Globalization and the Internet – A Christian Considers the Impact

Kerby Anderson looks at the growth and role of the Internet through a Christian worldview perspective.  It is important that we continue to understand its capabilities and its dangers.

Introduction

More than one billion people use the Internet and benefit from the vast amount of information that is available to anyone who connects. But any assessment of the Internet will show that it has provided both surprising virtues and unavoidable vices.

Contrary to the oft-repeated joke, Al Gore did not invent the Internet. It was the creation of the Department of Defense that built it in case of a nuclear attack, but its primary use has been during peace. The Defense Department’s Advanced Research Projects Agency created a primitive version of the Internet known as ARPAnet. It allowed researchers at various universities to collaborate on projects and conduct research without having to be in the same place.

The first area network was operational in the 1980s, and the Internet gained great popularity in the 1990s because of the availability of web browsers. Today, due to web browsers and search engines, Internet users in every country in the world have access to vast amounts of online information.

The Internet has certainly changed our lives. Thomas Friedman, in his book The World is Flat, talks about some of these changes.{1} For example, we used to go to the post office to send mail; now most of us also send digitized mail over the Internet known as e-mail. We used to go to bookstores to browse and buy books; now we also browse digitally. We used to buy a CD to listen to music; now many of us obtain our digitized music off the Internet and download it to an MP3 player.

Friedman also talks about how the Internet has been the great equalizer. A good example of that is Google. Whether you are a university professor with a high speed Internet connection or a poor kid in Asia with access to an Internet café, you have the same basic access to research information. The Internet puts an enormous amount of information at our fingertips. Essentially, all of the information on the Internet is available to anyone, anywhere, at anytime.

The Internet (and the accompanying digital tools developed to use it) has even changed our language. In the past, if you left a message asking when your friend was going to arrive at the airport, usually you would receive a complete sentence. Today the message would be something like: AA 635 @ 7:42 PM DFW. Tell a joke in a chat room, and you will receive responses like LOL (“laughing out loud”) or ROFL (“rolling on the floor laughing”). As people leave the chat room, they may type BBL (“be back later”). Such abbreviations and computer language are a relatively new phenomenon and were spawned by the growth of the Internet.

I want to take a look at some of the challenges of the Internet as well as the attempt by government to control aspects of it. While the Internet has certainly provided information to anyone, anywhere, at any time, there are still limits to what the Internet can do in the global world.

The Challenge of the Internet

The Internet has provided an opportunity to build a global information infrastructure that would link together the world’s telecommunications and computer networks. But futurists and governmental leaders also believed that this interconnectedness would also bring friendship and cooperation, and that goal seems elusive.

In a speech given over a decade ago, Vice-President Al Gore said, “Let us build a global community in which the people of neighboring countries view each other not as potential enemies, but as potential partners, as members of the same family in the vast, increasingly interconnected human family.”{2}

Maybe peace and harmony are just over the horizon because of the Internet, but I have my doubts. The information superhighway certainly has connected the world together into one large global network, but highways don’t bring peace. Highways connected the various countries in Europe for centuries, yet war was common and peace was not. An information superhighway connects us with countries all over the world, but global cooperation hasn’t been the result, at least not yet.

The information superhighway also has some dark back alleys. At the top of the list is pornography. The Internet has made the distribution of pornography much easier. It used to be that someone wanting to view this material had to leave their home and go to the other side of town. The Internet has become the ultimate brown wrapper. Hard core images that used to be difficult to obtain are now only a mouse click away.

Children see pornography at a much younger age than just a decade ago. The average age of first Internet exposure to pornography is eleven years old.{3} Sometimes this exposure is intentional, usually it is accidental. Schools, libraries, and homes using filters often are one step behind those trying to expose more and more people to pornography.

But the influence of the Internet on pornography is only one part of a larger story. In my writing on personal and social ethics, I have found that the Internet has made existing social problems worse. When I wrote my book Moral Dilemmas back in 1998, I dealt with such problems as drugs, gambling, and pornography. Seven years later when I was writing my new book, Christian Ethics in Plain Language, I noticed that every moral issue I discussed was made worse by the Internet. Now my chapter on pornography had a section on cyberporn. My chapter on gambling had a section dealing with online gambling. My chapter on adultery also dealt with online affairs.

Internet Regulation

All of these concerns lead to the obvious question: Who will regulate the Internet? In the early day of the Internet, proponents saw it as the cyber-frontier that would be self-regulating. The Internet was to liberate us forever from government, borders, and even our physical selves. One writer said we should “look without illusion upon the present possibilities for building, in the on-line spaces of this world, societies more decent and free than those mapped onto dirt and concrete and capital.”{4}

And for a time, the self-government of the Internet worked fairly well. Internet pioneers were even successful in fighting off the Communications Decency Act which punished the transmission of “indecent” sexual communications or images on the Internet.{5} But soon national governments began to exercise their authority.

Jack Goldsmith and Tim Wu, in their book, Who Controls the Internet?, describe the various ways foreign governments have exercised their authority.{6}

• France requires Yahoo to block Internet surfers from France so they cannot purchase Nazi memorabilia.{7}

• The People’s Republic of China requires Yahoo to filter materials that might be harmful or threatening to Party rule. Yahoo is essentially an Internet censor for the Communist party.{8}

• The Chinese version of Google is much slower than the American version because the company cooperates with the Chinese government by blocking search words the Party finds offensive (words like Tibet or democracy).

Even more disturbing is the revelation that Yahoo provided information to the Chinese government that led to the imprisonment of Chinese journalists and pro-democracy leaders. Reporters Without Borders found that Yahoo has been implicated in the cases of most of the people they were defending.{9}

Columnist Clarence Page points out that “Microsoft cooperates in censoring or deleting blogs that offend the Chinese government’s sensibilities. Cisco provides the hardware that gives China the best Internet-blocking and user-tracking technology on the planet.”{10}

All of this censorship and cooperation with foreign governments is disturbing, but it also underscores an important point. For years, proponents of the Internet have argued that we can’t (or shouldn’t) block Internet pornography or that we can’t regulate what pedophiles do on the Internet. These recent revelations about Yahoo, Google, and Microsoft show that they can and do block information.

The book Who Controls the Internet? argues that the last decade has led to the quiet rediscovery of the functions and justification for territorial government. The Internet has not replaced the legitimate structure of government with a self-regulated cyber-frontier. The Internet may change the way some of these territorial states govern, but it will not diminish their important role in regulating free societies.

Government and Intermediaries

Governments have been able to exercise control over the Internet in various ways. This should not be too surprising. The book Who Controls the Internet? points out that while some stores in New York’s Chinatown sell counterfeit Gucci bags and Rolex watches, you don’t find these same products in local stores. That is because the “most important targets of the laws against counterfeits—trademark laws—are local retailers.”{11}

The U.S. government might not be able to go after manufacturers in China or Thailand that produce these counterfeits, but they certainly can go after retail stores. That’s why you won’t find these counterfeit goods in a Wal-Mart store. And while it is true that by controlling Wal-Mart or Sears doesn’t eliminate counterfeit goods, government still can adequately control the flow of these goods by focusing on these intermediaries.

Governments often control behavior through intermediaries. “Pharmacists and doctors are made into gatekeepers charged with preventing certain forms of drug abuse. Bartenders are responsible for preventing their customers from driving drunk.”{12}

As the Internet has grown, there has also been an increase in new intermediaries. These would include Internet Service Providers (ISPs), search engines, browsers, etc. In a sense, the Internet has made the network itself the intermediary. And this has made it possible for governments to exert their control over the Internet. “Sometimes the government-controlled intermediary is Wal-Mart preventing consumer access to counterfeit products, sometimes it is the bartender enforcing drinking age laws, and sometimes it is an ISP blocking access to illegal information.”{13}

More than a decade ago, the German government raided the Bavarian offices of Compuserve because they failed to prevent the distribution of child pornography even though it originated outside of Germany.{14} In 2001, the British government threatened certain sites with criminal prosecution for distributing illegal adoption sites. The British ISPs agreed to block the sites so that British citizens could not access them.{15}

Internet Service Providers, therefore, are the obvious target for governmental control. In a sense, they are the most important gatekeepers to the Internet.{16}

Governmental control over the Internet is not perfect nor is it complete. But the control over intermediaries has allowed territorial governments to exercise much great control and regulation of the Internet than many of the pioneers of cyberspace would have imagined.

Globalization and Government

In previous articles we have addressed the issue of globalization and have recognized that technology (including the Internet) has made it much easier to move information around the world. There is no doubt that the Internet has accelerated the speed of transmission and thus made the world smaller. It is much easier for people around the world to access information and share it with others in this global information infrastructure.

Those who address the issue of globalization also believe that it diminishes the relevance of borders, territorial governments, and geography. Thomas Friedman believes that the Internet and other technologies are flattening the world “without regard to geography, distance, or, in the near future, even language.”{17}

In one sense, this is true. The lower costs of moving information and the sheer amount of information exchanged on the Internet have made it more difficult for governments to suppress information they do not like. The explosive growth of blogs and web pages have provided a necessary outlet for opinion and information.

It is also true that there has been some self-governing behavior on the Internet. Friedman, for example, describes eBay as a “self-governing nation-state—the V.R.e., the Virtual Republic of eBay.” The CEO of eBay even says, “People will say that eBay restored my faith in humanity—contrary to a world where people are cheating and don’t give people the benefit of the doubt.”{18}

But it also true that territorial governments work with eBay to arrest and prosecute those who are cheaters or who use the website in illegal ways. And it also relies on a banking system and the potential of governmental prosecution of fraud.

We have also seen in this article that governments have also been able to exert their influence and authority over the Internet. They have been able to use the political process to alter or block information coming into their country and have been able to shape the Internet in ways that the early pioneers of the Internet did not foresee.

Goldsmith and Wu believe that those talking about the force of globalization often naively believe that countries will be powerless in the face of globalization and the Internet. “When globalization enthusiasts miss these points, it is usually because they are in the grips of a strange technological determinism that views the Internet as an unstoppable juggernaut that will overrun the old and outdated determinants of human organization.”{19}

There is still a legitimate function for government (Romans 13:1-7) even in this new world of cyberspace. Contrary to the perceived assumption that the Internet will shape governments and move us quickly toward globalization, there is good evidence to suggest that governments will in many ways shape the Internet.

Notes

1. Thomas Friedman, The World is Flat: A Brief History of the Twenty-First Century (New York: Farrar, Straus and Giroux, 2005).
2. Al Gore, Speech on U.S. Vision for the Global Information Infrastructure, World Telecommunications Development Conference, Buenos Aires, March 1994, . www.goelzer.net/telecom/al-gore.html.
3. Jerry Ropelato, “Internet Pornography Statistics,” internet-filter-review.toptenreviews.com/internet-pornography-statistics.html.
4. Julian Dibbell, “A Rape in Cyberspace,” Village Voice, 23 Dec. 1993, 37.
5. Communications Decency Act of 1996, Pub. L. No. 104-104, ti.t. v, 110 Stat. 56, 133-143.
6. Jack Goldsmith and Tim Wu, Who Controls the Internet? (NY: Oxford University Press, 2006).
7. Troy Wolverton and Jeff Pelline, “Yahoo to charge auction fees, ban hate materials,” CNet News.com, 2 Jan. 2001, . news.com.com/2100-1017-25-452.html?legacy=cnet.
8. Goldsmith and Wu, Who Controls the Internet?, 9.
9. “Yahoo accused of helping jail China Internet writer,” Reuters News Service, 19 Apr. 2006, . www.infoshop.org/inews/article.php?story=20060420105508121.
10. Clarence Page, “Google caves to China’s censors,” Chicago Tribune, 16 Apr. 2006, . www.chicagotribune.com/news/columnists/chi-0604160321apr16,0,4616158.column
11. Goldsmith and Wu, Who Controls the Internet?, 67.
12. Ibid., 68.
13. Ibid., 72.
14. Edmund L. Andrews, “Germany Charges Compuserve Manager,” New York Times, 17 Apr. 1997.
15. John Carvel, “Prison Terms for Illegal Adoptions: Internet Babies Case Prompts Tough New Sanctions,” Guardian (UK), 15 March 2001.
16. Jonathan Zittrain, “Internet Points of Control,” 44 B.C.L. Rev. 653, 664-69 (2003).
17. Friedman, The World is Flat, 176.
18. Ibid., 455.
19. Goldsmith and Wu, Who Controls the Internet?, 183.

© 2006 Probe Ministries


Is the Internet Changing How You Think?

January 21, 2011

Can the Internet change how you think? That was a question columnist Suzanne Fields asked the other day. If you go to Edge.org, you will notice that the question they pose for this year is slightly different. It is: “How is the Internet changing the way you think?”

