and the complexities of federalism could impede adoption. Additionally, effective management is crucial to prevent issues like corruption or market volatility. Nevertheless, the potential benefits such as; reduced wealth inequality, increased productivity, and a buffer against economic downturns- are alluring. (PricewaterhouseCoopers).

While the executive order establishing a U.S. sovereign wealth fund is still in its early stages, Singapore’s CPF demonstrates that integrating state oversight with individual agency can transform citizens into stakeholders. For modern Americans burdened by housing costs, medical debt, and student loans, a similar fund could offer substantial relief and innovate on America’s financial institutions in a positive way.

Richard E. Carroll explores the potential for sovereign wealth funds at both the state and federal levels in the United States as a solution to financial challenges. At the state level, 20 U.S. states have established SWFs to manage natural resource revenues and benefit their citizens. For example the Alaska Permanent Fund, established in 1976, is the most well known, currently valued at over $5 billion. Many Alaskans get dividends from this fund, giving them expendable income for education or subsistence needs. New Mexico has done something similar, reducing the tax burden of the average citizen by about $1,000. I for one am a firm advocate for a SWF.

The Fund could be used to invest in infrastructure projects, such as roads, bridges, renewable energy, and broadband, creating jobs and stimulating economic growth. However, generally Americans are skeptical of government run programs, particularly those involving personal savings and investments. Therefore, building public trust would be essential for the fund’s success, perhaps including an opt out for citizens would be beneficial, but after their decision to opt out they should not be eligible to receive any benefits from the program- which is within their right. However, if the fund is managed properly, a steady stream of income from the SWF, the federal government could reduce income, corporate, or sales taxes, which could in theory put money back into the pockets of citizens and businesses. In essence America would be paying you for contributing positively to the American economy.

Having outlined all of that, the key question is whether the U.S. can adapt this model at the Federal level complicated by its diverse landscape. Time will tell.

Sources:

______________________________________________

  • International Monetary Fund. (2020). Sovereign wealth funds and public savings: Lessons from global models.  

Why’s America Sleeping? A Discussion Regarding The United Healthcare CEO’s Assassination.

“It takes violent shocks to change an entire nations psychology.”

– John F. Kennedy

This quote written in John F. Kennedy’s Magnum Opus ‘Why England Slept’ encapsulates the current collective psychology of the United States after the tragic assassination of Brian Thompson. Some people celebrated the CEO’s death, a symbol of the frustration many Americans have been feeling regarding the nation’s healthcare system. Critiques of the healthcare system are definitely warranted, and Luigi Manginoni’s tragic act has once again put the nations healthcare debate at the forefront a public discourse.  

President Kennedy’s quote is correct, often violent acts can change an entire nations collective psychology, there are plenty of examples in history that agree with that proposition. However, people are wrong assuming that the assassination will trigger meaningful change due to the fear healthcare insurance executives may feel after the assassination of Brian Thompson. People’s idealism can cloud the reality on how institutions operate in the real world. History has proven powerful players rarely relinquish control freely. The healthcare industry could hypothetically double down and refuse to budge, further entrenching an “us vs. them” mentality that pervades many contemporary national debates. Though, admittedly, the act could hypothetically result in meaningful change in the healthcare industry- but not in the way people celebrating the death would imagine. A good case study as to why that is the case would be the Ludlow Massacre.

On April 20, 1914, in Ludlow, Colorado, striking coal miners demanded better pay, safer working conditions, and the right to unionize ( more info on Ludlow here). The strikers were attacked by the Colorado National Guard and company-hired guards, killing the protestors and some of their family members. The Ludlow Massacre lead to the Colorado Coalfield War, where workers formed a militia and started attacking Colorado National Guardsmen and private law enforcement . The workers successfully attacked many of their oppositions positions and had a lower casualty count but when the dust settled the strikers’ demands were not met, the union did not obtain recognition and many striking workers were replaced. Further 408 strikers were arrested, 332 of them were indicted for murder. The institution decided to double down on the crackdowns resulting in none of the strikers work demands being met.

Though the workers themselves did not reach their goals, the tragedy of Ludlow spurred a greater national debate on workers rights in the United States. Slowly the grievances raised by the Ludlow massacre lead to the enactment of federal labor laws that we still use today. American society should turn this tragedy into a positive and reinvigorate the discussion and action that will lead to fundamental changes in the healthcare industry. The Ludlow Massacre forced the nation to confront workers’ rights, and similarly the tragic assassination of Brian Thompson could prompt similar discussions about the systemic failures in healthcare. However, history shows that institutional change is slow and often requires sustained public pressure. Hopefully, this time around the change will come sooner, if not there are indications that matters may get worse rather than better.  Analyzing the economic incentives causing this turmoil will illuminate the problem areas in the sector and hopefully lead to some practical solutions.

Economic Moral Hazards

The problem with the healthcare sector is that it produces bad economic incentives. 1 Often healthy economic incentives encourage behavior that benefits both individuals and society, they are aimed at promoting positive economic action while discouraging negative consequence such as waste or harm. For example good economic incentives would be efficiency standards for cars, they incentivize manufacturers to produce efficient automobiles by offering various government benefits. For example, car companies may get tax breaks,  recognition for meeting higher energy efficiency standards, or might get access to lucrative government contracts. This makes energy utilization effective, lowers bills for consumers, and helps reduce environmental impacts by using wasteful technology.

The healthcare industry seems to be running in the opposite direction regarding incentives. Large hospitals commonly increase prices for services and lab technology, knowing that insurers and government programs will foot the bill one way or the other. 2  A big reason hospitals can do this is due to lack of competition within the sector. 3 On average Americans have access to only a few healthcare providers, which incentives monopolistic practices such as price gouging. 4  These practices shift the financial burden onto patients, insurers, and taxpayers, exacerbating the system’s inefficiencies.  Insurance companies also contribute to producing bad economic incentives but in a different way.

Source: American Enterprise Institute

Health care Insurers also contribute to overall inflated healthcare prices. That’s because insurance companies have few incentives to negotiate for better rates or challenge the high prices set by hospitals.  They are well aware that they can pass those costs onto consumers in the form of higher premiums or deductibles in order to fulfill their fiduciary duty to their shareholders. 5 By passing those costs on to their consumers they ensure their shareholders are maximizing profits effectively fulfilling their duty. This leads to a disconnect between the price of healthcare and the actual cost to consumers leading to the  inflated cost of healthcare of the healthcare system.

Additionally, some companies during economic downturns might only focus on the volume of services provided, rather than the quality or necessity of those services. This may encourage doctors to prescribe unnecessary treatments overuse of healthcare and can result in unnecessary tests or procedures, which drive up the overall healthcare costs. If you are fully covered getting extensive tests is beneficial for your health but unnecessary care drives up the price for people who do not have adequate coverage. That is because higher utilization of healthcare services- necessary or not artificially inflates demand, which providers often use to justify price increases. Most insurance companies operate within fee-for-service payment systems, where providers are reimbursed based on the volume of services delivered rather than the value or outcomes. This further incentivizes unnecessary treatments, tests, and procedures, as healthcare providers have a financial interest in maximizing billable services

Further, the administrative complexity of health insurance also adds significant costs to the healthcare system. Insurers maintain vast bureaucracies to process claims, determine coverage, and manage provider networks, which requires substantial resources. Anecdotally, after spending some time in the insurance sector, a lot of the administrative tasks incentivize an incredible amount of waste.  These costs are ultimately passed on to consumers. For example, administrative expenses in the U.S. healthcare system account for nearly 8% of total spending, compared to 2-3% in countries with simpler, more centralized systems. 6

Action is Necessary

The tragic events surrounding Brian Thompson’s assassination have understandably stirred intense emotions and reignited a national conversation about the flaws in our healthcare system. While these tragedies can bring the issue to the forefront, history shows us that meaningful change doesn’t come from fleeting moments of outrage. The shockwaves from Thompson’s death can grab attention temporarily, but true change only happens when we confront the deeper economic incentives that drive the inefficiencies and inequalities in healthcare.

Reform, as we’ve seen in the past, is rarely quick or easy. It faces resistance from entrenched interests that benefit from the status quo. But the time to act is now. The monopolistic pricing, the disconnect between what healthcare actually costs and what patients pay, and the lack of meaningful negotiation from insurers- all of these must be tackled with urgency. It’s time to rethink the economic incentives behind the healthcare system and shift the focus toward transparency, competition, and patient-centered care. The current model is unsustainable, and the responsibility for change lies with all of us; policymakers, healthcare providers, insurers, and the public.

Let us use this tragedy not as a fleeting moment of anger but as a rallying point to demand systemic reform. By ensuring that economic incentives align with the well-being of patients and the long-term sustainability of the system, we can move toward a healthcare system that serves the needs of every American, not just the powerful few. Now is the time for thoughtful, deliberate action to reform the healthcare system in a way that reflects the values of justice, fairness, and efficiency for all.

“The time to repair the roof is when the sun is shining.”

-John F. Kennedy

Right now, I’m sad to say, it seems like we’re attempting to repair a roof in the middle of a tornado. Urgent action is needed.


Sources

  1. According to the Journal of the American Medical Association (JAMA), the U.S. healthcare system is plagued by administrative inefficiencies, price inflation, and overuse of medical services, which are driven by poorly aligned incentives among providers, insurers, and payers.

    Source: JAMA. “Waste in the US Health Care System: Estimated Costs and Potential for Savings.” (2019). ↩︎
  2. Research from the RAND Corporation indicates that hospitals charge private insurers an average of 247% of Medicare rates for the same services. This price disparity exists because private insurers lack the bargaining power to negotiate rates effectively, and hospitals rely on these inflated payments to subsidize their operations.

    Source: RAND Corporation. “Prices Paid to Hospitals by Private Health Plans Are High Relative to Medicare and Vary Widely.” (2020).. ↩︎
  3. Research shows that hospital consolidation reduces competition and leads to higher prices. A study by the National Bureau of Economic Research (NBER) found that hospital mergers result in price increases of 6% to 18%, depending on the level of market concentration.

