Academia.eduAcademia.edu

Finding Divinity in Fortran

2011

The information revolution is the single most important change in society since the printing press. At no other time has our society benefited from nearly limitless access to information and communication, and the changes brought on by this access have changed, and are changing, society in fundamental ways. Our homes, our workplaces, and our democracy have all been transformed by information and communication technologies. However, our ethics have not kept pace with our technological progress, and the immense changes brought by this this revolution have posed some equally immense moral questions. Indeed, there has been an almost total lack of religious discourse regarding the problems which have arisen out of the information revolution. This thesis is an attempt to change that. The thesis itself is structured as a series of essays on four key problems: 1. Intellectual Property, as it relates to Scripture 2. Information Ethics, the novel moral theory arising from Computer Ethics 3. Robotic Ethics, especially the ethics of robotic warfare 4. Hacker Culture, and its implicit spirituality Each of these essays attempts to tackle one of these key problems, and demonstrate how a religious perspective illuminates some aspect of it. As befits a thesis from a Jesuit, Catholic university, most of the essays are drawn from a Catholic, Christian perspective.

Finding Divinity in Fortran Author: Scott Molony Persistent link: http://hdl.handle.net/2345/1980 This work is posted on eScholarship@BC, Boston College University Libraries. Boston College Electronic Thesis or Dissertation, 2011 Copyright is held by the author, with all rights reserved, unless otherwise noted. Boston College The College of Arts and Sciences Department of Theology and Department of Philosophy Finding Divinity in FORTRAN: Towards a Theological Computer Ethic a thesis by Scott J. Molony submitted in partial fulfillment of the requirements for the degree of Bachelor of Arts May, 2011 This work is licensed under a Creative Commons Attribution-Noncommercial-No Derivative Works 3.0 United States License. You are free to to copy, distribute, and transmit this document, under the following conditions: • Attribution – You must attribute the work in the manner specified by the author or licensor (but not in any way that suggests that they endorse you or your use of the work). • Noncommercial – You may not use this work for commercial purposes. • No Derivative Works – You may not alter, transform, or build upon this work. You can find more information at: http://creativecommons.org/licenses/by-nc-nd/3.0/us/ c Copyright by Scott Joseph Molony 2011 Finding Divinity in FORTRAN: Towards a Theological Computer Ethic Scott J. Molony Advisor: Richard A. Spinello Reader: Stephen J. Pope Abstract The information revolution is the single most important change in society since the printing press. At no other time has our society benefited from nearly limitless access to information and communication, and the changes brought on by this access have changed, and are changing, society in fundamental ways. Our homes, our workplaces, and our democracy have all been transformed by information and communication technologies. However, our ethics have not kept pace with our technological progress, and the immense changes brought by this this revolution have posed some equally immense moral questions. Indeed, there has been an almost total lack of religious discourse regarding the problems which have arisen out of the information revolution. This thesis is an attempt to change that. The thesis itself is structured as a series of essays on four key problems: 1. Intellectual Property, as it relates to Scripture 2. Information Ethics, the novel moral theory arising from Computer Ethics 3. Robotic Ethics, especially the ethics of robotic warfare 4. Hacker Culture, and its implicit spirituality Each of these essays attempts to tackle one of these key problems, and demonstrate how a religious perspective illuminates some aspect of it. As befits a thesis from a Jesuit, Catholic university, most of the essays are drawn from a Catholic, Christian perspective. Acknowledgements This thesis could not have been written without the support and steadfast encouragement of a number of wondrous people. First of all, I am deeply grateful to my advisor, Dr. Richard Spinello, for his grace, kindness, and patience. He has always been a source of wisdom and support, and has been generous with both his time and his network. I cannot express how grateful I am. I am also deeply indebted to my perpetually-overworked reader, Dr. Stephen Pope, for his grace in taking me on as yet another project in his queue. Despite always juggling several projects, Dr. Pope never failed to make time for me when I asked for it, and has been a source of wisdom and guidance. James Keenan, SJ, has always been a mentor and advisor, and has now assumed the mantle of director of the Presidential Scholars Program. I am grateful the program will be in such capable hands. I am also grateful to the astonishing Ms. Jennie Thomas, who has never failed to be the picture of kindness and resourcefulness, and whose help in securing institutional resources was key to the success of this project. The first chapter in particular is indebted to the comments and feedback from Edward Vacek, SJ, who has been a mentor and a source of wisdom for my final two years at Boston College. Father Vacek never ceases to astonish me with his wisdom and kindness, and I value greatly my journeys to the School of Theology and Ministry. The second chapter is likewise indebted to the feedback from Dr. Luciano Floridi who, despite his considerable standing within the scholarly community, was willing to spend a great deal of time with an insignificant undergraduate, and even sponsor me for a summer in Oxford. His brilliance is matched only by his kindness. The third chapter owes a great deal to the kind attention of Andrea Vicini, SJ, another Italian of ferocious, yet kind, intellect. His comments, feedback, and encouragement helped me write a very strong chapter, and I am deeply grateful. The final chapter is indebted to Dr. Roberto Goizueta, who not only invested his time and talents, but was patient enough to listen to a young man babble on about technology and take the time to understand it. Dr. Boyd Taylor Coolman, and his estimable wife Dr. Holly Taylor Coolman have been extraordinary mentors during my time at Boston College. I have never ceased to marvel at their kindness, wisdom, and equipoise, not to mention their gracious hospitality. Boston College has made a very wise decision in granting Dr. Coolman tenure; I can only hope that many generations of young theologians can benefit from his kind mentorship. Arthur Madigan, SJ is, in addition to being extraordinarily learned, is quite possibly the kindest and humblest man I know. I have benefitted immensely from studying under his tutelage, and have grown not only as an ethician and a scholar, but as a person. Should I be so blessed, I hope to become like Arthur Madigan someday. Dr. Rob Gross and his wonderful wife Edie Rosenberg have been mentors since my days as a green freshman, and I regard them with the respect I do my parents. I thank them for their patience and good humor, and look forward to many more trips across Boston to sample new cuisine. Dr. Michael Martin has been a mentor and friend since my sophomore year at Boston College. He has been patient even with such a frustratingly linear thinker like myself. I am deeply grateful that the College of Arts and Sciences had the foresight to choose such a remarkable man for interim dean of the Junior class. I can only hope he continues to be such a wonderful pillar of the Boston College Community, and deeply apologize for making him resort to his first-year logic textbook to read my papers. Ms. Kyoko Wada, and the entire tea circle of wada shachu have been a source of wisdom, strength and growth for me at Boston College. They have taught me the virtues of hospitality, and how to fall in love with anyone I meet. I am forever changed for the better for my