Today, January 18, 2012, a huge amount of websites will be "going dark"  as a protest and demonstration of the damage that the 
Stop  Online Piracy Act [SOPA / HR 3261] and the and the   Preventing Real  Online Threats to Economic Creativity and Theft of Intellectual Property  Act of 2011 [P.R.O.T.E.C.T. IP Act -PIPA - S. 968] are  prepared to do to the functionality of the internet in the name of  "protecting intellectual property" at the behest of the media megacorps.
An  
incredible  array of tech and internet sites are taking part in this  protest/declaration/demonstration; your internet will not look the same  at all [for a day]. The provisions in PIPA and SOPA can 
actually break the internet's functionality;  this is being pushed by a coalition of media and entertainment  companies to "protect their intellectual property from pirates." Yes;  they'd rather
 break the internet's  functionality than figure out why their old rapacious business  models are failing.
You may not know it, but SOPA & PIPA  are only the latest in a long line of laws attempting to limit, contain,  channel and control the internet. I have lived through these times on  the net and offer some historical outline below. 
Unfortunately, since Wikipedia will be  blacked out today, you'll have to come back tomorrow if you want to  explore these links in more depth.
6e * 65 *     74  *  77 *  6f *   72  * 6b
A History of  Communications, Privacy and Internet Law1984: 
Cable Communications Policy Act of 1984  - set forth strong protections for subscriber privacy by 
restricting the  collection, maintenance and  dissemination of subscriber data. The Act prohibited cable  operators from using the cable system to collect  "personally  identifiable information" concerning any subscriber 
without  prior consent, unless the  information is necessary to render service or  detect unauthorized  reception. The Act also prohibited operators from
  disclosing personally identifiable data to  third parties without  consent, unless the disclosure is either  necessary to render a service  provided by the cable operator to the  subscriber or if it is made to a  government entity pursuant to a court  order.
[
The USA P.A.T.R.I.O.T. Act [Uniting (and) Strengthening America (by)  Providing Appropriate Tools  Required (to) Intercept (and) Obstruct  Terrorism Act of 2001] has narrowed/gutted the CCPA privacy  provisions considerably]
1986: 
The  Electronic Communications Privacy Act (ECPA) was passed by Congress  to  expand the scope of existing federal wiretap laws, such as the the 
Omnibus Crime Control  and Safe Streets Act of 1968 (Wiretap  Act) to include protection  for electronic communications and expanded  the privacy protections of  the Wiretap Act in five significant ways:
- ECPA  broadened the scope of privileged  communications to include all forms  of electronic transmissions,  including video, text, audio, and data.
- ECPA  eliminated the requirement that  communications be transmitted via  common carrier to receive legal  protection.
- ECPA maintained   restrictions on the interception of messages in transmission and adds a   prohibition on access to stored electronic communications.
- ECPA   responded to the Supreme Court's ruling in Smith v. Maryland (June  1979)  that telephone toll records are not private and restricts law  enforcement access to  transactional information pertaining to users of  electronic  communication services.
- ECPA broadened the reach of  the  Wiretap Act by restricting both  government and private access to  communications.
[
The USA  P.A.T.R.I.O.T. Act  [Uniting  (and) Strengthening America (by) Providing Appropriate Tools  Required  (to) Intercept (and) Obstruct Terrorism Act of 2001]   narrowed/gutted the ECPA privacy provisions considerably]
1987: 
The  Computer Security Act of 1987 reaffirmed that the National Institute  for  Standards and Technology (NIST) is responsible for the security of   unclassified, non-military government computer systems. The main  purpose  of the Act is to protect unclassified information from military   intelligence agencies. 
However, the  Act has since been weakened,  primarily as a result of the efforts of  the National Security Agency and repealed with the 
Federal  Information Security Management Act of 2002 [FISMA, see below]
1989: The Secret Service is given authority by Congress  over "access device fraud" as an extension of its "wire fraud"  authority.
1990:  
Operation Sun  Devil, 
Steve  Jackson Games, Inc. v. United States Secret ServiceThese  two raids and subsequent court cases resulted in the creation of the 
Electronic Frontier Foundation  and provided law enforcement with evidence to convince the US  Congress  of the need for additional funding, training and overall  expansion of  Federal law enforcement.