I have been wondering the same thing. Unlike Suzanne Fields, I wasn’t wondering IF the Internet was changing our thinking but HOW it is already changing the way we think. There were two reasons why I have been thinking this.

First, look at the younger generation being raised on the Internet. If you haven’t noticed, they think and communicate different from previous generations. I have done radio programs and read articles about the millennial generation. They do think differently, and a large part that is due to the Internet.

A second reason for my interest in this topic is an Atlantic article by Nicholas Carr entitled “Is Google Making Us Stupid?” He says: “Over the past few years I’ve had an uncomfortable sense that someone, or something, has been tinkering with my brain, remapping the neural circuitry, reprogramming the memory.” He believes this comes from using the Internet and searching the web with Google. And he gives not only his story but many anecdotes and some research to back up his perspective.

A developmental psychologist at Tufts University puts it this way. “We are not only what we read. We are how we read.” The style of reading on the Internet puts “efficiency” and “immediacy” above other factors. Put simply, it has changed the way we read and acquire information.

Now you might say that would only be true for the younger generation. Older people are set in their ways. The Internet could not possibly change the way the brains of older people download information. Not true. The 100 billion neurons inside our skulls can break connections and form others. A neuroscientist at George Mason University says: “The brain has the ability to reprogram itself on the fly, altering the way it functions.”

The Internet does appear to be altering the way we read and think, but more research is needed to confirm if this true. If so, parents and educators need to take note of what is happening in our cyberworld. I’m Kerby Anderson, and that’s my point of view.


New Media and Society

Kerby Anderson provides an overview of the ups and downs of the new media such as Facebook and Twitter, and their impact on us.

How is the new media affecting the way we think and the way we interact with others in society? I want to look at the impact the Internet, social networks, and portable media devices are having on our world.

Rachel Marsden doesn’t think it is positive. Writing in The Wall Street Journal she says:

Spare me the stories of your “genius” tech-savvy child who can name every country on Google Earth, or how, because of your iPhone, BlackBerry and three cell phones, you juggle 20 tasks at once and never miss any business—even at 4 a.m., because you sleep with your portable devices. Does anyone care that technology is destroying social graces and turning people into rude jerks?{1}

She isn’t the first to notice that the new technology and new mobile devices are changing the way we interact with others. And, as we will discuss later, they apparently are also changing the way we think, affecting everything from creativity to concentration.

Rachel Marsden wonders, “When did it become acceptable for technological interaction to supersede in-person communication?” I have news for her. It happened long before cell phones were invented. When I was a graduate student at Yale University, I noticed something odd about my academic advisor. Whenever the phone would ring, he felt he had to answer it. He could be advising me or we could be deep in the midst of a discussion of a research project. But if the phone rang, he stopped the conversation and answered the phone, staying on the phone until that conversation was over. I began to think that the only way I could ever have a sustained conversation with him would be to call him on the phone.

Of course, mobile devices make it even easier to ignore face-to-face interaction. Now the world revolves around the person who has instant access to others using these devices. Rebecca Hagelin says that narcissism has crept into our world. In 2006, Time magazine voted “You” as the “Person of the Year.” So much of media and advertising today is about indulging your fantasies.

Rebecca Hagelin is concerned about the impact this is having on our children. “Young people spend hours every day updating their Facebook pages, post and e-mail countless pictures of themselves, and plug their ears with music to create a self-indulgent existence shut-off from everyone around them.”{2}

While some of the impact is positive, much more should concern us and cause us to change our behavior.

The Internet and the Way You Think

Can the Internet change how you think? That was a question columnist Suzanne Fields asked recently.{3} If you go to Edge.org, you will notice that the question they pose for this year is slightly different. It is, “How is the Internet changing the way you think?” They pose this provocative question because of the impact of computer chips, digitized information, and virtual reality on the way we think and how we receive information in this “collective high-tech electronic ecosystem for the delivery of information.”

I have also been wondering about the impact of the Internet and the new media on our thinking. Unlike Suzanne Fields, I wasn’t wondering if the Internet was changing our thinking but how it is already changing the way we think. There were two reasons why I have been thinking about this.

First, look at the younger generation being raised on the Internet. If you haven’t noticed, they think and communicate differently from previous generations. I have done radio programs and read articles about the millennial generation. They do think differently, and a large part of that is due to the Internet.

A second reason for my interest in this topic is an Atlantic article by Nicholas Carr entitled “Is Google Making Us Stupid?” He says, “Over the past few years I’ve had an uncomfortable sense that someone, or something, has been tinkering with my brain, remapping the neural circuitry, reprogramming the memory.”{4}

It’s not that he believes his mind is going, but he notices that he isn’t thinking the way he used to think and he isn’t concentrating like he used to concentrate. “Immersing myself in a book or a lengthy article used to be easy. My mind would get caught up in the narrative or the turns of the argument, and I’d spend hours strolling through long stretches of prose. That’s rarely the case anymore. Now my concentration often starts to drift after two or three pages.”

He believes this comes from using the Internet and searching the web with Google. And he gives not only his story, but he also gives many anecdotes and as well as some research to back up his perspective.

For example, a developmental psychologist at Tufts University explains, “We are not only what we read. We are how we read.” The style of reading on the Internet puts “efficiency” and “immediacy” above other factors. Put simply, it has changed the way we read and acquire information.

Now you might say that would only be true for the younger generation. Older people are set in their ways. The Internet could not possibly change the way the brains of older people download information. Not true. The 100 billion neurons inside our skulls can break connections and form others. A neuroscientist at George Mason University says, “The brain has the ability to reprogram itself on the fly, altering the way it functions.”{5}

The Internet does appear to be altering the way we read and think, but more research is needed to confirm if this true. If so, parents and educators need to take note of what is happening in our cyberworld.

BlackBerries, Twitter, and Concentration

Have portable media devices altered our ability to concentrate? That certainly seems to be the case. Nearly all of us have noticed that people with a BlackBerry sometimes seem distracted. And after they answer an e-mail, they seem to spend a few minutes trying to recollect their thoughts before they had the interruption.

An article in Newsweek magazine documents what many of us have always suspected: there are two major drawbacks to these devices.{6} The first is distraction overload. A study at the University of Illinois found that if an interruption takes place at a natural breakpoint, then the mental disruption is less. If it came at a less opportune time, the user experienced the “where was I?” brain lock.

A second problem is what is called “continuous partial attention.” People who use mobile devices (like a BlackBerry or an iPhone) often use their devices while they should be paying attention to something else. Psychologists tell us that we really aren’t multitasking, but rather engage in rapid-fire switching of attention among tasks. It is inevitable they are going to miss key information if part of their focus is on their BlackBerry.

But another hidden drawback associated is less creativity. Turning on a mobile device or a cell phone when you are “doing nothing” replaces what we used to do in the days before these devices were invented. Back then, we called it “daydreaming.” That is when the brain often connects unrelated facts and thoughts. You have probably had some of your most creative ideas while shaving, putting on makeup, or driving. That is when your brain can be creative. Checking e-mail reduces daydreaming.

We also can see how new technology affects the way we process information and react to it emotionally. The headline of one article asked this question: Can Twitter make you amoral?{7} Research was done at the Brain and Creativity Institute of the University of Southern California to see the impact of social networks like Twitter.

What the researchers found was that human beings can sort information very quickly. And they can respond in fractions of seconds to signs of physical pain in others. But other emotions (like admiration and compassion) take much longer to register. In fact, they found that lasting compassion in a relationship to psychological suffering requires a level of persistent, emotional attention.

So how does that relate to a technology like Twitter? The researchers found that there was a significant emotional cost of heavy reliance on a rapid stream of news snippets obtained through television, online feeds, or social networks such as Twitter. One researcher put it this way: “If things are happening too fast, you may not even fully experience emotions about other people’s psychological states and that would have implications for your morality.”

The point of these studies is that media does have an impact. A wise and discerning Christian will consider the impact and limit its negative effects.

Social Networks

Social networks such as Facebook and MySpace create an interconnected web of friends and family. People who study these networks are beginning to understand the impact they are having on us.

At a social networking site, you find someone and ask to be his or her friend. Once you are accepted, you become a member of their network, and they become a member of your network. This opens to door to finding and making additional friends. The ability to extend your circle of friends is one of the many benefits of social networking.

One concern about social networking is that it, like most of the new media, increases distraction and fragmentation of thought. The quotes, stories, jokes, and video clips come at an increased rate. A concentrated conversation with one person is difficult. Look over the shoulder of someone in a social networking site who has lots of friends. Content quickly scrolls downward, and it feels like you are at a party where lots of people are all talking at once.

Also these networks tend to shorten our time of concentration. Steven Kotler makes this case in his Psychology Today blog, “How Twitter Makes You Stupid.”{8} He once asked the author of the best-selling book why he called it the “8 Minute Meditation.” The author told him that eight minutes was the length of time of an average segment of television. He reasoned that “most of us already know exactly how to pay attention for eight minutes.”

Steven Kotler argues that Twitter is reducing the time of concentration to a few dozen words. He thinks that constantly using Twitter will tune “the brain to reading and comprehending information 140 characters at a time.” He predicts “that if you take a Twitter-addicted teen and give them a reading comprehension test, their comprehension levels will plunge once they pass the 140 [character] mark.” I am sure someone is already testing that hypothesis. Soon we should know the results.

Social networks do help us keep track of people who do not live near us, and that’s a plus. But we are kidding ourselves if we believe that social networks are the same thing as true community. Shane Hipps, writing in Flickering Pixels, says this about virtual communities: “It’s virtual—but it ain’t community.”

Social networks also have a great deal of power to influence us. Sociologists Nicholas Christakis and James Fowler document this in their new book, Connected: The Surprising Power of Our Social Networks and How They Shape Our Lives. They believe that happiness is contagious and so is obesity and quitting smoking. We are not only influenced by our friends, but are even influenced by our friend’s friends. They say the world is governed by what they call “three degrees of separation.”

Addiction is another concern. Years ago, counselors discovered Internet addiction. Now they are starting to talk about Facebook addiction. Lots of youth and adults spend too much time in front of a computer. Social networks are wonderful tools, but wisdom and discernment are necessary in order to use them correctly.

Media Addiction

The Barna Group does lots of surveys, and that has led George Barna to conclude that “media exposure has become America’s most widespread and serious addiction.”{9} I have always been hesitant to label our high levels of media exposure an addiction. We seem to have an addiction label for every behavior. But George Barna makes a convincing case.

Addiction changes our brains by altering the chemical balance and flow within the brain and by even altering the structure of the brain. According to the American Psychiatry Association, we can legitimately call something an addiction when certain symptoms manifest themselves.

For example addictions change our brain structure, altering emotions, motivations, and memory capacity. Addictions cause withdrawal symptoms when exposure to the addictive item is eliminated. Addictions cause the people to abandon or reduce their involvement in normal and healthy activities.

Certainly media can be positive in terms of education and relaxation. But most media content, Barna argues, “winds up serving the lowest common denominator because that’s where the largest audience” is to be found.

There is a generational trend. The builder generation did not grow up with media and never became accustomed to it. The boomer generation embraced media, and the following generations expanded it use in ways unthinkable a few decades ago.

If we were truly serious about controlling the media input in our lives and our children’s lives, we would see examples of parents putting boundaries on media exposure. We see nothing of the sort. Expenditures on personal media, in-home media, and mobile media continue to increase.

It is not that parents don’t understand the dangers. Barna reports that three-quarters of parents say that exposure of their children to inappropriate media content are one of their top concerns. But they continue to buy their kids the media tools and continue to allow them to be exposed to inappropriate content.

By the time a young person reaches age 21, he or she will have been exposed to more than 250,000 acts of violence through TV, movies, and video games. He or she will have listened to thousands of hours of music with questionable lyrical content. Most parents know that much of what their children see or hear isn’t wholesome

This may be one of the biggest challenges for society in general and even the church in particular. Most parents recognize the danger of the media storm in which they and their children live. But that are unwilling to take the necessary steps to set boundaries or end their media addiction.

Some Concluding Biblical Principles

In a previous article on Media and Discernment, I talked about the need for Christians to evaluate the impact of media in their lives. We need to develop discernment and pass those biblical principles to our children and grandchildren.

The new media represents an even greater threat and can easily conform us to the world (Rom. 12:2). Media is a powerful tool to conform us to a secular worldview and thus take us captive (Col. 2:8) to the false philosophies of the world.

Christians should strive to apply the following two passages to their lives as they seek discernment concerning the media. The first is Philippians 4:8. “Finally, brothers, whatever is true, whatever is noble, whatever is right, whatever is pure, whatever is lovely, whatever is admirable—if anything is excellent or praiseworthy—think about such things.”

