Advertisement

Think tanks wrap-up

WASHINGTON, Sept. 25 (UPI) -- The UPI think tank wrap-up is a daily digest covering opinion pieces, reactions to recent news events and position statements released by various think tanks. This is the first of two wrap-ups for Sept. 25.


The Cato Institute

Advertisement

WASHINGTON -- Can the U.S. no longer deter aggression?

by Ted Galen Carpenter

An especially odd aspect of the Bush administration's drive for military action against Iraq is the underlying assumption that the United States cannot deter Saddam Hussein if he acquires nuclear weapons. That is a startling departure from a core feature of U.S. security strategy since the end of World War II.

U.S. officials have invariably believed that the vast U.S. strategic arsenal would ultimately deter any would-be aggressor, even a nuclear-capable one.

Over the years, the United States has deterred the likes of Joseph Stalin, Nikita Khrushchev, Leonid Brezhnev and Mao Zedong. None of those leaders seriously contemplated attacking the United States or even key U.S. allies. And the reason for their restraint was quite simple: They knew that such an attack would mean their own annihilation.

Advertisement

Why, then, do Bush administration officials apparently assume that Saddam is undeterrable? It cannot be that Saddam is more brutal than America's previous adversaries. Khrushchev and Brezhnev were equally thuggish, and as a colleague of mine has noted, Mao and Stalin were the gold and silver medallists in the 20th century's genocide Olympics.

Nor can a credible case be made that Saddam is more erratic and unpredictable than the tyrants the United States deterred in the past. Stalin gave paranoia a bad name, and Mao was the architect of China's utterly bizarre Cultural Revolution in the late 1960s and early 1970s -- at the very time that China was acquiring a nuclear weapons capability.

The notion of a direct Iraqi attack on the United States is credible only if one assumes that Saddam is suicidal. Yet he has shown no signs of that trait during a dictatorship of nearly three decades.

The notion that he might pass along a weapon of mass destruction to al Qaida or another terrorist group to use against the United States is only barely more plausible. Saddam knows that his name would be at the top of a short list of suspects if such a weapon ever went off in the United States and that American leaders would not be inclined to require proof beyond a reasonable doubt before ordering a devastating counterstrike.

Advertisement

A man who sleeps in a different location each night to preserve his life does not seem the type to throw that life away by attacking (directly or indirectly) the most powerful nation on earth. Saddam may be a thug, but he is a rational thug, and he understands that sponsoring such an attack would be signing his death warrant.

When pressed, many advocates of military action against Iraq concede that an Iraqi attack on the United States is improbable, but their fallback position is that Saddam in possession of nuclear weapons would pose a mortal threat to other countries in the region.

That concern has some validity, although the history of other new nuclear weapons states suggests that the possession of such weapons does not translate readily into regional dominance. A nuclear-armed China was not even able to prevail against Vietnam in 1979, and a nuclear-armed India hasn't been able to intimidate Pakistan on the Kashmir issue.

Iraq would likely find the same limitation in its region. The most feared scenario -- an assault on Israel -- is actually the least likely. Such an attack would be nearly as suicidal as an attack on America, since Israel has 200 to 300 nuclear weapons of its own.

Advertisement

An Iraqi move against other neighbors that do not possess weapons of mass destruction is more plausible. But if the Bush administration concedes that the United States might not be able to deter an attack on allies or clients in that region, there are important implications for America's security commitments in other regions.

Just last year, the president gave a firm pledge to do "whatever is necessary" to protect Taiwan from a Chinese attack. And the United States is poised to give security guarantees to an assortment of new NATO members.

Bush administration officials cannot have it both ways. If it is difficult to deter tiny Iraq from coercing its neighbors in the Middle East, it would surely be more difficult to deter a much larger and more powerful China from taking action against Taiwan. Similarly, can U.S. officials be certain that Washington would be able to deter a post-Putin Russia from threatening Estonia and other small Baltic neighbors?

The Bush administration needs to make up its mind. If it believes in deterrence, its policy toward Iraq makes no sense. If it no longer believes in deterrence, U.S. policy in other parts of the world makes no sense.

(Ted Galen Carpenter is vice president for defense and foreign policy at the Cato Institute and is the author or editor of 14 books on international affairs including the new book, "Peace & Freedom: Foreign Policy for a Constitutional Republic.")

Advertisement


Cato TechKnowledge

WASHINGTON -- How Far Can Hollywood Go to Protect Copyrights?

by Clyde Wayne Crews Jr. and Adam Thierer

The Internet has a way of making what would be straightforward problems extraordinarily difficult. Nowhere is this more the case than the issue of copyright protection.

If I have a computer, you can't break into my house and log on. Nor can you break into my office and access our office network. But on the Internet, where there's no single owner, it is less clear what constitutes trespass. Hence the fights over pop-ups, spam, privacy, so-called spyware that watches our online moves, and much more.