The  great hacker witch hunt hysteria  begins in earnest; "hackers are going to destroy your word perfect  documents and steal your credit cards!!!!!"
1991:  
Telephone  Consumer Protection Act of 1991 amended Title II of the
  Communications Act of 1934 and requires the  Federal Communications  Commission ("FCC" or "Commission") to promulgate  rules "to 
protect residential telephone subscribers'  privacy rights." In 2002, a federal judge ruled that the TCPA's  ban on sending  unsolicited fax advertisements was an 
unconstitutional restriction on  commercial  speech.
1994: 
Communications  Assistance for Law Enforcement Act of 1994 [CALEA] aka "Digital  Telephony Act"  was passed by Congress to preserve the Government's  ability, 
pursuant to court order or  other  lawful authorization, to intercept communications over  digital networks.  The Act 
requires  phone companies to modify their networks to ensure  government access to  all wire and electronic communications as well as  to call-identifying  information. The law also included several provisions enhancing   privacy, including a section that 
increased  the standard for government  access to transactional data.
6e * 65 *     74  *  77 *  6f *   72  * 6b
1996: 
The  Telecommunications Act of 1996 [TCA] and 
Title V of that Act - 
Communications Decency Act [CDA] Signed  into law on February 8, 1996 by then-President Bill Clinton,   this  bill purported to foster competition among companies sharing the    underlying infrastructure of networked technologies. Buried in that    legislation was an amendment - 
Title V -    The    Communications Decency Act of 1996 [CDA] - which proposed to    "regulate pornographic material on the Internet". This amendment is the    precursor to the
 Child    Online Protection Act [COPA] of 1998; the 
Children's    Internet Protection Act [CIPA] of 2000 and the current pending 
PROTECT IP Act  as   well as scores of bills passed in the intervening 15 years, using  the   specter of pornography (later switched to child pornography),  terrorism   and fear to push through legislation that favors media  cartels and the   government's interest in strangling the free flow of  information.
[
Section  230 of the CDA  added  protection for online service providers and users  from actions   against them based on the content of third parties,  stating in part that   "No provider or user of an interactive computer  service shall be   treated as the publisher or speaker of any  information provided by   another information content provider". Effectively,   this section  immunizes both  ISPs and Internet users from liability  for torts  committed by others  using their website or online forum, even  if the  provider fails to  take action after receiving actual notice of  the  harmful or offensive  content. We'll return to this important   proviso later.]
Promises, promisesThe   TCA was actually a deregulation of the 1975 FCC 
cross-ownership    rules put in place to limit media concentration and monopolies in the    radio and television space, preventing companies from denying    accessibility of airspace and broadcast space to other companies through    the conglomeration and consolidation of media and denial of the  common  carrier infrastructure built with US tax dollars as the  telegraph and  later telephone copper wiring.
The TCA was  supposed to foster  competition, fairly distribute the use of   infrastructure paid for by  the public and allow for the collection of  a   levy handed to the telcos  to upgrade and improve the national  backbone  and fiber-optic cables,  requiring "fiber to the curb" by  2006. 
The  Bell  companies — SBC,  Verizon, BellSouth and Qwest, claimed that they  would  step up to the  plate and rewire homes, schools, libraries,  government  agencies,  businesses and hospitals, with a fiber (and coax)  wire capable  of at  least 45 Mbps in both directions, and could handle  500+  channels... if  they received financial incentives. This wiring was  to be  done in  rich and poor neighborhoods, in rural, urban and  suburban areas   equally and would be open to ALL competitors, not a  closed-in network   or deployed only where the phone company desired.[
This was not  DSL,  which  travels over the old copper wiring and did not require new    regulations. This is not Verizon's FIOS or SBC’s Lightspeed fiber    optics, which are slower, can't handle 500 channels, are not open to    competition, and are not being deployed equitably. This was NOT fiber    somewhere in the network ether or only on the intranets of the telcos    but directly to homes. The FCC now defines broadband as 200 kilobytes    per second in one direction — 225 times slower than what was promised in    1992]
In exchange for building these networks,   the Bell companies ALL received  changes in state laws that handed them   excessive profits, tax  savings, and other perks to be used in building   these networks. It is  estimated that 
$300   billion dollars in  excess profits and tax deductions has been   collected for this purpose.
