{"id":913,"date":"2016-03-22T09:34:56","date_gmt":"2016-03-22T14:34:56","guid":{"rendered":"https:\/\/thesocietypages.org\/trot\/?p=913"},"modified":"2016-03-22T09:34:56","modified_gmt":"2016-03-22T14:34:56","slug":"fbiphone-and-coders-free-speech","status":"publish","type":"post","link":"https:\/\/thesocietypages.org\/trot\/2016\/03\/22\/fbiphone-and-coders-free-speech\/","title":{"rendered":"FBiPhone and Coders\u2019 Free Speech"},"content":{"rendered":"<figure id=\"attachment_914\" aria-describedby=\"caption-attachment-914\" style=\"width: 600px\" class=\"wp-caption aligncenter\"><a href=\"https:\/\/flic.kr\/p\/j7hLsu\" rel=\"attachment wp-att-914\"><img loading=\"lazy\" decoding=\"async\" class=\"size-large wp-image-914\" src=\"https:\/\/thesocietypages.org\/trot\/files\/2016\/03\/11885592144_d92d13a659_z-600x400.jpg\" alt=\"Photo by Faris Algosaibi, Flickr CC. https:\/\/flic.kr\/p\/j7hLsu\" width=\"600\" height=\"400\" srcset=\"https:\/\/thesocietypages.org\/trot\/files\/2016\/03\/11885592144_d92d13a659_z-600x400.jpg 600w, https:\/\/thesocietypages.org\/trot\/files\/2016\/03\/11885592144_d92d13a659_z-300x200.jpg 300w, https:\/\/thesocietypages.org\/trot\/files\/2016\/03\/11885592144_d92d13a659_z.jpg 640w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/a><figcaption id=\"caption-attachment-914\" class=\"wp-caption-text\">Photo by Faris Algosaibi, Flickr CC.<\/figcaption><\/figure>\n<p><span style=\"font-weight: 400;\">The FBI now says they <\/span><a href=\"http:\/\/www.politico.com\/story\/2016\/03\/feds-move-to-cancel-iphone-hearing-221062\"><span style=\"font-weight: 400;\">may <\/span><i><span style=\"font-weight: 400;\">not<\/span><\/i><span style=\"font-weight: 400;\"> need Apple\u2019s help<\/span><\/a><span style=\"font-weight: 400;\"> to break into a terrorist\u2019s iPhone, but for months they have insisted Apple\u2019s programmers must write a program enabling them to bypass security on this and other Apple devices. The demand raised questions about security and surveillance in a time of rapid technological change. Apple\u2019s refusal to comply stemmed from both a philosophical stance on privacy and concerns that such a program could easily be exploited. The company and its programmers further argued that <\/span><a href=\"http:\/\/appleinsider.com\/articles\/16\/03\/10\/government-says-apple-arguments-in-encryption-case-a-diversion-presents-point-by-point-rebuttle-\"><span style=\"font-weight: 400;\">code should be covered by free speech protections<\/span><\/a><span style=\"font-weight: 400;\">&#8212;no one can be forced to write code against their will. Sociological research shows how assumptions about the objectivity of computer code work against arguments like Apple\u2019s and how these assumptions are often used to legitimize the policing of already marginalized populations.<\/span><\/p>\n<h5><span style=\"font-weight: 400;\">Apple\u2019s concerns about controlling how and when a \u201cbreak-in\u201d program gets used are valid. Not only can it fall into the hands of hackers and the like, technologies like this can be used by law enforcement to maintain social inequalities and reinforce harmful stereotypes. Sociologists show how computer code and surveillance technologies are not value-neutral, but are instead composed of the values and opinions of those who write and use them. The result is that the police often use these presumably objective technologies to justify intrusive policing of the already at-risk. <\/span><\/h5>\n<ul>\n<li><a href=\"https:\/\/legacy.wlu.ca\/homepage.php?grp_id=2629\"><span style=\"font-weight: 400;\">Carrie Sanders<\/span><\/a><span style=\"font-weight: 400;\"> and <\/span><a href=\"https:\/\/virtualtour.wlu.ca\/homepage.php?grp_id=12104&amp;f_id=37\"><span style=\"font-weight: 400;\">Stacey Hannem<\/span><\/a><span style=\"font-weight: 400;\">. 2012. \u201c<\/span><a href=\"http:\/\/onlinelibrary.wiley.com\/doi\/10.1111\/j.1755-618X.2012.01300.x\/abstract;jsessionid=840DAAAA1E9AFE5B7004D1FB707D4185.d03t03?systemMessage=Wiley+Online+Library+will+be+disrupted+on+15+December+from+10%3A00-12%3A00+GMT+(05%3A00-07%3A00+EST)+for+essential+maintenance\"><span style=\"font-weight: 400;\">Policing \u2018the Risky\u2019: Technology and <\/span><span style=\"font-weight: 400;\">Surveillance in Everyday Patrol Work<\/span><\/a><span style=\"font-weight: 400;\">.\u201d <\/span><i><span style=\"font-weight: 400;\">Canadian Review of Sociology<\/span><\/i><span style=\"font-weight: 400;\"> 49(4):<\/span><span style=\"font-weight: 400;\">317-451.<\/span><\/li>\n<li><a href=\"http:\/\/www.sscqueens.org\/davidlyon\"><span style=\"font-weight: 400;\">David Lyon<\/span><\/a><span style=\"font-weight: 400;\">. 