Wednesday, March 22, 2017

Designing Democratic Spaces Online Without Allowing Trolls To Take Over...

Jennifer Forestal wrote an interesting article in the most recent issue of the American Political Science Review titled, "The Architecture of Political Spaces: Trolls, Digital Media, and Deweyan Democracy".  In it, she highlights the importance of how website architectures can either invite or prevent different types of political activities by creating different types of spaces.

So if the challenge is to create online spaces that encourage democratic discourse, then the problem is trolling. As an example, Forestal describes how, in August 2014, Jezebel - a site dedicated to "what contemporary women want to talk about" - had its comment section overwhelmed with images of violent pornography posted by anonymous users.

In Forestal's assessment, this was made possible by the open architectural design (through code) of the site's commenting platform, Kinja, which allowed anyone to create an account and comment anonymously as often as they wished.  Also, by granting each commenter the power to be moderator of any ensuing discussions, each discussion thread was effectively treated as a unique and exclusive event run by the thread's founder, rather than conceiving of all of the threads on the site together as part of a single collective, or community, enterprise.  Thus, trolls were able to proliferate.

Ultimately, Kinja was changed so that comments were divided into "pending" vs. "approved" categories - expanding its boundaries of approved commenters to include users of the website with "a long history of demonstrated good work".

Here's the thing... this redesign of Kinja's architecture kept the conversation "open", however it added a layer of editorial control.  Some might say it created an elite class of gatekeepers - done intentionally and by design.  Think of it as having created a Superdelegate system - a mechanism for the party establishment to check the impulses of the rank-and-file.

Without placing any value-judgments, the big idea here is something that myself and others have written about extensively - that software architectures absolutely structure people's behavior in cyberspace.

Forestal recommends that, in order to avoid trolls, online democratic communities need to be designed as "small" spaces, with stable members, and yet still be "flexible" enough to be responsive to change so as to prevent gated communities that discourage new experiences and encounters.  But this is not the most revealing conclusion; in fact, it's been the holy grail that designers have been pursuing for years but no one has quite figured out how to pull off.  The main contribution of Forestal's piece, then, is to frame this familiar challenge in a better theoretical context.


Thursday, March 16, 2017

How to turn your Raspberry Pi into a Web Server...

Many "first" Raspberry Pi projects are actually overly ambitious and complicated for beginners.  Well, here's one that is quick, easy, and free.  Assuming you've already set up your Raspberry Pi, just follow these steps to turn your Pi into a fully functional Web Server and host your own website.

(You will be entering these commands in the Terminal window.)

1. Install updates.

sudo apt-get update && sudo apt-get upgrade

2.  Install the Apache Web Server and PHP

sudo apt-get install apache2 php5 libapache2-mod-php5

3.  Then restart the server with:

sudo service apache2 restart

That's pretty much it. You can view the default web page by entering your Pi's local IP address in the browser (something like

Once you set up port forwarding on your router, you can then view your web page with the IP address that the rest of the world will use to reach your site. To determine this, just Google "WhatsMyIP".

In the future, you'll use this as the Pi's directory for your website:  /var/www/html

One final, but very important, thing....  In order to make any changes to your "html" directory, you'll need to change its permissions.  Open the Terminal, navigate to the "www" directory, and enter this command to change the owner from "root" to "pi" (or your username):

sudo chown pi: html

You can check out my Raspberry Pi-powered website at:

If publishing websites was hard, the Internet wouldn't be what it is.


Thursday, March 02, 2017

Review - Binary Bullets: The Ethics of Cyberwarfare

The following is my book review of Binary Bullets: The Ethics of Cyberwarfare. This review is scheduled to be published in the forthcoming issue of Perspectives on Politics.

In a volume of rich ambition and tackling an important area of rapidly growing geopolitical significance, Allhoff, Henschke, Strawser, and their contributors have overwhelmingly succeeded in presenting a current and comprehensive analysis of the ethics of cyberwarfare and introduced numerous theoretical and conceptual models for analysis that will guide the field for years to come.

Allhoff, Henschke, and Strawser begin by raising the definitional problem that often plagues studies of cyberwarfare – to what extent is cyberwarfare even warfare at all?  The editors immediately address this by defining cyberwar as “an act of violence conducted by, or targeted at, information communication technologies intended to compel our opponent to fulfill our will” (p. 3). Throughout the volume, to its credit, the problem of definition is acknowledged repeatedly, although the editors do an excellent job of making sure that we do not get lost in it.