    Source: NBER. “The Price Effects of Cross-Market Hospital Mergers.” (2018).
     The Health Care Cost Institute (HCCI) reports that the average price for hospital services is significantly higher in concentrated markets than in competitive ones.

    Source: HCCI. “Healthy Marketplace Index.” (2020). ↩︎
  4. The American Medical Association (AMA) found that in 2019, 90% of metropolitan areas in the U.S. were highly concentrated for hospital markets, meaning patients had limited choices among providers. This is also the case in more rural areas as well.

    Source: AMA. “Competition in Health Insurance: A Comprehensive Study of U.S. Markets.” (2019). ↩︎
  5. Premiums and deductibles for employer-sponsored health insurance have been steadily rising, with average family premiums increasing by 55% over the past decade. Insurers often attribute this to rising healthcare costs from hospitals and providers.

    Source: KFF. “2022 Employer Health Benefits Survey.” ↩︎
  6. The Study highlights the disproportionately high administrative costs in the U.S. healthcare system compared to other high-income nations with centralized systems, where administrative spending ranges between 2-3% of total healthcare expenditures             

       Source: Woolhandler, S., & Himmelstein, D. U. “Administrative Work Consumes One-Quarter of U.S. Physicians’ Working Hours and Lowers Their Career Satisfaction.” Health Affairs, 2014. ↩︎

Wage Theft in Iowa: Abuse of America’s Honest Worker.

Iowa, the heartland of America, often called the bread basket of the world due to the amount of food they export internationally. In Iowa the fields stretch endlessly and communities thrive on their hard work. Iowa’s residents are proud of their work ethic. Despite the beautiful green pastures and salt of the Earth people, an insidious problem lurks beneath the surface: wage theft.

Iowa, is renowned for its agricultural prowess and strong work ethic, but that does not mean Iowans are  immune to wage theft from employers, this is in spite of the State’s robust economy and reputation for fairness. Unfortunately, countless workers fall victim to wage theft each year, their rightful earnings siphoned away by unscrupulous employers. A new report from Common Good Iowa finds that employers are stealing over $900 million a year from an estimated 300,000 Iowa workers — about 1 in 7 workers and their families.

Wage theft encompasses a variety of illicit practices, including unpaid overtime, minimum wage violations, illegal deductions, and outright non-payment for hours worked. The effects are felt by various  workers from various industries. From farm laborers to restaurant staff, construction workers to healthcare professionals the problem seems to be systemic. In 2021 Tyler Technologies, a software company, settled claims for $3 million for not paying overtime wages to its employees in Iowa. The lawsuit was filed by a group of employees who alleged they were not properly compensated for overtime work. Roughly a year later, an employee at Short’s Burger & Shine in Iowa City realized she hadn’t been paid overtime for over 13 years. With the help of the Center for Worker Justice of Eastern Iowa, she was able to recover her the wages she was owed. However, recovering wages is not a guaranteed remedy. On average over 600 unpaid wage claims are filed with Iowa Workforce Development, and only a fraction of wages were recovered. Often, those most vulnerable to exploitation are immigrants, low-wage workers, and individuals with limited English proficiency, who may lack awareness of their rights or fear retaliation for speaking out. This is extremely alarming considering Iowa’s recent uptick in immigration.

Recently, Western Iowa Tech Community College’s settled for $3 million in a federal lawsuit filed by 13 Chilean students who accused the school of deceiving them about an internship program. The students compared the program to forced labor and human trafficking, claiming they were compelled to work up to 50 hours weekly, leaving minimal time for attending classes, studying, or resting. The students were promised to be enrolled in a 2 year culinary program, when in reality they worked 50 hours a week in meat packing factories. A far cry from the culinary arts. This is just one of the cases that was caught by the system due to the savviness of some of the international students. However, there are plenty of similar cases that fly low below the radar of any authorities or news outlets.

In Iowa, the consequences of wage theft ripple through communities, undermining economic stability and perpetuating cycles of poverty. When workers are denied their rightful pay, they struggle to make ends meet, facing difficulties in paying rent, buying groceries, and providing for their families. This not only harms individuals but has ramifications on the local economy, since decreased purchasing power leads to reduced consumer spending and stunted economic growth for the community as a whole.

On paper, Iowa has a robust labor law system. But despite existing labor laws designed to protect workers, enforcement mechanisms in Iowa remain inadequate, leaving many victims without recourse. The State’s Department of Labor, charged with investigating wage theft claims, is understaffed and underfunded, unable to keep pace with the scale of the problem. Further, Iowa’s Courts do not do a good job in upholding labor rights, where a majority of cases are decided on behalf of employers and corporations rather than an employee. Realistically the case split should be relatively even given the nature of labor cases. A 2012 study by the Iowa Policy Project estimated that dishonest employers defraud Iowa workers out of about $600 million annually in wages. This figure reflects the scale of wage theft before the recent escalation to $900 million. Further, Courts often tip toeing around issues in fear of reversal from a higher court.  Additionally, the complexity of the legal processes and fear of employer retaliation often deter workers from pursuing complaints, further perpetuating a culture of impunity.

To combat wage theft effectively, a multi-faceted approach is necessary, addressing both systemic flaws and individual grievances. Firstly, enhancing enforcement efforts through increased funding and staffing is essential to ensure that perpetrators are held accountable for their actions. This includes proactive investigations, targeted audits, and swift penalties for violators. These actions are paramount since too often than not Iowa’s executive branches refuse to exercise their ability to impose penalties.  Additionally, empowering workers with knowledge of their rights and avenues for redress is crucial, through outreach programs, legal assistance, and community organizing. Community organizing would do have a great deal of benefit since workers would be aware of their rights and have a strong support system to help enforce their rights when they are infringed. This includes partnerships between government agencies, advocacy groups, employers, and workers themselves to identify systemic issues, share best practices, and develop innovative strategies for prevention and enforcement. By harnessing the collective expertise and resources of diverse stakeholders, Iowa can forge a unified front against wage theft, ensuring that every worker is treated with dignity and respect.

Fostering a culture of compliance among employers is paramount, emphasizing the importance of fair labor practices and ethical conduct. This entails providing resources and incentives for businesses to uphold labor standards, such as certification programs, tax incentives, and public recognition for compliance. By incentivizing good behavior and penalizing violations, Iowa can create a more level playing field where honest businesses thrive and exploitative practices are marginalized.

Beyond regulatory measures, fostering collaboration between stakeholders is vital to address the root causes of wage theft and promote sustainable solutions. This includes partnerships between government agencies, advocacy groups, employers, and workers themselves to identify systemic issues, share best practices, and develop innovative strategies for prevention and enforcement. By harnessing the collective expertise and resources of diverse stakeholders, Iowa can forge a unified front against wage theft, ensuring that every worker is treated with dignity and respect. Recognizing the intersectionality of wage theft with other social issues is essential to achieve meaningful change. Problems like wage theft  require a multifaceted, especially when the issue disproportionately impacts marginalized communities. Efforts to combat wage theft must also address underlying disparities related to socioeconomic background, race, gender, and immigration status, By adopting an intersectional approach that centers the experiences of the most vulnerable, Iowa can advance equity and justice for all its residents.

From farms to factories, Main Street to the Capitol, the time has come to shine a light on the shadows where exploitation thrives, and to reclaim the promise of fair treatment and economic opportunity for every worker.  Meaning Iowa must confront wage theft head-on, the state has the opportunity to continue to uphold its values of integrity and fairness, ensuring that the heartland remains a place where hard work is rewarded and justice prevails. Or else Iowa risks being seen as a state that only exploits the workers that have built it up through generations.

Sources:

_____________________________________________

Common Good Iowa Report
Common Good Iowa. “Wage Theft in Iowa: An Analysis of Underpayment and Nonpayment of Wages,” 2024.

Tyler Technologies Overtime Pay Dispute
U.S. Department of Labor. “Tyler Technologies Settles Overtime Claims for $3 Million in Iowa,” 2021.

Short’s Burger & Shine Case
Center for Worker Justice of Eastern Iowa. “Employee Recovers 13 Years of Unpaid Overtime from Short’s Burger & Shine,” 2022.

Iowa Workforce Development Claims
Iowa Workforce Development. “Annual Report on Wage Claims and Recovery,” 2023.

Western Iowa Tech Community College Case
Radio Iowa, “Western Iowa Tech to Pay Millions to Students to Settle Lawsuit,” 2024. (https://www.radioiowa.com/2024/04/25/western-iowa-tech-to-pay-millions-to-students-to-settle-lawsuit/)

Iowa Policy Project Study
Iowa Policy Project. “The Cost of Wage Theft in Iowa,” 2012

Arbitration: A Key Piece To Africa’s Future Economic Success

This article is an excerpt of a larger working paper aimed at policy makers, economists, and investors. This article was aimed to be shorter and less technical than the larger paper.

International commercial arbitration has been touted by many members of the business community and legal profession as a suitable means of settling trade disputes outside of a formal court room. The reasons a person would want to choose to arbitrate a commercial dispute could range from the rapidness of arbitral proceedings in comparison to domestic courts to the ability to keep proceedings confidential. But the benefits of commercial arbitration are not strictly limited to the parties involved in the arbitrational proceedings. There have been numerous studies outlining how commercial arbitration also facilitates economic growth and social well being within nations. The United Nations has acknowledged the many benefits of commercial arbitration fact and has incentivized the use of arbitral institutions. No other continent can benefit more from arbitration than Africa.

The UN has facilitated arbitration by incentivizing a multilateral treaty regime for international commercial transactions. One of the main treaties that attempted to incentivize arbitral proceedings is formally known as United Nations Convention on the Recognition and Enforcement of Foreign Arbitral Awards (also known as the  ‘New York Convention’).  Every signatory to the New York Convention makes two fundamental promises. The first promise is to honor written agreements that call for parties to arbitrate matters that are capable of settlement by the arbitration agreement. And the second fundamental promise is that nations who are signatories to the New York Convention agree that their national domestic courts will recognize and enforce arbitral awards. (New York Convetion).  Out of 193 nations, 162 nations are signatories to the New York Convention. The 162 nations include some of the worlds trading powerhouses most notably China and the United States.