(not) Built on  liesBut  there was a problem with this -  
the   networks couldn't be built at the time  the commitments were made.   TELE-TV and Americast, the Bell  companies' fiber optic front groups,   spent about $1 billion and were  designed to make America believe these   deployments were real in order  to pass the TCA.
Instead of  spending the money on these  promised networks, the Bell companies used   the money to enter long  distance markets, roll out wireless and   inferior ADSL services:   customers paid for a fiber optic wire  and got  ADSL over the old  copper wiring with old and failing routers,  switches  and exchanges.  Network capacity was lied about and the network  was  oversold.
[
Verizon and SBC are rolling  out  new fiber optic services but want  the laws changed again. These   services are crippled, closed networks.  FIOS’s top speed is only 35% of   the Asian standard, and yet it cost  $199 vs  $40 for 100 Mbps in many   European countries]
What  the TCA 
really was about was 
deregulation and an open invitation   to telcos, media conglomerates and lobbyists to swoop into the vacuum   left by the breakup of ATT on antitrust grounds in 1982-1984. On the   promises of the telcos, the FCC succumbed to lobbyist cash and sold out   the protected common carrier infrastructure to corporations to use as   they saw fit.
The Net  Speaks BackWritten in outraged  response to  government's intrusion on the  development of the internet  through the  passage of the TCA, 
John Perry Barlow,    an early and influential voice on the web, published the 
Declaration     of the Independence of Cyberspace on Feb. 8, 1996. Although  strident and anthemic, Barlow's opinion was shared by many of the top    technicals, theorists and legal scholars of that time, who saw in the    TCA and the embedded CDA the beginnings of censorship and control over    the channels of communication the net was opening. They also saw the    first attempts by corporations to use Congress and lobbyists to shape    the net for the convenience and profit of the entrenched entertainment    industry, who had already begun consolidating companies and muscling  out   new businesses built around the net with bagsful of cash to  attorneys,   congressmen and the FCC.
Barlow was not alone in  his  perception that something  underhanded was going on. Articles  began  appearing online and in print  media pointing to  something  rotten in  all this quickly-moving legislation:
The      Telecommunications Act of 1996:A Commentary on What Is Really Going   on  HereThe    Telecommunications Act of 1996 - Mauer School of LawThose few who   protested   and claimed the Act would lead to mass media consolidations  were   surprised by how 
quickly  that   consolidation happened. Within just a few years, radio stations,  over   the air TV stations, cable TV stations and telephone companies were    eaten up by the larger, richer companies in a feeding frenzy that has    resulted in the limited, false "choices" we are forced into today.  
Rather than "encouraging competition," the   TCA allowed consolidation of  the media and control of all information   received by people to a small  group of sources, all of them   incestuously feeding content to their own  networks in a war for   eyeballs (and click-throughs).Some  Further Reading on  the TCA:1997-2002
False     Premises, False Promises: A Quantitative History of Ownership    Consolidation in the Radio IndustryLessons from 1996 Telecommunications Act:    Deregulation Before Meaningful Competition Spells Consumer Disaster    [Consumer Reports]Fallout     from the 1996 Telecommunications Act [PDF file - Common Cause]Moyers    on America . The Internet @ Risk . Resources . TimelineCom101-    Intro to Mass Communication: Media Economics [Cabrini College]A    Little Analytical Honesty Please...6e * 65 *     74  *  77 *  6f *   72  * 6b
1998: 
Child  Online Protection Act [COPA] passed by Congress to protect  children's personal information from its collection and  misuse by commercial Web sites [
the  law, however, never took effect, as three separate rounds of  litigation led to a permanent injunction against the law in 2009]...  but that didn't seem to be enough, as Congress then passed the 
Children's  Online Privacy Protection Act of 1998 (COPPA) - 
the "think of the children!" spectre was  first being pushed as a way to make people fear the internet.