The first section takes a norms-based approach and constructs its ethical basis more on what’s already occurring in cases of cyberwarfare and in the realm of international law than how ethics normatively ought to be going forward. George R. Lucas Jr. argues convincingly that a soft-law approach (“best practices”) is more likely to be accepted than formal legislation because norms emerge from practice rather than through stipulative laws and regulations that are imposed externally. Especially at the international level where cyberwarfare is carried out by nation-states, the limitations of international law seem particularly pronounced in the borderless cyber realm, and thus there is not much practical alternative.  In contrast to this soft-law approach, however, Michael N. Schmitt and Liis Vihul examine international legal norms arguing that new treaties or customary law norms to govern cyberconflicts will find a range of opposition, thus evolving existing international law is “the more likely near-term prospect” (p. 52).  Randall R. Dipert then segues nicely into the next section by arguing that just-war theory should apply if the effects of cyberwarfare do rise to the level of harm produced in traditional warfare. Perhaps Dipert’s most interesting idea is his reexamination of what constitutes “arms”. If weaponized malware like Stuxnet is based on algorithms, and algorithms are really just ideas, then can we really consider ideas to be, literally, weapons, perhaps even to be bought and traded as military commodities, since they can demonstrably be used for harm?

Interestingly, while the Tallinn Manual is harshly critiqued by multiple authors here and called “a spectacular failure”, those who are bold enough to explicitly propose ethical guidelines for cyberwarfare tend not to veer far from Tallinn’s principles – namely, that cyberattacks shouldn’t be directed against civilians, should only be directed at military targets in a way that minimizes collateral damage, the principle of equivalent harm, etc.

The second section takes a just-war approach. Can just war theory accommodate developments in cyberwarfare, or do these new ways of fighting render its application obsolete? David Whetham draws the analogy to soldiers spreading out over an enemy’s territory to plunder and destroy everything in their path, though is careful to state that cyberwar is not real war at all. Ryan Jenkins follows by arguing that cyberwar can be Ideal War where states can direct their force discriminately against military targets, minimizing non-combatant and collateral damage, and proportionally. Brian Orend then presents a thoughtful and important discussion on the ethical considerations informing “what justice and law should require of good-faith actors in the aftermath of cyberwar” (p. 116). He raises critical issues that often go overlooked, and to his credit, offers a constructive way forward.

The third section explores the ethos of cyberwarfare.  Perhaps the most intriguing chapter in the volume is Matthew Beard’s The Code of the Cyberwarrior. He draws a comparison to less formal military codes of honor – “the warrior code” – akin to “what it is to be a Marine”. Cyberwarriors require a self-policing and similar code to help cultivate morally good conduct and develop a normative identity. Beard’s arguments stand out for focusing more on individual ethics of the cyberwarrior, rather than those of the nation-state, and correspondingly for ethics being enforced through peer-based social pressures rather than international law or other legal norms. The reader is left wanting to know more about the cultural anthropology of the cyberwarrior, and about that of hackers and hacktivists for that matter, but Beard maintains the distinction between these different types of cyberoperatives.

This focus on the individuals involved in cyberwarfare is coupled nicely with the chapters by David Danks and Joseph H. Danks who call for “bringing humans back in the loop” (p. 178) in formulating our ethical understanding in such a highly technical field, as well as that by Daphna Canetti, Michael L. Gross, and Israel Waismel-Manor whose analysis suggests the very real psychological harm that cyberwarfare can cause among its participants. These contributions serve as valuable reminders that, in all matters of cyberspace, it is still real people who are involved – carrying out the operations and feeling their effects.

Finally, the volume closes with a look at cyberespionage, the role of deception, and privacy. Heather M. Roff is the first to question whether cyberoperations geared towards deception of the enemy fall on the side of “permissible ruses” or are impermissible acts of perfidy, eroding the levels of trust between enemies that would undermine peace negotiations and contribute to greater international instability. Seumas Miller then presents a new term - “covert political cyberaction” – that addresses acts that are not quite cyberwar and not quite cybercrime, but rather are the “dirty” actions that tend to be harmful and unlawful but pursued to achieve a greater good. Michael Skerker adds the case of cyberespionage and, specifically, the ethics involved in government-sponsored data collection. He argues that the collection of metadata through automated keyword searches and data mining techniques poses a legitimate threat to “the autonomy of inhabitants of liberal states” (p. 251), and proposes a moral standard to determine when such “coercive state actions” are justified.

Many of the authors cite the same few examples – Estonia 2007, Israel-Syria 2007, Russia-Georgia 2008, Stuxnet, etc.) – and these all focus on nation-state behavior which, understandably, is part of how cyberwarfare is commonly defined.  But what of rogue actors, cyberterrorists, hacktivists, etc. Would the recent case of Russian operatives hacking into the Democratic National Committee’s email system to publicly reveal private political communications in the weeks leading up to an election be considered cyberwarfare? If so, how applicable are the prescribed ethical principles in the absence (or redefinition) of “civilian targets” or “collateral damage”? If not, is that an indication that conceiving of cyberwarfare in strictly military terms between nation-state actors is too limiting and thereby less relevant?

Binary Bullets is a thorough and comprehensive presentation of many of the ethical challenges raised by the prospect of cyberwarfare and should be read by anyone not only interested in ethical philosophy but also in international law, military strategy, and the politics of technology. The volume’s breadth of content and perspectives is sure to greatly expand one’s understanding of both evolving ethical considerations in technological spaces and of cyberwarfare itself.