Africa is the continent with the least signatories to the New York Convention.  Further, in comparison to other continents, Africa is the least economically developed. (per the Global Policy Forum).  This is not a correlation that should be overlooked. International commercial arbitration attracts investment and can play a vital role in developing a nation’s overall political economy. At a surface level commercial arbitration facilities trade between nations increasing trade input and output, improving economic activity. However, there is subtle message being sent when a nation has a robust institutional system of commercial arbitration and has domestic courts willing to enforce arbitral awards. That message is simple, “we want to incentivize international trade in a fair and equitable manner”. When a nation does this business are more likely to invest and contract with people/entities within that nation, because they have the confidence that domestic courts will enforce arbitral awards. Continents which are considered to be ‘highly developed’, namely Europe and North America, have robust systems that facilitate international commercial arbitration. (Latham & Watkins).

During the 20th century Africa as a continent relied heavily on aid from other wealthier nations to develop. And foreign aid to this day still plays a major role in Africa, and has it’s benefits. However, research done by Mai Abdulaziz Alghamdi suggests that foreign aid may be doing more harm than good. (Alghamdi). He argues that burdensome amounts of foreign aid can have deleterious effects on aid-recipient countries. (Alghamdi). That is because Africa is the largest recipient of foreign aid. The effect of foreign aid on economic growth is positive however the net benefit of foreign aid is small, suggesting that foreign aid does not result in drastic increases in economic growth.( Alghamdi). Countries need aid to develop but there are negative consequences if a nation heavily relies on aid to fund its government and develop its economy. For example, Bazoumana Ouattara analyzed the effect of aid flow in Senegal. He found that that a large portion of aid flow (around 41%) is used to finance Senegal’s debt and 20% of the government’s resources are devoted to debt servicing. (Ouattara). Secondly, he found that the impact of aid flows on domestic expenditures is statistically insignificant, and that debt servicing has a significant negative effect on domestic expenditure. (Ouattara). In essence, the aid given to Senegal is used to finance the government and not neccesarily used to directly develop the economy as a whole. Several African nations seem to have recognized that in order to sustain meaningful economic development then they must not rely so much on foreign aid. Many nations have attempted to stimulate business activity within their jurisdiction via various economic initiatives. But Africa’s economic powerhouses seem to have one thing in common when it comes to economic/ legal development in the 21st century. They all are utilizing the tools of international commercial arbitration to stimulate economic growth.  One significant nation

Four years after Kenyan independence, that Kenya would enact its first sovereign arbitration legislation, The Arbitration Act of 1968. It was largely influenced by the Arbitration Ordinance of 1914 which was legislation used in colonial Kenya. However, for some unexplained reason, the act adopted outdated arbitral protocol when instead they ideally should have used the New York Convention as a model for Kenya’s arbitral legislation. So, in essence what occurred is that Kenya kept Britain’s colonial arbitral law intact. Unfortunately, the act allowed the court to retain their oversight over all arbitral proceedings in Kenya, meaning that parties could manipulate the court system to frustrate and delay the arbitral process. (Mbithi). In contrast to Kenya’s pre-colonial arbitral past. For example, in East African Power & Lightning Co. Ltd v Kilimanjaro Construction ltd, the Court of Appeals, declined to stay proceedings in favor of arbitration in spite of the fact of the existence of an arbitration agreement.

However a  comprehensive piece of arbitral legislation would come in to effect in 1995. After Kenya aggressively pursued policies that successfully attracted foreign direct investment, it quickly became apparent that the Arbitration Act of 1968 needed reform in order to keep foreign investment within Kenya high. (Mbithi). Kenya had some of its worst economic performances between the years of 1991-92. Growth stagnated. Inflation reached a historic level. Further the government’s budget deficit was over 10% of GDP. In effect, due to treaty requirements, bilateral and multilateral donors suspended their aid programs in Kenya in 1991, resulting in economic uncertainty. One of the ways Kenyan legislature attempted to remedy the dire economic situation was by repealing the old arbitration act and creating a new framework. (Mbithi).  The legislature enacted the Arbitration Act, No. 4 of 1995. The new piece of legislation adopted the UNCITRAL model law, a more modern framework arbitral framework. It also was expanded to include both domestic and international arbitration. (Mbithi).  But despite these major improvements, there was a profound change to the new piece legislation.  Section X of the Arbitration Act stipulated “except as provided in this Act, no court shall intervene in matters governed by this Act”. This not only had ramifications in international commercial arbitration, but it also was a check on the judiciary by the legislature, prior to this act the courts had absolute oversight over all adjudicative functions in the country.

In 2006, Kenya’s government drafted a new developmental program that would make sure that by 2030 Kenya is “newly industrialized, middle income country that provides a high quality of life to all it’s citizens”. (Vision 2030).  The plan is called Kenya Vision 2030.  As of 2020, the initiative has proven fruitful. (World Bank). Kenya far at performs its neighbors economically, mainly due to the influx of foreign investment and their well developed social and physical infrastructure. (World Bank). Further, in 2020 Kenya ranked number 56 in the Ease of Doing Business Index. This is a significant jump in rankings when compared to Kenya’s position in 2010 which was 95. This improvement can be partly explained by changes made within Kenya’s Constitution. In order to facilitate the Kenya Vision 2030 plan, the constitution was changed to include this provision: “alternative forms of dispute resolution including reconciliation, mediation, arbitration and traditional dispute resolution mechanisms shall be promoted, subject to clause”. (Muigua). Arbitration was now backed via statute and Kenya’s constitution. This signaled to foreign investors and businesses that commercial arbitration is being incentivized within the nation. After the constitution was changed, Kenya made exponential improvements economically, and their rankings in the Ease of Doing business index would continue to rise. (Muigua) Kenya will likely fulfill the goals set out in the Kenya Vision 2030 plan.

Robert Moses: The Unelected Master Planner

Robert Moses is a figure that’s relatively obscure to the general public. However his influence has had a lasting impact throughout the United States. He would be paramount in engineering how cities in the States were structured, effectively influencing how and where Americans would spend their money.

Who was Robert Moses? Well, to start, he was unelected public official who held about 12 positions in the Greater New York city area. His stints in public office span from 1924-66. The positions he held had tremendous influence over urban planning. Urban planners aren’t often thought of as being political behemoths but Robert Moses’s tenure in these positions forces us to reconsider the influence unelected politicians may have over society.

Mr. Moses was a relentless, effective, and a calculated worker. His ability to start and finish public projects is arguably unmatched within the scope of American history. Furthermore, his ability to manipulate power goes far beyond the scope of anything Machiavelli could have imagined within a democratic republic. Robert Moses wasn’t fully understood or recognized outside of New York until the publication of Rob Caro’s Pulitzer winning book The Power Broker. The book gives us a grandiose look into the Moses. Robert Caro spent years researching for his book which spans roughly 1,300 pages. His scholarship, alongside with years of historical developments since the initial publication, are what guide my analysis on Robert Moses. Through our investigation of Robert Moses we will come to understand how a lot of cities in the United States mirror each other in terms of structure and societal development. And, albeit indirectly, an analysis of Moses forces us to consider a few philosophical questions when it comes to ideal local governance in the United States. But before we attempt to get understand why these two inquires are relevant , we have to investigate the rise of Robert Moses.

 Robert Moses assent spanned various societal backgrounds. His tenure in public office spans three major historical events in the United States. Moses held positions during the economic boom of the 1920s, a crippling Depression in the 1930’s, World War II, and the subsequent post war economic boom.

The 1920’s: The Rise to Power

After finishing up his PhD at Columbia University, Moses decides to enter New York politics as a political idealist motivated to make change. A story familiar to many young professionals who aim to change the “old guard” within political systems. Moses had plenty of issues he wanted to grapple over. The society he was living in was corrupt, had little to no consumer protection, and certain industries were dominated by monopolies. He briefly worked for the Bureau of Municipal Research and with the U.S. Food Commission. But soon he realized that philosophical theories and logic, no matter how beneficial, wouldn’t take you far when it came to political advancement. His initial propositions were brushed under the rug by the seasoned veterans of government. Though his theoretical understanding of politics would come in handy from time to time, his practical education of political power would be where he was able to hone the craft of political power.

After a series of fortunate events  Moses found himself appointed as the chief of staff to a woman named Belle Moskowitz. She was the leader of a commission tasked with organizing New Yorks administrative structure. A responsibility which came with significant power. It’s worthy to note Belle Moskowitz wasn’t elected by anyone. Rather, Moskowitz was appointed by Alfred Smith the Governor of New York. Smith was of course elected. I include these details not to be redundantly informative but rather to highlight the opaque nature of local government when it comes to transparency. People who you may assume are in control are passing that responsibility to an “advisor”, meaning there are various puppeteers pulling the strings. Moses’s time with Moskowitz is where he would learn the “tricks of the trade” in terms local governance. After managing to impress Alfred Smith through the early 1920’s, Moses found himself appointed to his first positions of power. The appointments would lead him to a notorious political squabble with an eventual US president, Mr. Franklin Delano Roosevelt.

The Appointed One & The Fight with Roosevelt.

In 1924 Moses was appointed as the leader of both the Long Island State Park Commission and State Council of Parks. Moses actually drafted the legislation that created the power of these commission earlier in his career. Personally, when I read the names of these positions I didn’t immediately think POWER.  But let’s remember that Moses was calculated.  He strategically used the power that he did have to gain even more power. Being head of these political bodies allowed him unprecedented control over land-use and highway construction. Behind the scenes he usurped control over certain political entities from elected officials. Moses would lobby constituents, politicians, and special interest groups into allowing him to have independent control over land-use and highway development commissions. Overtime he began to resemble a mini dictator. However, his power wouldn’t go unchallenged.

LC645-600Border
Young Roosevelt.