The second is Colossians 3:2–5. “Set your minds on things above, not on earthly things. For you died, and your life is now hidden with Christ in God. When Christ, who is your life, appears, then you also will appear with him in glory. Put to death, therefore, whatever belongs to your earthly nature: sexual immorality, impurity, lust, evil desires and greed, which is idolatry.”

Notes

1. Rachel Marsden, “Technology and the New Me Generation,” The Wall Street Journal, 30 December 2009.
2. Rebecca Hagelin, “Narcissism and Your Family,” 15 February 2010, www.townhall.com/hagelin.
3. Suzanne Fields, “Can the Internet Change How You Think?” 15 January 2010,
www.townhall.com/fields
.
4. Nicholas Carr, “Is Google Making Us Stupid?” Atlantic, July/August 2008.
5. Ibid.
6. Sharon Begley, “Will the BlackBerry Sink the Presidency?” Newsweek, 16 February 2009.
7. “Can Twitter Make You Amoral? Rapid-fire Media May Confuse Your Moral Compass,” 14 April 2010, www.in.com.
8. Steven Kotler, “How Twitter Makes You Stupid,” Psychology Today, 15 May, 2009, www.psychologytoday.com/blog/the-playing-field/200905/how-twitter-makes-you-stupid.
9. George Barna, “Media Addiction,” 25 January 2010, www.barna.org.

© 2010 Probe Ministries


Exponential Times – Applying Christian Discernment

Kerby Anderson discusses some of the trends in our rapidly changing world, calling for Christians to “understand the times” with discernment.

You may have seen the YouTube video asking, “Did you know”? Sometimes it has the title “We are living in exponential times.” I want to look at some of the trends that illustrate the fact that we live in exponential times. While I will use the video as a starting point, I will also be citing other authors and commentators as well.

The video begins by talking about population. How often we forget that there are countries like China and India that have a billion people. For example, the video says that if you are one in a million in China, there are thirteen hundred other people just like you. That is because there are over a billion people in China.

The video also points out that twenty-five percent of India’s population with the highest IQs is actually greater than the total population of America. Put another way, India has more honors kids than America has kids.

This reminds me of a statement in The World Is Flat by Thomas Friedman. He says that when he was growing up his parents would tell him “Finish your dinner. People in China and India are starving.” Today he tells his daughters, “Girls, finish your homework—people in China and India are starving for your jobs.”{1}

Consider the population explosion. There were one billion people in 1800. We did not reach two billion until 1930. The planet had three billion people in 1960 and four billion in 1975. We reached five billion people in 1987 and six billion people in 1999. It is estimated that the planet will hold seven billion people in 2012.

Of course, life expectancy has been going up, and this is changing the demographic of various countries. Many more people are living to age 100 and beyond. For example, there were only two hundred centenarians in France in 1950. The number is projected to reach a hundred fifty thousand by year 2050. That is a seven-hundred-fifty-fold increase in one hundred years.{2}

Or consider the United States population increase in this demographic group. In 1990, there were approximately, thirty thousand centenarians. Some believe that estimate may be a bit too high, but it provides an approximate baseline. The U.S. Census Bureau estimates there will be two hundred sixty-five thousand centenarians by 2050.{3}

One last trend is that world population growth is slowing down as populations are aging. Demographers tell us that we need 2.1 children per woman to replace a population. Back in the 1950s, the average number of babies per woman of child-bearing age was 5.0 but has been dropping ever since. It will most likely reach 2.3 in 2025.{4}

In the developing world, fertility is already moderately low at 2.58 children per woman and is expected to decline further to 1.92 children per woman by mid-century.{5} While only three countries were below the population replacement level of 2.1 babies in 1955, there will be one hundred and two such countries by 2025.{6}

Exponential Growth

What is the impact of exponential growth on society? Richard Swenson argues in his book Margin that this has created unprecedented problems for us:

One major reason our problems today are unprecedented is because the mathematics are different. Many of the linear lines that in the past described our lives well have now disappeared. Replacing them are lines that slope upward exponentially.{7}

Exponential growth is very different from arithmetic growth. We live our lives in a linear way. We live day-to-day, week-to-week, month-to-month. But the changes taking place around us are increasing not in a linear way but in an exponential way.

Exponential growth is not something that we would consider intuitive. Scott Armstrong demonstrated that when he asked a graduate class of business students the following question. If you folded a piece of paper in half forty times, how thick would it be? Most of the students guessed it would be less than a foot. A few guessed it would be greater than a foot but less than a mile. Two students guessed it would be great than a mile but less than two thousand miles. The correct answer is that the paper would be thick enough to reach from here to the moon.{8}

This is the challenge of living in exponential times. If the graph is linear, we have a fairly good grasp of what that will mean for us in the future. When the graph curves upward exponentially, we have a difficult time comprehending its impact.

But will the graph continue to trend upward? It will until it reaches some limit. Eventually there is an upper limit to most of the trends we are seeing. Objective things (people, government buildings, and organizations) have limits. Subjective things (relationships, creativity, and spirituality) also have limits.

At this point the curve changes from a J-curve to an S-curve. The exponential slope begins to flatten and reach a new equilibrium. Eventually there is a turning point at which the upward curve no longer grows exponentially. Finally, the curve levels as growth and limits reach an equilibrium.

One of the challenges of living in exponential times is that the various trends are at different points on the curve. The amount of new information seems to be exploding exponentially and looks like a J-curve. The number of e-mails you receive might not be growing exponentially like it did a few years ago but may still be increasing. Population in many developing countries has been leveling off (and often decreasing), and so the graph looks more like the S-curve. All of these trends are at different parts of the curve and are happening simultaneously. Thus, it is often difficult for us to comprehend what this means to us personally.

Futurists who are trying to understand what will happen in the future are faced with an even more daunting task. If they look at each trend in isolation, they can begin to get an idea of what might happen. But as soon as someone tries to integrate all of these trends into a comprehensive whole, the future becomes blurred.

Trying to integrate all the various trends (many growing exponentially) creates a challenge for anyone trying to accurately predict the future. We might know the individual trends, but trying to integrate hundreds of trends into a comprehensive picture is difficult, if not impossible.

Warnings About Exponential Growth

In the past, a number of authors have warned about the dangers of exponential growth. And because their predictions did not come to pass, the concept of exponentiality and its impact have faded from current discussion.

In the early nineteenth century, Thomas Malthus wrote his famous Essay on the Principle of Population in which he argued that population growth would outstrip food production. He reasoned that population would grow exponentially while food production would merely grow arithmetically. Thus, he predicted a future crisis due to this exponential growth.

In 1968, Stanford biologist Paul Ehrlich published his controversial best-seller, The Population Bomb. He also noted that population was growing exponentially and made numerous predictions about catastrophes that would befall the human race in the 1970s and 1980s.

Dennis Meadows and others with a group known as The Club of Rome published their report in the book The Limits to Growth. The authors used a computer simulation to consider the interaction of five variables (world population, industrialization, pollution, food production and resource depletion). By changing the various assumptions about population and resources, they predicted various dire scenarios for the future.

Of course these doomsday predictions never came to pass. So it was inevitable that discussion and warning about exponential growth were no longer published on the front pages of newspapers and newsmagazines.

Another reason we have ignored the potential impact of exponential growth is due to the remarkable technological achievements of the twentieth century. Automobile manufacturers have been able to significantly increase gas mileage in cars. Petroleum engineers have been able to find more effective and efficient ways to pull oil from the ground. Farmers and scientists have essentially tripled global food production since World War II, thereby outpacing even population growth.

Nevertheless, there are indeed limits to growth. If we understand what those limits are and work within them, then the future will be bright. If we ignore them, the human race could be in for some rough times. Harvard biologist E.O. Wilson expressed this dichotomy when he asked, “Are we racing to the brink of an abyss, or are we just gathering speed for a takeoff to a wonderful future? The crystal ball is clouded; the human condition baffles all the more because it is both unprecedented and bizarre, almost beyond understanding.”{9}

Columnist Tom Harper is more pessimistic: “Currently we are behaving like insane passengers on a jet plane who are busy taking all the rivets and bolts out of the craft as it flies along.”{10}

Whatever our future, it is certain that is will be more complex than ever before. And it will be a world in which information has exploded exponentially.

Information Explosion

One aspect of exponential times is the information explosion. The YouTube video by the same title reminds us that information is exploding exponentially. For example, it points out that there are thirty-one billion searches on Google every month. The best estimate is now there are about thirty-six billion searches on Google each month. In 2006, it was 2.7 billion. That’s a thirteen-fold increase in just three years.

In order to keep up with this information explosion, engineers have been working at a breakneck pace to increase the efficiency and capacity of computers and other devices that process and store information. Every year, fifty quadrillion transistors are produced. That is more than six million for every human on the planet.{11}

Look at the exponential growth of Internet devices. In 1984, there were a thousand. By 1992, there were one million. By 2008, there were one billion and the number is about to exceed two billion. Some experts believe that there will be fifteen billion Intelligent Connected Devices by the year 2015.{12}

The YouTube video estimates that a week’s worth of The New York Times contains more information than a person was likely to come across in a lifetime in the eighteenth century. This figure is more difficult to quantify even though it, or variations of it, is cited all the time.

In fact, this may be our biggest challenge in the twenty-first century. There is so much information that most of us are having a difficult time trying to make sense of all the data. Facts, figures, and statistics are coming at us at an accelerating rate. That is why we need to evaluate everything we see, read, and hear from a Christian worldview in order to make sense of the world around us.

One last point is that most of this information is still in the English language. The YouTube video says that there are about 540,000 words in the English language. And this is five times as many words as in the time of Shakespeare.

It turns out that these estimates may be a bit off. Part of the problem is deciding what constitutes a word. After all, we have so many derivatives of a word and we have many words that have multiple meanings. Do you count the word or the various meanings of a word?

Let’s start with the English vocabulary at the time of Shakespeare. We know how many words he used. If you count all the words in his plays and sonnets there are 884,647 of them. The estimate for the number of different words he used varies from eighteen to twenty-five thousand. I might also mention that it appears that Shakespeare coined or invented about fifteen hundred new words. Even so, it seems like the estimate that there were a hundred thousand English words in Shakespeare’s time might be too high.

Do we have over five hundred thousand words in the English language today? Again, it depends how you count words. The largest English dictionary has about four hundred thousand entries. A more realistic number is around two hundred thousand. The latest edition of the Oxford English Dictionary contains entries for 171,476 words in current use, and 47,156 obsolete words.

Nevertheless, English has become the language of choice for the world. Approximately three hundred seventy-five million people speak English as their first language. Another seven hundred million speak English as a foreign language. English is also the language most often studied as a foreign language in the European Union. English is more widely spoken and written than any other language.

English is the medium for eighty percent of information stored in the world’s computers. English is the most common language used in the sciences as well as on the Internet. Not only have the number of English words expanded since Shakespeare’s time, its influence has expanded as well.

Exponential Times and a Biblical Worldview

The Bible tells us that we are to understand the times in which we are living. First Chronicles 12:32 says that the sons of Issachar were “men who understood the times, with knowledge of what Israel should do.” Likewise we need to understand our times with knowledge of what we as Christians should do.

We have also been looking to the future by trying to plot trends from today into tomorrow. The Bible also tells us that we should plan for the future. Isaiah 32:8 says that “the noble man devises noble plans, and by noble plans he stands.” Proverbs 16:9 says “the mind of man plans his way, but the Lord directs his steps.” So we should not only plan for the future, but commit those plans to the Lord and be sensitive to His leading in our lives.

When you live in a world that is increasing exponentially, you have to be ready for change. In fact, it is probably true that most of us now expect change rather than stability in our world. Not so long ago, there were those telling us that change would shock our senses and disorient us.

As commentator Mark Steyn points out, we developed a whole intellectual class of worriers. He says:

The Western world has delivered more wealth and more comfort to more of its citizens than any other civilization in history, and in return we’ve developed a great cult of worrying. You know the classics of the genre: In 1968, in his bestselling book The Population Bomb, the eminent scientist Paul Ehrlich declared: “In the 1970s the world will undergo famines—hundreds of millions of people are going to starve to death.” In 1972, in their landmark study The Limits to Growth, the Club of Rome announced that the world would run out of gold by 1981, of mercury by 1985, tin by 1987, zinc by 1990, petroleum by 1992, and copper, lead and gas by 1993.{13}

Obviously none of that happened. But we shouldn’t dismiss the potential impact of exponential growth, but learn to be more careful in our predictions.

I believe one of the greatest challenges for Christians will come from the information explosion. Not only are we inundated with facts, figures, and statistics, but we must also confront various philosophies, worldviews, and religions. It is absolutely essential that Christian develop discernment. We must work to evaluate everything we see, read, and hear from a Christian worldview.

