The Digital Big Bang. Phil Quade

Чтение книги онлайн.

Читать онлайн книгу The Digital Big Bang - Phil Quade страница 17

The Digital Big Bang - Phil Quade

Скачать книгу

space or stored in vast arrays of storage devices. The resulting rat's nest of technology, people, and procedures then offers such a complicated and undistinguished landscape that, within the context of the conversation, further use of the word cyber could mean anything, and often does. It is important, then, to tease out the constituent parts of cyberspace to describe their characteristics, their contribution to the overall effect, and their relationship to each other. This, in turn, will yield a taxonomy or roadmap that allows focused discussions about discrete aspects of cyberspace that can be considered in the context of the whole.

      This section attempts to describe, in context, discrete facets of cyberspace along the following lines: Physical geography, communications pathways, controlling logic and storage, devices, and people. It's important to note that cyberspace is not actually built this way, any more than a human being grows from embryo to adult according to the taxonomy laid out in Gray's Anatomy. But the understanding of the unique characteristics of cyberspace and how it is likely to operate under various scenarios is the goal here, not a description of how to build it anew.

      THE BOOKENDS: GEOGRAPHY AND PEOPLE

      Like any domain, cyberspace is sandwiched between the earth that hosts it and the people who would use it. Given humankind's long experience with both (that is, geography and people), this fact is both a source of comfort and a vexation. To see why, we need only consider each in turn.

      The Geography Layer

      Software running on the millions of computers controlling the storage devices and pathways of cyberspace constantly senses the status of various routes, sometimes sending communications around the planet on pathways that are underutilized to arrive at a destination only miles away in the shortest time possible. Not understanding the informal but influential rules that inform cyberspace routing means users may be forever surprised at the paths their communications take and where they may actually reside while being stored until the owner accesses them. In most cases, this counterintuitive phenomenon represents a user-preferred feature, in that the details of routing and storage are handled automatically without requiring the user to master and direct complex aspects of technology, communication routes, and traffic flows. But the downside is obvious for users who assume that their data is safe from prying eyes or other risks because it is stored or routed through technologies and routes that are wholly within the users' field of view.

      Experience in the geography layer also informs a sense of who is responsible for what. Cyberspace cannot ignore the reality that laws, policies, and treaties that govern human affairs are almost always tied to geography. This reality becomes particularly challenging when trying to sort out which laws pertain to property that is shared across countries or, more significantly, what jurisdiction pertains to an activity that crosses space and time in milliseconds, only to take a different route seconds later.

      The People Layer

      The top layer reflects the fact that people are an integral component of cyberspace. Indeed, people (rather than technology) explain the dynamic, ever-changing nature of cyberspace as users employ its various capabilities in ways that depart from, and even confound, the expectations of component, software, and system designers.

      The Circuit Layer

      The circuit layer of the model depicts the literal pathways that communications take to make their way from one place to another within cyberspace. Taken together with the geography and people layers of the unfolding model, this layer represents the sum total of what would have once been referred to as the telecommunications domain.

      Long before the advent of the computers, sophisticated software, and ubiquitous wireless devices that power today's Internet, the telecommunications domain offered a simple and reliable means for a given communication to be sent and received across far-flung stretches of the earth. In that day and age, the flow of communications was still directly and manually controlled by human beings. A person would literally choose whether, when, and how a message would be sent by dialing a phone, faxing a message, or keying a microphone to initiate a communication. The communication would then flow from one location to its destination along a generally straight line, often a dedicated path (or link), and would be immediately received by the intended recipient on the other end. In effect, the communication would be manually pushed from one location to another and would be at risk of disclosure to a third party only during the time it was in transit. Before and after the transmission, the communication would reside in a sanctuary of sorts: In a person's mind, in a desk drawer, or if need be, in a safe.

      As the Internet began to spread its web using these same methods of communication and as the means of transmission, storage, and presentation to communicants around the world increased exponentially in variety, scope, and scale,

Скачать книгу