interaction with them, and I commend any who seek the way of tea to their tutelage. I am deeply grateful to Ms. Courtney McKee, for always being a pillar of strength and sanity despite tempestuous times. She will make a wonderful physician, and the world is better for her in it. I am also grateful to Ms. Betsy Hilliard, who was perpetually frank, yet kind. My oldest friend, and soon to be a professor in her own right. I am grateful for her love. Mr. Yuping Toh taught me how to love in a way I had never known before, and I will be forever grateful. He is a kind, wonderful, decent man; and I hope he finds happiness. He also introduced me to a wondrous group of people — Mr. David Cheung, Mr. Joseph Davies-Gavin, Mr. Edward Howland, and the entire crew of the Boston Gay Men’s Chorus. My hat is off to such a fine group of gentlemen. Mr. John Falcone, Mr. Matias Wibowo, Mr. Bert Ouellette, Mr. Joel Nebres, Mr. Rocco Pigneri, Mr. Gilbert Macabuag, Mr. Steven Young, Mr. Alan Yee and everyone at Dignity/Boston have given me a spiritual home in Boston. Dr. Patrick Cheng has been a source of kindness and wisdom in Boston, as well. I hope he settles into the city, and that many more learn from his wise teachings. Mr. Leslie Tay has been a kind and generous tutor in many arts, not the least of which is music. I hope the future treats him well, that he finds his place in the Opera world, and that he is shown even a fraction of the love he has shown me. Mr. Celso Javier Perez taught me how to be a polite activist, and, for both the lessons on etiquette and activism, I am grateful. He will doubtless change the world. I am grateful also to Mr. Robert Kubala, Mr. Brian Varian, and Mr. Steven Liu, who have taught me the value of forgiveness. Most importantly, I am grateful to my parents, Bill and Doni Molony. They have given me everything, and I can only hope that I can repay their boundless love and sacrifice with love of my own. Everything good in this thesis is indebted to others; all errors are solely mine. For My Mothers, Earthly and Heavenly Contents 1 Introduction 1.1 Copylight of the World: Intellectual Property & the New American 1.2 Cosmopoesis: A Theological Interpretation of Information Ethics 1.3 Mercy and Justice in Robot Ethics: A Christian Approach . . . . 1.4 God in All Code: The Ignatian Spirituality of Hacker Culture . . 2 Copylight of the World: Intellectual Property and the New can Bible 2.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.2 Case Description . . . . . . . . . . . . . . . . . . . . . . . . . 2.3 Background: Justification for Intellectual Property . . . . . . 2.3.1 Locke: Labor-Desert Theory . . . . . . . . . . . . . . . 2.3.2 Hegel: Personality Theory . . . . . . . . . . . . . . . . 2.3.3 Mill/Bentham: Utilitarianism . . . . . . . . . . . . . . 2.4 Ownership of Scripture . . . . . . . . . . . . . . . . . . . . . . 2.5 Scripture and IP Rights Frameworks . . . . . . . . . . . . . . 2.5.1 Scripture and the Lockean Theory . . . . . . . . . . . . 2.5.2 Scripture and the Hegelian Theory . . . . . . . . . . . 2.5.3 Scripture and the Utilitarian Theory . . . . . . . . . . 2.5.4 Scripture is its own Category . . . . . . . . . . . . . . 2.6 Comparison: ICEL vs. USCCB . . . . . . . . . . . . . . . . . 2.6.1 ICEL . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2.6.2 USCCB . . . . . . . . . . . . . . . . . . . . . . . . . . 2.6.3 Reconciliation . . . . . . . . . . . . . . . . . . . . . . . Bible . . . . . . 1 3 5 7 8 Ameri. . . . . . . . . . . . . . . . 10 11 12 16 18 20 20 21 23 23 25 27 27 28 28 29 31 3 Cosmopoesis: A Theological Interpretation of Information Ethics 3.1 The Ontology of Goodness . . . . . . . . . . . . . . . . . . . . . . . . 3.1.1 God the Sustainer . . . . . . . . . . . . . . . . . . . . . . . . 3.1.2 Meonic Evil . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.2 Homo Poieticus: Christianizing Floridi’s Philosophical Anthropology . 3.2.1 Floridian Anthropology . . . . . . . . . . . . . . . . . . . . . . 3.2.2 Christian Anthropology . . . . . . . . . . . . . . . . . . . . . 33 34 35 36 37 37 38 . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3.3 3.2.3 Reconciling the Floridian and Biblical accounts . . . . . . . Cosmopoiesis: The Information Ethics Teleology and Eschatology . 3.3.1 Information Ethics Eschatology . . . . . . . . . . . . . . . . 3.3.2 Christian Eschatology . . . . . . . . . . . . . . . . . . . . . 3.3.3 Harmonizing Information Ethics and Christian Eschatology . 4 Mercy and Justice in Robot Ethics: A Christian Approach 4.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.2 Christian Foundations . . . . . . . . . . . . . . . . . . . . . . 4.2.1 Holy War . . . . . . . . . . . . . . . . . . . . . . . . . 4.2.2 Christian Pacifism . . . . . . . . . . . . . . . . . . . . 4.2.3 Just, or Limited War . . . . . . . . . . . . . . . . . . . 4.3 The Problem . . . . . . . . . . . . . . . . . . . . . . . . . . . 4.4 Autonomous vs. Semi-Autonomous Robots . . . . . . . . . . . 4.5 Ethical Issues in Semi-Autonomous Robots . . . . . . . . . . . 4.6 Ethical Issues in Autonomous Robots . . . . . . . . . . . . . . 4.6.1 Embedded Values . . . . . . . . . . . . . . . . . . . . . 4.6.2 Indirect Values . . . . . . . . . . . . . . . . . . . . . . 4.6.3 Direct Values . . . . . . . . . . . . . . . . . . . . . . . 4.7 Critique of Machine-Learning in Autonomous Robots . . . . . 4.8 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 41 45 46 47 49 . . . . . . . . . . . . . . 52 53 54 54 55 57 59 61 62 64 65 66 67 72 75 5 God in All Code: The Ignatian Spirituality of Hacker Culture 5.1 Introduction . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2 Joy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.2.1 Art, Science, and Play: Hacker’s Joy . . . . . . . . . . . . . . 5.2.2 Moments of Consolation: Ignatian Joy . . . . . . . . . . . . . 5.3 Mission . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.3.1 The Contagious, Wondrous Joy of Programming: Hackers’ Mission 5.3.2 Ignatian Indifference: Poverty, and the Mission . . . . . . . . 5.4 Magis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.4.1 Raymond’s Ethic of Constant Innovation . . . . . . . . . . . . 5.4.2 Ignatian Ethic of Striving for Perfection . . . . . . . . . . . . 5.5 Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.5.1 Men and women for others: Jesuit faith that does justice . . . 5.5.2 Shared labor: Hacker cooperation . . . . . . . . . . . . . . . . 5.6 Formation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5.6.1 Jesuit Formation . . . . . . . . . . . . . . . . . . . . . . . . . 5.6.2 Hacker Formation . . . . . . . . . . . . . . . . . . . . . . . . . 5.7 Conclusion . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Bibliography 77 78 80 80 82 84 84 86 88 88 90 92 92 93 94 94 96 98 101 Chapter 1 Introduction 1 Chapter 1: Introduction The information revolution is the single most important change in society since the printing press. At no other time has our society benefited from nearly limitless access to information and communication, and the changes brought on by this access have changed, and are changing, society in fundamental ways. Our homes, our workplaces, and our democracy have all been transformed by information and communication technologies. However, our ethics have not kept pace with our technological progress, and the immense changes brought by this this revolution have posed some equally immense moral questions. Issues like privacy, strong security, and intellectual property will have deep and far-reaching consequences for us now, and will only increase as computers grow more prevalent. Indeed, one group of voices which have been conspicuously absent from the current discussion are religious voices. Religious communities have been deeply formative of our collective conscience; thinkers like St. Augustine, St. Thomas Aquinas, Mahatma Gandhi, Archbishop Romero and Dr. Martin Luther King, Jr. have left deep marks on even secular thinkers. However, there has been an almost total lack of religious discourse regarding the problems which have arisen out of the information revolution. While the Holy See, to its credit, produced two very general