It’s Well Past 230 For The US Communications Decency Act

One of the more amazing aspects of growing older in Washington DC is watching ancient political events or hastily written laws of another time take on a whole other meaning than they were originally intended.  

Section 230 of the US Communications Decency Act is one of those items.  An ancient political sop, in an ancient Presidential campaign year coming into the third decade of the 21st century - now like a Commandment to Moses on Mt. Sinai.  

The original purpose of Section 230 was to provide a cover to a nascent industry called the Internet. In toto is says “"No provider or user of an interactive computer service shall be treated as the publisher or speaker of any information provided by another information content provider.”

In other words, people could publish and the sites containing the information could not be sued for content. 

For those of us on the Hill at the time in a presidential political year - and considering what little was on the Internet at the time - it didn’t seem like a big deal.  Protecting some potential political contributors and encouraging industry - who could not like that?

As Time Goes By

Truly no one in 1996 had a clue what the Internet would become – even the Internet.  The explosion of sites and the reach of the system didn’t really take place until the mid/late 00’s and early 10’s.  And no one thought it would be accessed by over sixty percent of the world’s population.  Nor through smart phones - which again did not exist until 2007.  Jobs. Zuckerberg. Bezos. Few knew of them. Less cared.

What did occur to the sharper cognoscente early on was the ability to plant and maneuver information on the Net.

No more newspapers or magazines with editors and source demanding reports.  Straight from the horse’s mouth to the public.  A boon to those with an agenda to push – foreign and domestic.  And a way to tie together moment by moment liked minded peoples in a way not possible before.

And, for the protected Net platform providers desperate to try to monetize their investment, controversy drove “eyes” to target.  More revenue from advertisers. And the Net companies also slowly realized that all the personal information the “eyes” unknowingly and legally gave - at no charge – was a valuable commodity.  Who it got sold to  - well, that was somebody else’s headache.  

Fire In The Theatre

So, we’ve ended up with the mess we have today.  A wealthy beyond belief internet capable of shooting lies around the world at a moment’s notice. And the ability to multiply the lies through bots with an anonymity based on a system that has it built in; the owners paying lip service to public concern with “internal guidelines.” 

US regulators has been reluctant to interfere much with this system. Part of it ignorance of its structure and extent of its reach. And part  balancing act of libertarian cant  - with the true fear of potential political backlash from a system built to instantly attack those who cross it. 

And, after stiff arming DC for some time with hostile and dismissive rhetoric, the Internet’s Capital, Silicon Valley, has realized that any efforts to regulate can be countered with good lobbying and partial measures that work well enough to mollify.  Self-regulation of content is touted at the best solution.  And they are more than happy to support the idea of freedom of speech when it comes to increasing eyes on site – no matter what the speech or what its effect.  Self-regulation works in their world view. Why upset the system?

Well Past 230 - Let‘Em Sue

For an increasing large portion of the political and social system of the United States, the current “system” is not working.  It is a protected, informational sewer clogging up our personal and political processes. 

It is time to look at the main culprit - the existence of a section of a political bill from 26 years ago meant to mollify a potential set of contributors by supporting a nascent industry long overdue for change.

We cannot fix this situation with government regulation.  The last thing we need is our government building another version of the Federal Communication Commission regulating content on the “public airwaves.”  Besides, the internet is no borders and no boundaries.  What are you gonna do - regulate a server in Bucharest used by a blogger in Singapore?

No, I would simply remove Section 230 itself.  Strike the section.  Let the platform providers see what the true market place looks like when they can be sued by one and all for their content.  Other companies are, why not them?  Let the market dictate what will and will not be tolerated.  They’ll be paying more attention to content. Fast.

Some will scream bloody murder about this approach.  And to those who wish to burn down the theatre and have no limits – well, sorry guys.  The Constitution supports free speech – up to point.  As a Supreme Court justice once said, the Constitution is not a suicide pact… “the choice is not between order and liberty. It is between liberty with order and anarchy without either.”

We are well past 230.  Time for change.


Ronald Marks is a former CIA officer who served as Senate liaison for five CIA Directors and intelligence counsel to two Senate Majority Leaders. He currently is a non-resident senior fellow at the Scowcroft Center at The Atlantic Council and a visiting professor at the Schar School of Policy and Government at George Mason University.


You Might Also Read: 

Flunking Cyber Education:

 

« Hidden In Plain Sight
Sharing Deepfakes To Be Made Illegal In Britain »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Allen & Overy

Allen & Overy

Allen & Overy is an international law firm. Practice areas include Cybersecurity and Data Protection.

baramundi software

baramundi software

baramundi software AG provides companies and organizations with efficient, secure, and cross-platform management of workstation environments.

CyberPrism

CyberPrism

CyberPrism provides SaaS solutions using proprietary technology, underpinned by industry-leading technical practitioners to protect OT within Government, Maritime and Industrial markets.

DQM GRC

DQM GRC

DQM GRC are one of the UK's leading providers of data governance, e-privacy and GDPR services, to commercial organisations across all industries in the UK.

Adzuna

Adzuna

Adzuna is a search engine for job ads used by over 10 million visitors per month that aims to list every job everywhere, including thousands of vacancies in Cybersecurity.

Privacera

Privacera

Privacera enables consistent data governance, security, and compliance across all your data services - on-premises and in the cloud - so you can maximize the value of your data.

Keysight Technologies

Keysight Technologies

Keysight is dedicated to providing tomorrow’s test technologies today, enabling our customers to connect and secure the world with their innovations.

Enginsight

Enginsight

Enginsight provides a comprehensive solution for monitoring and securing your servers and clients.

RevealSecurity

RevealSecurity

RevealSecurity's TrackerIQ detects malicious activities in enterprise applications.

Intelligent Technical Solutions (ITS)

Intelligent Technical Solutions (ITS)

We help businesses manage their technology. Intelligent Technical Solutions provide you with the right technical solution, so you can get back to running your business.

Primary Guard

Primary Guard

Primary Guard provides IT solutions and computing technologies that help minimize impact from cyber threats, improve business efficiency and maintain essential functions during or after a disaster.

Utimaco

Utimaco

UTIMACO develops on-premises and cloud-based hardware security modules, solutions for key management, data protection and identity management as well as data intelligence solutions.

BitLyft

BitLyft

BitLyft is a managed detection and response provider that is dedicated to delivering unparalleled protection from cyber attacks for organizations of all sizes.

Zeron

Zeron

Zeron build bridges between security teams and top management. Our platform unifies your cyber risk posture seamlessly, encompassing threat insights and quantifiable risk scenarios.

CyberMaxx

CyberMaxx

At CyberMaxx, our approach to cybersecurity provides end-to-end coverage for our customers – we use offense to fuel defense.

Guardian Angel Cyber

Guardian Angel Cyber

Guardian Angel Cyber, is your trusted ally in safeguarding your digital assets and online presence.