Blog Feed Post

The President of the Internet

What, exactly, did Facebook, Twitter, Google, and other tech giants do to empower or enable bad actors (foreign governments, radical organizations, Russians) to influence the outcome of the 2016 elections? How did it happen? Who is to blame? How can we prevent it from happening again?

Congress has an idea. Sen. Mark Warner (D-VA) and Sen. Amy Klobuchar (D-MN) have urged their colleagues and constituents to support a bill that will regulate campaign ads running on digital platforms. That sounds like a plan, but it really won’t produce the desired outcome. In fact, the very concept of this bill makes assumptions about the nature of communications, command and control that are no longer valid.

There Is No Central Authority

The Internet is not television or radio (highly regulated, government-granted monopolies propagated over airwaves controlled by the government). The Internet is not a newspaper with an editor-in-chief, a publisher, a physical address, and a license to conduct business. The Internet is not Facebook, Twitter, Google, or any group of tech companies. The Internet is not Verizon, AT&T, Comcast, or any carrier or network. The Internet is not “in the cloud,” at your Internet Service Provider (ISP), or located anywhere.

The Internet is everywhere. It is a vast computer network (made up of millions of smaller networks) using a specific set of communications protocols. It cannot be shut down, it cannot be disabled, and it cannot be destroyed. Most importantly, it cannot be regulated because there is no central authority to regulate.

Can’t We Regulate Something?

Just for the sake of argument, let’s pretend a law was passed that required Facebook, Twitter, Google, and other online outlets to apply the Bipartisan Campaign Reform Act of 2002 (aka the McCain-Feingold Act) to paid political advertising. You would start seeing and hearing the tagline you’ve come to know and ignore: “I’m so-and-so candidate and I approve this message.”

Great! Now we’ve regulated political ads online. Except it won’t change a thing. Legitimate political advertising, even super-well-targeted attack ads filled with misinformation, is not what’s at play here. We are dealing with something much, much harder to identify and impossible to stop: people communicating with each other.

Here’s What We’re Up Against

I wrote about this back in June 2017 and in October 2015. The methodology used by bad actors to exert pressure and social influence on the unsuspecting public is self-organizing.

Most self-organizing systems work by giving a few very simple instructions to completely autonomous entities and letting them act on their own.

The strategy requires four cohorts: ideators, propagators, supporters, and executors. Ideators will come up with the instructions and post them. Propagators will share, retweet, or otherwise propagate the instructions. Supporters will not propagate but will tacitly support the propagators. Executors will carry out the instructions.

You can find good examples of self-organizing systems by analyzing self-organizing ant colonies or self-organizing robot swarms or even algorithmic art.

Social Media Meme Mutations

In his book The Selfish Gene, Richard Dawkins coins the term “meme” as a concept for discussion of evolutionary principles in explaining the spread of ideas and cultural phenomena. Memes possess many of the attributes we assign to living things. They are born, they procreate, they mutate, and at some point, they die. Once an article, blog post, meme, or other unit of communication works its way into someone’s echo chamber or comfort zone, it will be propagated across that person’s social network. Unless you are willing to impose dictatorial censorship, there’s nothing you can do to regulate it – there never has been and there never will be. Even on the “paid and closed” Internet, there’s no way to prohibit self-expression. As Victor Hugo once said, “On résiste à l’invasion des armées; on ne résiste pas à l’invasion des idées” (One resists the invasion of armies; one does not resist the invasion of ideas).

A Social Engineering Arms Race

The names “social terrorism” and “social media warfare” are not quite right. This is a new kind of war against an enemy with very new weapons. Discussing the military impact of social media, my good friend Col. John Fenzel (Ret.) said, “We are now in a state of enduring social conflict enabled and empowered by social media.” At the time, we were talking about terrorists killing civilians on the street. These attacks were not ordered by a military commander, not carried out by troops, not perpetrated by terror cells or operatives. They were socially engineered. The key performance indicator of that well-executed, hyper-targeted, social media marketing campaign was dead people. It’s sickening to think of it this way, but you have to call it what it was: a highly successful social engineering hack.