statements1 on the subject, with a short follow-up statement on social media2 , there has been almost no concentrated effort on the part of religious thinkers to address issues arising from the Information Revolution. This thesis is an attempt to change that. I do not pretend that this thesis lays out a complete or definitive religious answer to questions raised in computer ethics. Partly, this is because the issues are both thorny and manifold; partly this is due to the rapidly-changing nature of computer ethics, 1 2 Pontifical Council for Social Communications, ‘Church in Internet’; idem, ‘Ethics in Internet’. Benedict XVI. 2 Chapter 1: Introduction and partly due to a great respect for wiser thinkers who could contribute much to the topic. However, what I do intend for this thesis is the beginning of a conversation. By laying out detailed, religious responses to computer ethics problems, I hope to impress upon my fellow theologians that these issues are worthy of attention, and to impress upon the community of philosophers that so far have taken these problems on that religious thinkers can have dynamic contributions to the field. The thesis itself is structured as a series of essays on four key problems: 1. Intellectual property, as it relates to Scripture 2. Information ethics, the novel moral theory arising from computer ethics 3. Robotic ethics, especially the ethics of robotic warfare 4. Hacker culture, and its implicit spirituality Each of these essays attempts to tackle one of these key problems, and demonstrate how a religious perspective illuminates some aspect of it. As befits a thesis from a jesuit, catholic university, most of the essays are drawn from a Catholic, christian perspective. 1.1 Copylight of the World: Intellectual Property & the New American Bible The first chapter deals with the copyright policies surrounding the New American Bible (NAB), the authorized translation of the Bible put forward by the Magisterium as the official translation of the Bible used in the worship and liturgy of the Roman Catholic Church in the English language. While the translation is not highly used in the scholarly world, it is regarded as a solid, if somewhat conservative, bible used for 3 Chapter 1: Introduction devotional use. The first part of the chapter introduces the NAB, and establishes its importance. Attempts to bring the NAB into the 21st Century, however, have been met with mixed success. Indeed, the current copyright policies regarding electronic distribution of the NAB are nothing short of incoherent. While some of the sloppiness of the current policy of the bishops’ conference may be attributed towards a changing understanding of how people use computers, especially given the rise of mobile computing, the current policy is very difficult to parse. The second section of the essay delves into how incoherent this policy really is, and makes the case that it is a problem needing a solution. In order to have a solution to the problem, however, one needs a solid foundation. The third section of the essay delves into the theoretical foundations of intellectual property regimes, including three major forbears: 1. Locke’s Labor-Desert Theory 2. Hegel’s Personality Theory 3. John Stewart Mill and Jeremy Bentham’s Utilitarian Theory. Scripture, however, is a very complicated work. The fourth section of the essay attempts to lay out precisely who has claim to the Bible. The problem is difficult, however, since in the multi-millennial history of the text, untold numbers of people have labored to produce what we have today. Indeed, I attempt to lay out a theological argument regarding the Bible as properly belonging to all people, given the great commission, but held in stewardship by the institutional church. This problem is laid bare in the fifth section of the chapter, where the status of Scripture established in the previous section is shown to be incompatible with each of the IP frameworks established earlier. Indeed, Scripture appears to be so radically 4 Chapter 1: Introduction different from the models of intellectual property thus established that I argue it appears to be in a category of its own. Finally, having shown that Scripture does not fit easily into established frameworks. I then examine how Scripture is handled by two separate arms of the institutional church: the United States Conference of Catholic Bishops (USCCB), and the International Commission for English in the Liturgy (ICEL). The USCCB and the ICEL have radically different frameworks, which befits their separate functions — the USCCB, being a teaching arm, attempts to centralize control, while the ICEL, fundamentally a cooperative body, attempts to standardize texts as widely as possible, and therefore promotes comparatively liberal sharing. In trying to harmonize the two, I argue for adopting ICEL’s model more widely, essentially prioritizing access to scripture while accommodating efforts to preserve its integrity. 1.2 Cosmopoesis: A Theological Interpretation of Information Ethics The single biggest development to arise from the computer ethics field has been the development of a new moral system by Dr. Luciano Floridi, currently of the University of Oxford. In his new system3 , Dr. Floridi argues for the concept of information to take a sort of priority in moral philosophy that concepts like being have held before. While the system is not without controversy, it represents a real innovation not only for computer ethics, but for the wider discipline. The second chapter is an attempt to get the christian tradition and Dr. Floridi’s traditions to intersect. Floridi is, essentially, a platonist, and so I alternate Augustine 3 Luciano Floridi; Jeroen van den Hoven and John Weckert, editors, Chap. 3 In ‘Information Ethics: Its Nature and Scope’, (Cambridge University Press, 2008). 5 Chapter 1: Introduction and Eastern Orthodox neo-platonist sources as a place for intersection. The first section of the chapter describes Floridi’s fundamental value judgement, which references inforgs — a sort of ontologically minimalist notion which encompasses any structured object at a given level of abstraction: 1. Inforgs exist 2. Ceteris Paribus, this existence is a good thing 3. Therefore, existing inforgs have “a Spinozian right to persist in its own status, and a Constructionist right to flourish, i.e. to improve and enrich its existence and essence.4 ” Using the notion of God as sustainer, I transform Floridi’s base value judgement into a notion that God’s presence in sustaining beings can form the basis of an ethical system. In the second section of the chapter, I attempt to christianize Floridi’s anthropology. Floridi’s view of humans as anti-entropic agents leads him to have three major ontic powers: 1. Control 2. Modeling 3. Creation I tie these notions to the Holy Trinity, and show how each of these ontic powers can be seen as deriving from the human’s partial participation in the divine life of each of the persons of the Trinity. In the final section of the chapter, I explore floridian and christian eschatology, and speculate on how they need not be contradictory. I also propose a name for the rather awkward information ethics project with the name Cosmopoeisis. 4 Floridi, ‘Information Ethics: Its Nature and Scope’ (as in n. 3), p. 48. 6 Chapter 1: Introduction 1.3 Mercy and Justice in Robot Ethics: A Christian Approach Computers are also changing the way in which we conduct war. While much has been made of the threat of cyberwar, computers are now entering the battlefield in the person of robots. As mechanization appears inevitable, the christian community will be called to assess this new weapon of war. The first section of chapter 4 attempts to do just that — layout how the face of war will be changing. The second section attempts to lay out the foundations for a christian approach to the problem. It describes three approaches within the tradition: 1. Holy War 2. Christian Pacifism 3. Just War While dismissing the first almost outright, the chapter examines whether the kind of pacifism shown by the US bishops in the face of nuclear weapons5 is warranted. Ultimately, the section decides that robots do not pose the same sort of indiscriminate threat, and decides on a just war stance for pragmatic, pastoral reasons. The chapter then examines some rather terrifying statistics from Iraq and Afghanistan which are used by the proponents of robotic warfare to justify some of their claims. This helps to situate the moral situation in its appropriate gravity. In the next section, the chapter makes a distinction between autonomous and semi-autonomous robots. These machines are not autonomous in the sense of being moral agents, but are autonomous in the sense of being able to function apart from humans for a time — anywhere from a few minutes to hours. 