2003. \u201c<\/span><a href=\"https:\/\/infodocks.files.wordpress.com\/2015\/01\/david_lyon_surveillance_as_social_sorting.pdf\"><span style=\"font-weight: 400;\">Surveillance as Social Sorting: Computer Codes and Mobile <\/span><span style=\"font-weight: 400;\">Bodies<\/span><\/a><span style=\"font-weight: 400;\">.\u201d Pp. 13-30 in <\/span><i><span style=\"font-weight: 400;\">Surveillance as Social Sorting: Privacy, Risk and Digital <\/span><\/i><i><span style=\"font-weight: 400;\"><br \/>\n<\/span><\/i> <i><span style=\"font-weight: 400;\">Discrimination,\u00a0<\/span><\/i><span style=\"font-weight: 400;\">edited by David Lyon. New York: Routledge.<\/span><\/li>\n<\/ul>\n<h5><span style=\"font-weight: 400;\">From this perspective, it becomes easier to understand code as speech. Codes are the expression, intentional or otherwise, of the values and beliefs of the programmer. What makes code in some ways more powerful than speech is that it is also highly functional. Jennifer Peterson explains that code is at once the writing of a program as well as the program\u2019s execution&#8212;it is both expressive and functional&#8212;but the legal system overlooks the functional capacity of code as speech and the ways that it\u00a0can be used to protest, dissent, and discriminate.<\/span><\/h5>\n<ul>\n<li><a href=\"http:\/\/mediastudies.virginia.edu\/people\/jap2fc\"><span style=\"font-weight: 400;\">Jennifer Peterson<\/span><\/a><span style=\"font-weight: 400;\">. 2015. \u201c<\/span><a href=\"http:\/\/nms.sagepub.com\/content\/early\/2013\/09\/24\/1461444813504276.abstract\"><span style=\"font-weight: 400;\">Is Code Speech? Law and the Expressivity of Machine <\/span><span style=\"font-weight: 400;\">Language,<\/span><\/a><span style=\"font-weight: 400;\">\u201d <\/span><i><span style=\"font-weight: 400;\">New Media &amp; Society <\/span><\/i><span style=\"font-weight: 400;\">17(3):415-431. <\/span><\/li>\n<\/ul>\n<p><span style=\"font-weight: 400;\">And for a great read on surveilling sociologists, check out <\/span><a href=\"https:\/\/books.google.com\/books\/about\/Stalking_the_Sociological_Imagination.html?id=Fm_ahKfH-zcC\"><i><span style=\"font-weight: 400;\">Stalking the Sociological Imagination: J. Edgar Hoover\u2019s FBI Surveillance of American Sociology<\/span><\/i><\/a><span style=\"font-weight: 400;\"> by Mike Forrest Keen. <\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The FBI now says they may not need Apple\u2019s help to break into a terrorist\u2019s iPhone, but for months they have insisted Apple\u2019s programmers must write a program enabling them to bypass security on this and other Apple devices. The demand raised questions about security and surveillance in a time of rapid technological change. Apple\u2019s [&hellip;]<\/p>\n","protected":false},"author":1957,"featured_media":914,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[124,15,13,85],"tags":[3914,33762,40742,2510,38547,40496,2131,1918,355,880,2851,140,585,12882,38546,3835,2143,302],"class_list":["post-913","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-crime","category-culture","category-inequality","category-politics","tag-apple","tag-coding","tag-coercion","tag-computers","tag-crime","tag-evidence","tag-fbi","tag-free-speech","tag-government","tag-hacking","tag-homeland-security","tag-internet","tag-iphone","tag-policing","tag-politics","tag-security","tag-surveillance","tag-terrorism"],"jetpack_featured_media_url":"https:\/\/thesocietypages.org\/trot\/files\/2016\/03\/11885592144_d92d13a659_z.jpg","_links":{"self":[{"href":"https:\/\/thesocietypages.org\/trot\/wp-json\/wp\/v2\/posts\/913","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/thesocietypages.org\/trot\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/thesocietypages.org\/trot\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/trot\/wp-json\/wp\/v2\/users\/1957"}],"replies":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/trot\/wp-json\/wp\/v2\/comments?post=913"}],"version-history":[{"count":1,"href":"https:\/\/thesocietypages.org\/trot\/wp-json\/wp\/v2\/posts\/913\/revisions"}],"predecessor-version":[{"id":915,"href":"https:\/\/thesocietypages.org\/trot\/wp-json\/wp\/v2\/posts\/913\/revisions\/915"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/thesocietypages.org\/trot\/wp-json\/wp\/v2\/media\/914"}],"wp:attachment":[{"href":"https:\/\/thesocietypages.org\/trot\/wp-json\/wp\/v2\/media?parent=913"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/thesocietypages.org\/trot\/wp-json\/wp\/v2\/categories?post=913"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/thesocietypages.org\/trot\/wp-json\/wp\/v2\/tags?post=913"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}