Freedom of Information?
First Monday

Freedom of Information? The Internet as Harbinger of the New Dark Ages

There's a common presumption that the Internet has brought with it the promise of openness, democracy, the end of inequities in the distribution of information, and human self-fulfillment. Any such conclusion would be premature.

The digital era has ambused and beguiled us all. Its first-order impacts are being assimilated, but its second-order implications are not. Powerful institutions perceive their interests to be severely threatened by the last decade of technological change and by the shape of the emergent 'information economy'. Elements of their fight back are identified, particularly extensions to legal protectionism, and the active development and application of technologies that protect data from prying eyes.

Many of the features that have ensured a progressive balance between data protection and freedom of access to data have already been seriously eroded. The new balance that emerges from the current period of turmoil may be far less friendly to public access and more like a New Dark Ages.


Scene-Setter: Information Wants To Be Free
Information in the Information Age
The Economics and Politics of FOI
The Dark Side of the Information Revolution

Scene-Setter: Information Wants To Be Free

Networking technologies have enabled the emergence of social processes over distance ('cyberculture'), and communities that are dispersed or 'virtual' (Clarke, 1996). The term 'cyberspace' was coined (fully 16 years ago) to give a name to the 'shared hallucination' that is the Internet experience.

To place Freedom of Information (FOI) in its contemporary setting, it's necessary to appreciate one of the defining aphorisms of cyberspace, which is that 'Information wants to be free'. The origins of this are traced in Clarke (1999e). It's an intensely ambiguous statement, transcendental to the point of offering a basis for a new religion, and hence it bears analysis and interpretation.

First, ambiguity in English needs to be confronted. The word 'free' primarily implies 'without constraint', and only secondarily 'without payment'. Confusion is invited, because one of the implications of information being readily available is that it does tend to become gratis. The manner in which production, storage, dissemination and access are paid for is through business models, such as sponsorship, advertising and subscription (Clarke, 1999d).

Three clusters of interpretations are suggested:

  1. Information needs to be readily available and not subject to rules, obstacles and obstructions that hinder its flow, because:
    • it's a prerequisite to the satisfaction of social needs like liberty, democracy and egalitarianism, and of personal needs ranging from physical safety and well-being to self-fulfillment;
    • otherwise cheats will prosper, and hypocrisy and cant can't be overcome. A recent, although rather extreme, version of the open society argument is in Brin (1998);
    • it's the raw material from which new information is made, and on which technological and economic progress depend. See, for example, GNU and the Open Source Movement, Dempsey (1998) and Clarke (1999a);
  2. Information is worthy of anthropomorphic and teleological treatment, i.e. to attribute motives to it is meaningful (if a use of artistic licence). This is the basis of the concept of 'meme', an idea passed from one generation to the next, which was postulated as a means of explaining how the human species responds to environmental challenges more flexibly and more quickly than is possible through genetic adaptation and selection (Dawkins, 1976). See also Blackmore (1999). Hence:
    • information wants to be readily available to anyone who seeks it;
    • information wants to be thrust in the faces even of people who don't seek it;
    • information wants to motivate actions by people; and,
    • information wants to exercise free will;
  3. Information wants freedom, i.e.:
    • it hasn't got it: each new generation of people, and each new generation of information technology, seek to entrap it and deny its freedom;
    • 'somebody ought to do something': eternal vigilance is necessary, and the law needs to be continually adapted and at times dramatically altered, in order to retain and sustain freedom of access to information; and,
    • 'Free information!' (as in the imperative 'free Tibet!', not as in the phrase 'free steak knives').


The notion of 'freedom of information' has become ossified. Meanwhile, technology has been dancing around it, redefining the underlying concept of 'information', and the processes and the political economy of its production, its dissemination and access to it.

This paper investigates the new meaning of 'freedom of information' in the information age, information society and information economy. It identifies how the precepts underlying lawyerly pontifications have been overtaken by the impacts of information technology, with the result that conventional discussions within the FOI establishment are picayune, and have degenerated to a focus on trivia at the level of how many angels can dance on a pinhead.

The preamble drew attention to the quantum shift that has occurred as a result of the emergence of the first substantial information infrastructure, the Internet. The concepts of 'data', 'information', 'knowledge' and 'wisdom' are outlined. This leads into a consideration of representations of data, such as documents, databases and directories. The paper then examines the forms in which data exists, and explains the recent shift from atoms to bits.

The first-order impacts of these changes are discussed, including the new behaviours that have quickly arisen, and the new theories of economics and political economy that have emerged in an attempt to explain them.

Less apparent are the second-order implications that are arising from the new information technologies. A consideration of these leads to the conclusion that the conventional expectation that the Internet is delivering greater freedom of access to information may be seriously misguided, and that instead it may result in loss of some of our existing freedoms.