5 United States Conference of Catholic Bishops, The Challenge of Peace: God’s Promise and Our Response, (Office of Publishing Services, USCCB, 1983). 7 Chapter 1: Introduction The chapter is able to examine some of the ethical issues arising from semiautonomous robots, most of which raise questions of virtue and vice. The earlier data from Iraq and Afghanistan showed that significant violence is done to soldiers’ character in war; the question the section examines is whether the emotional and epistemological distance that semi-autonomous war robotics offers is ameliorating that violence, or swapping one kind of ethical damage for another. The chapter hesitantly affirms the ethical use of semi-autonomous robots, while pleading for more data. After a significant detour into machine learning techniques for context, the final section of the paper attempts to adjudicate between two models of artificial consciences — one, proposed by a team led by Patrick Lin, advocates a virtue-ethics based approach based upon machine learning, while Ronald Arkin proposes a more deontological model. I ultimately favor Arkin’s model, after examining some flaws in Lin’s model; notably, that machine-learning techniques are spooky — they deliver superior results, but when they fail, they fail both unpredictably and badly. Given that not all failures are equivalent in wartime, I argue it is better to have a machine that fails more often, but more predictably and more mercifully, than one which fails badly. 1.4 God in All Code: The Ignatian Spirituality of Hacker Culture The first section in the final chapter examines the foundational documents of modern hacker culture, and attempts to draw parallels between them, with the hope of initiating dialogue between these vital traditions of power and wisdom. The second section examines notions of joy, both in hacker culture and in Ignatian spirituality. The joy of constant play found in Raymond’s writings is juxtaposed 8 Chapter 1: Introduction against the Ignatian notion of moments of consolation. Both appear to have very similar elements. The third section deals with the Ignatian notion of mission, and how that contrasts with the self-evident mission found in Hacker culture. The intense dedication of both of their adherents are compared. The fourth section deals with the teleological goal of the mission — Raymond’s ethic of constant innovation, and Ignatius’s ethic of magis striving for perfection. More similarities are uncovered. Human relationality and service is examined in the fifth section. Jesuit commitment to justice — particularly in the wake of superior general Pedro Arrupe. Hacker commitment to shared labor is also examined. Notions of formation are taken seriously in the final section. Both traditions are shown to begin with a particular normative view of the human person, and develop the person towards this aspiration. 9 Chapter 2 Copylight of the World: Intellectual Property and the New American Bible 10 Chapter 2: Copylight of the World 2.1 Introduction The evangelistic imperative is one of the defining features of Christianity. While each major faith tradition proclaims its own truths to the world community in its own way, no other major faith tradition, with the possible exception of Islam, has felt the need to make its truths so widely accessible to everyone. Much of that imperative can be attributed to the Great Commission, when Jesus commands the disciples to spread the news of his resurrection. Perhaps its most famous formulation is in Matthew 28: 16 The eleven disciples went to Galilee, to the mountain to which Jesus had ordered them. 17 When they saw him, they worshiped, but they doubted. 18 Then Jesus approached and said to them, “All power in heaven and on earth has been given to me. 19 Go, therefore, and make disciples of all nations, baptizing them in the name of the Father, and of the Son, and of the holy Spirit, 20 teaching them to observe all that I have commanded you. And behold, I am with you always, until the end of the age.” Combined with the Pauline affirmation that the Gospel applies to all people (hence disciples of all nations), Christianity formulated conceptions of evangelism and missionary work. Within the Roman Catholic tradition, this usually takes the form of emphasizing both sacred Scripture and sacred tradition 1 . Since the promulgation of Dei Verbum, the Dogmatic Constitution on Divine Revelation in 1965, there hasn’t been a great deal of controversy about how the Gospel should be promulgated — until now. 1 Paul VI. 11 Chapter 2: Copylight of the World With the dawning of the digital age, the publishing industry is now undergoing a huge revolution in their ways of doing business, with great uncertainty. This uncertainty carries over into the 21st century, as new methods of spreading the Gospel overtake reflection on those same methods. In particular, the thorny issue of copyright law has left much of the online world scratching its head, and tying itself in knots. In this essay, I’m going to examine how this debate affects our understanding of evangelization in the 21st century. First, I will examine current theories of intellectual property, and demonstrate why they are lacking when applied to scripture. I will then attempt to posit an ethical solution, based on current (and, hopefully, future) frameworks. 2.2 Case Description The New American Bible (NAB) is the fruit of several decades’ worth of work by several generations of scholars. Originally commissioned by the Confraternity of Christian Doctrine (CCD), which, importantly, still holds the copyright, its administration in the US has largely fallen to the United States Conference of Catholic Bishops (USCCB) and, abroad, with the International Commission on English in the Liturgy (ICEL), which is “[A] mixed commission of Catholic Bishops’ Conferences in countries where English is used in the celebration of the Sacred Liturgy according to the Roman Rite,”2 and coordinates translations of English liturgical works, including the Roman Lectionary, which, in turn, includes its material from the NAB. The ICEL maintains its copyright on the liturgical works, giving the following rationale: ICEL copyrights its texts in order to maintain under the civil law and 2 International Commission on English in the Liturgy, ‘Welcome to ICEL’. 12 Chapter 2: Copylight of the World international conventions the Church’s ownership of these texts used by Catholics in their worship. The legal safeguard provided by copyrighting the texts helps to preserve their literary and liturgical integrity under the ecclesiastical authority given to the conferences of bishops by the Second Vatican Council and by subsequent instructions of the Apostolic See. Through copyright of its texts ICEL can also help to promote their availability to all the English-speaking countries through the international copyright conventions.3 The ICEL also collects royalties from publication of these works. Again, from the ICEL: As a nonprofit body at the service of the Church in the countries where English is spoken, ICEL endeavors to conduct its program with just remuneration for translators, editors, composers, consultants, and staff and with expenditures directly related to liturgical purposes. To provide a continuing source of revenue for ICEL’s current and future expenses in developing liturgical materials, a royalty fee is charged to all publishers. ICEL does not charge for the reproduction of its texts when they appear in materials produced by individual parishes, schools, religious houses, and the like for their private and non-commercial, nonprofit use. Even in such cases, however, the requisite acknowledgment and copyright notice should always appear.4 Finally, in an appendix to the policy (presumably part of the 2008 revision): 3 International Commission on English in the Liturgy, Publication Policies of the International Committee on English in the Liturgy, Inc. Revised edition. (2008), p. 4. 