This is one of the foundational goals of Probe Ministries. We are dedicated to helping you to think biblically about every area of life. I would encourage you to visit the Probe website (www.probe.org) to read other articles. You can also get a podcast of this program or any other program, and even sign up for the Probe Alert.

Kerby Anderson discusses some of the trends in our rapidly changing world, and calls for Christians to ‘understand the times’ with discernment.We live in a world of change. And as I have discussed above, many of these changes are not linear but exponential. May all of us be found faithful in speaking biblical truth to a culture in the midst of change.

Notes

1. Thomas Friedman, The World is Flat: A Brief History of the Twenty-First Century (New York: Farrar, Straus and Giroux, 2005), 237.

2. “50 Facts: Global health situation and trends,” World Health Organization, 1998.

3. “Centenarians in the United States,” U.S. Census Bureau, 1999.

4. “50 Facts: Global health situation and trends.”

5. “World population to increase by 2.6 billion over next 45 years,” World Population Prospects, 24 February 2005.

6. “50 Facts: Global health situation and trends.”

7. Richard Swenson, Margin: How to Create the Emotional, Physical, Financial, and Time Reserves You Need (Colorado Springs: NavPress, 1992), 44.

8. Scott Armstrong, Long-Range Forecasting: From Crystal Ball to Computer (NY: Wiley, 1985), 102.

9. E.O Wilson, “Is Humanity Suicidal?” The New York Times Magazine, 30 May 1993, 27.

10. Tom Harper, quoted by William Goetz, Apocalypse Next: The End of Civilization as We Know It? (Camp Hill, PA: Horizon Books, 1996), 15.

11. George Gilder, “Happy Birthday Wired: It’s Been a Weird Five Years,” Wired, January 1998, 40.

12. “15 Billion Connected Devices – Powered by the Embedded Internet,” Small Forms Factors Blog, 28 April 2009.

13. Mark Steyn, “It’s the Demography Stupid,” Wall Street Journal, 4 January 2006.

© 2009 Probe Ministries


Is the World Flat? How Should Christians Respond in Today’s Global World

Drawing from Thomas Friedman’s book, The World is Flat, Kerby Anderson looks at some of the major new factors in our world which cause not only countries and companies, but also individuals to think and act globally. Most of the factors discussed are givens against which Kerby helps us to consider their impact on Christianity and the spread of the gospel on a global basis.

Introduction

Is the world flat? The question is not as crazy as it might sound in light of the book by Thomas Friedman entitled The World is Flat: A Brief History of the Twenty-First Century. His contention is that the global playing field has been leveled or flattened by new technologies.

In fourteen hundred and ninety-two when Columbus sailed the ocean blue, he used rudimentary navigational equipment to prove that the earth was round. More than 500 years later, Friedman discovered in a conversation with one of the smartest engineers in India that essentially the world was flat. Friedman argues that we have entered into a third era of globalization, which he calls Globalization 3.0 that has flattened the world.

The first era of globalization (he calls Globalization 1.0) lasted from when Columbus set sail until around 1800. “It shrank the world from a size large to a size medium. Globalization 1.0 was about countries and muscles.”{1} The key change agent in this era was how much muscle your country had (horsepower, wind power, etc.). Driven by such factors as imperialism and even religion, countries broke down walls and began the process of global integration.

The second era (he calls Globalization 2.0) lasted from 1800 to 2000 with interruptions during the Great Depression and World Wars I and II. “This era shrank the world from size medium to a size small. In Globalization 2.0, the key agent of change, the dynamic force driving global integration, was multinational companies.”{2} At first these were Dutch and English joint-stock companies, and later was the growth of a global economy due to computers, satellites, and even the Internet.

The dynamic force in Globalization 1.0 was countries globalizing, while the dynamic force in Globalization 2.0 was companies globalizing. Friedman contends that Globalization 3.0 will be different because it provides “the newfound power for individuals to collaborate and compete globally.”{3}

The players in this new world of commerce will also be different. “Globalization 1.0 and 2.0 were driven primarily by European and American individuals and businesses. . . . Because it is flattening and shrinking the world, Globalization 3.0 is going to be more and more driven not only by individuals but also by a much more diverse—non-Western, non-white—group of individuals. Individuals from every corner of the flat world are being empowered.”{4}

The Flatteners

Friedman argues in his book that the global playing field has been flattened by new technologies.

The first flattener occurred on November 9, 1989. “The fall of the Berlin Wall on 11/9/89 unleashed forces that ultimately liberated all the captive peoples of the Soviet Empire. But it actually did so much more. It tipped the balance of power across the world toward those advocating democratic, consensual, free-market-oriented governance, and away from those advocating authoritarian rule with centrally planned economies.”{5}

The economic change was even more important. The fall of the Berlin Wall encouraged the free movement of ideas, goods, and services. “When an economic or technological standard emerged and proved itself on the world stage, it was much more quickly adopted after the wall was out of the way.”{6}

Thomas Friedman also makes a connection between the two dates 11/9 and 9/11. He noted that in “a world away, in Muslim lands, many thought [Osama] bin Laden and his comrades brought down the Soviet Empire and the wall with religious zeal, and millions of them were inspired to upload the past. In short, while we were celebrating 11/9, the seeds of another memorable date—9/11—were being sown.”{7}

A second flattener was Netscape. This new software played a huge role in flattening the world by making the Internet truly interoperable. Until then, there were disconnected islands of information.

We used to go to the post office to send mail; now most of us send digitized mail over the Internet known as e-mail. We used to go to bookstores to browse and buy books, now we browse digitally. We used to buy a CD to listen to music, now many of us obtain our digitized music off the Internet and download it to a MP3 player.

A third flattener was work flow software. As the Internet developed, people wanted to do more than browse books and send e-mail. “They wanted to shape things, design things, create things, sell things, buy things, keep track of inventories, do somebody else’s taxes, and read somebody else’s X-rays from half a world away. And they wanted to be able to do any of these things from anywhere to anywhere and from any computer to any computer—seamlessly.”{8}

All the computers needed to be interoperable not only between departments within a company but between the systems of any other company. Work flow software made this possible.

Where will this lead? Consider this likely scenario. When you want to make a dentist appointment, your computer translates your voice into a digital instruction. Then it will check your calendar against the available dates on the dentist’s calendar. It will offer you three choices, and you will click on the preferred date and hour. Then a week before your appointment, the dentist’s calendar will send you an e-mail reminding you of the appointment. The night before your appointment, a computer-generated voice message will remind you.

The fourth flattener is open-sourcing. Open-source comes from the idea that groups would make available online the source code for software and then let anyone who has something to contribute improve it and let millions of others download it for free.

One example of open-source software is Apache which currently powers about two-thirds of the websites in the world. Another example of open-sourcing is blogging. Bloggers are often one-person online commentators linked to others by their common commitments. They have created essentially an open-source newsroom.

News bloggers were responsible for exposing the bogus documents use by CBS and Dan Rather in a report about President Bush’s Air National Guard service. Howard Kurtz of The Washington Post wrote (Sept 20, 2004): “It was like throwing a match on kerosene-soaked wood. The ensuing blaze ripped through the media establishment as previously obscure bloggers managed to put the network of Murrow and Cronkite on the defensive.”

Another example of open-sourcing is the Wikipedia project which has become perhaps the most popular online encyclopedia in the world. Linux is another example. It offers a family of operating systems that can be adapted to small desktop computers or laptops all the way up to large supercomputers.

A fifth flattener is outsourcing. In many ways, this was made possible when American companies laid fiber-optic cable to India. Ultimately, India became the beneficiary.

India has become very good at producing brain power, especially in the sciences, engineering, and medicine. There are a limited number of Indian Institutes within a population of one billion people. The resulting competition produces a phenomenal knowledge meritocracy. Until India was connected, many of the graduates would come to America. “It was as if someone installed a brain drain that filled up in New Delhi and emptied in Palo Alto.”{9}

Fiber-optic cable became the ocean crosser. You no longer need to leave India to be a professional because you can plug into the world from India.

A sixth flattener was offshoring. Offshoring is when a company takes one of its factories that is operating in Canton, Ohio and moves the whole factory to Canton, China.

When China joined the World Trade Organization, it took Beijing and the rest of the world to a new level of offshoring. Companies began to shift production offshore and integrate their products and services into their global supply chains.

The more attractive China makes itself offshoring, the more attractive other developed and developing countries have to make themselves. This created a process of competitive flattening and a scramble to give companies the best tax breaks and subsidies.

How does this affect the United States? “According to the U.S. Department of Commerce, nearly 90 percent of the output from U.S.-owned offshore factories is sold to foreign consumers. But this actually stimulates American exports. There is a variety of studies indicating that every dollar a company invests overseas in an offshore factory yields additional exports for its home country, because roughly one-third of global trade today is within multi-national companies.”{10}

The seventh flattener is supply chaining. “No company has been more efficient at improving its supply chain (and thereby flattening the world) than Wal-Mart; and no company epitomizes the tension the supply chains evoke between the consumer in us and the worker in us than Wal-Mart.”{11}

Thomas Friedman calls Wal-Mart “the China of companies” because it can use its leverage to grind down any supplier to the last halfpenny. And speaking of China, if Wal-Mart were an individual economy, it would rank as China’s eighth-biggest trading partner, ahead of Russia, Australia and Canada.

An eighth flattener is what Friedman calls insourcing. A good example of this is UPS. UPS is not just delivering packages, the company is doing logistics. Their slogan is Your World Synchronized. The company is synchronizing global supply chains.

For example, if you own a Toshiba laptop computer under warranty that you need fixed, you call Toshiba. What you probably don’t know is that UPS will pick up your laptop and repair it at their own UPS-run workshop dedicated to computer and printer repair. They fix it and return it in much less time than it would take to send it all the way to Toshiba.

A ninth flattener is in-forming. A good example of that is Google. Google has been the ultimate equalizer. Whether you are a university professor with a high speed Internet connection or a poor kid in Asia with access to an Internet café, you have the same basic access to research information.

Google puts an enormous amount of information at our fingertips. Essentially, all of the information on the Internet is available to anyone, anywhere, at anytime.

Friedman says that, “In-forming is the ability to build and deploy your own personal supply chain—a supply chain of information, knowledge, and entertainment. In-forming is about self-collaboration—becoming your own self-directed and self-empowered researcher, editor, and selector of entertainment, without having to go to the library or movie theater or through network television.”{12}

A tenth flattener is what he calls “the steroids.” These are all the things that speed the process (computer speed, wireless).

For example, the increased speed of computers is dazzling. The Intel 4004 microprocessor (in 1971) produced 60,000 instructions per second. Today’s Intel Pentium 4 Extreme has a maximum of 10.8 billion instructions per second.

The wireless revolution allows anyone portable access to everything that has been digitized anywhere in the world. When I was at graduate school at Yale University, all of us were tied to a single mainframe computer. In order to use the computer, I had to hand computer cards to someone in the computer lab in order to input data or extract information. Now thanks to digitization, miniaturization, and wireless I can do all of that and much more from my home, office, coffee shop, airport—you name it.

Biblical Perspective

Although futurists have long talked about globalization and a global village, many of these forces have made that a reality. At this point it might be valuable to distinguish between globalization and globalism. Although these terms are sometimes used interchangeably, I want to draw some important distinctions. Globalization is used to describe the changes taking place in society and the world due to economic and technological forces. Essentially, we have a global economy and live in the global village.

Globalism is the attempt to draw us together into a new world order with a one world government and one world economy. Sometimes this even involves a desire to develop a one world religion. In a previous article (“Globalism and Foreign Policy“), I addressed many of the legitimate concerns about this push towards global government. We should be concerned about political attempts to form a new world order.

On the other hand, we should also recognize that globalization is already taking place. The World is Flat focuses on many of the positive aspects of this phenomenon, even though there are many critics would believe it may be harmful.

Some believe that it will benefit the rich at the expense of the poor. Some believe it will diminish the role of nations in deference to world government. These are important issues that we will attempt to address in future articles.

For now, let’s look at some important implications of a flat world. First, we should prepare our children and grandchild for global competition. Thomas Friedman says that when he was growing up his parents would tell him “Finish your dinner. People in China and India are starving.” Today he tells his daughters, “Girls, finish your homework—people in China and India are starving for your jobs.”{13}

Another implication is the growing influence of the two countries with the largest populations: China and India. Major companies are looking to these countries for research and development. The twentieth century was called “the American Century.” It is likely that the twenty-first century will be “the Asian Century.”

These two countries represent one-third of the world’s population. They will no doubt transform the entire global economy and political landscape.