Franklin Roosevelt, at the time leader of the Taconic State Parkway Commission, had a political spat with Moses. It all started when Roosevelt had a plan to build a parkway through a region of New York City called the Hudson Valley. Moses had different plans. He managed to funnel all the funds from Roosevelt’s project to his own project. Moses was able to keep the funding to Roosevelt’s project so low that it could barely even maintain operations. Roosevelt complained to the governor that Moses was “skinning” Smith’s administration alive. But nothing happened. Eventually, Roosevelt became governor and eventually his parkway project was completed. Roosevelt had another goal in mind, and that was to remove Moses from power. But the removal of Moses was almost impossible by the time Roosevelt became governor. Robert Moses had set up a powerful base of political independence by using legislation, public funding, the press, and young political reformers to support his positions. He would later spearhead a commission which aimed to consolidate 187 separate agencies into eighteen departments. In just 10 year’s Moses was able to absorb power from potential opponents and build a powerful network to get his projects done. But this was just the start there was much more to come from Robert Moses.

The Depression & Beyond

During the 1930’s the United States suffered an economic depression. During this economic catastrophe Robert Moses would blossom. Ironically, his former rival actually enabled this via New Deal legislation lead by President Roosevelt. Moses was granted even more executive and monetary incentive to solidify his power by the Federal Government. Roosevelt, not forgetting his political tenure in New York, attempted to get Moses ousted by making federal funds available only if Moses was removed from office. Moses wasn’t threatened. He told the press of Roosevelts demands. Subsequently, the Federal Government had to stop after increasing public pressure. But as World War II was being waged, Robert Moses’s influence on New York City began to take shape.  The Master Builder started to work on his vision. One unnamed federal official commented on Moses during this era saying:

“Because Robert Moses was so far ahead of anyone else in the country, he had greater influence on urban renewal in the United States – on how the program developed and on how it was received by the public – than any other single person.”

That quote gives us an insight on the magnitude of power Moses had. He was responsible for many projects ranging from the United Nations Headquarters, Shea Stadium, and the Pratt Institute. But he also led initiatives to spur more highway developments, suburban housing developments, strip malls, and other public amenities. Moses got even better at getting projects done. A common strategy involved starting projects knowing that financially they couldn’t be accomplished , but he would leverage political clout in order to manipulate political officials to complete his projects anyway. While in the depression his projects employed a largely jobless populous during the Great Depression. During this era, he held numerous public positions at the same time. None of the positions required him to be publicly elected.

WWII & The New America

The world dramatically changed after World War II. The United States emerged as an economic and political powerhouse within the International community.  Moses understood this and he wanted to further influence the new world around him. His goal for NYC was one that attempted to integrate an urban center to suburban areas which would all be interconnected via parkways. The bureaucrat’s vision would influence America for the years to come.

After World War II America’s social community began to change. Women entered the work force in droves, the nation was in better economic shape than a lot of nations in the world, and the ideal of “Americanness” began to solidify. What do I mean by Americanness? I mean white picket fences, increased home & automobile ownership, and the development of mass consumerism. After WWII plenty of soldiers came home to start anew. They were incentivized to start “nuclear” families, to buy homes, develop their market skills, and most importantly to spend money in order to expand the American economy. Robert Moses was fully aware of this societal shift. He saw the traditional layout of American cities as archaic and counter intuitive to the world’s economic demands. Small retail owners were dismissed in favor of shopping behemoths

download (1)
Robert Moses and NYC Mayor Jimmy Walker.

such as Macy’s, Sears, and the advent of the shopping mall. Local restaurants were forgotten as Dairy Queen and McDonalds slowly became staples in the American diet. Automobiles slowly eliminated the reliance on public transport, allowing people to buy suburban properties further away from NYC.  Moses preferred a sprawl model over concentrated urban communities. And he developed plenty of projects to incentivize the sprawl model. New Yorkers, such as Robert Caro, criticize Moses for destroying New York neighborhoods in favor of vast highways that connected the suburbs to the City. When developing these projects Moses displaced hundreds of thousands of people, destroyed economic centers, and arguably community identity. This led critics to surmise that Moses perhaps preferred automobiles and shopping centers over people. Furthermore, Moses played a part in depleting New York’s resources to develop his projects.  But despite that, the Moses model was in demand in post war America. Plenty of public officials from around the country demanded Robert Moses’s expertise in developing their city plans. This may explain why many American cities, especially in the Midwest, mirror each other in a plethora of ways.

In hindsight Moses’s city planning was a perfect model for a globalized economy. It was predictable; generally people would work a similar hourly schedule, consistently consume products from publicly traded corporations, and, by driving, consumers would

download
Robert Moses

support the gas, oil, and automobile industry. This model has its merits. It’s predicable, safe, and allows people to consume their preferred products. However, a community too reliant on the Moses model is more susceptible to global economic crises. This isn’t just a theoretical proposition, practical examples are evident when we look at Detroit and Las Vegas during the 2008 financial crisis. But it’d be remiss to not mention how many new and innovative developments Moses was responsible for. He was able to engineer and execute massive urban plans that did help a considerable amount of people. But at the expense of displacing many people out of their communities. But one of the most disturbing things about Robert Moses is his ability to become an immensely influential political figure without having to get elected into political office.

Moses’s story forces us to think about the type of local (& perhaps national) governments people would prefer. Do we prefer governments that can be taken over by “Mosesesque” figures in order to get long term, and perhaps beneficial, projects done? Or do we want a system that is a bit more decentralized which doesn’t allow any one sole “political will” to dominate? Whatever you prefer, each has its positive and negative implication.

Which begs a peripheral question: How much do YOU know about the unelected officials in your local government? A question to consider.

Sources:

Power Broker by Robert Caro

ROBERT MOSES AND THE RISE OF NEW YORK THE POWER BROKER IN PERSPECTIVE by KENNETH T. JACKSON

A Consumer’s Republic: The Politics of Mass Consumption in Postwar America by Lizabeth Cohen

https://www.pbs.org/wnet/need-to-know/environment/the-legacy-of-robert-moses/16018/

http://fordhampoliticalreview.org/the-legacy-of-robert-moses/

America’s Forgotten Civil War: Colorado’s Coalfield War

     The first article of the new five part Forgotten American History series! The Forgotten American History series aims to introduce readers to the less commonly known aspects of American history. The first edition takes us to Colorado! Hope you enjoy. 

 

 

Colorado’s Coalfield War is one of the most violent yet obscure events in American history. Which is a bit puzzling since The Coalfield War has all the allure of the quintessential American story. It has divisiveness, the quest for the American dream, violence, and an underdog. The Coalfield War took place after a rapid economic boom in the United States. The early 20th century saw the development of notable business magnates. Some you are most likely familiar with such as Andrew Carnegie, John D. Rockefeller, and Henry Ford. During their time they were commonly referred to as ‘industrialist”. That’s mainly due to the economic supremacy they had on industries such as fossil fuel, manufacturing, and transportation. The business strategies commonly used by these magnates were monopolistic. Common techniques used to monopolize included unilateral corporate acquisitions, price controls, and wage suppression. However, a new social development would attempt to countervail the monopolistic tendencies of these business tycoons.  The development being worker’s unions.

Laborers in the early 20th century worked in abhorrent conditions. An unnamed worker who grew up in one of Pennsylvania’s mining communities provides an account on what life was like for a miner:

Our daily life is not a pleasant one. When we put on our oil soaked suit in the morning we can’t guess all the dangers which threaten our lives. We walk sometimes miles to the place- to the man way or traveling way, or to the mouth of the shaft on top of the slope. Add then we enter the darkened chambers of the mines. On our right and on our left we see the logs that keep up the top and support the sides which may crush us into shapeless masses, as they have done to many of our comrades. We get old quickly. Powder, smoke, after-damp, bad air- all combine to bring furrows to our faces and asthma to our lungs.”

Wages were often not paid in US dollars. Rather, workers were paid with metallic strips which were redeemable in company stores. A stark contrast to how modern wage payment is facilitated. Furthermore, workers often lived at their work sites. Worker’s would often build their own dwellings which ranged from tents to shacks. This led to the development of work specific settlements.  In addition, workers often lacked representation in terms of corporate boardrooms. However, workers unions began to spring up providing an opportunity for representation. Exploited laborers could finally voice their frustration en masse.

Colorado’s Coalfield War gives us a perfect opportunity to examine the early relationship between industrialists and workers unions. The stereotypical relationship is often framed idealistically. The cliché often goes like this; workers are in discontent due to their impoverished work situation.  They then begin to band together and organize. Managers are often against organizing but after some convincing they slowly join the workers’ cause. And in one harmonious swoop the workers walk over to administrative offices and demand that the industrialist improve conditions. The industrialist, understanding the gravity of the situation, then succumbs to their demands. And after both parties reach an agreement. But realistically it was never that straightforward.  Colorado’s Coalfield War will give us a realistic glimpse of how a lot of early labor disputes panned out in the United States.

The story of Colorado’s Coalfield War begins in the coal mines of southern Colorado during the 1910’s. Colorado’s coal industry at the time was booming. So much so that roughly 10 percent of the state’s population was employed by the coal sector. At the time coal was highly profitable due to the demand of America’s expanding railroad system which needed coal to fuel their engines. One of the nation’s richest people were involved

Apr20family-298x300
One of Colorado’s mining families that was living in a tent community

in the coal industry. For example, John D. Rockefeller Jr (heir to John D. Rockefeller) recognized an opportunity to capitalize and acquired ownership of the Colorado Fuel and Iron company (CFI).

Coal mining for the CFI was physically arduous and hazardous work. CFI’s coal miners were under a considerable amount of fatal risk compared to other American coal miners. Statistically, miners in Colorado were twice as likely to die on the job compared to their peers in other states. That’s not to say that the other states were a pleasant place work. But Colorado’s coal mines were considerably risky. The fear of explosion, suffocation and collapsing mines was the reality for many coal miners . Ironically, Colorado had some of the best mining laws in the country. But Colorado’s mining laws were rarely enforced. The United States House Committee on Mines once declared:

Colorado has good mining laws and such that ought to afford protection to the miners as to safety in the mine if they were enforced, yet in this State the percentage of fatalities is larger than any other, showing there is undoubtedly something wrong in reference to the management of its coal mines

Furthermore, mining labor in Colorado was egregiously exploited. Worker’s were paid for the tonnage of coal produced. However, their “dead work” (maintenance, supply runs, and infrastructure repairs) were unpaid.

