Saturday, November 19, 2005

Reflecting on John Perry Barlow's "Crime and Puzzlement."

The whole idea of ambiguity swindles around John Perry Barlow, as he figures out why people can take up different identities, pretend to be someone else, and take what is not theirs. Barlow even shows us, that he found the person that wanted to get his credit information and a whole lot more. Barlow talks to him to find some kind of answer to, why? I was even questioned to why he would let someone down load his credit information? The information was incorrect, but that is a danger I believe Barlow is trying to tell people. Barlow, I believe is conjuring up the idea that cyberspace allows us to do these kinds of things.

It thought it was funny, in which Barlow wanted the person to call him? To what Barlow realized, it was an 18 year old kid, that had all the intent to do what he was doing, and knew what he was doing.he idea of media hype help fueled Barlow and outsiders, of what's happening in cyberspace. Barlow knows that young adults have the tendencies to try to break into places. I like the fact, that he talks about his own account when he was 17 year old, telling us that he broken into NORAD. (Note: To find out NORAD, just search about it on Google.com) Barlow brings up some important questions to the table in what he says, "What is a place if Cyberspace is everywhere? How does one treat property that has no physical form and can be infinitely reproduced? Barlow goes on and talks about the idea on how information can't be owned.

I like the fact that the author shows claims of how people are trying to find ways to protect people's personal information, from people like Acid (the 18 yr old hacker). Barlow’s finds are interesting in which he talks about two other hackers by the 'names' of The Prophet and the Knight Lighting, that got a hold of a Bell South document. Barlow explains to us, how the hacker believe that he wasn't really doing anything wrong. Being sentenced to 30 years is a long time, for something that seemed kind of harmless. Barlow tells us that nearly all publications are now mostly electronic. I believe that would easy for anyone connected to a company computer, or information, could easily find important business documents. I believe that Barlow wants us to know how easy it is, for people to move around in cyberspace, and that means anywhere. To apples to codes, Barlow strongly points out that the hackers are the people that know software. What's important, is that Barlow says, "If we are entering into a world in which no one has a body, physical threats begin to lose their sting.

With crime that's happening in cyberspace, the threat of crime is becomes hard to overcome with new technology and software. I believe that Barlow's efforts to find ways to stop crime from happening, doesn't seem to be very strong, in which he leads us to his questionable accounts from his own experience. I believe Barlow wants to educate us on some level of how information is being exploited and try to find answers to for each of his finds. Still puzzled about how technology helps us to exploit information, I believe Barlow to be more of an educator than a crime investagator in what he's showing us. The article still leaves me confused in what he was trying to show us. Barlow talks about so many things on the playing field of how information is being used and the idea of cyberspace having and not having physical value. With the idea of a physical side to cyberspace and a non-physical side, Barlow tends to form circles with his information. Still I would have to say, John Perry Barlow, definitely examines important aspects of what's happening to information in cyberspace. Barlow also show us, what kinds of question that we should be asking about cyberspace, and how cyber property can effect the means of ownership and copyrights towards information.

0 Comments:

Post a Comment

<< Home