Students of biblical prophecy wonder if these two countries represent the “Kings of the East” (Rev. 16:12). In the past, most of the focus was only on China. Perhaps the Kings (plural) represent both China and India.

A final implication is that this flattened world has opened up ministry through the Internet and subsequent travel to these countries. Probe Ministries, for example, now has a global ministry. In the past, it was the occasional letter we received from a foreign country. We now interact daily with people from countries around the world.

Last month the Probe website had nearly a quarter of a million visitors from over 140 countries. These online contacts open up additional opportunities for speaking and ministry overseas.

The flattening of the world may have its downsides, but it has also opened up ministry in ways that were unimaginable just a few years ago. Welcome to the flat world.

Notes

  1. Thomas Friedman, The World is Flat: A Brief History of the Twenty-First Century (New York: Farrar, Straus and Giroux, 2005), 9.
  2. Ibid.
  3. Ibid., 10.
  4. Ibid., 11.
  5. Ibid., 49.
  6. Ibid., 52.
  7. Ibid., 55.
  8. Ibid., 73.
  9. Ibid., 105.
  10. Ibid., 123.
  11. Ibid., 129.
  12. Ibid., 153.
  13. Ibid, 237.

© 2005 Probe Ministries


Protecting Your Family On the Internet

Protecting from Pornography

What’s available for free and sometimes delivered without asking for it is not just airbrushed naked women anymore–it’s very clear pictures of people actually engaging in various types of sex, bestiality, and adults molesting children.

Like the tobacco industry used to, the pornography industry aggressively targets young children as consumers. They position their Web sites to be found in seemingly innocent searches using words like toys, Disney, Nintendo, or dolls. According to NetValue, children spent 64.9 percent more time on pornography sites than they did on game sites in September 2000. Over one quarter (27.5%) of children age 17 and under visited an adult Web site, which represents 3 million unique underage visitors.{1}

But they are not the only ones struggling with easy and anonymous access to pornography–over 200,000 Americans, classified as “cybersex compulsives,” are hopelessly addicted to e-porn. The study, conducted by psychologists at Stanford and Duquesne universities, appears in the March 2001 issue of the journal Sexual Addiction and Compulsivity.

We personally know of people now in jail for stealing to support their porn addiction. Pastors are hearing from scores of people in their congregations who are secretly addicted to e-porn. Exposure to pornography, for some, escalates into more perverse and dehumanizing images. Online pornography is so strongly graphic, sending a hormonal power surge through the brain, that it has been called “electronic crack cocaine.”

Protection from online pornography is essential. Parental involvement is the first line of defense. And Internet filters will add an additional layer of security in the home. Whether a filtered Internet service provider, a filtering software program, or even hardware filters just recently available, some level of filtering is better than none, but none are perfect. The technology is developing every day and filters are far more effective and less intrusive than a couple of years ago.

Many organizations have tested filtering technologies, and their evaluations and experience is available to parents. The Center for Decency (www.centerfordecency.org), the National Coalition for the Protection of Children and Families (www.filterreview.org) and a combination of several organizations at www.getnetwise.org are excellent resources.

Those sites will also provide excellent advice to parents about monitoring their children or spouse’s online activities as well as provide resources to deal with situations that arise if pornography is a problem in the home.

Put your computer in a public place in your home where anyone can see what’s on the screen. Determine how much time children can spend online. Some families link screen time to reading time: a half-hour of reading earns you 30 minutes of Internet time. Talk to your children about the dangers of pornography. We warned our boys about “mind dirt,” the kind of mental images that can’t be washed out of memory like the mud that was ground into their soccer uniforms. Talk about why pornography is wrong: because it destroys the dignity that God gives people made in His image, and because it fuels our flesh instead of our spirits.{2}

Protecting our families from Internet pornography in our homes, businesses, schools, and libraries is one of the most loving and important things we can do for them.

Protecting from Predators

Several years ago when my son was about eight or nine, we had a memorable conversation when he decided he was going to run away from home. I used all the arguments from reason to try and dissuade him, but he was determined to leave. He was quite confident that if he met any bad guys, he’d just “beat ’em up,” and that would be the end of that. I had to tell him about the real bad guys who are out there looking for vulnerable runaways, alone and defenseless, who either capture or lure them to places where they make horrible videos of grownups doing horrible things to kids–or worse. Thankfully, he decided to stay home.

As parents, of course we want to protect our kids from predators “out there” in the world; but it’s just as important to protect them from predators online. Evil people and pedophiles know how to find children who don’t know enough to be suspicious and self-protective, and they often rationalize their actions by saying that if parents don’t protect their kids, then they deserve whatever happens.

One of the most unsafe places on the Internet is chat rooms. Conversations start out in a group, but one person can invite another into a private conversation. Anyone can initiate a private conversation, called an “instant message” or IM, with any other computer user once they know their nickname or screen name. I strongly suggest you teach your kids not to go into chat rooms or have private conversations unless you are supervising. Some “kids” they meet in chat rooms or IM’s may not be kids at all, but adults with bad intentions.

It’s essential to set down safety rules for our families. Teach your kids never to give out personal information like their age, phone number, school, or your town or city. Don’t even let them use their real names. Kids must never call or meet an online friend in person unless a parent is there. And it would be wise also not to have a personal profile, which is a big part of the America Online community, but also Web sites like Yahoo (www.yahoo.com). Predators prowl the profiles looking for likely victims.

Donna Rice Hughes,{3} a children’s Internet safety advocate, suggests some excellent questions to ask your kids who spend time online:

  • Have you seen any pornographic pictures?
  • Has anyone online talked dirty to you?
  • Have you met anyone online whom you don’t know?
  • Has anyone asked you for personal information?
  • Has anyone asked to meet you in person?

Ask the questions, and watch their body language for clues that anything has happened. We need to stay alert. We need to protect our kids from predators.

Protecting Ourselves Emotionally

The Internet has opened an almost literal Pandora’s box of emotional disasters for huge numbers of people.

An innocent looking computer screen or television set, for those with Web TV, turns out to be a portal to enormously addictive and powerful relationships with people we would never otherwise meet. People can be overwhelmed by the sense of truly connecting with people in an intense, compelling way. It can be a shock and a thrill to get a computer for doing mundane tasks like word processing or bookkeeping and discover that when it connects to the Internet, there are live people on the other side of the screen! The nature of online communication is different from the face-to-face or telephone communication we’re used to in real life (or “RL” in net-speak). For one thing, people can project themselves as they wish to be. The painfully shy introvert can become a witty conversationalist, the charismatic center of attention in a chat room. Overweight, slovenly people can pretend to be buff and beautiful. Middle-aged men can–and do–present themselves as young girls.

This means that online communication so often isn’t between people as much as between personas. Add to that the development of a dizzily rapid sense of intimacy, and you have the potential for people to get hurt by not guarding their hearts as Proverbs 4:23 tells us to do.

For instance, one young man met disaster when, lonely after his divorce, he thought he fell in love with a young lady he met in a chat room. They started talking by phone. He professed his love for her; she professed her love for him. She visited him for a romantic weekend tryst. But it turns out she was a fourteen-year-old runaway, not eighteen as she had said, and when her parents tracked her down they had him arrested as a sex offender.{4}

Many married people have discovered how intrusive the Internet can be when their spouses start spending hours online in chat rooms and private conversation. Many marriages have broken up over online affairs. It doesn’t matter if the relationships become physical or not; when people give their affections to another person, it’s adultery of the heart.

How do we protect ourselves emotionally?

First, pre-decide to guard your heart (Prov. 4:23). If you start to think and daydream about someone in a way that you would be embarrassed if others knew what you were thinking, pull back. You’re probably spending too much time online and spending too much emotional energy on that person. Redirect your thoughts to ones that are more righteous.

Second, if you’re married, shore up your relationship. Spend at least as much time building into your marriage as you do with online friends. Resolve not to take your spouse for granted or compare him or her to your image of your online friends. Remember that we tend to project onto online friends the qualities we want them to have, and it’s not fair to compare the reality of the person you’re married to with the fantasy of the persona on the other side of the screen. Consider that it is extremely rare, and frankly unwise, for married people to have close friends of the opposite sex.

Third, watch how much of your heart you share with people online. They are, after all, strangers. Our emotions follow our hearts, and when we give chunks of our hearts away by sharing our hopes and dreams and feelings, our affections are tied to those pieces of our hearts. I’ve heard it called “emotional fornication,” and for good reason.

It’s important to realize how quickly and easily we can fall into the false and fast intimacy of online relationships. We need to remember that the intimacy is not real, but the pain that might come from forgetting that is very real.

Protecting Ourselves Financially

Every year, more and more people are buying and selling on the Internet. That means more opportunity for fraud, mischief and flat-out evil intentions. How do we protect ourselves financially?{5}

First, protect your online identity. Identity theft is a growing problem, and the Internet has only made it easier. Don’t store your personal information or credit card numbers with online retailers. Reputable merchants will ask if you want them to keep track of your personal information so you don’t have to enter it every time. It’s not that hard or time-consuming, and it’s a good way to protect yourself. Don’t give out more information than is necessary, especially your social security number. You’re not being paranoid. You’re being wise.

Now let’s talk about making a purchase online. You don’t have to be afraid to do this if you’re dealing with a reputable company or organization. Be sure you’re dealing with a real company or organization. Look for a physical address and at least one customer service number. (Call it to make sure it’s active.) Check out the company online at the Better Business Bureau (www.bbb.org).

Before entering personal information, make sure you’re using a secure, or encrypted, connection. Look at the site’s Web address. If it changed to “https,” the ‘s’ shows that it’s secure. Although, not all secure connections use the https designation. The one thing you absolutely must see is that the padlock icon on your Web browser is locked.

Once you make your purchase, print a copy of your online order and keep it for the length of the return or warranty period. Your printed copy may be the only proof of your purchase.

Use a credit card instead of a debit card. Credit cards give you bargaining leverage if you need to dispute a charge–for instance, if the item never arrived. With debit cards, it’s like spending cash; once the money is out of your account, it’s gone.

If you participate in online auctions like eBay or Amazon.com, be aware that auctions are the number one online scam today.{6} If you don’t want to gamble, you can use a third-party escrow service where the seller doesn’t get paid until the buyer receives and approves his purchase. The most money lost in Internet scamming is through the Nigerian money offers.{7} “These offers, which used to come by airmail but now are increasingly arriving by email, promise millions of dollars in exchange for allowing your bank account to be used to safeguard someone else’s riches. But the real intent is to take money out of your account, not put money in it.”{8}

We need to be just as good stewards of God’s money online as we do every other place.

Protecting Ourselves from Unnecessary Losses

The rise of the Internet has opened new doors to all kinds of unnecessary losses from which the wise person protects himself or herself. Probably the biggest loss is time. And probably the biggest time-waster is chat rooms. They are not productive, and many are not safe because predators prowl there. They encourage a false sense of intimacy and community. Chat rooms are a way to spend time, but when we stand before the judgment seat of Christ, one wonders how much of that activity will withstand the fiery test and endure into eternity? (1 Cor. 3:12-15)

Another consumer of time is e-mail. The problem with this is that, like handwritten letters, some e-mail is valuable for true communication. And like newspapers, some is valuable for disseminating information. But a lot of time is spent forwarding messages that are actually hoaxes and urban legends. Like fake virus warnings, for instance. I get several of these a week, and often per day, urging me to forward the letter to everyone in my address book. Please, before passing on a virus warning, check it out at one of the sites that expose virus warning hoaxes, like www.Vmyths.com. And please don’t waste your time or anybody else’s by passing on e-mails that promise goodies in exchange for forwarding the message to a certain number of people. There is no such thing as e-mail tracking. Nobody will know if you forwarded the message, and you won’t ever get the goodies.

But real viruses are a true threat, and they can wipe out data on your computer. That is a completely unnecessary loss because of the excellent virus-protection software available today, such as Norton Anti-Virus or McAfee VirusScan. Don’t open e-mail attachments if you don’t know what they are or if you don’t know the person who sent them. (You generally{9} don’t need to worry about opening the e-mail message itself, though. It’s the attachments you need to be concerned about.) Many programs infect a person’s computer and send out copies of themselves to people in their address books and the sender doesn’t even know it’s happening. I regularly receive messages containing viruses and worms from people I don’t know because I’m the one who sends out our online newsletter, the Probe-Alert, and some people’s infected e-mail programs automatically reply back with nasty surprises for my computer.

In this article we’ve looked at ways to protect ourselves and our families from online pornography and online predators. We suggested how to prevent emotional and financial disasters. And finally we’ve examined some unnecessary losses. Hopefully, you’ve found something that will help you pursue the worthy scriptural goal of “doing all to the glory of God,” (1 Cor. 10:31) even in your online life.