By 1913, 10,000 of Colorado’s miners had enough with their work environment and decided to strike. The strikers attempted to unionize via the United Mine Workers of America. They demanded improved work conditions, better wages, strict enforcement of Colorado’s mining laws, and union recognition. The CFI responded by rejecting all of the union’s demands.

 

Ludlow_Death_Car
Baldwin- Felts employees with an armored car.

There were considerable measures taken to countervail unionization. The CFI employed strikebreakers to keep the company running. The company evicted strikers from their company homes forcing the striker to build tents for their families nearby. Under Rockefellers orders, the CFI hired Baldwin- Felts Detective Agency (a private detective agency) to harass the strikers.  The agency would shine spotlight on tents, fire live ammunition at strikers’ tents, and patrolled the tent communities with an armored vehicle that had a machine gun mounted unto it. Clearly these were terror tactics. The strikers were unphased. Strikers responded to the terror tactics by taking up arms and defending their tents. Eventually, the skirmishes were acknowledged by the governor of Colorado and he responded by sending the National Guard to the tent community in Ludlow. The strikers were under the impression that the National Guard was there to protect them. But several hundred strikers were arrested by them and often beat the strikers. The National Guard would add more fuel to the fire when they discovered that a strikebreaker had been murdered. The National Guard had been financed by the CFI to cover the expenses of deployment, so they had an implicit obligation to make sure the CFI’s interests were met. One day while the tent dwellers were at funerals commemorating two infants, the National Guard began to dismantle the tent community. However, the community members rebuilt the tents and they continued the strike, persevering through the winter. However, things would come to a boiling point on April of 1914.

The Ludlow Massacre

On April 20th 1914, two national guard posts were deployed on top of a hill, encircling the Ludlow tent community. They deployed an armed post with a machine gun overlooking the strikers. No one is exactly sure what instigated the violence. Some historical records suggest that the National Guard was demanding the release of a

Masses_1914_John_Sloan
The Masses cover art depicting the Ludlow Massacre

hostage, but the strikers refused to give the hostage up. One of the sides then opened fire (it’s unclear who fired the first shot). Nevertheless, a battle would ensue which lasted the whole day. The casualties included high ranking union members such as Louis Tikas. Innocent bystanders (mainly women and children) hid in their tents to avoid the gunfire. The strikers retreated. The National guard then went to the tents, doused them with kerosene, and set them on fire. One of the tents that were set on fire housed 11 children and 2 women. The women and children all died, they were either burned or suffocated to death. These casualties were deemed a massacre by several periodicals in Colorado. The news of the National Guard’s atrocities would then spread across the nation like wild fire.

   Height of The Coalfield War

In Denver, the United Mine Workers declared “A Call to Arms”. They suggested that all union members should gather all “arms and ammunition legally available.” . Subsequently an insurgency would take place in Colorado. Three hundred armed strikers marched from all over Colorado to the Ludlow area. When they made it, the insurgents cut telephone and telegraph wires. And they prepared for battle. The New York Times described the event as such:

“With the deadliest weapons of civilization in the hands of savage-mined men, there can be no telling to what lengths the war in Colorado will go unless it is quelled by force … The President should turn his attention from Mexico long enough to take stern measures in Colorado

Furthermore, in an act of solidarity railroad workers refused to transport National Guard soldiers from Trinidad to Ludlow via railway. Up north in Colorado Springs, union

CC-X-60543
Colorado National Guardsman at an Outpost in Southern Colorado.

miners walked off their jobs and set off to Trinidad. They carried revolvers, rifles, and shotguns. Support was even shown on the East Coast. In New York City, picketers marched in front of the Rockefeller office located on 26 Broadway, New York City. However, these demonstrations were quickly quashed by local law enforcement.

When all the miners met in southern Colorado violence naturally ensued. They attacked antiunion town officials, supervisors/guards, and strikebreakers. Sporadic violence was rampant in southern Colorado as the miners carried out targeted killings, the statistical figures on fatalities vary considerably. So, a precise number can’t be drawn on how many people died. The insurgents also damaged a considerable amount of mining infrastructure.  The Associated Press estimated the financial losses at $18 million (which is about $450,239,203 in 2019).  The CFI alone lost $1.6 million. They were also able to strategically take control of an area that was roughly 50 miles long and 5 miles wide. However, this control didn’t last long. President Woodrow Wilson dispatched federal troops to Colorado, and the miners subsequently surrendered.

         Aftermath

After the Coalfield Wars, Congress held hearings with John D. Rockefeller Jr, union leaders, and several high-ranking members of the National Guard. Though atrocities were recognized by both sides during the hearing, no one was ever formally indicted for their crimes. Unfortunately, a lot of the tangible benefits the strikers were fighting didn’t materialize.  But all wasn’t lost. Rockefeller, feeling political pressure, lead an initiative so workers could have internal representation in the CFI. A measure akin to modern internal corporate arbitration. He also created an internal company union. And encouraged internal social services such as creating a YMCA for the Mining department. During this era, the YMCA played a substantial role in influencing morality and promoting athletic activity within American communities. But it’s important to remember these measures are a far cry from what the original demands the UMWA fought for. It can be argued that these measures were a bit of strategic marketing from Rockefeller. Think about internal company unions will always have corporate interest in mind. So full workers representation isn’t fulfilled. But there is a silver lining, the UMWA gained 4,000 new  members.

In all the Coalfield War gives us an interesting look into the dynamic relationship between industrialists, the government, and workers. Namely, that when disenfranchised workers sought better work conditions that undermined corporate interests, considerable measures were taken to curtail workers goals. Measures which would disgusts modern American sentiments.  Hiring private companies to terrorize workers, bringing in government officials to suppress workers, and massacring innocent bystanders would likely surprise many American households in the 21st century. We also get a key insight on what happens when “the people” get pushed too far in terms of getting their grievances acknowledged. Violent civil disobedience.

 

I’ll leave readers with song lyrics about the Ludlow massacre by Woody Guthrie:

It was early springtime when the strike was on,

800px-Ludlow_Monument_Cropped
Ludlow Memorial

They drove us miners out of doors,

Out from the houses that the Company owned,

We moved into tents up at old Ludlow.

 

I was worried bad about my children,

Soldiers guarding the railroad bridge,

Every once in a while a bullet would fly,

Kick up gravel under my feet.

 

We were so afraid you would kill our children,

We dug us a cave that was seven foot deep,

Carried our young ones and pregnant women

Down inside the cave to sleep.

 

That very night your soldiers waited,

Until all us miners were asleep,

You snuck around our little tent town,

Soaked our tents with your kerosene

 

 

 

Works Cited:

https://coloradoencyclopedia.org/article/ludlow-massacre

https://www.zinnedproject.org/news/tdih/ludlow-massacre/

https://www.pbs.org/wgbh/americanexperience/features/rockefellers-ludlow/

https://upcolorado.com/university-press-of-colorado/item/download/301_0c3ef02f967b1fa4d978737d608bc159

The Ludlow Massacre: Class, Warfare, and Historical Memory in Southern Colorado by Mark Walker (Historical Archaeology Vol. 37, No. 3, Remembering Landscapes of Conflict (2003), pp. 66-80)

A Miner’s Story The Independent, LIV (June 12, 1902), 1407-10. (http://www.digitalhistory.uh.edu/voices/social_history/14miner.cfm)

Thales & Heraclitus: What Russell Got Wrong.

Bertrand Russell Chiefing A Pipe.

    Often Bertrand Russell is revered in the mainstream philosophical community. And rightly so, the work he’s done in the fields of logic, linguistics, and mathematics have had a profound impact on the world. His influence has led him to be credited as the founder of analytic philosophy. But people often forget that Russell was also interested in history, so much so that he penned a lengthy history of Western Philosophy, which he called A History of Western Philosophy. This article will discuss Bertrand Russell’s account of Heraclitus and Thales. Two philosophers who came before Plato and Aristotle. The reason such a discussion is necessary is due to the fact that Russell may not be giving an accurate portrayal of either philosopher in his book. The reason being is that Russel relies on problematic sources to back his claims. This piece will attempt to outline the thoughts Russell had on these thinkers, and then we will criticize certain elements of his arguments. But in order to conduct a proper analysis we must understand the overal goal of Russel book.

    In the History of Western Philosophy  Bertrand Russell attempts to provide a coherent timeline for western philosophical thought. He claims that in order to successfully attempt such a project a specific method of analysis must be used. A method which is “philosophical”. By “philosophical” Russell means that he’ll attempt to synthesize the historical development of two different styles of inquiry, those being scientific and theological traditions (Russell Xiii). Both have different functions, but yet throughout history they’ve reinforced one another in various ways. For Russel, theology is useful because it allows us to make “speculation on matters as to which definite knowledge has, so far, been unascertainable.”(Russell Xiii). In other words, theology allows human reason to explore the unknowable. Now on the other hand, science allows human reason to explore the knowable (Russell Xiv). According to Russell, both have limitations; theology induces dogmatic belief (which he disapproves of), while science tells us what we can in fact know but “what we can know is little” (Russell xiv). Having acknowledged their flaws, Russell proceeds to argue that the development of human intellectual history has been shaped by those two methods of inquiry interacting with one another over time. Theology picks up the methodological flaw inherent in science, and vice versa. It’s this symmetric relationship which allows Russell to put various thinkers in dialogue with one another. Giving readers a coherent narrative to follow in terms of the development of western philosophical thought. But Russell’s methods have drawn scrutiny amongst critics. Frederick Copleston, a contemporary of Russel, acknowledged that “[Russell] treatment of a number of important philosophers is both inadequate and misleading.”. The inadequacy and misleading nature of Russell’s work is evident in his description of two philosophers who came before Socrates, Thales and Heraclitus.  