Information in the Information Age

This section establishes the foundation for the analysis that follows, by defining key terms, and summarising the characteristics of the digital era that set it far apart from its predecessors.

Data, Information, Knowledge and Wisdom

It's important to an assessment of 'freedom of information' to consider definitions of terms underlying the discussion. An analysis is presented in the Appendix. The key conclusions it reaches are that:

  • 'data' is any symbol, sign or measure which is in a form that can be directly captured by a person or a machine. Conventionally, the most useful data is that which represents (or purports to represent) real-world facts and events;
  • 'information' is data that has value in a context. To business people, the most common context is decision-making. Casual reading is another example which provides access to data that makes a difference to the reader's state of mind, by adding to, or throwing doubt upon, previous understanding or beliefs;
  • 'knowledge' is the matrix of impressions within which an individual situates newly acquired information; and,
  • 'wisdom' is judgement by an individual, using currently available knowledge, together with new information, and is based on criteria that are felt rather than expressed.

The 'cybernetic' era of the second half of the twentieth century advanced some sophisticated, but fundamentally mechanistic arguments that sought to reduce all of these ideas to cascading tiers of control loops. It failed. There is no continuum from data to wisdom; they need to be regarded as a set of related, but distinct, domains.

Representations of Data, and Data Objects

Using the above definitions, that which is stored is data, and information only exists where data has value to a person, in a context. Among the FOI community, it is uncommon for the distinction to be drawn between raw data and context-relevant information.

Data is abstract, but it is represented (or in the terms of copyright law, 'expressed') in concrete form, on physical media. Typical representational forms include scrolls, manuscripts, documents, files, records, databases and directories. Typical media include paper, magnetic tape and disks, optical storage, and integrated circuits (ICs, or 'chips'). This paper uses 'data object' as a generic term for all categories of item that embody representations of data.

The notion of 'freedom of information' is also abstract. In order to constrain the rights that they create, so-called FOI laws have been expressed in very narrow terms. What is needed is a legal right to access data, in any form on any medium, i.e. irrespective of the nature of the data object. The actual rights that exist in law apply not to all data objects, but only to a very limited subset of whatever the law at any point in time understands the term 'document' to mean.

The Information or Digital Era

At the turn of the century, any discussion of 'freedom of information' has to reflect the characteristics of information in the digital era. Uttering the mantra 'information wants to be free' is not enough; it's important to examine the technical features of information production and reticulation, and then to build from that an understanding of the political economy of the current era.

Information initially was once merely verbal. For several millennia, it has been expressed in tangible forms, such as scratches on rock, on vellum, on parchment and on paper. These scratches, no matter how sophisticated the script, were only able to be processed by humans reading and interpreting them.

Suddenly, during the last few decades, digital representations have become the mainstream. Ideas had previously been conceived as words, numbers, symbols, shapes, pictures and sounds. They required a person to interpret them. A succession of technologies have made it possible to express those ideas in patterns that can be stored on digital media, can be easily, cheaply and rapidly reproduced and disseminated, and can be manipulated by machines as well as people.

The information revolution that has occurred during the last couple of decades is underpinned by a cluster of related data object technologies. They are:

  • the convenient and inexpensive creation of new data objects in digital form (e.g. using desktop publishing packages, PC-based graphic design tools, animation, and digital music generators);
  • the conversion of existing materials into digital data objects (commonly referred to as 'digitisation', e.g. using scanners, OCR, digital cameras, and digital audio recording);
  • the near-costless replication of data objects (e.g. using disk-to-disk copying, screen grabbers, and CD burners as consumer appliances);
  • their very rapid transmission, at unmeasurably low marginal costs (e.g. using modem-to-modem transmission, CD-ROMs in the post, e-mailed attachments, FTP download, and Web download);
  • inexpensive and widespread access to data objects, from a variety of devices (e.g. PCs, PDAs, mobile phones, public kiosks, and Web-enabled TV) in a vast variety of locations (including the workplace, the home, public kiosks and Internet cafes);
  • computer-based analysis of data, in order to compile statistics and to detect instances of interest (e.g. data matching, profiling, data mining and pattern recognition software); and,
  • convenient manipulation of data objects (e.g. using word processors, and sound and image processing tools).

In some cases (such as digital audio), the quality of digital formats quickly overtook that of their predecessor technologies. In a very short time, a great deal of copyrightable material has leapt from the physical to the electronic, or, as Negroponte (1995) preferred to put it, has migrated from atoms to bits.