The political “ads” being discussed use 100 percent of the same tactics: websites, fake news, bot accounts, people with an agenda, and people looking for leadership who are willing to do what they are told. The outcomes are equally as predictable.

Known Unknowns

There is no president of the Internet. Could there be? You might think Mark Zuckerberg (CEO of Facebook) is a candidate (Congress clearly thinks he is). He rules a meta-country of over 2 billion people. Except he really doesn’t. Mark doesn’t decide what you are going to see in your Facebook feed; an algorithm that is programmed to show you content you are most likely to engage with decides. No humans are involved. Should they be?

Larry Page (CEO of Alphabet) is also a candidate. He rules a meta-country more than three times the size of Facebook. He doesn’t decide what links should show up on the results page of your Google search; an algorithm programmed to feed you results (ads you are likely to click on) makes that decision. No humans are involved. Should they be?

Like most of us in the United States, I live in a town (that has a government) in a county (that has a government) in a state (that has a government) in a country (that has a government). There are four levels of government overseeing my hometown. So it makes sense that professional politicians who don’t understand what the Internet is want to put themselves in charge of it. It’s just not possible.

If there were a president of the Internet or if it could be regulated, that president or governing body of regulators would actually rule the world. No one should ever have that much power. And, luckily, no one ever will.

Other Articles You May Enjoy

About Facebook Ads

iPhone X: Imitation Is Not Innovation

Chipping People: Are You Ready?

ICOs: What You Need to Know

CMOs Shouldn’t Buy Tech, Ever!

How Do You See the Future?

The Five Jobs Robots Will Take First

The Five Jobs Robots Will Take Last

Just How Dangerous Is Alexa?

Machine Learning & AI: When to Start?

Artificial Intelligence: 5 Things Every CEO Should Know

Author’s note: This is not a sponsored post. I am the author of this article and it expresses my own opinions. I am not, nor is my company, receiving compensation for it.

The post The President of the Internet originally appeared here on Shelly Palmer

Read the original blog entry...

More Stories By Shelly Palmer

Shelly Palmer is the host of Fox Television’s "Shelly Palmer Digital Living" television show about living and working in a digital world. He is Fox 5′s (WNYW-TV New York) Tech Expert and the host of United Stations Radio Network’s, MediaBytes, a daily syndicated radio report that features insightful commentary and a unique insiders take on the biggest stories in technology, media, and entertainment.