4 Ibid. 13 Chapter 2: Copylight of the World Use of ICEL Materials on Global Computer Networks ICEL texts and translations that have been approved by the Conferences of Bishops, have received the recognition of the Holy See, and have subsequently been promulgated for use on the date established by the Conferences of Bishops may be reproduced in a non-commercial site (“Site”) on the global computer network commonly known as the Internet without obtaining written or oral permission, subject to the following conditions: 1. There must be no fee charged to access the Site or any of the ICEL translations, texts, or music, thereon; 2. The appropriate ICEL copyright acknowledgment must appear on the first and last pages and/or frames within the Site displaying the ICEL translation or text (see www.icelweb.org and click on “copyright policies”); 3. The ICEL translations and texts must be followed exactly; 4. These policies do not grant a license to publish texts in any other form or any other right in ICEL’s name and marks, and the Site may not display the ICEL translations or texts or otherwise use the ICEL name in any way that implies affiliation with, or sponsorship or endorsement by, ICEL; 5. ICEL reserves the right to terminate or modify its permission to use its translations and texts; 6. ICEL reserves the right to take action against any party that fails to conform to these policies, infringes any of its intellectual property rights, or otherwise violates applicable law. 14 Chapter 2: Copylight of the World The USCCB, which administers the CCD’s copyright of the New American Bible, however, has a very different set of copyright guidelines: • No permission is required for use of less than 5,000 words of the NAB in print, sound, or electronic formats (for web usage, see below) provided that such use comprises less than 40% of a single book of the Bible and less than 40% of the proposed work. • Permission must be requested for use of more than 5,000 words from the NAB (or when the use comprises more than 40% of a single book of the Bible or more than 40% of the proposed work). • A copy of the manuscript pages that contain Scripture selections should be sent to [the Associate Director of Permissions] • The Scripture citations should be highlighted and the reference citations must be clearly marked. The following information should be included: title, publisher, publisher address, publisher contact name, proposed publication date, print run, list price, length of work. • Manuscripts may be accepted via e-mail with prior authorization. To obtain authorization, please send an email to nabperm@usccb.org. • Permission is no longer granted to reproduce the 1970 New Testament (apart from in the Liturgy of the Hours). • All quotations must be verbatim from the text, including capitalization and punctuation. The poetic structure of some passages and books written in verse (for example, Psalms, Wisdom, Isaiah, etc.) must be preserved in verse as printed. • The appropriate copyright acknowledgment must be given [as per a given formula] 15 Chapter 2: Copylight of the World The end result of all of this legalese, however, is quite confusing. In practical terms, this means it is perfectly legal for one to view the NAB online, on a personal laptop, or on Apple Computer’s new iPad, but if one were to download the text in order to read it offline, say on the train, is illegal copyright infringement. Surely, however the confluence of the church and the state set the rules for reading the bible in the 21st century, the presence or absence of a wireless signal shouldn’t make that difference. 2.3 Background: Justification for Intellectual Property How can one own an idea? Such a question has been raised in society since the time of Gutenberg – and, until recently, had been more-or-less satisfactorily answered. The advent of the internet, however, has changed the entire frame of the question. When books, inventions, and other creative works heretofore were physical objects – things that could be touched, made, and controlled by scarcity – society developed copyrights and patents, which worked admirably. However, the digital revolution of the internet changed the rules of the game when two major advances changed the nature of creative works: 1. Creative works are digital – composed on computers. This means that a work has gone from being markings on a piece of paper to being bits in a data stream. It is therefore now possible to reproduce flawless copies of any work composed on the computer. While this capability existed in the hands of book printers up until now, the widespread adoption of computers and desktop publishing has enabled even average citizens to produce work on the level of professional typesetters. 16 Chapter 2: Copylight of the World 2. The internet connects personal computers together in a global network. While the capability to move files from one computer to another was one of the first major advances of the computer industry, Geography had heretofore posed a definite limitation to any attempt to share files; Users could put a file on portable storage media like a floppy disk, say, and share it with neighbors, but only realistically able to share information between people who are geographically close. Companies could control the distribution of software by being the only people who could ship uses copies of software. With the advent of the internet, however, works can now be placed online for anyone to access and copy. This has thrown back open the question of intellectual property (IP) rights: are the rights given by traditional intellectual property regimes morally legitimate? Some, like noted activist and founder of the Electronic Frontier Foundation (EFF) Richard M. Stallman argue that intellectual property rights, at least applied to software, constitute a “betrayal”5 of other users; an idea which he calls “morally sickening” and argue that “It is not ethical to use non free software.” Other authors, however, like Richard Spinello6 argue that at least the idea of some sort of copyright is completely legitimate, if not the current US copyright regime. The debate appears to be somewhat intractable. However, in some ways, the debate is also moot. It is highly unlikely that the logical conclusion of abolitionists like Stallman’s reasoning will come to pass, and copyright will be abolished. The debate, then, needs to be refocused — given that copyright exists, what is acceptable conduct within this framework? What is the most morally superior way of conducting oneself under the scheme? It is these questions which have the most direct bearing on the question at hand, and deserve the most scrutiny. 5 Anarcho Babe. Richard Spinello, Cyberethics: Morality and Law in Cyberspace, 3rd edition. (Jones and Bartlett, 2006). 6 17 Chapter 2: Copylight of the World In order to deal with these questions, however, it is necessary to first examine what justifications are given for IP rights in the first place in order to be able to adequately answer the question. There are three sources for justifications of IP rights. Briefly, they are: 1. A Lockean theory, commonly referred to as the Labor-Desert theory78910 2. A Hegelian theory, referred to as the Personality theory1112 3. A Utilitarian theory13 A brief discussion of the three follows. 2.3.1 Locke: Labor-Desert Theory The Lockean argument is perhaps the one most documented. Briefly, the argument emphasizes that Labor makes right – an agent has a legitimate claim to only that which the agent works for. Locke begins with a rights-based approach; declaring, as noted above, that everyone has rights to life, liberty, and property. His main moral thrust comes in his assertion that people are entitled to as much property as may be necessary to sustain themselves’ and their dependents’ right to life. (The text lends itself to a broader reading of “sustenance” to include a modest, though not extravagant, living.) Locke also asserts 7 Spinello (as in n. 6), p. 98. Justin Hughes, ‘The Philosophy of Intellectual Property’, The Georgetown Law Journal, 77 (1988):2, p. 296-329. 