During the last half-millennium, successive waves of information technologies have increased the accessibility of data, and changed its economics. These waves have included:

  • printing, 500 years ago;
  • newspapers, during the last 200 years;
  • public libraries, during the last 150 years;
  • telegraph and telephone, and off-set printing, during the last 100 years;
  • radio, since about 1920;
  • television, since the 1940's;
  • photocopiers and laser printers, since the early 1970's;
  • microcomputers, PCs and workstations, since the mid-1970's;
  • fax machines since the early 1980's;
  • CD-ROMs, since the mid-1980's; and,
  • the Internet in general, and e-mail and the Web in particular, coupled with mature applications on computers used by individuals at work, in the home, and on the move, since about 1995.

There can be little doubt that, in economically strong countries, a larger proportion of the public are currently better educated about history, and more aware of current events, than would ever have been possible in the past.

The impact and implications of the recent digital revolution far exceed that of the printing press around 1500, and its effects are being felt far more rapidly. To invoke a simple example, within the space of a mere five years, students have come to expect that the answer to any question will be 'on the Internet', and are now surprised and even dismayed to find themselves directed to sources other than the World Wide Web. And many of the impacts and implications cut much more deeply than that into the social and economic conventions of the late twentieth century.

The Economics and Politics of FOI

The digital era evidences a distinctly different political economy from the now-defunct industrial age. In order to investigate those differences, a brief review is needed of the scene immediately prior to the revolution.

The Political Playing Field

There are various justifications for access to information, including social, psychological, democratic, law and order and economic motivations. There is also a wide range of justifications for the denial of access to information. These include many narrow, sectional interests, but also some of broader concern, such as privacy, and the assurance of some degree of order in the processes of economic development, and of government.

The exercise of political choice is primarily dependent on interplay between institutions that have political power, and that exercise it. Historical accident also plays a part (in particular, ambiguous wording in statutes and prior judgments, and new judicial inferences about their meaning).

FOI has to date been focussed mainly on government. The private sector has successfully avoided being subjected to the same rigours, partly through the exercise of economic power, and partly because of the economic rationalist philosophies that pervade political parties, which dictate that, even in advanced nations, economic concerns dominate social ones, and that, as a result, freedom for business enterprises is a higher ideal than freedoms for people.

During the two decades since the 1978 legislation affecting some of the Australian public sector, for example, there have been few accretions to the freedom side of FOI. In the States and Territories, small advances have arisen, usually in response to public scandals, but, in most jurisdictions, the granting of meaningful access to government data has been successfully avoided.

One area in which an increase in accessibility has occurred has been the progressive acceptance that environmental impact statements (EIS) are a necessary feature of major infrastructure proposals, and that public information, public consultation, and public involvement in design are elements of the EIS process. Regrettably, that development has not been extended to social impact statements for major initiatives. In some countries, however, notably New Zealand and Canada, privacy impact assessments (PIAs) for major applications of information technology are entering the mainstream, and this is likely in Australia in the near future (Clarke, 1997b).

There have, on the other hand, been plenty of extensions to existing abilities to deny access. Government agencies have a litany of excuses available, in the form of exemptions with wide applicability. Moreover, there are increasingly frequent refusals by agencies and Ministers to provide information to the Parliament and Parliamentary Committees, and Auditors-General are currently submitting to a trend towards gentler audits and audit reports. In Australia, there has been some degree of tightening in relation to access to personal data, following passage of the Privacy Act 1988, although this primarily limits access by people, rather than access by governments agencies and corporations.

Individuals, lacking a firm power base, have on the other hand been subject to ever-increasing demands that they provide personal information to government agencies. These demands have been coupled with economic disincentives against non-compliance, and, with occasional exceptions, the public has acceded to the power of governments.

The net effect is that personal data has been becoming increasingly open, information held by corporations remains largely hidden, and information held by governments is largely protected, but subject to some limited access provisions.

The Political Economy of the Digital Era

Producers of all kinds of information have tended to use fairly elaborate 'production-lines' or 'value-chains', with successive individuals and organisations 'adding value' to a base product. Digital technologies have lowered the costs involved in those production processes, by rendering some steps unnecessary, by enabling people to perform other steps with less training or cheaper tools, and by providing cheap and quick transmission from one step to the next. The delays between the origination of data objects and their availability to users have been greatly reduced.

Digital technologies have quickly proven to be a double-edged sword, however. In addition to lowering the costs of production for authorised publishers, they also assisted the replication of data objects by parties who were not acting within the terms of a licence issued by the intellectual property owner. Unauthorised copying, adaptation and use are rife.

The context within which data objects exist has changed very quickly, and the courts are struggling to understand and to apply intellectual property law in the new context. This is considered in greater depth at Clarke & Dempsey (1999). If the controls that have hitherto kept the lid on widespread appropriation of copyright objects were to cease to be effective, so the argument goes, the haemorrhage of revenue would remove the economic incentive to originate copyright objects and to publish them.