 

Bertrand’s Thales

Image result for thales
Thales the “scientist”

    In order to understand and identify the “inadequate and misleading” elements of Russel’s work we must analyze his descriptions of certain philosophers. Some of the problematic elements of his descriptions can be found when he describes Thales, a thinker who was active in the 6th century BCE. To be frank, little is known about Thales specific work, as none of his writing survived. But despite that fact, society can get a general idea about Thales by reading some second hand accounts about his teachings.  Russell provides an introduction to Thales, writing: 

“There is…ample reason to feel respect for Thales, though perhaps rather as a man of science than as a philosopher in the modern sense of the word.” (Russell 24)

This sentence should warrant our attention because we can analyze and infer a few things from Russell’s statement. One, that Bertrand holds Thales in high regard compared to the other philosopher of that particular era. And secondly, we should hold a favorable opinion on him because compared to these philosophers Thales is a “man of science”. Why does Russell feel this way? Well, it all stems from a theory attributed to Thales which professes that everything is made of water. A problematic theory to credit onto Thales in the first place, but the reason for that will be addressed in a different section in this paper. Russell explains that Thales’s theory of water shouldn’t be taken as some “foolish” hypothesis but rather as a scientific hypothesis (Russell 26). 

Now the reason he feels like Thales warrants such high praise is due to some scientific discoveries made while he wrote his book. While Russell was writing his book in the 20th century, the scientific consensus seemed to match well with Thales water theory. The consensus was largely contingent on the fact that the theoretical work done by the scientist Willaim Prout on atoms was true. Prout hypothesized that the hydrogen atom was the only fundamental element of the universe. Furthermore, he said that the atoms of other elements were actually just collection of different hydrogen atoms (Rosenfeld). This is similar to Thales’s theory since hydrogen is a pretty important component when it comes to water, but is different since Prout specifies the element hydrogen.  So this background information helps explain why Russell felt so confident in Thales. And explains assertions such as this: 

The statement that everything is made of water is to be regarded as a scientific hypothesis… Twenty years ago, the received view was that everything is made of hydrogen, which is two thirds water…. His [Thales] science and his philosophy were both crude, but they were such as to stimulate both thought and observation.” (Russell 26)

Now the last part of that sentence describes how his science and philosophy were “crude” but are acceptable since they aimed to stimulate both thought and observation. So, one can infer that theoretical frameworks which stimulate thought and observation, are ones which Russell approves of. But Russell also lets readers know what kind of frameworks he doesn’t appreciate. That leads us to Russell’s description of Heraclitus. 

Bertrand’s Heraclitus

Related image
Heraclitus the “mystic”

    The way Heraclitus is portrayed in Russell’s book plays on the theme of science and theology interacting with each other overtime. Russell generally views Heraclitus in a negative light, but acknowledges the difficulty science has had in refuting Heraclitus’s theory of perpetual flux. Additionally, Heraclitus is strangely categorized as “mystical” rather than “scientific”. Russell describes the nature of Heraclitus thought as such: 

Heraclitus, though an Ionian, was not in the scientific tradition of the Milesians. He was a mystic, but of a peculiar kind. He regarded fire as the fundamental substance, everything… is born by the death of something else “ (Russell 41)

Russell doesn’t give us a clear reason why Heraclitus shouldn’t be considered scientific, but we can imply that it’s due to his heavy reliance on intuition and speculation. Heraclitus brand of mysticism is categorized as reforming the religion of his day (Russell 42). Additionally, elements of Heraclitus doctrine are criticized by Russell. Specifically he attacks Heraclitus views on war, contempt for mankind, and his disapproval of democracy. 

Now having outlined what Russell says about these thinkers. It’s time to shift focus on what Russell may have gotten wrong when discussing these philosophers.  For instance we can use the reasoning Bertrand used to praise Thales to talk about Heraclitus as a “scientific thinker”. Additionally, we can also conceive as Thales as a “mystic”. Furthermore, we can learn to understand how Russell came to these conceptions when investigating the sources he decided to use. 

 

Analysis of Russell’s claims 

  Our criticism of Russell should begin with looking at what kind of information Russell based his critiques on. He’s pretty transparent in letting the readers know where he got his information from, writing: 

“According to Aristotle, he thought that water is the original substance out of which all others are formed; and he maintained that the earth rests on water”(Russell 26)

But there’s an issue with Russell’s apparent transparency. In the next paragraph he goes on to take Aristotle’s account as pure fact, and basis his entire scientific description of Thales on it. Never once does the problematic nature of Aristotle’s account of Thales get mentioned. But thankfully, recent scholarship done by Frede tells us why Aristotle’s writings on Thales aren’t to be taken as absolute fact. Frede explains that:

it is not Aristotle’s aim to provide an account of his origin of philosophy and its evolution for its own sake, to satisfy his and his readers own historical interests “(Frede 503)

Basically, Frede notes that Aristotle wasn’t entirely fair when it came down to providing accurate descriptions of certain thinkers, but rather was using their doctrines to validate his work (Frede). Now having considered that fact Thales can be seen as a mystic because not a lot of his doctrine was written down, and getting an accurate description of his work is difficult. But the school of thought he was a part of (the Milesian school) had mystical tendencies that Bertrand speaks of.  Additionally, Aryeh Finkelberg notes that: 

“Heraclitus, and other early Greek thinkers, did not set out to found philosophy and science, or pave the way for Aristotle—who has long been criticized “for reading his philosophical concerns into the early thinkers (Finkelberg, Heraclitus and Thales’ Conceptual Scheme). “So the method Bertrand uses to put them in dialogue together is problematic since none of these thinkers thought of themselves as either scientists, philosophers or mystics.

    Now having mentioned the problematic nature of the sources, I will provide  sources which allow us to think of Thales as a “mystic” and Heraclitus as a “scientist”. To begin I will refer to a source used by Russell himself- Aristotle. As noted previously Russell relies on Aristotle’s account of Thales to prove that the thinker was indeed scientific. But he conveniently leaves out an account that could hint at him being less “scientific”. In Aristotle’s work On the Soul  Thales is framed as a thinker who’s influenced by “mysticism” and attempts to explain the world via religious terms.  The account goes as such: 

“Thales too (as far as we can judge from people’s memoirs) apparently took the soul to be a principle of movement…Some say that the universe is shot through with soul, which is perhaps why Thales too though that all things were full of Gods”( Aristotle, On the Soul 405a)

There’s a lot to unpack from this phrase. Firstly, Aristotle is relying on testimonials from various people to get Thales’s account on souls. So we can infer that Thales Soul/Movement Theory was one that was known and discussed among contemporaries that were familiar with Thales. Secondly, we can see that Thales theory is based on metaphysical concepts (soul), and that these concepts have at least some effect on our material world (movement). And lastly, we can surmise that Thales’s world view largely consists of things having Gods within them. Arguably, this is a pretty “mystical” way to perceive reality. But from this phrase it’s unclear if Gods and Soul are in the same realm in terms of metaphysics. From the quote, soul is something metaphysical since it’s “principal of movement” and not movement itself. But Gods can be seen as both physical and metaphysical, since the universe being “shot with Soul” would have impact if whether things were filled with Gods or not. But it’s unclear from this reading if Gods are physical, metaphysical, or both. What we can clearly analyze is that Thales does have some mystical element in his analysis. Rendering Russell’s description as inadequate and a bit misleading. 

    Furthermore, Thales theory of water as the fundamental source of everything isn’t necessarily true. He may have never postulated that. Aristotle explains that he did indeed say that water is the fundamental source, but he also claims that he may not have seen it that way after all. Explaining that the earth and water could be reinforcing each other as elements ( Aristotle,On the Heavens, 292-294b). Thales could’ve easily believed that there didn’t need to be one principal element that’s responsible for everything. For all we know Thales could’ve theorized that several elements contributed to the forces of the world. But because Aristotle is using Thales to justify his own theories, conceptualizing him as a philosopher who believes that one fundamental source is responsible for everything is necessary in order to legitimize Aristotle’s views . 

    Let’s transition over to Heraclitus, aka the “mystical” thinker. Firstly, I’d like to mention that Russell dismissal of the claim that “everything is fire” and approval of “everything is water” is absurd. The way he justifies his reasoning, though understandable, is equally as silly. He uses Prout’s work on atoms to back up that claim but you could do the same for Heraclitus. After all everything in the universe emits heat, and if we understand fire to mean “element that emits heat”, then (considering 21st century physics) Heraclitus theory shouldn’t be taken as foolish either. Further, he can been seen as scientific due to observations such as these: 

Sea: water most pure and most tainted, drinkable and wholesome for fish, but undrinkable and poisonous for people”( Hippolytus, Refutation of All Heresies,)

&

Corpses should be disposed of more readily than dung” (Strabo, Geography).

The first quote is an empirical observation on how one element can nourish one animal but yet be dangerous to another. While the second can be interpreted as a public service announcement that corpses are as unsanitary as dung. Though not completely “scientific” in our modern use of the term, these statements are observations on the general nature of the world, and are valid. Thales allegedly made similar observations but Russell holds him in higher esteem compared to Heraclitus. 

    In all we can see that Bertrand Russell’s claims in the  History of Western Philosophy are problematic. Mainly because the notion that these thinkers were either scientific or mystical are inaccurate conceptions in the first place,since the thinkers didn’t even see themselves as such. And since we can conceptualize each thinker as both a “mystic” and “scientist” Russel’s analysis is misleading. Furthermore, the evidence used by Russell isn’t the best since the source itself, Aristotle, is biased.

 

 

 

 

Source(s):

Frede, Michael. “Aristotle’s Account of the Origins of Philosophy – Oxford Handbooks.” Oxford Handbooks – Scholarly Research Reviews, 27 Apr. 2018, http://www.oxfordhandbooks.com/view/10.1093/oxfordhb/9780195146875.001.0001/oxfordhb-9780195146875-e-20.

“Heraclitus and Thales’ Conceptual Scheme.” Heraclitus and Thales’ Conceptual Scheme | Reading Religion, 31 May 2017, readingreligion.org/books/heraclitus-and-thales-conceptual-scheme.

Rosenfeld, Louis. “William Prout: Early 19th Century Physician-Chemist.” Clinical Chemistry, Clinical Chemistry, 1 Apr. 2003, clinchem.aaccjnls.org/content/49/4/699.

Russell, Bertrand. History of Western Philosophy. Routledge, 2015.

 

Aristotle: On the Soul and On the Heavens

 

Hippolytus: Refutation of All Heresies,

 

Strabo: Geography

 

 

 

 

 

 

A Brief Critique of Locke: Deconstruction and Reconstruction

words in their primary or immediate signification stand for nothing but the ideas in the mind of him that uses them (p. 146).”