Latest Stories
DXWorldEXPO LLC announced today that Kevin Jackson joined the faculty of CloudEXPO's "10-Year Anniversary Event" which will take place on November 11-13, 2018 in New York City. Kevin L. Jackson is a globally recognized cloud computing expert and Founder/Author of the award winning "Cloud Musings" blog. Mr. Jackson has also been recognized as a "Top 100 Cybersecurity Influencer and Brand" by Onalytica (2015), a Huffington Post "Top 100 Cloud Computing Experts on Twitter" (2013) and a "Top 50 C...
Cloud-enabled transformation has evolved from cost saving measure to business innovation strategy -- one that combines the cloud with cognitive capabilities to drive market disruption. Learn how you can achieve the insight and agility you need to gain a competitive advantage. Industry-acclaimed CTO and cloud expert, Shankar Kalyana presents. Only the most exceptional IBMers are appointed with the rare distinction of IBM Fellow, the highest technical honor in the company. Shankar has also receive...
Enterprises have taken advantage of IoT to achieve important revenue and cost advantages. What is less apparent is how incumbent enterprises operating at scale have, following success with IoT, built analytic, operations management and software development capabilities - ranging from autonomous vehicles to manageable robotics installations. They have embraced these capabilities as if they were Silicon Valley startups.
DXWorldEXPO LLC announced today that ICOHOLDER named "Media Sponsor" of Miami Blockchain Event by FinTechEXPO. ICOHOLDER give you detailed information and help the community to invest in the trusty projects. Miami Blockchain Event by FinTechEXPO has opened its Call for Papers. The two-day event will present 20 top Blockchain experts. All speaking inquiries which covers the following information can be submitted by email to [email protected] Miami Blockchain Event by FinTechEXPO also offers s...
Poor data quality and analytics drive down business value. In fact, Gartner estimated that the average financial impact of poor data quality on organizations is $9.7 million per year. But bad data is much more than a cost center. By eroding trust in information, analytics and the business decisions based on these, it is a serious impediment to digital transformation.
Daniel Jones is CTO of EngineerBetter, helping enterprises deliver value faster. Previously he was an IT consultant, indie video games developer, head of web development in the finance sector, and an award-winning martial artist. Continuous Delivery makes it possible to exploit findings of cognitive psychology and neuroscience to increase the productivity and happiness of our teams.
As DevOps methodologies expand their reach across the enterprise, organizations face the daunting challenge of adapting related cloud strategies to ensure optimal alignment, from managing complexity to ensuring proper governance. How can culture, automation, legacy apps and even budget be reexamined to enable this ongoing shift within the modern software factory? In her Day 2 Keynote at @DevOpsSummit at 21st Cloud Expo, Aruna Ravichandran, VP, DevOps Solutions Marketing, CA Technologies, was jo...
Predicting the future has never been more challenging - not because of the lack of data but because of the flood of ungoverned and risk laden information. Microsoft states that 2.5 exabytes of data are created every day. Expectations and reliance on data are being pushed to the limits, as demands around hybrid options continue to grow.
The standardization of container runtimes and images has sparked the creation of an almost overwhelming number of new open source projects that build on and otherwise work with these specifications. Of course, there's Kubernetes, which orchestrates and manages collections of containers. It was one of the first and best-known examples of projects that make containers truly useful for production use. However, more recently, the container ecosystem has truly exploded. A service mesh like Istio addr...
As IoT continues to increase momentum, so does the associated risk. Secure Device Lifecycle Management (DLM) is ranked as one of the most important technology areas of IoT. Driving this trend is the realization that secure support for IoT devices provides companies the ability to deliver high-quality, reliable, secure offerings faster, create new revenue streams, and reduce support costs, all while building a competitive advantage in their markets. In this session, we will use customer use cases...
Digital Transformation: Preparing Cloud & IoT Security for the Age of Artificial Intelligence. As automation and artificial intelligence (AI) power solution development and delivery, many businesses need to build backend cloud capabilities. Well-poised organizations, marketing smart devices with AI and BlockChain capabilities prepare to refine compliance and regulatory capabilities in 2018. Volumes of health, financial, technical and privacy data, along with tightening compliance requirements by...
Business professionals no longer wonder if they'll migrate to the cloud; it's now a matter of when. The cloud environment has proved to be a major force in transitioning to an agile business model that enables quick decisions and fast implementation that solidify customer relationships. And when the cloud is combined with the power of cognitive computing, it drives innovation and transformation that achieves astounding competitive advantage.
Evan Kirstel is an internationally recognized thought leader and social media influencer in IoT (#1 in 2017), Cloud, Data Security (2016), Health Tech (#9 in 2017), Digital Health (#6 in 2016), B2B Marketing (#5 in 2015), AI, Smart Home, Digital (2017), IIoT (#1 in 2017) and Telecom/Wireless/5G. His connections are a "Who's Who" in these technologies, He is in the top 10 most mentioned/re-tweeted by CMOs and CIOs (2016) and have been recently named 5th most influential B2B marketeer in the US. H...
DevOpsSummit New York 2018, colocated with CloudEXPO | DXWorldEXPO New York 2018 will be held November 11-13, 2018, in New York City. Digital Transformation (DX) is a major focus with the introduction of DXWorldEXPO within the program. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of bus...
DXWordEXPO New York 2018, colocated with CloudEXPO New York 2018 will be held November 11-13, 2018, in New York City and will bring together Cloud Computing, FinTech and Blockchain, Digital Transformation, Big Data, Internet of Things, DevOps, AI, Machine Learning and WebRTC to one location.