Debates are currently raging about the shape of the new economics. See, for example, Lamberton (1971, 1996), Dyson (1995), Romer (with a populist description in Kelly, 1996), Clarke (1994), Clarke (1999a), Clarke (1999c) and Shapiro & Varian (1999). These accept as given that the user-pays business model that has been common during the industrial age has been undermined by technology, and that alternative business models need to be applied.

The following aspects convey the extent of the changes involved:

  • an economics based on the assumption of scarcity is no longer appropriate or useful. That assumption is so deeply embedded in conventional economics that the application of any form of conventional analysis is error-prone (Dempsey, 1998). Analyses need to reflect the ease of creation, replication, appropriation and adaptation, and the importance to economic and social progress that they be permitted to occur;
  • the accessibility of data has brought with it 'a culture of appropriation'. There is a brisk transition in train from industrial era, linear, value-chain thinking towards an interdependent, interactive, shared future, in which what we have hitherto called plagiarism is a virtue rather than a vice. Largely passive consumption has become active participation; and, the role of consumer has metamorphosed into a role of consumer-producer or actor/participant. Recycling is intrinsic to the process. It is component-based, and features ongoing re-creation or cumulative creativity, and intentional collage rather than (nominally) original creation. As a result, the model changes from a sequence to a cluster, 'like bees around a honey pot' (Clarke, 1997a; Clarke, 1999a). Alternative metaphors include 'barn-raising' (as distinct from 'horse-trading' - Rheingold, 1994), and a 'cooking pot', which "keeps boiling because people keep putting in things as they themselves, and others, take things out" (Ghosh, 1998), and even a 'bazaar' (as distinct from a 'cathedral' - Raymond, 1998). Barlow (1994) summed this characteristic up as "information wants to change"; and,
  • all forms of data now have similarities with speech, and hence freedoms that have long applied to speech are being credibly claimed to apply to other forms of data as well. The expression ceases to be differentiable, because digitisation has "detached information from the physical plane, where property law of all sorts has always found definition" Barlow (1994).

The Dark Side of the Information Revolution

A reading of the preceding analysis might suggest that the changes that have been taking place are predominantly positive, in many ways, and especially for freedom of information. Certainly, that's the aspect of the digital era that most commentators focus upon.

This section identifies second-order effects that are too easily overlooked. They are so substantial that they threaten to undermine the conventional, pleasant expectations that the digital revolution will 'bring in the millennium'.

Quality Issues

Information quality is a term for the cluster of characteristics that 'good' information should have. Most important among them are accuracy, timeliness and completeness. Also significant are the provision of evidence of the sources of data which a work refers to, and identification of the author, date and location of publication, in order to enable auditability.

Within the publishing industries and the various information professions, sets of conventions have developed over the decades which provide some degree of assurance in relation to information quality. At the professional end of the data-production business, ranging from entertainment, via sport and news reporting, to statistics and reference information, long standing business models have been undermined, and alternative business models have not been emerging rapidly enough.

A particularly poignant example of the rapidity with which the digital revolution has undermined a hitherto financially and culturally valuable business is the story of the latest (and, possibly, the last) decade of Encyclopaedia Britannica (EB).

In 1991, the company sold about 400,000 printed sets, and in 1997 about 10,000. (Tellingly, my source for this information is a quotation from the Managing Director of EB International, only available to subscribers to a for-fee service, E-Commerce Today). The collapse was triggered by the success of Microsoft Encarta and other CD-ROM versions of lower-quality but approximately equivalent collections sold in a convenient and inexpensive form. Since then, Web-based information services have mushroomed. Despite its brand reputation, and the apparent quality and presumed value of the content the company owned, and even after scrambling to survive, revenue has halved, losses have accumulated, the company has changed hands several times, and survival remains uncertain (Rayport & Gerace, 1997, Evans & Wurster, 1997, Melcher, 1997; Downes & Mui, 1998, p.51; Shapiro & Varian, 1999, pp. 19-21, 26).

In late October 1999, as this paper 'went to press' (as we once used to say), EB announced that they had abandoned their longstanding business model of fee-for-personal-copy, and were now publishing via the Web on the public Internet, in the hope of garnering sufficient advertising revenue to survive.

A great deal of the information that has become available on the Internet is a result of amateurs playing author, editor, publisher and marketer, and in some cases doing them in a manner significantly less professional than was achieved by conventional publishers. Long standing quality assurance conventions are only partly understood, and only partly respected, by the flood of new information providers who have appeared on the Internet.

Other factors include the initial discovery of information, identification of versions, and archiving of old information. A great many links are ephemeral, and with their demise disappear not only information, but the ability to audit the claims of authors who refer to them.