9 Kai Kimppa, Problems with the Justification of Intellectual Property Rights in Relation to Software and Other Digitally Distributable Media, Ph. D thesis, (Turku Centre for Computer Science, 2003), p. 59-75. 10 Herman T. Tavani, ‘Locke, Intellectual Property Rights, and the Information Commons’, Ethics and Information Technology, 7 June (2005):2. 11 Spinello (as in n. 6), p. 99. 12 Hughes (as in n. 8), p. 330-358. 13 Spinello (as in n. 6), p. 100. 8 18 Chapter 2: Copylight of the World that the earth was, originally, held by people in common; property rights derive from people claiming certain small portions of land and other resources to exclude other’s access to, thus increasing the number of people who can subsist on the remaining common land. (Ironically, he essentially justifies private property on altruistic grounds.) Locke derives his theory entirely from a supposition that all tangible property is held in common; the Lockean argument for IP rights extends this to creating a parallel immaterial commons 14 . One key feature of the immaterial commons, however, is that every object in it is both unique and non-diminishing. Hamlet is only one particular combination of words in the entire English language, and so can be said to be unique, but my reading Hamlet does not prohibit my next-door neighbor from doing so as well. Hughes identifies two alternate readings of Locke’s theory: 1. Labor-Avoidance: This reading holds that labor is, by definition, an implicitly unpleasant activity that people pursue only reluctantly. It is just, therefore that those who labor be rewarded with the fruits that are thence derived. Applying it to Hamlet Shakespeare deserves the IP right to Hamlet because writing plays is painful (or, at least, less pleasant than alternate options). 2. Value-Added: Those whose labor creates value should be rewarded with its profits. Rather than stressing the unpleasantness of the work, this theory stresses the value that is created. Applying this to the Hamlet example, Shakespeare is entitled to the IP rights to Hamlet not because it is painful to write plays, but because Hamlet is a great play. 14 Kimppa (as in n. 9), p. 64. 19 Chapter 2: Copylight of the World 2.3.2 Hegel: Personality Theory The Hegelian15 position holds that an author invests some facet of the author’s personality in all created works. The works created by a given author embody a part of the author’s personality. Therefore, an author is entitled to some amount of control over the created work. Note that the IP rights associated with this theory are separate and distinct from those associated with the Lockean argument. Rather than stressing compensation for pain or value, the Hegelian instead demands veto power over derivative works, and seeks to ensure that created works accurately reflect the author. Unlike either the Lockean or the utilitarian, who argue that creation must be incentivized, the Hegelian does so almost from a defensive posture – to define the agent itself concretely in the world, rather than allow others to define the agent. This argument assumes that creation will happen, and even encourages it, but insists that the rationale behind creative works – a self-actualization solely by an agent – must remain only within the agent’s sole control. 2.3.3 Mill/Bentham: Utilitarianism The Utilitarian’s argument is perhaps the simplest of the three, and is most prominently articulated in the US Constituion, which reads, in part “The Congress shall have power . . . To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.” (Art. I, §8, Cl. 8) The utilitarian’s argument is merely that creating works takes time, and effort, and without sufficient protection, authors will have no incentive to create, and will, 15 Hughes (as in n. 8), p. 330-365. 20 Chapter 2: Copylight of the World accordingly, not. Important to this idea is that creation: artistic, literary, scientific, or technical, must be incentivized. Agents within the system do not create IP works absent these incentives, because, economically, the “costs of expression” outweigh the “costs of distribution” – in effect, because it does not make economic sense to create IP works, agents will, accordingly, not create IP works. Because IP works are held to be a nonmoral good, the utilitarian argues that the only moral route for society is to give some sort of economic incentive for IP works to be created. Futher, the utilitarian argues, the best method to incentivize the production of IP works is the limited monopoly granted by IP rights; ergo IP works are moral. 2.4 Ownership of Scripture Before we can examine the justification for Scriptural IP rights, we must first resolve one important question: Who owns the Bible? In a certain sense, this question is nonsensical — we certainly do not own the Bible in the same way that we may own even original works. The ICEL gives the following argument in answer to that question (emphasis mine): [I]n order to maintain under the civil law and international conventions the Church’s ownership of these texts used by Catholics in their worship.16 Thus, the ICEL contends that the Church owns the Bible. While this is a superficially satisfactory answer, there are two deeper questions which lie beneath the surface here. The first is who do we mean when we say “The Church”? Do we mean all of God’s children (that is, the entirety of humanity?) Do we mean the Catholic 16 International Commission on English in the Liturgy, Publication Policies of the International Committee on English in the Liturgy, Inc. (as in n. 3), p. 4. 21 Chapter 2: Copylight of the World Christian community? Or do we mean the institutional, teaching arm of the church embodied in the Roman Magisterium? The ICEL clearly has one particular view of the answer to this question. In the ICEL’s view, the Bible belongs to the institutional Church. Yet, I think a stronger case could be made for seeing church as a cipher for the entire people of God. The case for such a view rests in view of St. John’s view of Christ the Word of God. It has been understood since the earliest days of the church Christ came to redeem all people, not merely the Jewish people. Thus, it is incumbent upon the Christian Community, which has joyously received this news, to proclaim to the entire world the good news of salvation in Christ. Insofar as Christ is the Word of God and is himself the good news of salvation, then the Word of God belongs to all the people, and all people belong to the Word of God. However, the other question that must be answered is more subtle: is the word “own” the appropriate use of the word in the context of Scripture? For the ICEL, the answer is yes, but I confess that I am not quite sure. It is clear that the Bible is a gift from God; however, as stated above, that gift, if it “belongs” to anyone, belongs to the whole of God’s people. Yet, where is the Christian community and the institutional Church in this conception? Surely, as the people who recognize scripture as holy, they should have some place in this theoretical conception? My answer is yes, though the notion of stewardship. I argue that Scripture, like Christ, is a gift which is beyond our power to hold. It is given to us, and it is at the same time beyond us. Thus, it is given to the Christian community as an inheritance held in trust for the whole people of God to claim. 22 Chapter 2: Copylight of the World 2.5 Scripture and IP Rights Frameworks Given the brief systematic sketch, we should be able to determine which, if any, system seems to make the most sense when applied to Scripture. Alas, despite the copious detail of each framework, Scripture, taken seriously as the inspired Word of God does not fit neatly into any one of these systems, as we will see. 2.5.1 Scripture and the Lockean Theory The Lockean theory is based on two separate assumptions: 1. Ownership is in some way tied to labor (whether by the Labor-Avoidance theory or the Value-Added theory. 