Reading “Blown to Bits” by Harry Lewis, Ken Ledeen, Hal Abelson, and Wendy Seltzer.

blown-to-bits.jpg

I have read “Blown to Bits”, a book by four distinguished authors. In this file I am writing which impression it has made on me, and what I learnt.

Even though Hal Abelson is not the first in the list of authors, it is him who attracted me to this book. You see, a long time ago I also read a few pages from another book by him, and I was impressed by the clarity of the narrative and the powerful ideas which challenged my mind.

So, when I discovered that he has also written a book on “digital society” and the present state of the Internet, I knew that I have to read it. I planned to read something on “digital law” and “digital society” for a long time, but I would not expect Abelson to be the person to turn to in order to achieve this.

There are other books on the subject, some of them from renowned programmers:

  1. Brian Kernighan: D is for Digital
  2. Brian Kernighan: Understanding the Digital World
  3. Brian Kernighan: Millions, Billions, Zillions
  4. Erik Brynjolfsson and Andrew McAfee: The Second Machine Age
  5. Michael P Lynch: The Internet of Us

If anyone reads them and wants to share the experience, please, message me. This review, however, is dedicated to “Blown to Bits”.

1. Review

1.1. Who are the authors and from which perspective the are writing.

I grew up through Digital Transformation. When I was a kid, the idea of photos being available instantly after taking seemed laughable, but after a photo was developed and printed, it could last many years. Now we have photos available on the spot, but very few of us print them out in order to feel, touch, and preserve them.

I got interested in this phenomenon, and wanted to find a book which would explore it and tell me more. “Blown to Bits” came as a blessing.

Before I get to the book’s contents, I need to think about who exactly wrote the book, because the perspective influences what is visible.

The authors are USA university professors. That is they are fairly rich people, living in urban areas, with modern conveniences available, and what is the most important, with a certain perception of justice. The attitude to justice as something that shapes the life is that peculiar property of the USA life that is hard to find elsewhere, even though Common Law is not unique to the USA, and many other countries have it. In the USA people think about litigation, courts, and case law all the time.

Why am I mentioning this? This book is not just a work of political philosophy or social theory, even though it has bits of both of those. What is more attractive in it is that it mostly consists of real cases. Many people are capable of groundless theorising and predicting doom and gloom or moonshine and roses with little justification, but far less people are capable of accumulating a large amount of already happened cases to illustrate their theoretical derivations.

This book is full of cases. In fact, each chapter starts with an indicative case, which serves as the kindling for the narrative presented in it, describing a certain broadly defined aspect of the “digitalization” of society. The narrative is then intentionally misleading the reader to come up with some interim conclusion on how an issue should be solved, only to present another case, which is likely to completely break down that tentative solution. This really makes the reader think!

I was quite surprised that, even though in many cases the evolution of regulation and legislation was driven by financial interests of mighty parties (such as the Internet commerce industry), there were cases when courts made decisions on the basis of public good. I was impressed that such events still happen sometimes.

1.2. Which subjects are touched in the book

Since the book discusses many controversial topics, I need to state them here clearly:

  1. The uniformity of bits.
  2. The abundance of bits.
  3. Longevity of bits.
  4. The speed of transmission.
  5. Privacy of bits.
  6. The copyright.
  7. DRM
  8. Defamation.
  9. Fraud.
  10. Algorithmic biases.
  11. AI black boxes.
  12. Encryption.
  13. Net neutrality and publishers versus newspapers.
  14. Organization of data: hierarchies and search.
  15. Obsolescence of regulation and outdated metaphors.
  16. Digital access limitations.

I need to say a few words about each of those lest I forget.

1.2.1. The uniformity of bits.

Everything we are discussing now consists of bits. Bits are uniform, and for machines they make no sense, as machines do not have “sense”. But people assign meaning to different forms of bits, and represent images, audio, sculpture, texts, and many other things.

People are used to apply to those bits the reasoning originally aimed at various objects of the physical world, and have historically justified pre-suppositions fit for the objects, but not necessarily for bits.

When the US government imposed restrictions on exporting of cryptographic algorithms from the USA, Phil Zimmerman printed his program as a book and published it internationally.

1.2.2. The abundance of bits.

It looks very weird not just for people who discovered computers in the 1980s, but even for people used to the 56k modem links of the 1990s to see how cheap bits are nowadays. Digitising the world is fun and profit, everything which can be digitised, will be. Hard drives are big enough to fit everything one wants to fit, and will be kept for as long as someone wants to keep them. Moreover, you do not necessarily know who collects the bits about you. And even you do not want to have data collected about you, you probably have no option to say “no”.