Notes

1. “The NetValue Report on Minors Online,” Business Wire, December 19, 2000.

2. I enthusiastically recommend two Web sites for people addicted to porn and those who love them. The first is divided into two sections, targeted at both groups of people, with different articles on each. www.pureintimacy.org. The second is www.settingcaptivesfree.com, which features an online Bible study program (“Pure Freedom”) through which many have found freedom from sexual addiction for the first time in their lives.

3. http://www.protectkids.com

4. http://www.ozarkcountry.com/jerry.

5. The Kim Komando National Talkradio Show E-Zine, May 26, 2001.

6. http://www.natlconsumersleague.org/susantestimony52301.html

7. http://www.fraud.org/scamsagainstbusinesses/tips/nigerian.htm

8. http://www.natlconsumersleague.org/susantestimony52301.html

9. There are exceptions, such as the Wscript.Kakworm that someone sent me. According to the Symantec web site, “The worm utilizes a known Microsoft Outlook Express security hole so that a viral file is created on the system without having to run any attachment. Simply reading the received email message causes the virus to be placed on the system.” This shows the importance of running an up-to-date virus protection program, because I was alerted to the presence of the worm as soon as it arrived in my inbox and before I opened the e-mail message that contained it.

2001 Probe Ministries.


The Value of the Internet for Christians

Sue Bohlin’s article, originally written in 1995, asks, How should Christians deal with this new culture force? There are many worthwhile places on the Internet for believers, and this essay is heavily documented with the electronic addresses. The dangers of pornography and unwise intimacy with computer-mediated relationships are also discussed.

An Exciting Technology

The internet is a cultural force that is changing the way we live and communicate, but many people don’t understand it. In this essay we’ll examine the Internet as a tool for Christians to use to the glory of God while at the same time employing discernment to be wise in our use of a most exciting technology.

The internet is like our highway system, only it includes both the destinations as well as the roadways. Just as you can travel in a car over a series of connected interstates, state highways, city streets, farm-to-market roads, and gravel paths, the internet lets you travel electronically through a network of computers that lets you get just about anywhere in no time flat. The internet also includes the destinations in your electronic travels, much like different kinds of malls, where the stores are right next to each other. There are entertainment malls, where you can see pictures ranging from fine art in the Louvre (www.louvre.fr) to breaking news stories,{1} watch video clips of live performances, and listen to speeches, {2} music,{3} and radio stations on the other side of the globe (www.radio.com or www.christianradio.com). There are information malls where you can do research and gather information on everything from Caribbean vacations to the Crusades to castles.{4} There are library malls where, instead of books, you can get files of everything from games to computer software to historical documents.{5} And there are conversation malls where you can talk to people across town or around the world.{6}

The internet also provides almost instantaneous electronic mail, or e-mail, which allows people to communicate so quickly, easily, and cheaply that e-mails now outnumber physical mail aptly nicknamed “snail mail.” You don’t have to track down paper and pen, handwrite the note or letter (and these days, legible handwriting is becoming all too rare), find a stamp and then walk it to a mailbox. Instead, those who can type find that it’s a lot faster to zip off a letter at a keyboard, type in an e-mail address, hit the “send” button, and bam! Your letter is in the other person’s mailbox waiting for them to log on and read it.

You can also subscribe to electronic, automated mailing lists, which are a blend of newsletter and discussion group devoted to a single, specialized topic. My friend Bill, whose 8-year-old daughter Cheska lost a courageous battle with cancer, was grateful for the Brain Tumor list.{7} Subscribers to this list are people with brain tumors, those whose families or friends have brain tumors, and health-care professionals who treat these patients or do research into the disease. Bill gleaned exceedingly valuable information and leads on research and therapies. He also gave and received support and encouragement from this virtual community of people bound by a common tragic bond.

The instant, easy communication of e-mail also made it possible for Cheska to receive prayer support from literally around the world. By sending prayer updates to a little more than 200 people, her father discovered that by word of mouth and computer, thousands of people all over the globe prayed for her. I discovered that same wonderful phenomenon when sending out requests for prayers and cards to the Barbershop (singing) community for my father during his battle with cancer, and he was delighted to receive encouragement from all sorts of people he didn’t know.The internet is one of the most exciting developments that the world has ever seen. Many Christians are both fearful and ignorant of it, though we don’t have to be. Like any other kind of technology, the internet is morally neutral. It’s how we use it or abuse it that makes the difference.

Home-Schoolers and Missionaries

The technology of the internet has been a tremendous boon to families. Many of them have discovered that the internet’s rich informational resources have provided a way to share common interests. One father and his son like to surf the World Wide Web to explore their passions for the Civil War and astronomy.{8} Another father-son duo used the internet to decide what historical places they would visit while planning a battlefield tour. Many families have enjoyed researching their vacation destinations before leaving home. In our family, we used the internet to learn as much as we could about Costa Rica before our son headed there on a missions trip. Our other son, researching a paper for school on the artist M.C. Escher, found biographical information and examples of his artwork on the World Wide Web. It yielded excellent information and saved us a trip to the library, making both of us happy campers!

Many home-school families have discovered the benefits of the internet. There is a great deal of information online that can supplement lessons and provide resources for the parent teacher. Online encyclopedias,{9} newspapers and libraries{10} offer more information to home-schoolers than has ever been available before. But for many families, the best part of the internet (as well as forums on the online services like CompuServe and America Online) is the support and interaction they can enjoy with other home-schoolers. Families in the most remote corners of Canada can enjoy an electronic camaraderie with those in suburban Atlanta and even military families in Germany. They share insights and experiences with each other as well as brainstorming together on problems and challenges such as finding a different way to teach a child having trouble grasping a concept, or what to do with a special needs child. “Plugged-in” home-school families report that the encouragement of their online home-school communities is often what keeps them going.

As video capabilities become cheaper and more accessible, home-school families look forward to networking with others in some learning exercises. A family’s geographical location won’t make any difference in a virtual (electronic) classroom.

For missionaries and mission organizations, the internet has become a huge blessing. Radio and satellite links give missionaries in even the most remote outposts access to instant, inexpensive, reliable communication with their organizations and families via e-mail. The internet has shrunk the world, and missionaries no longer have to feel so isolated. One missionary in the former Soviet Union told me via e-mail that she was very grateful for almost instant access to loved ones as well as mature, wise believers who can encourage and guide her as she deals with the challenges of missions work. But the best thing, she said, was that she can ask people to pray specifically and immediately for needs and problems, and start seeing answers within hours instead of weeks or months. A missionary battling discouragement, homesickness and weakness, not to mention the intensity of spiritual warfare, can summon real-time prayer assistance from the other side of the world and experience very real support and a sense of being truly connected to the larger Body of Christ.

Whether a parent is saying goodbye to a child headed for the mission field, a foreign military post, or even to college in another part of the state, the internet has made it easier to separate knowing they can stay in close contact with their loved ones, in a world that has grown considerably smaller as the internet has grown larger.

Dangers on the Internet

The internet provides a wealth of information, but not all the information is edifying or wise. Much of it is downright silly, but some of it is actually dangerous. Fortunately, you don’t have to worry that you’ll turn on your computer and a pornographic picture will fall out of your monitor into your home; however, porn pushers are getting increasingly aggressive in finding ways to send their pictures to unsuspecting people, often children.

The key to protecting our children from online pornography is the same way we protect them from printed pornography: parental vigilance. Parents need to know what their children are doing at the computer, which is why it’s wise to keep the family computer in a public place. And it’s also wise to become computer and internet literate ourselves. But there are some powerful tools to help parents and schools keep adult-oriented material away from children: software programs that filter out objectionable sites and prevent access to them. There are several filtered internet service providers (ISP), where the filter resides on a remote computer. This is the safest and most effective system, much harder for technically savvy kids and teens to circumvent than a filtering program that you install on your own computer.

Just having a filtering program isn’t enough. Some programs work so poorly that they’re actually worse than nothing at all because they give a false sense of security. Not all filtering software is created equal! Nothing will ever take the place of parental involvement and vigilance, and that will always need to be our first line of defense. But what about when our kids are at school? Administrators are very much aware of the dangers of the internet, while desiring students to have access to the incredible resources it offers. Many school districts are in the process of developing Acceptable Use Policies that will provide stringent parameters for student internet access. It’s essential that parents check on the policies of both their children’s schools and the local public libraries, which often provide unfiltered access to both adults and children out of a misguided (in my opinion) allegiance to the concept of no censorship.

Another danger of a very different kind also requires our vigilance. There are a lot of computer viruses floating around on the internet, which are transmitted when you transfer a file from a remote computer to your own (downloading), or from an infected diskette to a clean one.

A virus is an invisible program, written by programmers ranging from mischievous to mean-spirited, that attaches itself to a file and wreaks some degree of havoc on an unsuspecting person’s computer. It’s important to use software that scans your hard disk and diskettes for viruses and then destroys them. I used to neglect to keep checking my computer for viruses, and when I turned it on the day of Michelangelo’s birthday, March 6, the virus of the same name wiped out all my data—mine and a few other thousand people’s! A little caution goes a long way. Be sure to use, and update, virus protection software by good companies such as Norton or McAfee.

Online Communication

Both Ann Landers and Dear Abby have run an increasing number of letters in their advice columns about spouses who emotionally or physically abandoned their families after meeting people through the computer. Those who have never developed a relationship with someone who lives on the other side of a screen and a telephone line have a hard time understanding how such a thing could happen, but there is an electric thrill in the immediacy of computer communication, as if a radio personality suddenly started conversing with you through your radio.

The dynamics of computer conversation are vastly different from face-to-face discussion. There is no non-verbal element, which comprises 93% of our communication. When body language and tone of voice are missing, and words are all you have to work with, words become much more important. And words, especially those of a direct and personal nature, are very powerful. But words on a screen are enough to allow friendships to sprout up quickly and mature under the right circumstances. Many people count their online friends, some of whom they’ve never met, as among their most cherished relationships. And many Christians are grateful for the depth of fellowship with other believers they have found through the computer.

However, it’s important to understand how online relationships differ from those in the “real world.” Because we have very limited information about the people we communicate with, we project our preconceptions and fantasies onto them, quite unconsciously. Real life can be ordinary and drab compared to the idealized image we relate to on the screen. One person finally realized that the reason she preferred her online friends to her real-life ones was that, as she put it, she “had imbued them with magic.”

That’s why there are emotional potholes in cyberspace. A false sense of emotional intimacy is easily achieved when all you have to work with is words and thoughts and feelings. What is missing is the fullness of another person’s whole personality and the context of his or her three-dimensional life. Therefore, what people experience is generally not true intimacy, although a relationship can indeed be extremely intense and most people are unprepared for the level of intensity that can characterize online communication. Sometimes, though, that experience of emotional intimacy can come at the cost of intimacy in one’s “real life” relationships. Many husbands and wives feel shut out of their spouse’s heart and mind because they spend hours a day at the computer, communing with unseen people with whom they readily share their deepest selves.

Women are especially vulnerable in online communication for two reasons: first, because God made us verbal creatures, and we respond deeply to words. And words are everything in cyberspace. Secondly, women are vulnerable because of the pervasive loneliness in our culture. Even those in marriages and families experience unmet needs for attention, warmth, and interaction. Many women are starving for romance, and any attention from a man can feel like the romance they’re starving for. When a woman receives focused attention from a man who is listening to her heart as well as her words, it can feel like the romance God designed her to receive, and that’s why a frightening number of women become infatuated with men they’ve never even laid eyes on, although this happens to men as well. The word of God tells us to guard our hearts (Proverbs 4:23), and this is wise advice for all online communications and relationships.

Christian Resources

Never before has it been so easy to access so many Christian ministries and their material. It’s now possible for us at Probe to make our radio transcripts available to anyone in the world with internet access, without printing or mailing costs. And internet surfers can stumble across biblically-based, Christian perspectives without even meaning to by using search engines,{11} programs that scour the net for anything they can find on a given subject. For example, someone looking for information on angels will find Probe’s essay{12} right alongside articles from a typically New Age perspective.

If you have a computer, a modem, and an internet provider, you have access to literature and reference works beyond the scope of many libraries. One favorite internet site is the Institute for Christian Leadership’s amazing “Guide to Christian Literature on the Net.”{13} Here you can browse various Bibles, articles, classic essays, creeds and confessions, sermons, and reference works. They also offer the “Guide to Early Church Documents on the Net,”{14} a real find for church history buffs. Wheaton College sponsors the “Christian Classics Ethereal Library (www.ccel.org), offering writings by great saints such as Thomas Aquinas and Augustine, John Calvin and Jonathan Edwards. Their collection of reference works is thrilling to Bible students. Here you can find a concordance, Bible dictionary, a topical Bible, and Matthew Henry’s commentary. One of the best Christian resource is the Bible Gateway (www.biblegateway.com), where you can locate any chapter or verse in the most popular English versions, as well as Spanish, German, French, Swedish, Tagalog, and Latin! If you’re a teacher or pastor, check out the Blue Letter Bible (www.blueletterbible.org) for wonderful study tools.