Moreover, there remains a great deal of detail that is obscured or even falsified, resulting in what economists refer to as 'information asymmetries', i.e. inequality of information among the participants in decision-making processes, and hence imbalance of bargaining power, and inequities.

The Counter-Reformation

Content providers who depended on their customers paying full value for access to it are seeing their business model undermined by the digital revolution: "there's likely to be a long, lean period for anyone trying to sell information. The problem is that there are so many reasonable and free options that are good enough" (Doyle B., quoted in Melcher, 1997).

Rationally, corporations that are dependent for their survival on the exploitation of rights to information are taking action to defend their positions. The risk is that these defensive stances may be economically and culturally very harmful. This is highly reminiscent of the way in which the cyberpunk sci-fi novelists (e.g. Gibson, 1984; Sterling, 1988; Sterling, 1989; and, Stephenson, 1992) envision the 'hypercorps' retiring into enclaves, and dealing only with the identified and continuously monitored members of respectable, official society.

Two ways in which content-owners are battening down the hatches are through legal measures, and through the development and application of information technologies.

1. Legal Protectionism

The following are key aspects of the argument advanced in Clarke & Dempsey (1999).

A. Accidental Extension of the Power of Copyright Owners

An important change in the effect of copyright law accompanied digitisation, and became even more apparent with the explosion of the Internet. The purchase of a book, or tuning to a broadcast radio or television channel, did not necessitate the acquisition of a copyright licence. The purchase or rental of digital media, on the other hand, generally does. Moreover, a workstation's mode of operation inherently involves the making of a succession of copies of the object, in memory and on the screen.

The move from atoms to bits has therefore resulted in an accidental extension to the legal rights that copyright owners enjoy: there has never previously been any right to preclude people from accessing data-objects, whether to read them, listen to them, look at them, or watch them. The new need for the consumer to have a licence has accidentally strengthened the hand of the copyright owner.

B. Enhanced Legal Protection for Information

One of the main weapons in the armoury of powerful organisations is the ability to arrange for favourable action in legislatures. For example, a draft Australian Government Bill, the Copyright Amendment (Digital Agenda) Bill 1999, follows the lead of other governments in acceding to the demands of powerful corporations in relation to compilations such as databases, and to technologies which circumvent copyright protection.

A further, recent move has been the suppression of information about errors and security risks in software products: "Information derived from decompilation of a program ... cannot be used or communicated to others for any other purpose" (Ministerial Press Release relating to the Australian Copyright Amendment (Computer Programs) Bill 1999, enacted 13 August 1999).

The major publishing interests have been able to significantly extend the scope of copyright, and hence protect their revenues, profits and empires. Moreover, they have arranged for activities that offend large copyright-ownership interests to be dealt with by the criminal courts (at public cost) rather than the civil courts (at their own cost).

There are also signs that both trade secrets law and the law of confidence may be in the process of being developed in directions that provide yet greater protection for the interests of large corporations. This may extend even to the point of protecting ideas rather than expressions, and beyond the protection of data objects to, for example, preclude individuals from applying their accumulated, abstracted knowledge.

C. Shift From Copyright to Contract

A further manoeuvre whereby copyright-objects can be protected against abuse is to rely less on copyright law and more on direct contractual arrangements between the publisher and the would-be reader. This would have the effect of undermining libraries, and restricting not only reproduction, but also access to the object.

Instances already exist, such as expensive hard-copy reports that are sold on the express condition that they cannot be lent to any other person, and databases that are remotely accessible by subscription.

D. Threats to Statutory Licensing

Educational institutions have a statutory licence under the Copyright Act. They could establish digital collections of copyright-objects, irrespective of who they are owned by, and allow students and staff to make digital and printed copies from those collections. But the Act makes the licence subject to an equitable payment to the copyright-owner.

In Australia, photocopying was the subject of long negotiation between representatives of copyright owners and universities. During the last five years, the establishment of 'electronic reserves' of materials frequently accessed by students has been stymied by an ongoing battle between those same parties as to what 'equitable' means. This impasse represents a grave threat to the performance of the nation in the information era.

E. Threats to Equitable Public Access

There are many different circumstances in which people access information. For example, some people do so as consumers, whereas the intention of other accesses is to use the data as a 'factor of production', in order to produce more information. Some accessors are disadvantaged, due to such factors as physical impairment, or the locality in which they live. Others enjoy privileges of various kinds.

The exercise of power that the copyright-owner gains from technological innovations and legislative amendments represents a very substantial negative effect on equitable public access to information. This is further discussed at (Clarke, 1999a).

F. Threats to Anonymous and Pseudonymous Access

Historically, a great deal of access to published works has been anonymous, in the form of purchase of books, access to books in libraries and viewing of films in theatres; or pseudonymous, e.g. the borrowing of books from libraries, or the hiring of a video. A relatively small proportion of access has been associated with an authenticated identity. It has generally been where the material was being adapted or incorporated into another work.