2. Property is held in common until an individual claim supersedes on the commons. Neither one of these statements is entirely defensible with regard to Scripture, but the second is much more defensible than the first. The notion that ownership is tied to labor prompts an examination of the question what is labor regarding scripture? The immediate answer for most people will be translation, and this is to be expected, given the intense amount of time, dedication and effort that biblical scholars pour into every word (and, sometimes, every letter) of the Bible in order to ensure as accurate a translation as possible. Yet, in our rush to acclaim the translators, we must not forget the primary labor of creating the bible: Authorship. Authorship with regard to the Bible is a complex thing. Any Christian will answer that the primary author of the Bible is God. Yet this is where the simplicity of the question ends. The secondary authors of the texts are presumably the manuscript authors themselves — St. Paul is rather straightforward, but also, if the documentary 23 Chapter 2: Copylight of the World hypothesis is to be believed, the Yahwist, the Elohist, the Deuteronomist and the Priestly source are the four main (if ill-understood) authors of the Old Testament. A third level of authorship rests in the editors of the same works — the priestly editors who laid out the Genesis story with two creation accounts clearly had some sort of theological agenda in doing so, and by studying their revisions we can divine it. Translators are yet another layer of abstraction added onto this complex animal, so any work done by modern translators, even if they were working only with manuscript texts and were not relying on any previous scholarship at all (a laughably naı̈ve assumption), they would, at best, appear to be only at the fourth degree of removal in this vast process of co-creation. Thus, while it’s clear that translators have some role to play in determining the IP status of the bible, to grant to them all of the benefits of several previous generations of scholarship and labor seems disingenuous. Largely, this is due to the Lockean model’s understanding of labor and work — for Lockeans, creation is like agriculture: A single person tills a field, plows, puts blood, sweat, and tears into working to soil, and derives fruit thereby. In reality, the process of translating the Bible isn’t like agriculture (or writing a novel) whose primary agent is a single person with accompanying initiative, but is in fact closer to building a road: later workers use earlier workers’ progress in order to get to their work; still later workers will build on them. The Lockean model’s other assertion is quite different, and much easier to harmonize with the Christian tradition. We have already established that, within the Christian tradition, the Bible is given to all people. This is quite comparable to Locke’s assertion that all property is held, originally, in common. Indeed, in Locke’s original Second Treatise on Government, begins with the assertion that everything is held in common because it was given to humanity by God. 24 Chapter 2: Copylight of the World It’s Locke’s second model — that individual claims, made to support oneself, can supersede the commons, that this becomes an issue. The nature of immaterial works is such that scarcity may only be artificially imposed. Thus, the ultimately altruistic basis for Locke’s argument breaks down when dealing with immaterial things. 2.5.2 Scripture and the Hegelian Theory The Hegelian theory is at once both the best and worst theory to apply to scripture. Its set of concerns are closest to the Christian community’s concerns, and yet applying it in the way it is applied to every other work would be a gross injustice to scripture. The core of Hegel’s theory is that a work by an author is an expression of an author’s personality in the world — an act of self-definition — and, therefore, IP rights are an intrinsic component of personal liberty to define oneself. Leaving aside the question of whether human beings can really define themselves, this is striking in its resemblance to normal theological discourse about Scripture: the Word of God is God’s self-revelation in the world. Much of the Hegelian theory’s concerns mirror concerns of the Christian community. Indeed, while Utilitarians and, to a lesser extent, Lockeans are concerned with deriving economic advantage from their works, Hegelians are focused exclusively on concerns of textual integrity. This mirrors ICEL’s reasoning (again, emphasis mine): The legal safeguard provided by copyrighting the texts helps to preserve their literary and liturgical integrity under the ecclesiastical authority given to the conferences of bishops by the Second Vatican Council and by subsequent instructions of the Apostolic See.17 17 International Commission on English in the Liturgy, Publication Policies of the International Committee on English in the Liturgy, Inc. (as in n. 3), p. 4. 25 Chapter 2: Copylight of the World This is precisely what the bishops are trying to affirm: Textual integrity is important, and, indeed, is why safeguards are kept on the text in the first place. However, on a theoretical basis, this line of reasoning breaks down when applied to anyone except God. A translation of many other works can be a work of art itself — Robert Fagles’s Iliad, for example, is truly remarkable, and Sir David Ross’s translation of the Nicomachean Ethics is still essential over 80 years after it was first published in 1925 — that kind of personal shaping of the text that marks Fagles’s and Ross’s work is precisely what modern Biblical commentators are attempting to avoid. While eisegesis is inevitable, and exegesis always only a possibility, great care and attention is given to make the translator’s work as transparent and unobtrusive as possible. Thus, although translations can be judged and praised, they ultimately should not be counted as primarily the work of the translator but rather of the original, primary author, which, here, is God. Alas, God cannot make copyright claims, and, despite some efforts, cannot be sued either. Ostensibly, this is where the Church can step in. Yet, this is where the Church must be very careful and very humble, if it can make this step at all — the entirety of the Hegelian argument rests upon an author objecting to others’ use of the author’s work, because, since a work is an extension of that person, those who use an author’s work are compelling the author into undesired association. Following that line of reasoning, the (presumably institutional) church, on behalf of the Living God, would be claiming that God does not desire association with someone else’s message. That’s an extraordinary claim, and it is not at all clear who would be qualified to judge such a claim. Copyrights are currently administered through our court system, but I can think of no Christian who would think that a court of law is an appropriate place for a theological debate, much less one with the force of civil law. 26 Chapter 2: Copylight of the World 2.5.3 Scripture and the Utilitarian Theory The Utilitarian theory is the most straightforward of all the theories, and the one which is most oblique to scripture. However, it must be taken seriously, because our current system of copyright law has taken this as its justification. The Utilitarian holds that copyright is nothing more than economic incentive to produce works. If people can’t derive economic advantage from producing, say, novels, then fewer novels will be written. Since we want a socially optimal number of novels to be written, we give people a temporary monopoly on their novel, in order to sell them. This produces many problems, which will be shown in a later section, but there is a major problem with applying this conception to scripture. If the Christian community has any sort of unified consensus about the Bible, it is surely that that the Bible is not just another IP work. Indeed, Christians need no