The internet doesn’t limit itself to what can be seen, though. By downloading the free software program RealAudio (www.real.com), it’s possible to listen to a variety of audio programs. You can hear a sermon by Chuck Swindoll (www.insight.org) or David Jeremiah (www.turningpoint.org). You can enjoy various kinds of music and radio stations, as discussed earlier.

There is a lot of information available to Christians. Want to find a Christian radio station near you or in a city you’ll be visiting? There’s a web site that lists hundreds of them (www.christianradio.com). (a href=”http://youtube.com” target=”_blank” rel=”noopener noreferrer”>YouTube has a dizzying amount of hymns and worship music.

Happy surfing!

Notes


1. For example, Cable News Network’s home page is www.cnn.com. You can also check the websites of newspapers and TV networks and stations.

2. Use a search engine with the keywords “+speech +RealAudio” to see a list of speeches online.

3. Music is such a broad category that your best bet is to use a search engine (see Note 11) to find sites that offer the kind of music you would like to hear, such as “Country Music” or “Gospel Music” or “Japanese Music.”

4. The internet is a mind-boggling collection of information, and search engines—like instant, electronic librarians—are the best way to find information about whatever you’re interested in. See Note 11.

5. These “library malls” are analogous to FTP (File Transfer Protocol) sites.

6. The “conversation malls” are analogous to the old IRC (Internet Relay Channels) rooms, as well as the immensely popular chat rooms now available on the World Wide Web. You can find thousands of them by going to any search engine and typing in “chat rooms” as the keywords. However, be forewarned that these can be dangerous places for children, and I suggest that people stay out of them. This is helpful: www.wikihow.com/Be-Safe-in-the-Chat-Rooms.

7. You can get information about this list, and other like it, by using search engines. For instance, use “brain tumor list” as the keywords to get information on all the lists available for this particular issue.

8. NASA’s home page is www.nasa.gov. Another good route is to go to Google.com and search for Astronomy.

9. You can get either comprehensive or free, but not both. Britannica Online (www.brittanica.com) is comprehensive, but you have to pay a subscription fee to access it. The free encyclopedias are not comprehensive; one place is at www.encyclopedia.com/.

10. The online services are probably the best sources for libraries (files contributed by members), particularly groups on Facebook.

11. There are several search engines available on the Internet, all of which are free. My personal favorite is Google, www.google.com.
Here are some others to try:
Altavista: (Alas, Altavista is no more: digital.com/about/altavista)
Yahoo: www.yahoo.com
Lycos: www.lycos.com
Ask.com: www.ask.com

12. Angels: the Good, the Bad, and the Ugly

13. iclnet93.iclnet.org/pub/resources/christian-books.html

14. iclnet93.iclnet.org/pub/resources/christian-history.html

 

©1995 Probe Ministries, Revised 2020.


Privacy 2000

Introduction

Privacy is something I believe we all take for granted until we lose it. Then we begin to think about how someone invaded our privacy, often by incremental steps. In this article we are going to discuss ways in which we have lost our privacy. Most of the intrusions into our lives come from government, but not all. Businesses also buy and sell information about us every day. Most of us would be shocked to find out how much personal information is in databases around the country.

As we cover this important issue of privacy and focus on a specific threats to our privacy I want to begin by highlighting how quickly our privacy is being lost and how often it takes place without any debate.

Let’s look at the last few years of congressional debate. It’s amazing to me that there never was an extended debate on the issue of privacy. Granted there wasn’t a lot of debate on a number of issues, but the lack of debate on this fundamental issue shows how far down the road we have gone. Let’s look at a few of these issues.

For example, we saw absolutely no debate on issues such as the national ID card, the medical ID number, the administration’s encryption policy, and the expansion of the FBI’s wiretap capability.

Some of the proposals were defeated, at least for now. The national ID card was defeated, for example, not because Congress debated the issue, but because thousands of Americans wrote letters and made phone calls. Most other issues, however, are moving ahead. Congress gave the FBI permission to use “roving wiretap surveillance.” That means that the next time you use a pay phone at your local grocery store, it may be tapped merely because there’s a criminal suspect within the area. One wiretap order in California authorized surveillance on 350 phones for over two years. In another case, five pay phones were tapped, intercepting 131,000 conversations.

Those are just a few of the examples we will discuss on the subject of privacy. Unfortunately whenever someone cries for privacy, another is sure to ask, “What do you have to hide?” The question confuses privacy and secrecy. I don’t really have anything I want to keep secret, but I’m not too excited about the government listening to every one of my phone conversations. You may not want your future boss to know that you have a genetic predisposition to breast cancer. You may not want a telemarketer to know what you just recently purchased so that he can call your home number and try to sell you more. The point is that each day we are losing a bit of our privacy. And we will continue to do so unless we work to establish some limits to this invasion of our privacy.

National ID Card

Issuing internal passports has been one of the methods used by communist leaders to control their people. Citizens had to carry these passports at all times and had to present them to authorities if they wanted to travel within the country, live in another part of the country, or apply for a job.

A few years ago, the Department of Transportation called for the establishment of a national ID system by October, 2000. Although presented as merely a move toward standardization, this seemed to many as a move toward a national passport to allow the government to “check up” on its citizens.

A little history is in order. Back in 1996, Congress passed the Illegal Immigration Reform and Immigrant Responsibility Act. This charged the federal Department of Transportation with establishing national requirements for birth certificates and driver’s licenses. Add to this the 1996 Kennedy-Kassebaum health-care law that implies that Americans may be required in the future to produce a state- issued ID that conforms to federal specifications.

If all of this sounds to you like Big Brother or even the mark of the beast, then you have company. Congressman Ron Paul believes that the Department of Transportation regulations would adversely affect Americans and fought to end these regulations.

The law ordered the Attorney General to conduct pilot programs where the state driver’s license includes a “machine- readable” social security number. It also ordered the development of a social security card that uses magnetic strips, holograms, and integrated circuits.

The good news is that the work by Congressmen Ron Paul and Bob Barr paid off and the attempt to create a national ID card was stopped, for now. But it is likely to surface again. After all there has been a push to establish a federal database for Americans and having each person carry an ID card would allow that information to be linked to a federal database. And while it would help the government catch illegal aliens, it could also be used to track law-abiding American citizens.

Tracking down illegal aliens and standardizing licenses are worthy goals. But the ends do not justify the means. That is why so many people wrote Congress to stop this push for a national ID card. Sometimes in the midst of this political debate, citizens must ask themselves how much they value their freedom and privacy.

Congressman Bob Barr says, “Novelists Aldous Huxley and George Orwell have given us countless reasons why we shouldn’t trade our privacy for any benefit, no matter how worthwhile it sounds.” In the end, we must ask, At what cost? Is it worth trading our privacy for the benefits government promises? The answer is no, and that’s why we need to pay attention to governmental attempts to invade our privacy.

Carnivore

We’ve talked about attempts to establish a national ID card and attempts to expand wiretaps. Another threat to privacy is Carnivore, the FBI’s newest electronic snooping device that can read your e-mail right off your mail server.

Packed in a slim laptop computer, this program looks downright docile, but privacy advocates believe that it is quite dangerous. This automated system to wiretap the Internet is called Carnivore because it rapidly finds the “meat” in vast amounts of data. The programmers devised a “packet sniffer” system that can analyze packets of data flowing through computer networks to determine whether it is part of an e-mail message or some other piece of Web traffic.

The FBI has been quietly monitoring e-mail for about a year. Finally the bureau went public with their operation to what the Wall Street Journal called “a roomful of astonished industry specialists.” Although the device has been used in less than 100 cases, there is every reason to believe that it will be expanded. A judge can issue a court order to tap your e-mail just as they tap your phones.

In this electronic age, new devices threaten our privacy. And in this current political climate, administration officials seem to have little concern about threats to our Fourth Amendment rights. Critics argue that Carnivore, like some ravenous beast, will be too hungry to be trusted. But the FBI says that this new device can be tailored to distinguish between packets of information and only grab e-mails from the suspect. Carnivore appears to be more discriminating than a standard telephone wire tap. The FBI says that messages belonging to those not being probed (even if criminal) would not be admissible in court. Perhaps that is true, but privacy advocates wonder how this new device will be used in the future.

Carnivore is nothing more than a standard computer with special software. The computer is kept in a locked cage for about a month and a half. Every day an agent comes by and retrieves the previous day’s e-mail sent to or by someone suspected of a crime. But it can also capture file downloads and chat room conversations. And once it is installed, the FBI can dial into Carnivore to make changes and monitor data that have been collected.

Critics are concerned that Carnivore will soon become a hungry beast, ready to devour personal and confidential information in people’s e-mail messages. The FBI says that won’t happen, but such assurances do nothing to mollify the critics. Maybe Carnivore will never tap into your e-mails, but its existence is just one more good reason why we should be careful about what we put in our e- mails.

Encryption

The privacy threats surrounding today’s technology are numerous, and I want to turn to computers and talk about another important issue: encryption. Now I know that’s probably an unfamiliar word. But stay with me. Encryption is big word for a big issue that I think you need to know about.

Encryption is a relatively new technology that enables you to have private phone conversations and send e-mail messages that are secure. Encryption codes your words so that they cannot be deciphered by people listening in on your conversation or reading your mail.

As you may know, nosy people already can listen in on your wireless phone calls (cellular or cordless phones). And they can intercept and read your e-mail. Sending e-mail without encryption is like mailing a postcard—everyone can read it along the way. And we all know that people will do exactly that. If you have ever had a phone on a party line, you know that people listen in.

What you may not know is that various branches of the government are demanding the authority to read encrypted messages. Now remember that the Fourth Amendment guarantees citizens be free of unreasonable searches and seizures. Nevertheless, these and other law enforcement officers believe they have the right to open your mail.

What they are asking for is the key to the code. When you send a message in code, you need a key to enable you to send the code and the recipients need the same key to read the code. The Clinton administration is demanding access to all encryption keys. This is like giving the government the power to steam open all the letters we send in the mail. Frankly you only see this level of surveillance in totalitarian countries. If government has the key, then it could call up information on you, your family, your medical records, your bank records, your credit card purchases, and your e- mail messages to all of your friends and relatives.

What is even more disturbing is the current attempt by government to limit American citizen’s access to strong and power encryption software. A new study from the Cato Institute says that “People living outside the United States find it amusing and perplexing that U.S. law regulates the distribution of strong encryption.”

Everyone wants encryption in the computer age. Citizens want private communication. Businesses want to prevent billing records and personnel records from falling in the wrong hands. Consumers don’t want their credit card numbers widely distributed. That is why we need strong encryption software, and that is why government should not be given a key to the messages we send. Most Americans would not like to turn over so much of their privacy to the government, but unfortunately most Americans don’t realize that they already have.

Privacy and Your Life

We have been talking about the threats to our privacy through wiretaps of our phones and e-mail correspondence, as well as through the issuing of a national ID number. Common citizens are having their privacy violated in new and unexpected ways.

Such is life in the cyberage. As more and more people are seeing their privacy violated, they wonder what to do in a time of financial and personal indecent exposure. What used to be called public records weren’t all that public. Now they are all too public. And what used to be considered private records are being made public at an alarming rate. What should we do?

First, don’t give out personal information. You should assume that any information that you do give out will end up on a database somewhere. Phone solicitors, application forms, warranty cards all ask for information you may not want to give out. Be careful how much information you disclose.

Second, live your life above reproach. Philippians 2:14-15 says “Do all things without grumbling or disputing, that you may prove yourselves to be blameless and innocent, children of God above reproach in the midst of a crooked and perverse generation, among whom you appear as lights in the world.” 1 Timothy 3:2 says that an elder must be “above reproach” which is an attribute that should describe all of us. If you live a life of integrity, you don’t have to be so concerned about what may be made public.

Third, exercise discretion, especially when you use e-mail. Too many people assume they have a one-on-one relationship with someone through the Internet. The message you send might be forwarded on to other people, and the message may even be read by other nosy people. One Web site provider says, “A good rule of thumb: Don’t send any e-mail that you wouldn’t want your mother to read.”

Finally, get involved. When you feel your privacy has been violated, take the time to complain. Let the person or organization know your concerns. Many people fail to apply the same rules of privacy and confidentiality on a computer that they do in real life. Your complaint might change a behavior and have a positive effect.