This lack of identification is very important, because it sustains an environment in which information is generally accessible without fear of recrimination from authority figures such as employers, competitors, teachers, parents and powerful vested interests. Any shift of copyright towards contract risks bringing with it a switch from predominantly anonymous to predominantly identified transactions. With that would come a serious 'chilling effect' on information availability, and a direct threat to open society and democracy.

2. Technological Protection

Powerful organisations have a variety of interests in preventing the exposure of data they control. They seek to protect information that would disclose such things as their corporate strategies and the directions of their technology investments; the nature of micro-monopolies from which they extract profits; and, the details of their financial and taxation arrangements.

A. Technologies That Protect Data-Objects

Many corporations also wish to exploit data under their control. In order to do so they seek out technologies that protect data objects. Some of these technologies are passive in nature, protecting objects while they are

  • under the owner's control;
  • in transit; and,
  • under a licensee's control.

There are means to trace rogue copies, using 'watermarking' technology (to uniquely identify the publication) or 'fingerprinting' technology (to uniquely identify the copy downloaded to the particular user).

Active technologies operate in several different ways, utilizing:

  • notification to the licensee of the rights available under the licence, at the time that the data-object is accessed;
  • identification of licensees, and authentication of identities;
  • enforcement mechanisms that operate on the client-workstation; and,
  • destruction or disablement of the copyright-object where the licence expires or its use appears to be in breach of the licence conditions.

These are described in greater detail at (Clarke & Dempsey, 1999).

The effect of such technologies is to preclude information access. In many cases, this may not change the current balances, but in some circumstances, it is likely to reduce the accessibility of information. For example, a publisher could combine:

  • disintermediation (by ensuring contractual arrangements directly with the user of the material);
  • security technology (by using cryptography-based scrambling of content while it is in transit and stored on the client);
  • 'watermarking' technology (to uniquely identify the publication); and
  • 'fingerprinting' technology (to uniquely identify the copy downloaded to the particular user).

B. Technologies That Entrench Data-Object Protection

It's feasible that the Internet Protocol Suite could be adapted in a manner that favours the protection of data objects, and thereby undermines freedom of information. For example, it could facilitate existing techniques that assist corporate servers to exercise control over personal workstations. In addition, there has been a recent tendency towards the appropriation of Internet bandwidth to support 'virtual private networks' (VPNs).

Alternatively, the open, public Internet could be circumvented by the emergence of a new architecture, developed and promulgated by an alliance of corporations and governments, much more suited to their needs rather than those of consumers and citizens (and probably endowed with an insidious title such as Internet 3).

C. Technologies That Protect Originators and Users

A variety of tools is available, many based on cryptographic methods, which enable individuals to protect their identity. This can be achieved either by denying identification entirely, or by substituting it with a pseudonym and protecting the linkage between real and pseudo-identity through technical, organisational and legal measures (Clarke, 1998; Clarke, 1999b).

The focus during the last decade or so has been on the use of such tools by individuals, in order to send messages and distribute documents whose originator cannot be traced (e.g. using 'anonymous remailers'). There has been speculation, however, that the largest uses of these tools may be by governments and by businesses dealing in particular kinds of data, such as pornography.

Similar tools can also be used to access documents without leaving an identified trail as to who has viewed which documents (e.g. 'anonymous Web surfing'). Of course, such tools are valuable not only to individuals, but also to governments and businesses conducting covert operations of various kinds.


The implications of these developments is that governments and corporations are in a position to enhance the restrictions on access to information. The golden era of information accessibility is under threat, because governments have successfully resisted FOI and now have additional weapons available to them. Major corporations are wielding their power to protect their own interests.

In the present information era, skirmishes around the edges of existing FOI laws are irrelevant. If freedom of information is to be sustained, let alone increased, then measures are needed now. Arguments against legal protectionism need to be advanced much more energetically, countervailing power needs to be mobilised against corporate and governmental interests. Information and networking technologies need to be carefully designed to avoid protectionism becoming entrenched within information infrastructure.

A serious battle is in train, with corporations manipulating governments, netheads wailing, the public non-aware, and FOI specialists largely failing to notice the changes going on around them. FOI activists can either remain asleep (and become even less relevant), or can inform themselves and become involved in this vital issue.

About the Author

Roger Clarke is Principal of Xamax Consultancy Pty Ltd. in Canberra and Visiting Fellow in the Department of Computer Science at Australian National University.


This paper was prepared for presentation at the Conference on 'Freedom of Information and the Right to Know', Communications Law Centre and the International Commission of Jurists, Melbourne, 19-20 August 1999.