The quote above is taken out of the work called An Essay Concerning Human Understanding by John Locke. Specifically, the quote is from Book III which talks about how humans come to understand words and communicate ideas to one another. From the quote above the reader can get a general idea of John Locke’s theory on words. We can reason that Locke thinks words are equal to ideas when he says “Words in the their primary…. signification stand for nothing BUT ideas in the mind…”. Additionally, he goes on to explain that humans are endowed with various thoughts that are supposed to benefit other people. But there’s a catch, these thoughts are all locked up within the individual. Despite this dilemma, words allow these ideas to become unlocked from the individual. According to Locke the unlocking process is what allows society to flourish (Chapter ii sec1. Pg 146 Locke). From that readers are compelled to conceptualize language as a phenomenon which instructs and provides knowledge in order for society to flourish. Furthermore, sharing ideas would be living in accordance with human nature, since he also believes that humans are inherently designed to be sociable (Chap I sec 1 pg 145). Since for Locke ideas are used to be sociable, that means words have utility as well. He argues there are two use values when it comes to recording words: 1. it aids memory 2. It brings ideas out in the open where others can see them (Chapter ii sec 2 pg 146). But words would become too idiosyncratic if people conceived of their own “markings” to translate their ideas. So words that flourish are a “mark” which are universally recognized. Locke explains this notion by saying:

nobody can apply a word, as a mark, immediately to anything else. For that would involve making the word be a sign of his own conceptions, …applying the word as a mark of a thing involves applying it intending it to stand for that thing, which means applying it with an accompanying thought about the word’s significance.”

So if you want an idea to universally stand for a certain mark that means one must find a mark within the world which can generally signify the idea you are trying to convey. This process is what facilitates proper communication with others. So, for example,  if “x” signified the idea “car” in a certain society, then another mark such as “y” (y= not car) would be inappropriate to use for car since “y” isn’t generally understood to mean car. Though Locke has interesting reasons to justify his views on words and ideas, that doesn’t exempt his arguments from criticism.

One objection to Locke’s reasoning would be one that challenges the claim that recording words aid personal memory. While yes, generally this may seem true, readers should analyze the full extent of this claim. Let’s consider a brief example. Imagine an individual who has trouble with long term memory but is proficient at remembering locations. Now let’s say this person is attending a speech and wants to remember the way the orator was talking, and so writes down “Remember the address”. Later on in the week the person finds the paper and reads what he had written. According to Locke the words written down on the paper should aid our forgetful person in remembering the infliction of the orator. But problems arise considering the fact the person is proficient at remembering locations. So he reads it and thinks “Right, it was 5th street”. On the surface this seems like it aided his memory but his initial intention was to remember the infliction of the orators voice, and not the location. After all the person is already good at remembering locations and didn’t necessarily need the words to remind him where the speech was. This could be mitigated by recording his voice (since address (location) and address (speech style) can have different pronunciations). But this would be problematic if the person voice recorded words like “councilor/counselor” or “bank”. Because these words sound the same, the forgetful individual might still find trouble in remembering what they meant.

Another detail we must pay attention to in Locke’s reasoning is the concept that when we write symbols to denote ideas we are doing this to share ideas with others. This once again is generally true. And we get a qualifier on why sometimes it may not be true, since popular symbols must be used to signify ideas (“x”= car example above). So Locke successfully explains why sometimes people don’t understand words that explain ideas. The symbols are too idiosyncratic. But he fails to go deeper on what makes these symbols generally understood in the first place. It’s not as if when human’s with linguistic capacity look at objects they immediately have word impressions of that object. Quite plainly, when you look at a dog in the real world, the brains initial impression doesn’t initially stimulate the cognitive impression of “dog!”. And if you were to pan over to a chair your brain doesn’t exclaim “chair!”. It just understands these objects as such. The word and the object here don’t seem to be directly linked to one another in terms of recognizing objects in our consciousness. But nonetheless these names exist and we have formulated them, so in that sense Locke is correct in saying words are ideas. But it’s wrong to say the inverse, that ideas are words. Mainly because objects in themselves don’t contain the property “word”. But rather, this cognitive property assignment comes from humans. He acknowledges the arbitrary nature of word denotation but still believes that the impressions of objects warrant an automatic denotation. But this isn’t an accurate conceptions of human cognitive thinking. We don’t get impressions from objects in the world and immediately think “this object is that”, rather the brain seems to conduct a process of pattern recognition. The brain’s process seems to fall under reasoning like this “this object is this object, which generally falls under this set of symbols/sound in the world”. This distinction, though small, opens up the scope of Locke’s inquiry into the human mind. Here, we can begin to understand the creatures we are. We aren’t creatures who cognitively just process objects and translate them to ideas, but rather we do that and then inquire about its relationship in the world. This process happens quickly, and most humans master this skill by around the age of 3. That’s how we are able to come closer to understanding each others intentions. Animals are generally good at understanding intentions. Humans obviously fall in that category too, but we are different in that we are able to connect patterns with certain sounds and symbols. Let’s imagine, I invite you over for dinner but I don’t speak your language. Now, I could be standing at a table with some spaghetti on a plate and I can point to it and say “fleeblah” and then have another family member come to it and say “fleeblah”, and a person who has never even heard “fleeblah” uttered can reason the sound “fleeblah” has something to do with that spaghetti. Now if I go even further and open up my phone and google many pictures of spaghetti. And then point and say “fleeblah” that person is inclined to understand that when I utter “fleeblah” I am intending to put the idea spaghetti into their head. This recognition of intention should warrant our attention when we speak about human cognition and language. It seems as if when humans utter/ write words we are intending to put ideas into other people’s cognition. This turns Locke’s assertion that words are used to bring ideas out in the social world, into a question of “what do humans intend with words when they try to bring ideas out in the social world?”. A question which may be tackled in a future post.

The Development of Cyber Law: Past and Future

The Development of Cyber Law: Past and Future

Cyber law is often seen as a developing field in terms of international law. And rightly so, considering that the internet is a relatively new development in human history. However, that’s not to say that there isn’t development within the field of cyber law. The field encompasses a broad range of topics such as Intellectual property, data privacy, censorship etc, and some laws regarding cyber law are clearly defined. But despite that, this paper will narrow the scope in terms of where cyber law is the least developed, arguably that is within the context of data privacy and unauthorized access. These laws are often the least developed because they used to be enforced by legislation that covered traditional communication networks, such as mail and phone networks. But since data and unauthorized access is  the least developed that means they are often the most abused by agents committing cybercrimes. Feasibly, this is mainly due to the fact that these sectors lack enforcement and detection methods. However, in regions where cyber law is most enforceable have decided to back enforcement and detection mechanisms that allow their  cyber law to be practically enforced. But in order to understand how that’s possible a bit of background information on cybercrime and cyber law is necessary.

 

Background

Cybercrime has existed since the 1970’s in the form of network attacks on phone companies. Hackers would infiltrate telephone networks enabling them to create connection, reroute calls, and use payphones for free (The History of Phone Phreaking).  This early era of hacking was a problem due to the lack of legislation that could act as a guide for law enforcement to accurately charge criminals. Arguably, it was the lack of legislation on hacking which allowed computer hackers to hone their techniques of network infiltration and data theft. The reason why that’s so can be observed in the late 1980s, where the intensity of large system attacks became more abundant and destructive. One of these major system hacks was perpetuated by a group known as 414. It may come as a surprise that this group wasn’t a group of hardened criminals, but rather 6 teenagers from Milwaukee, Wisconsin. These teenagers managed to hack high profile systems ranging from a nuclear power to banks (Stor). The intentions of the hackers didn’t seem maligned, since they didn’t steal any info from these systems. But the 414 hacks weren’t harmless either since they cost a research company $1,500 after the hackers deleted some billing records. But other major hacks weren’t as harmless. The notorious Morris worm is a prime example of the harmful effects of unwarranted network infiltration. The reason that’s the case is that it the Morris Worm was one of the first hacks that was distributed to the public internet (Sack). The worm was created by Robert Morris a Graduate student at Cornell in order to showcase the security problems of the internet, the worm would go on to cause in-between $100,000- $10,000,000 in damage by infiltrating networks and causing them to become non-operational (Newman). Clifford Stoll, one of the people responsible for purging the worm, described the Morris worm as such:

“I surveyed the network, and found that two thousand computers were infected within fifteen hours. These machines were dead in the water—useless until disinfected. And removing the virus often took two days.” (Sack)

Additionally, one of Stoll’s colleagues says that 6,000 computers were infected, which may not seem like much but only 60,000 computers were connected  to the internet at that time. Meaning 10% of the internet was infected (Sack). Such attacks would force legislators to address the problems of cybercrime, specifically network infiltration. One of the first pieces of comprehensive cyber law to address these issues was the Computer Fraud and Abuse Act enacted by the United States congress.

Computer Fraud and Abuse Act

After a lieu of cyber-attacks plagued the world, the U.S Congress decided to specifically address cybercrime. Prior to the Computer Fraud and Abuse Act (CFAA) cybercrime was prosecuted under mail and fraud, however that proved uncomprehensive. The CFAA’s framework defined what cybercrime entailed. One of the pioneering things the legislation did was define what kinds of computers were off limits to data infiltration. According United States code, In Title 18, Section 1030 of CFAA a computer is unlawful to hack if that computer is:

“(A) exclusively for the use of a financial institution or the United States Government, or, in the case of a computer not exclusively for such use, used by or for a financial institution or the United States Government and the conduct constituting the offense affects that use by or for the financial institution or the Government; or

(B) which is used in interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States.” -18 U.S. Code § 1030 – Fraud and related activity in connection with computers (Cornell)

Basically, stealing information from a computer that effects the United States via interstate or foreign commerce/communication is forbidden. These specifications were enough to convict various individuals who committed cybercrimes in the late 1980s. Interestingly enough, Robert Morris was the first person to be convicted for violating the Computer Fraud and Abuse Act. Specifically, because he intended to infiltrate several computers without authorization which negatively affected economics and communication within the US (Newman). Arguably, the enforcement power of the CPAA may have been the essential precedent needed for the international community in terms of creating sufficient cyber laws.