Into this muddled legal environment comes H.R. 5211, the "Peer-to-Peer Piracy Prevention Act of 2002," sponsored by Rep. Howard Berman, D-Calif. Berman wants to give Hollywood and the record industry immunity from liability when they access peer-to-peer, or P2P, networks and attempt to prevent trade in their copyrighted material.

In other words, let Hollywood hack.

The pain of copyright holders is understandable. The file-sharing that goes on today wouldn't be possible without the Internet in the first place, and they have a real problem on their hands regarding compensation for their works. But does that call for giving entertainment industry giants a pass to police our personal computers and future Web devices?

Advertisement

The technology community is up in arms and some, like the Computer and Communications Industry Association, known as the CCIA, have gone so far as to label the Berman bill "vigilante legislation."

Of course, limited "vigilantism" can have its place. As Berman pointed out in remarks prepared for a Cato Institute conference: "Libertarians might reasonably wonder why we need to pass legislation to give property owners the right to protect their property against theft. After all, if someone steals your bike and brazenly stores it on their front lawn, you are allowed to trespass on that lawn to take your bike back. Why wouldn't a copyright owner be able to do the equivalent online?"

In one sense, Berman is correct: Private property owners have the right to defend their possessions. But the problem with his analogy is that intellectual property, or IP, is a somewhat different beast than tangible property. There are important differences between the two, given the more utilitarian construction of intellectual property rights in the Constitution.

IP rights are more limited in scope and duration, and the "fair use" rights of users is a part of today's copyright bargain. Then again, fair use doesn't necessarily mean free use. Artists deserve compensation.

Advertisement

Under the Berman bill, IP holders (or more likely the large movie studios and recording labels that represent them), would be granted a broad liability safe harbor to police P2P networks like KaZaA, Morpheus and Gnutella. The real question is, exactly what is it that the Berman bill would let them do online. Just monitor activity? Send notice to potential violators? Destroy certain files? Send a virus into the network?

Unfortunately, it remains unclear not only what the Berman bill authorizes on P2P networks, but also for the broader Internet, other communications systems (such as P2P on cell phones), or even future private cyber-networks or technologies that have not yet been developed.

While Berman's effort to empower copyright holders to protect their creations is understandable, it likely tips the balance a bit too far in favor of Charles Bronson "Death Wish"-type vigilantism. Technological self-help is legitimate, but breaking and entering is not.

Does this mean there are no legitimate self-help remedies available to content creators?

Not necessarily. If copyright owners are simply loading up servers with harmless dummy files posing as the original, no one has any real right to complain when accessing those instead of a real file: We aren't entitled to someone else's music in the first place. Such dummy files alone, which entail no intrusive access whatsoever to anyone's computer, may do the job by making P2P file swapping of copyrighted materials too cumbersome.

Advertisement

James DeLong of the Competitive Enterprise Institute recommends that copyright owners deploy phony files that begin playing the targeted song or movie -- only to then launch into a scolding lecture on the evils of copyright infringement.

An interesting recent study by two University of Washington students suggests that this "spoofing" strategy may work if combined with selective litigation against the most egregious file pirates. And, apparently, a company known as Overpeer is already engaged in such spoofing on behalf of industry.

This is the superior self-help approach: Nobody gets hacked and nobody gets hurt. P2P networks that trade in files via owners' permission would continue unimpeded. Only trade in copyrighted material would be inconvenienced.

For this, the Berman bill probably isn't needed. If any legislation is pursued, it should probably not allow much more than such non-invasive self-help remedies. But it remains unclear why copyright owners would need any new legislative authority to take this path.

More extreme "hacking" authorization would be a mistake. On a public Internet, where government policy is likely to be ham-handed anyway, we cannot have different classes of Internet users subject to different rules covering an alleged right to hack.

It is true that we agree to share the contents of our hard drive when we open it up to a P2P network, but the implied permission we grant stops there. Moreover, does it make sense for policymakers to be authorizing attacks on computer networks after just announcing a new cyber security plan?

Advertisement

Thus there should be no explicit liability protection for copyright owners -- especially when they have the alternative of using dummy files and spoofing. If we allow them special hacking rights, it's too easy for them to delete files erroneously on the target computer, or cause collateral damage to third parties. If they cause either type of damage, they should be liable.

It's fine to allow record and movie companies to go ahead and self-protect in ways that have no chance of impinging on third parties such as storing bogus files. Berman's staff has said he's open to those kinds of changes in the legislation; other stakeholders should take that to heart.

Too many critics of the Berman bill base their opposition on an almost fanatical hatred of Hollywood or the recording industry. Such corporate-bashing is silly and unfortunate, given that there are other valid reasons to be concerned with the measure.

Efforts to solve the piracy problem have to be tempered by perceptions of fairness on both sides. Bootleggers' rights aren't being violated by stopping them. But on the other hand we can't stop them in such a way that legitimate file-sharing and innocent users are caught in the crossfire.

Advertisement

(Clyde Wayne Crews Jr. is the director of technology studies and Adam Thierer is the director of telecommunications studies at the Cato Institute. They are the co-editors of "Copy Fights: The Future of Intellectual Property in the Information Age.")

Latest Headlines