J. P. Barlow, 1994. "The Economy of Ideas," Wired, volume 2, number 3 (March), pp. 84-90, 126-129, and, at

S. Blackmore, 1999. The Meme Machine. Oxford: Oxford University Press, and,

D. Brin, 1998. The Transparent Society. Reading, Mass.: Addison-Wesley.

R. Clarke, 1992a. "Fundamentals of 'Information Systems," at

R. Clarke, 1992b. "Knowledge," at

R. Clarke, 1994. "Electronic Support for Research Practice: The Inadequacy of Economic Analysis in a Time of Revolutionary Change," Information Society, volume 10, number 1 (March), and at

R. Clarke, 1996. "CyberCulture: Towards the Analysis That Internet Participants Need," (March), at

R. Clarke, 1997a. "Electronic Publishing: A Specialised Form of Electronic Commerce," Proceedings, 10th International Electronic Commerce Conference, Bled, Slovenia (June) , at

R. Clarke, 1997b. "Privacy Impact Assessments," (September), at

R. Clarke, 1998. "Information Privacy On the Internet: Cyberspace Invades Personal Space," Telecommunication Journal of Australia, volume 48, number 2 (May/June), at

R. Clarke, 1999a. "Key Issues in Electronic Commerce and Electronic Publishing," Proceedings, Information Online and On Disc 99 Conference, Sydney (19-21 January), at

R. Clarke, 1999b. "The Legal Context of Privacy-Enhancing and Privacy-Sympathetic Technologies," (April), at

R. Clarke, 1999c. "The Willingness of Net-Consumers to Pay: A Lack-of-Progress Report," Proceedings, 12th Electronic Commerce Conference, Bled, Slovenia (8-9 June), at

R. Clarke, 1999d. "Electronic Services Delivery: From Brochure-Ware to Entry Points," Proceedings, 12th Electronic Commerce Conference, Bled, Slovenia (8-9 June), at

R. Clarke, 1999e. "Information Wants To Be Free," (August), at

R. Clarke & G. Dempsey, 1999. "Electronic Trading in Copyright Objects and Its Implications for Universities," Proceedings, Australian EDUCAUSE'99 Conference, Sydney (18-21 April), at

R. Dawkins, 1976. The Selfish Gene. Oxford: Oxford University Press, and at

G. Dempsey, 1998. "Knowledge and Innovation in Intellectual Property: The Case of Computer Program Copyright," Unpublished PhD Thesis, Australian National University (March).

L. Downes L. & C. Mui, 1998. Unleashing the Killer App. Boston: Harvard Business School Press, p. 51, and at

E. Dyson, 1995. "Intellectual Value," Wired, volume 3, number 7 (July), pp. 148-150, 217-218, and at

P. Evans & T. Wurster, 1997. "Strategy and the New Economics of Information," Harvard Business Review (September-October), pp. 71-82.

R.A. Ghosh, 1998. "Cooking pot markets: an economic model for the trade in free goods and services on the Internet," First Monday, volume 3, number 3 (March), at

W. Gibson, 1984. Neuromancer. London: Grafton/Collins.

K. Kelly, 1996. "The Economics of Ideas," Wired, volume 4, number 6 (June), and at

D.M. Lamberton (editor), 1971. The Economics of Information and Knowledge: Selected Readings. Harmondsworth: Penguin.

D.M. Lamberton (editor), 1996. The Economics of Communication and Information. Cheltenham: Edward Elgar.

R.A. Melcher, 1997. "Dusting off the Britannica," Business Week (20 October), at

N. Negroponte, 1995. Being Digital. London: Hodder & Stoughton.

E.S. Raymond, 1998. "The Cathedral and the Bazaar," First Monday, volume 3, number 3 (March), at

G. Rayport & T. Gerace, 1997. "Encyclopaedia Britannica," Case 5-396-419, Harvard Business School, at

H. Rheingold, 1996. "A Slice of My Life in My Virtual Community," In: P. Ludlow (editor), High Noon on the Electronic Frontier: Conceptual Issues in Cyberspace. Cambridge, Mass.: MIT Press, pp. 413-436.

H. Rheingold, 1994. The Virtual Community in a Computerized World. London: Secker & Warburg, and at

T. Roszak, 1986. The Cult of Information. New York: Pantheon.

C. Shapiro & H.R. Varian, 1999. Information Rules: A Strategic Guide to the Network Economy. Boston: Harvard Business School Press.

R. Stallman, 1992. "Why Software Should Be Free," at

N. Stephenson, 1992. Snow Crash. New York: Bantam Spectra.

B. Sterling, 1988. "Preface," In: Mirrorshades: The Cyberpunk Anthology. New York: Ace.

B. Sterling, 1991. Islands in the Net. New York: Arbor House.

Appendix: Data, Information, Knowledge, Wisdom

This Appendix is an abbreviated rendition of the analysis in Clarke (1992a), and Clarke (1992b).