Budapest Convention on Cybercrime

In November 2001, the first international convention on cybercrime took place. The scope of the Budapest Convention on Cyber Crime (BCC), unlike the CPA, had a wide range because it addressed: IP law, fraud, and child pornography. However, the convention also found it important to address what unlawful access to a computer constituted, defining it as:

“..A Party may require that the offence be committed by infringing security measures, with the intent of obtaining computer data or other dishonest intent, or in relation to a computer system that is connected to another computer system.” -Article 2 of BCC (Council Of Europe)

Here, arguably, the BCC is more specific then the CPAA in terms of defining unlawful access. The reason being is that it ignores the economic/ social effects and directly addresses what unlawful access is which would be:

“..the intent of obtaining computer data or other dishonest intent…to a computer system that is connected to another computer system”.

The BCC ignores the economic/ social effects because some hacks may not influence the economy or society, by keeping the CPAA definition, the scope of data infiltration would’ve been limited to social and economic consequences on specific nations.  Furthermore, the BCC’s unlawful access clause has been a topic of discussion for legal entities and private corporations.

Modern Developments

     EU v Facebook

The precedent set by the BCC on data infiltration remains relevant in contemporary times. Especially when considering the role private corporations have in data security.  This is evident when taking Facebook’s recent big data breach into consideration. In order to understand why Facebook could potentially be an important catalyst to cybercrime we need to understand Facebook’s role on the internet. Simply put, Facebook is a social media website which connects private users via a public platform, but despite it being a public platform users’ can share data privately.  However, controversy emerged after users’ data was allegedly being misdirected and sold to third parties without user’s complete consent(Guzenko). This is a clear violation of the BCC’s definition of unlawful system infiltration. The reason that could be so is that since Facebook is in charge of maintaining data security for their users, that would mean Facebook selling data without user’s consent would constitute unlawful data infiltration according to article 2 of the BCC. Additionally, Facebook was hacked by a third party and millions of users’ data was exposed without user consent. After this particular hack the European Union decided to step in and reprimand Facebook via a 1 billion euro fine (Schnechner). The EU argues Facebook didn’t do enough to protect users’ data from infiltration, but such accusations do little for cyberlaw. The reason for that is that the EU could always argue that an entity “didn’t do enough” to protect user data, and supplement that reasoning with a fine. Rather, since cyberlaw is a relatively new field, legal entities ought to cooperate with influential players within the cyber world in order to create viable solutions to cybercrimes. The EU accusations assume that Facebook is the entity which allows 3rd parties to access user’s data, but actually it’s the users themselves who allow it. Restricting one’s data is an option if a user changes their privacy settings. Additionally, It’s unrealistic to expect Facebook to curtail the behavior of its one billion users, some users may be more susceptible to data hackers due to their ignorance on data security. The reasoning the EU expels on to Facebook would be similar to this: If an EU citizen were to steal property from another citizen then the EU itself would be held accountable for allowing that to occur, and thus deserves to be fined. This is so because Facebook is similar to the EU, in that it’s a microcosm of different sets of people behaving in ways they can’t totally predict. So instead of focusing on how specific internet services operate, focus should be shifted to network self-enforcement. A prime example of that shift of focus would be China’s comprehensive self-regulating internet network.

China’s Internet Network

Modern cybercrime has evolved in terms of the magnitude of attacks. However, in the 21st century cyber attacks, particularly on infrastructure, are not only possible but prevalent (Schmitt). An example of such an attack is explained by Tomas Ball, a contributor to the Computer Business Review

in December 2015 a massive power outage hit the Ukraine, and it was found to be the result of a supervisory control and data acquisition (SCADA) cyber-attack. This instance left around 230,000 people in the West of the country without power for hours…chaos was sewn using spear phishing emails, a low tech approach to launch such an attack; this trend is relevant today, with phishing still being used against critical infrastructure.” (Ball).

That’s only one case, but hacks on critical infrastructure can range from manipulating data which changes the chemical composition of drugs being manufactured, or to infiltrating a dam and redirecting electricity (Schmitt). Countries have implemented measures to mitigate and respond to this risk on critical infrastructure. A notable response to this problem has been from the Chinese government. China has been able to mitigate the risk of data infiltration by regulating its domestic network via legislation and technology. This may seem like a normal approach, but China is unique in the sense that it’s network is reinforced by technology which actively implements its cyber legislation. It’s difficult to understand the full scope of how China is able to do this (since the government isn’t transparent on how the network fully operates) but there are things that are clearly observable in terms of how data transfer is controlled. Firstly, data transfer in China is purposefully slowed. This is important because it allows the Chinese network to detect potential disturbances before they fully manifest, so infiltration could be detected much easier (Chew). Secondly, as mentioned before, the system self regulates. The Chinese government implements its own filters by creating comprehensive state tech that enforces Chinese law. However, China also puts heavy pressure on Chinese firms to self-regulate content, meaning that a firm that deals within the cyber world must follow the cyber laws or face a shutdown of business or a hefty fine. This is similar to how the EU went about dealing with Facebook, the only key difference being that the EU lacks its own data enforcement technology (Chew).   And lastly, China’s network will respond to infringements of their cyber law by quickly “poisoning” unlawful data connections. An example of this would be if a hacker wanted to infiltrate some data network the connection would immediately be detected as a “poisonous connection” and thereby the hacker would be cut off from that connection (Chew). Arguably this is what sets China’s cyber network apart from everyone else, the ability to actively regulate data under their legal framework. Though it’s worthy to note that China’s network indeed does well in terms of enforcing its cyber law by regulating data, but that doesn’t mean the network is exempt from criticism.

China’s cyber network is rather effective in terms of enforcing its cyber law, however it has been used to disenfranchise its own civilian population. Qiang Xiao an internet researcher at UC Berkeley describes China’s internet network as such

…it has consistently and tirelessly worked to improve and expand its ability to control online speech and to silence voices that are considered too provocative or challenging to the status quo.”(Xiao). But such things, unfortunately, should be expected. After all it makes sense for illiberal governments to manifest illiberal computer networks. But such realities shouldn’t deter liberal government from trying to conceptualize and develop internet networks which enforce cyber law. This is a lot easier said than done because it’s easier to enforce authoritarian cyber law than more liberal law (Schmitt).”

Mainly, due to the fact that the amount of computing power needed to create a liberal network would be immense. In conjunction with it being so massive, economic factors come into play when determining how effective cyber law is enforced in a region, leaving poorer liberal nations behind. Despite that, developments in quantum computing can allow for massive amounts of data to be processed and it’s getting cheaper as it develops (IBM). Not only that but quantum computing opens up the door for the network to self-learn, enabling better self-enforcement (IBM). Such features may intrigue governments who want to enforce a Common Law internet network since it can self-learn off of old legal precedents. So in the future enforceable cyber for liberal governments is definitely a possibility, and perhaps a necessity if strong cyber law is to be properly enforced.

In conclusion, since there are problems with enforcement and efficiency of cyber law, internet networks which actively enforce cyber law using the internet network itself are necessary to achieve practical cyber data enforcement. Different legal jurisdictions would naturally have different laws concerning their respective internet networks, therefore various network legal structures would need to exist to facilitate their cyber laws. Developments in quantum computing may pave the way for networks to regulate themselves.

Works Cited

“18 U.S. Code § 1030 – Fraud and Related Activity in Connection with Computers.” LII / Legal Information Institute, Legal Information Institute, http://www.law.cornell.edu/uscode/text/18/1030.

Ball, Tom. “Top 5 Critical Infrastructure Cyber Attacks.” Computer Business Review, Computer Business Review, 18 Jan. 2018, http://www.cbronline.com/cybersecurity/top-5-infrastructure-hacks/.

“Budapest Convention on Cybercrime.” Council of Europe, Council of Europe, http://www.coe.int/en/web/conventions/full-list/-/conventions/rms/0900001680081561.

Chew, Wei Chun. “How It Works: Great Firewall of China – Wei Chun Chew – Medium.” Medium.com, Medium, 1 May 2018, medium.com/@chewweichun/how-it-works-great-firewall-of-china-c0ef16454475.

Guzenko, Ivan. “The Third-Party Data Crisis: How the Facebook Data Breach Affects the Ad Tech.” MarTechSeries, 5 July 2018, martechseries.com/mts-insights/guest-authors/the-third-party-data-crisis-how-the-facebook-data-breach-affects-the-ad-tech/.

“The History Of Phone Phreaking.” The History of Phone Phreaking — FAQ, http://www.historyofphonephreaking.org/faq.php.

Newman, Jon O. “UNITED STATES of America, Appellee, v. Robert Tappan MORRIS, Defendant–Appellant.” Stanford Law, stanford.edu/~jmayer/law696/week1/Unites%20States%20v.%20Morris.pdf.

Sack, Harald. “The Story of the Morris Worm – First Malware Hits the Internet.” SciHi Blog, 3 Nov. 2018, scihi.org/internet-morris-worm/.

Schechner, Sam. “Facebook Faces Potential $1.63 Billion Fine in Europe Over Data Breach.” The Wall Street Journal, Dow Jones & Company, 30 Sept. 2018, http://www.wsj.com/articles/facebook-faces-potential-1-63-billion-fine-in-europe-over-data-breach-1538330906.

Schmitt , Michael N. “Cyberspace and International Law: The Penumbral Mist of Uncertainty.” Harvard Law Review, harvardlawreview.org/2013/04/cyberspace-and-international-law-the-penumbral-mist-of-uncertainty/.

Stor, Will. “The Kid Hackers Who Starred in a Real-Life WarGames.” The Telegraph, Telegraph Media Group, 16 Sept. 2015, http://www.telegraph.co.uk/film/the-414s/hackers-wargames-true-story/.

“What Is Quantum Computing?” What Is Quantum Computing? , IBM, http://www.research.ibm.com/ibm-q/learn/what-is-quantum-computing/.

Xiao, Qiang. “Recent Mechanisms of State Control over the Chinese Internet – Xiao Qiang.” China Digital Times CDT, chinadigitaltimes.net/2007/07/recent-mechanisms-of-state-control-over-the-chinese-internet-xiao-qiang/.