The Rise and Fall Of America’s Unregulated Internet

America gave birth to the Internet. Created in the 1970’s by the U.S. Defense Department, its use drifted to academia and then started to take off in an entrepreneurial, libertarian private sector of the 1990’s among those who thought it might be something, someday. Upon this apparently dubious ground, they placed their financial bets.

At first, it was viewed as a novelty where you could exchange emails and pin messages on so-called white boards.  Even gathering news through a collection point, like the Drudge Report, (a U.S. based news aggregation website) or from reluctant main stream media who gave it away from free to a dubiously small and not likely profitable audience.  

US Government (USG) regulation was sparse during this period.  When the 1996 Telecommunications Act was passed – the first change of telecom in 60 years to enable greater competition in the industry - the Internet was mentioned in passing.

Early Internet lobbying groups wanted what protection from litigation against them because of false or defamatory information place on their sites. They got what they asked for as a way to encourage growth and competition in a nascent era in which growth projections were not encouraging.

Flash forward twenty-four years, and you have a different world in which the Internet and its social media play a dominant, and often disruptive role, in international trade and politics with over 4 billion users – half the planet. 

Two US presidential elections have been impacted heavily by issues of “fake news” and rumor spreading that used to be confined to Third World elections and internationally based Cold War type propaganda programs. Now, the combination of legal protection and the laissez faire attitude of social media companies seems both anachronistic and harmful. And our lackadaisical concern about cyber security seems ridiculous.

Regulation Comes 

The days of the regulation are upon us for social media content, and the overall operations of the Internet itself. The difference between the Trump Administration approach and the Biden Administration will not likely be great - the ongoing programs will likely strengthen and the desire to come to grips with unregulated security and content will increase as political upsets increases with a social media wracked by extreme politics, misinformation, and balkanization of interests and a failed system to make it secure.

The USG is already looking at organizational sizes for anti-trust and putting forward a number of government programs from the Defense Department and Homeland Security which focus on protecting and upgrading the security in an information system woefully inadequate to handle such. 

Moreover, it is increasing its policing efforts within the Internet with the FBI and Homeland Security - in cooperation with the Intelligence - again expanding large scale programs to reach out to the provide sector to provide them supportive information and deal comprehensively with attack. It is seriously considering EU style rules on the use, storage and sale of information it gathers - a prime revenue source.

As for social media content, the providers did get the message after the 2016 elections that, like it or not, the “public square” they created has a seedy and manipulated side that pollutes the information provided and potentially poisons the news which the sites use for “eyes on site, click bait” and thus revenue to the sale of this information. 

Particularly sensitive to the election issue, the social media’s 2020 election behavior saw well developed programs of self-policing and unprecedented cooperation with the USG entities overseeing the vote.

Whither Content?

After several bashings on Capitol Hill of the social media leadership in 2020, they recognize there is a big problem.  And, by their own reluctant admission are willing to let the USG set some regulation for them.  The hearings that will be certainly held in the next Congress on this regulation are going to be brutal as an industry that favors light regulations and views the Congress with disdain runs into increasingly angry legislatures and power of Washington DC.

Advocates are pushing to drop the provision of the Telecommunications Act that protects the social media, and further allow regulation of the content through an USG organization like the Federal Communications Commission.  Whatever happens for regulation - and there will be regulation - the issue of the First Amendment freedom of speech will be hovering over all of this.  

Bottom Line:  The “halcyon” days of so-called Internet “freedom” in the US are gone. It is now only a question of how heavy the regulation will be.  Both security and content will be heavily overseen by the USG as the body politic will accept nothing else.

Ronald Marks  is President of ZPN Cyber & National Security Strategies

You Might Also Read:

Foreign Influence In The American Election Of 2020 Is Declining

 

« Cyber Psychology
AI Speeds Up Government Policy Decisions »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

IT Governance

IT Governance

IT Governance is a leading global provider of information security solutions. Download our free guide and find out how ISO 27001 can help protect your organisation's information.

Alvacomm

Alvacomm

Alvacomm offers holistic VIP cybersecurity services, providing comprehensive protection against cyber threats. Our solutions include risk assessment, threat detection, incident response.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

Malware.lu

Malware.lu

Malware.lu is a repository of malware and technical analysis. The goal of the project is to provide samples and technical analysis to security researchers.

Hitachi ID Systems

Hitachi ID Systems

Hitachi ID Systems offers comprehensive identity management and access governance, privileged access management and password management solutions.

Evok

Evok

EVOK is an IT Service provider specialized in installing, maintaining and supporting IT infrastructures for SMB's in Switzerland.

Netskope

Netskope

Netskope, a global cybersecurity leader, is redefining cloud, data, and network security to help organizations apply Zero Trust principles to protect data.

Panaseer

Panaseer

Panaseer is an enterprise cybersecurity automation and data analytics company that helps organizations stop preventable breaches by ensuring security controls are working effectively.

Picasso

Picasso

The Picasso project is focused on ICT Policy, Research and Innovation for a Smart Society: towards new avenues in EU-US ICT collaboration.

Netwrix

Netwrix

Netwrix empowers information security and governance professionals to identify and protect sensitive data to reduce the risk of a breach.

BlueVoyant

BlueVoyant

BlueVoyant's Cyber Defense Platform is security operations platform that provides real-time threat monitoring for networks, endpoints, and supply chains.

RIPS Technologies

RIPS Technologies

RIPS Technologies delivers automated security analysis for PHP applications as platform independent software or highly scalable cloud service.

3Elos

3Elos

3Elos operates in the Information Technology market with a focus on research, development, consulting, marketing and implementation of Information Security solutions.

CYBAVO

CYBAVO

CYBAVO is a cryptocurrency security company founded by experts from the cryptocurrency and security industries.

eaziSecurity

eaziSecurity

eaziSecurity has built an eco-system of technology and services that bring enterprise scale security solutions to the SME marketplace.

Rootshell Security

Rootshell Security

Rootshell Security is transforming vulnerability management with its vendor-agnostic Prism Platform and industry-leading offensive security assessments.

Fulcrum Technology Solutions

Fulcrum Technology Solutions

The Fulcrum team of technologists are recognized experts in the fields of IT Infrastructure Technology, Security, Service Management and Support.

Cypheria

Cypheria

Cypheria harness the expertise of elite military units and combine it with extensive digital combat experience to deliver unparalleled security solutions for organizations.

CyberHive

CyberHive

CyberHive offer a complete suite of threat protection modules that seamlessly integrate to block current, as well as future threats.