Track congressional legislation and write letters. Many of the threats to privacy I’ve covered started in Congress. Citizens need to understand that many governmental policies pose a threat to our privacy. Bureaucrats and legislators are in the business of collecting information and will continue to do so unless we set appropriate limits.

Sadly most Americans are unaware of the growing threats to their privacy posed by government and private industry. Eternal vigilance is the price of freedom. We must continue to monitor the threats to our privacy both in the public and private sector.

© 2000 Probe Ministries International


Privacy Issues

The Need to Discuss Privacy Issues

Privacy is something I believe we all take for granted until we lose it. Then we begin to think about how someone invaded our privacy, often by incremental steps. In this article we are going to talk about ways in which we have lost our privacy. Most of the intrusion into our lives comes from government, but not all. Businesses also buy and sell information about us every day. Most of us would be shocked to find out how much personal information is in databases around the country.

As I address this important issue, I will focus on several specific threats to our privacy. I want to begin, though, by discussing how quickly our privacy is being lost and how often it takes place without any debate.

Let’s look at the last session in Congress. It’s amazing to me that there never was an extended debate on the issue of privacy. Granted there wasn’t much debate on a number of issues, but the lack of debate on this fundamental issue shows how far down the road we have gone.

For example, we saw absolutely no debate on issues such as the national ID card, the medical ID number, the Clinton administration encryption policy, the expansion of the FBI’s wiretap capability, along with the Clinton administration’s Executive Order authority and federal databases.

Some of the proposals were defeated, at least for now. The national ID card was defeated, for example, not because Congress debated the issue, but because thousands of Americans wrote letters and made phone calls. Meanwhile, plans by the Clinton administration to develop a medical ID number are on hold, but could surface at any time.

Most other issues, however, are moving ahead. Congress gave the FBI permission to use “roving wiretap surveillance.” That means that the next time you use a pay phone at your local grocery store, it may be tapped merely because there’s a criminal suspect within the area. And if you think I am overreacting, look at what has already happened in California. One wiretap order there authorized surveillance on 350 phones for over two years. In another case, five pay phones were tapped, intercepting 131,000 conversations.

Recently, the Federal Communications Commission mandated that cell phones and other wireless telephone companies track the location of the customers from the time the call was initiated until the time it was terminated. By locating the cell site the person was using, the government can pinpoint the location of every citizen who uses a cell phone since the telephone companies must track and log the locations.

Those are just a few of the examples we will discuss on the subject of privacy. Unfortunately, whenever someone cries for privacy, another is sure to ask, “What do you have to hide?” The question confuses privacy and secrecy. I don’t really have anything I want to keep secret, but I’m not terribly excited about the government listening to every one of my phone conversations. You may not want your future boss to know that you have a genetic predisposition to breast cancer. You may not want a telemarketer to know what you just recently purchased so that he can call your home number and try to sell you more.

The point is that each day we are losing a bit of our privacy. And we will continue to do so unless we work to establish some limits to these invasions of our privacy.

National ID Card

Issuing internal passports has been one of the methods used by communist leaders to control their people. Citizens had to carry these passports at all times and had to present them to authorities if they wanted to travel within the country, live in another part of the country, or apply for a job.

The Department of Transportation has recently called for the establishment of a national ID system by the first of October, in the year 2000. Although presented as merely a move toward standardization, this seemed to many as a move toward a national passport to allow the government to “check up” on its citizens.

A little history is in order. Back in 1996, Congress passed the Illegal Immigration Reform and Immigrant Responsibility Act. This charged the federal Department of Transportation with establishing national requirements for birth certificates and drivers’ licenses. Add to this the 1996 Kennedy-Kassebaum health care law that implies that Americans may be required in the future to produce a state-issued ID that conforms to federal specifications.

If all of this sounds to you like Big Brother or even the mark of the beast, then you have company. Congressman Ron Paul believes that the Department of Transportation regulations would adversely affect Americans. He says, “Under the current state of the law, the citizens of states which have drivers’ licenses that do not conform to the federal standards by October 1, 2000, will find themselves essentially stripped of their ability to participate in life as we know it.”

Congressman Paul adds that, “On that date, Americans will not be able to get a job, open a bank account, apply for Social Security or Medicare, exercise their Second Amendment rights, or even take an airplane flight, unless they can produce a state-issued ID that conforms to the federal specifications.”

The law orders the Attorney General to conduct pilot programs where the state driver’s license includes a “machine-readable” Social Security number. It also orders the development of a Social Security card that uses magnetic strips, holograms, and integrated circuits. The law also requires that states collect Social Security numbers from all applicants for various licenses. It requires states to transmit the name, address, and Social Security number of every new worker to a Directory of New Hires.

The good news is that the work by Congressmen Ron Paul and Bob Barr paid off and the attempt to create a national ID card was stopped, for now. But it is likely to surface again.

After all, there has been a push to establish a federal database for Americans and having each person carry an ID card would allow that information to be linked to a federal database. And while it would help the government catch illegal aliens, it could also be used to track law-abiding American citizens.

Tracking down illegal aliens and standardizing licenses are worthy goals. But the ends do not justify the means. That is why so many people wrote Congress to stop this push for a national ID card. Sometimes in the midst of this political debate, citizens must determine how much they value their freedom and privacy.

Congressman Bob Barr says, “Novelists Aldous Huxley and George Orwell have given us countless reasons why we shouldn’t trade our privacy for any benefit, no matter how worthwhile it sounds.” In the end, we must ask, At what cost? Is it worth trading our privacy for the benefits government promises?

Medical ID Number

While the Department of Transportation is moving ahead with plans for a national ID card, the Department of Health and Human Services is working to assign everyone a lifetime medical ID number.

The purpose of the ID number is to make it easier to keep accurate records of patients as they change doctors and health plans. The identification was required in a 1996 law that guarantees workers continued access to health coverage even if they change jobs.

One solution proposed is to merely use Social Security numbers. But doing that could give credit card companies and other organizations access to medical records. This would raise a greater concern over privacy of medical records. And that’s the point. Even a secure number still could pose a privacy nightmare by potentially giving everyone from insurance companies to computer hackers access to medical histories.

One doctor expressed his concern that a “unique patient identifier could lead to a central database.” He fears that “someone without permission could break into those records.” But even if the record is secure, doctors fear that patients will withhold embarrassing information if there is a chance someone else might get access to the records.

Robert Gellman, an information policy consultant said at a recent hearing, “Once everyone’s required to use a government-issued health identification card, it may become impossible for any American citizen to walk down the street without being forced to produce that card on demand by a policeman.”

Why are so many people concerned? Perhaps past history is an indication. One of the features of Hillary Clinton’s national health care plan was a federal database of every American’s medical records. During one of his State of the Union addresses, President Clinton waved a card with a “unique identifier number” that would give government bureaucrats and health care providers easy computer access to everyone’s medical history.

Although the American people rejected that plan back in 1993 and 1994, the government is still moving ahead with a plan to give every American an “unique identifier number” and to compile medical records into a federal database. Five years ago the argument for a medical card and number linked to a federal database was to aid in health care planning and to eliminate fraud by health care providers. The American people, however, feared it would end medical privacy and increase federal control over health care.

The fear is justified. Just listen to what has already happened in a system without a medical ID number. For example, there is the banker on a county health care board who called due the mortgages of people suffering with cancer. There was a congresswoman whose medical records, revealing a bout of depression, were leaked before primary day. And there are a number of drug store chains that sell the name, address, and ailments of their customers to marketing firms.

The Hippocratic Oath says, “That whatsoever I shall see or hear of the lives of men, which is not fitting to be spoken . . . I shall keep inviolably secret.” Current attempts by the federal bureaucracy to standardize and centralize medical information are presented as a way to make health care delivery more effective and efficient, but they also have the potential to invade our privacy and threaten doctor-patient confidentiality. Frankly, I think the administration needs to rethink their current proposal. Or, to put it in medical terms, I think they need a second opinion.

Encryption

As we have been looking at the issue of privacy, we’ve considered attempts to establish a national ID card and a medical ID number. I want to turn to computers and talk about another important issue: encryption. Now I know that’s probably an unfamiliar word. But stay with me. Encryption is big word for a big issue that I think you need to know about.

Encryption is a relatively new technology that enables you to have private phone conversations and send e-mail messages that are secure. Encryption codes your words so that they cannot be deciphered by people listening in on your conversation or reading your mail.

As you may know, nosy people already can listen in on your wireless phone calls (cellular or cordless phones). And they can intercept and read your e-mail. Sending e-mail without encryption is like mailing a postcard — everyone can read it along the way. And we all know that people will do exactly that. If you have ever had a phone on a party line, you know that people listen in.

What you may not know is that various members of the Clinton administration (like Attorney General Janet Reno and FBI Director Louis Freeh) are demanding the authority to read encrypted messages. Now remember that the Fourth Amendment guarantees citizens be free of unreasonable searches and seizures. Nevertheless, these and other law enforcement officers believe they have the right to open your mail.

What they are asking for is the key to the code. When you send a message in code, you need a key to enable you to send the code and the recipients need the same key to read the code. The Clinton administration is demanding access to all encryption keys. This is like giving the government the power to steam open all the letters we send in the mail. Frankly, you only see this level of surveillance in totalitarian countries. If the government has the key, then it could call up information on you, your family, your medical records, your bank records, your credit card purchases, and your e-mail messages to all of your friends and relatives.

What is even more disturbing is the current attempt by the government to limit an American citizen’s access to strong and powerful encryption software. A new study from the Cato Institute says that “People living outside the United States find it amusing and perplexing that U.S. law regulates the distribution of strong encryption.” Critics of the administration’s policy point out that true criminals (terrorists, drug dealers, the mafia) are unlikely to use anything less than the strongest encryption for their communication and data storage. The government will unlikely have a key to that level of encryption. Meanwhile, the average citizen must use weak encryption to protect private data and run the risk that the government will have a key to access it.

Everyone wants encryption in the computer age. Citizens want private communication. Businesses want to prevent billing records and personnel records from falling into the wrong hands. Consumers don’t want their credit card numbers widely distributed. That is why we need strong encryption software, and that is why government should not be given a key to the messages we send. Most Americans would not like to turn over so much of their privacy to the government, but unfortunately most Americans don’t realize that they already have.

Privacy and Your Life

Dave Ballert thought he was being a savvy consumer when he attempted to download a copy of his credit report from a web site. He hadn’t checked it recently and thought it was worth paying the eight bucks. But when the report arrived a few minutes later, it wasn’t his. It was a report for someone in California. The next thing he knew he received a call from the Washington Post, who said they received his report. The web site halted access later, but the damage was already done. How would you like a major newspaper to have a copy of your credit report?

Consider the case of the Social Security Administration. They provided earnings information to individuals via the Internet. After more than a month of virtually unfettered access for disgruntled employees, ex-spouses, and their attorneys, the Social Security Administration pulled the plug.

Such is life in the cyberage. More and more people are seeing their privacy violated and wonder what to do in a time of financial and personal indecent exposure. What used to be called public records weren’t all that public. Now they are all too public. And what used to be considered private records are being made public at an alarming rate. What should we do?

First, don’t give out personal information. You should assume that any information that you do give out will end up on a database somewhere. Phone solicitors, application forms, warranty cards all ask for information you may not want to give out. Be careful how much information you disclose.

Second, live your life above reproach. As it is written in Philippians 2:14-15, “Do all things without grumbling or disputing, that you may prove yourselves to be blameless and innocent, children of God above reproach in the midst of a crooked and perverse generation, among whom you appear as lights in the world.” 1 Timothy 3:2 says that an elder must be “above reproach,” which is an attribute that should describe all believers. If you live a life of integrity, you don’t have to be so concerned about what may be made public.

Third, exercise discretion, especially when you use e-mail. Too many people assume they have a one-on-one relationship with someone through the Internet. The message you send might be forwarded on to other people, and the message may even be read by other nosy people. One web site provider advises, “A good rule of thumb: Don’t send any e-mail that you wouldn’t want your mother to read.”

Finally, get involved. When you feel your privacy has been violated, take the time to complain. Let the person or organization know your concerns. Many people fail to apply the same rules of privacy and confidentiality on a computer that they do in real life. Your complaint might have a positive effect.

Track congressional legislation and write letters. Many of the threats to privacy I’ve talked about started in Congress. Citizens need to understand that many governmental policies pose a threat to our privacy. Bureaucrats and legislators are in the business of collecting information and will continue to do so unless we set appropriate limits.

Sadly, most Americans are unaware of the growing threats to their privacy posed by government and private industry. Eternal vigilance is the price of freedom. We must continue to monitor the threats to our privacy both in the public and private sector.

 

©1999 Probe Ministries.