The information systems discipline and profession regard 'data' as any symbol, sign or measure which is in a form that can be directly captured by a person or a machine. The most useful data represents or purports to represent facts and events in the real world. (Note that, while 'data' is technically a plural noun - the singular is 'datum', usage during the last fifty years has rendered it a generic term, qualified as, for example, 'data-item' for the singular and 'data-items' for the plural).

The vast majority of real world facts never give rise to data. The background noise emanating from all points of the universe has been ignored for millions of years (until the last few decades, during which some astronomers have occasionally sampled a tiny amount of it). Some things about the trucks that carry goods in and out of a company's gates may be of great interest to someone (such as which trucks, when, what they carried in, and what they carried out). But it's rare to bother even measuring, let alone recording, the pressure in the tyres on the trucks, the number of chip marks in the paintwork, the condition of the valves on the motor, or even the number of consecutive hours the driver has been at the wheel. There are myriad real-world facts that we let go by, and never capture as data.

Of the real-world data that we do capture, many kinds are very uninteresting. The contents of audio tapes on which astronomers record the background noise emanating from various parts of the sky might on occasions contain a signal from a projectile launched from the earth, and just possibly might contain some pattern from which it would be possible to infer an interstellar event, or perhaps the existence of intelligent life somewhere in the universe. But usually the contents are extremely boring, and devoid of any value to anyone. Similarly, a great deal of the data captured by commerce, industry and government is either 'just for the record' or of interest for only a very short time, and then filed in case someone ever wants to look at it again.

What is it that makes data interesting or valuable? The most straightforward way in which data is useful is when it has relevance to a decision. When we make up in the morning, we don't usually think about what the weather is like outside until we are deciding what to do with the day (if it's a weekend) or what to wear (if it's a workday). Data about a delivery of a particular batch of baby food to a particular supermarket is lost in the bowels of the company's database, never to come to light again, unless and until something exceptional happens, such as the bill not being paid, the customer complaining about short delivery, or an extortionist making a telephone call to claim that poison has been added to some of the bottles.

A narrow interpretation is that data is relevant and of value only if it makes a difference to a decision. A more general approach is to define it as relevant if it could make a difference. A yet broader conception recognises that value exists even in the absence of a decision, where the data is not what we would have expected, and therefore has 'surprisal' value ("Gosh! The government might survive the election yet!" Or "An injury incurred in training will keep the star fullback out of the Grand Final!"). Information is "a difference which makes a difference" (Barlow, 1994, quoting Shannon).

The most useful definition is therefore that information is data that has value in a context. Until it is placed in an appropriate context, data is not information, and once it ceases to be in that context it ceases to be information. A critical element of that context is a person who is processing the data, and interrelating it with other data and models. "Information is an activity - a verb not a noun" (Barlow, 1994).

It's important to relate information to two further concepts. Knowledge can be naively considered as a body of facts and principles accumulated by mankind over the course of time. This storehouse' notion is too mechanistic to be of much use, however. A more serviceable interpretation is as the matrix of impressions within which an individual situates newly acquired information, and which underlies selectivity, filtering and interpretation. Wisdom, meanwhile, is a very different notion from information and knowledge. It is judgement by an individual, using currently available knowledge and new information, based on criteria that are felt rather than expressed.

The information systems discipline's definitions of data and information presented above avoid the most simplistic notions, but are still too mechanistic for some observers: "information, [even today], is no more than it has ever been: discrete little bundles of fact, sometimes useful, sometimes trivial, and never the substance of thought [and knowledge] ... The data processing model of thought ... coarsens subtle distinctions in the anatomy of mind ... Experience ... is more like a stew than a filing system ... Every piece of software has some repertory of basic assumptions, values, limitations embedded within it ... [For example], the vice of the spreadsheet is that its neat, mathematical facade, its rigorous logic, its profusion of numbers, may blind its user to the unexamined ideas and omissions that govern the calculations ... garbage in - gospel out. What we confront in the burgeoning surveillance machinery of our society is not a value-neutral technological process ... It is, rather, the social vision of the Utilitarian philosophers at last fully realized in the computer. It yields a world without shadows, secrets or mysteries, where everything has become a naked quantity" (Roszak, 1986, pp.87,95,98,118,120,186-7).

Contents Index

Copyright © 1999, First Monday

Freedom of Information? The Internet as Harbinger of the New Dark Ages by Roger Clarke
First Monday, volume 4, number 11 (November 1999),

A Great Cities Initiative of the University of Illinois at Chicago University Library.

© First Monday, 1995-2019. ISSN 1396-0466.