1.2.3. Longevity of bits.

Bits live a long time, if at least someone cares about them. This is both good and bad. Good in that making archives is very easy, bad because the amount of accumulated noise is also very big.

1.2.4. Speed of transmission.

Bits can be transmitted very fast and very far. Expect people to work from home, and your daughters falling in love with guys from Yemen.

1.2.5. Defamation.

Since bits live long and can be accessible to everyone, what if someone publishes something bad about you on the internet? If it is false, you can sue. But what if it is true?

Suppose you cheated on your wife, years ago, and want to forget that case, but somebody remembered, possibly copied your messages to took a photo.

Do you really deserve the public hatred and bad fame after all those years?

1.2.6. Privacy.

When I was young, people were much more privacy-loving than now. Even today, if you ask people if they care about privacy, they usually say “yes”.

But in reality, even if people care, they do not take action to assure that privacy, especially since it is very laborious and expensive. People do not read “privacy policy”, and in many countries even consider them laughable.

People are very ready to lose their personal data for a 1% discount at a shop or the convenience of ordering food over the phone.

1.2.7. Copyright.

Copyright was invented to stimulate the production of knowledge when knowledge was scarce. It gave an artificial monopoly over physical book production to reward authors and protect them from predatory competing publishers. Since that time most “copyright violations” are by end users, and printing books is not really an investment.

1.2.8. DRM

DRM refers to tools which artificially limit copying. It is largely a failed effort, but the books discusses it thoroughly.

1.2.9. Fraud.

Conducting fraud is much easier in the age of the Internet.

1.2.10. Algorithmic biases.

For a few years I could not log into my bank app, because I am a Caucasian man living in a predominantly Mongoloid country, and the app just crashed on seeing my face. This is not a bug, this is a feature.

Algorithms have bias in them, because biases make sense. If group A has crime rate 16%, and group B has crime rate 10%, by excluding group A the average crime rate will drop. But this is not a solution people are happy with, we say that any particular member of group A is not responsible for all the group.

1.2.11. AI

In the case of neural-networking AI the problem is even worse, because AI methods cannot explain why they make a decision. You fail a job interview, because “AI considers you untrustworthy”. (Real case.)

1.2.12. Encryption

American law enforcment agencies once wanted to outlaw any uncontrolled encryption, and wanted to set up a “key escrow” system in order to wiretap all Internet communication. They failed because the (1) public key algorithms, (2) Internet commerce industry.

It is always better when the forces of Good are supported by large money.

1.2.13. Access to internet.

Bits are only uniform if you can get access to them. In the USA the ISP market is deregulated, but the “invisible hand of the market” did not lead to an increased competition, so internet is slow and expensive.

1.2.14. Are social networks publishers or newspapers?

If they are publishers, then they should be liable if some crappy content appears on their website.

If they are newspapers, they cannot refuse to publish true content, because “freedom of speech”.

How do you solve this issue?

1.2.15. Obsolescent legislation.

A lot of attention is paid to the fact that legislation of the new technologies uses metaphors and use-case from the past technologies. The laws about Radio from 1920s used books, newspapers, and telegraph as analogies.

New Internet laws referred to Radio and Television.

1.2.16. Hierarchies and search.

Search is much more productive than hierarchies in finding good information, but it also makes Google a monopolist and a gate-keeper. (I use Microsoft Bing, by the way.)

1.3. What is omitted in the book

A topic which is not mentioned, even though it is clearly present in the new digital world is the “delegation of responsibility”. I personally encountered the following situation: In a coffee shop I had an issue with a machine-produced drink, and wanted to escalate the issue to the manager, only to find out that the only 20-y.o. girl in the coffee shop is the “shop manager”. I found the phone of their “chief manager”, and tried to escalate over the phone, but with little success.

This case is not huge, but recently I had the same story in the metro. A 20-y.o. girl called herself the “chief of the metro station”, although she clearly could not solve any issue. She only was there to receive the blame for robots’ faults.

Also, the instability of bits spoken of too little. Bits live for a long time, if somebody cares to back up them.

1.4. The book’s style and difficulty

The books is extremely easy. The language is colourful and vivid, the few technical explanations are straightforward and done as if the reader is 5 years old.

Care is taken for the narrative to be neutral and unbiased. Every case is substantiated by an extensive list of supporting material.

I certainly recommend it to everyone.

2. Feedback

Please, comment by emailing the special email address at the bottom of the page.

  1. Telegram http://t.me/unobvious
  2. GitLab: http://gitlab.com/lockywolf
  3. PayPal: https://paypal.me/independentresearch
  4. The permanent link to this page is: https://lockywolf.net/2025-04-19_Reading-Blown-to-Bits-by-Abelson-et-al.d/index.html