1999: 
The  Gramm–Leach–Bliley Act (GLB), aka Financial Services Modernization  Act of 1999 regulates the privacy of personally identifiable, nonpublic  financial  information disclosed to non-affiliated third parties by financial  institutions. The Act 
requires written  or electronic notice of the  categories of personal information collected, categories of people the  information will be disclosed to, the consumer's opt-out rights, and the  company's confidentiality policy. The Act also requires  administrative,  technical, and physical safeguards to protect the security and privacy  of information.
The  Wireless Communication and Public Safety Act of 1999 required all  mobile telephones created after 2000 to have 
the capability  to map the user's location through the use of global positioning  systems. The primary benefit of such a system is that it enables  9-11  operators to locate callers in distress. However, 
such systems also  raise major privacy concerns since they allow mobile telephone  users to  be located at any time. The Act clarified that 
telephone companies' must  obtain the customer's opt-in consent to collect location information in  any non-emergency situation.
2000: 
Children's  Internet Protection Act [CIPA] - proposed to limit children's  exposure to pornography  and explicit content online. Both of Congress's  earlier attempts at restricting indecent Internet content, the 
Communications Decency Act and the Child  Online Protection Act, were held to be unconstitutional by the U.S.  Supreme Court on First Amendment grounds.
2002: 
E-Government Act of 2002 -  expanded e-government initiatives in the executive branch. The Act  contained
 privacy protections,  such as prohibitions on the secondary  disclosure of information obtained for statistical purposes. This Act  included the 
Federal  Information Security Management Act of 2002 [FISMA; Title III],  which recognized the importance of information security to the economic  and national security interests of the United States, and the 
Confidential  Information Protection and Statistical Efficiency Act [CIPSEA; Title V],  which 
establishes uniform  confidentiality protections for information  collected for statistical purposes by US statistical agencies.  The law guides standardized approaches to the idea that 
a respondent's  information should not be exposed in ways that lead to inappropriate or  surprising identification of the respondent. By default the  respondent's  data is used for 
statistical purposes only. If the respondent  gives 
informed consent, the data can be put to some other use.
6e * 65 *     74  *  77 *  6f *   72  * 6b
Reading the above laws in light of current knowledge, you can see a  pattern of stretching interpretation, ignoring provisions stated  explicitly in those laws regarding privacy and the responsibility of  both government and private corporations to protect consumer's privacy,  limit the sharing and pooling of information and identifying records.
You know this has not happened. 
You  know that these laws have been exploited, twisted or ignored by both  government and private corporations. This is the danger of SOPA  and PIPA and their ilk; proponents of the law say "trust us!" when there  is ample evidence for the last 28 years that such assertations are not  to be believed; that any loophole, clever lawyer word-games or outright  bribery or intimidation will be used to turn these laws into a bludgeon  against free speech under the rubric of "protecting intellectual  property."
6e * 65 *     74  *  77 *  6f *   72  * 6b
To the people who would say the government "has a right" to do  this because "DARPA created the internet" or "companies pay for the  servers and lines," let me make a very important point:
The government did not pay for the  lines the  internet uses, nor did the communications companies. Those (mostly)  copper lines were paid for by your parents and grandparents in taxes,  surcharges and easements given to The Bell System, AT&T and the rest  of the corps, who then taxed you (through Congress) to lay those lines.You  continue to pay for a 1997 grant of $93 billion dollars to the  communications companies to roll fiber out to the home by 2004. None of  that has happened; the telcos took that money, in violation of the terms  of the deal made with Congress for that purpose, and instead used it to  invest in their own wireless market. You have been, and are being,  ripped off [check your phone bill; see those "federal excise taxes" and  "surcharges"? That's the debt you're paying for something not rendered].
You own the internet. You paid for it; you   still pay for the infrastructure.The government does not own the  internet, nor do the telcos.
46 75 63 6b 20 53 4f 50 41
46 75 63 6b 20 50 49 50 41
46 75 63 6b 20 74 68 65 20 52 49 41 41
46 75 63 6b 20 74 68 65 20 4d 50 41 41
46 75 63 6b 20 43 6f 6e 67 72 65 73 73