external incentive to produce translations or commentary — indeed, the great commission makes it a religious imperative. What this system may do, however, is make it possible to derive income from copies of a religious text, although, as we will see 2.5.4 Scripture is its own Category As we have seen, the notions of scripture categorized in section 2.4 fits into no preconceived notion of IP rights. However, scripture does lend itself to its own set of concerns for Christians, which will be important to our ethical determination: 1. Integrity. The Christian community broadly, and the Catholic Christian community narrowly, are both very concerned to ensure the integrity of the scriptures. Any legal protections applied 27 Chapter 2: Copylight of the World 2. Access. Christians are keen to ensure access to the scriptures for anyone who would like them. While Catholic Christians are also key to ensure that appropriate pastoral direction accompanies the scriptures (since Catholics do not have the right of private interpretation), Catholics are just as eager as any other Christian group to encourage the spread of God’s Word. The key to our pastoral dilemma, then, is trying to fit these two major concepts into how the ICEL, the NCCB, and other Catholic agencies which have control over copyrights of the New American Bible and other scriptural contexts should conduct themselves. 2.6 Comparison: ICEL vs. USCCB The the ICEL and the USCCB both have copyright policies, as noted in section 2.2. What’s interesting is these policies are almost total inverses of one other. I will examine possible motivations for this split, comment on the pros and cons of each approach, and then make recommendations for synthesizing the two approaches. 2.6.1 ICEL The ICEL is a cooperative body between conferences of bishops where English is the primary liturgical language. Its explicit goal is to attempt to standardize, as much as is pastorally possible, the liturgy between English-speaking countries, in order to encourage solidarity between English-speaking countries, and a sense of community with the wider church. Indeed, many smaller countries, or countries where English is not the primary language of the liturgy, rely on larger countries (“publishing” countries) to export liturgical books, and therefore discourage regionalism in order to 28 Chapter 2: Copylight of the World minister pastorally to English speakers all around the globe. In essence, ICEL is an organization founded on coordination and cooperation, and their copyright policy reflects this focus. Their electronic copyright policy is quite liberal, and allows essentially anyone to host a web version of any ICEL text. Thus, if Boston College or another Catholic University (or, for that matter, anyone) decided it wanted to host the text of the Roman Missal, it wouldn’t even have to ask permission — they could proceed, so long as three salient points were followed: 1. No fee must be charged to access such a site. 2. ICEL’s copyright must be acknowledged. 3. The copy must be verbatim. ICEL also essentially reserves the right to revoke this permission, if, say, an anti-Catholic group decided to host material for the purposes of mockery. ICEL’s approach has a number of benefits. Its approach maximizes interchangeability, at least between web-enabled computers, and grants maximum flexibility to the faithful, and minimizes clerical oversight. Thus, if ICEL doesn’t have the time or money to extensively police sites which would want to host the Roman Missal, it can set broad guidelines, and only police those which abuse its liberal policy. The downside, of course, is the other side of its upshot — where there is great freedom, there is great possibility for abuse. 2.6.2 USCCB The USCCB, unlike the ICEL, is not a grouping of bishops’ councils, but is a council of bishops itself. Thus, the USCCB sees its primary job as pastoral direction, and exercise 29 Chapter 2: Copylight of the World of the teaching arm of the institutional church. This orientation is also reflected in their copyright policy, which they maintain over the NAB. Unlike the ICEL, the USCCB maintains comparatively strict controls over use of the NAB. While still liberal by many publishing houses’ standards, its controls are quite strict: • Only 40% of a work may consist of NAB material without written permission. • No work can contain more than 40% of a given book of the bible (which means that one couldn’t even include all of Obadiah’s denunciation of Edom). • No one else may duplicate the work done at usscb.org, which includes – Podcasting the NAB, or the Daily Readings – Posting the complete NAB or the Daily Readings The USCCB’s approach, then, is to keep as many things “in house” at usccb.org as is possible. Presumably, this is because they have spent a great deal of time maintaining a very complete and meticulous website. In a larger consideration, the bishops view their teaching role as primary, and want to ensure that, when Catholics look to scriptures, that they do so through the bishops. This approach is consistent with the Catholic approach to scriptural understanding, in that the Church is the primary locus of scriptural interpretation. However, this approach has its limitations. Notably, the faithful who want an electronic version are dependent upon either usccb.org. Those who want an electronic version in a format other than standard HTML, or who want to read the Bible on their Kindle, or in the full-screen version of their iPad either have to wait until a publisher produces a particular version. Currently, Olive Tree Bible Software produces an (admittedly 30 Chapter 2: Copylight of the World well-done, if expensive) NAB for the iPhone/iPad; Kindle users are, as of this writing, out of luck. The USCCB’s approach supports the integrity of the text, but at the expense of access to the text. Contrary to ICEL’s opinion, the american bishops’ approach seems to be “If you can’t do it well, don’t do it at all.” 2.6.3 Reconciliation Each of the two approaches treats one of the Christian concerns, and favors it over the other. While both approaches play to the strengths of the agency favoring it, there may, in fact, be a superior option that incorporates both concerns better. If priority must be given to either of the two concerns, it is better, I argue to prioritize access. Mostly, this derives from theological concern — the great commission’s evangelistic imperative is clear and unambiguous, and I am convinced that the pastoral support that an immediately accessible Bible would represent is a greater contribution than a completely whole but utterly inaccessible one. However, there is also a pragmatic dimension to such advice — US copyright law is unabashedly utilitarian in its basis (although some proponents argue for its strengthening on Lockean grounds), and many of the controls that the Hegelian authors argue for are not only absent in US copyright law, the doctrine of fair use carves out certain exceptions (e.g. the right of quotation, parody, etc.) which make policing difficult, litigious, and ultimately a distraction to the work of spreading the Gospel. A third option is to take an approach which is similar to the ICEL approach, using a selected license. Creative Commons, a foundation committed to offering alternatives to full copyright claims. In particular, Creative Commons offers an “Attribution- 31 Chapter 2: Copylight of the World Noncommercial-No Derivative Works 3.0” license, which is a legal document giving anyone the narrow freedom to make verbatim copies of a given work, provided it is properly attributed, used for noncommercial purposes, and not used to create a new work without the copyright holder’s permission. Such a middle way would strike, I argue, the best balance between accessibility and integrity — the text could be moved to whichever format is popular at the moment (.html, .tex, .epub, etc.), while still forcing the text, as promulgated by the US bishops, to remain unaltered. This does not mean, however, that the work of the USCCB should be wasted, or that Catholics should not look to their bishops when interpreting Scripture. usccb.org is one of the best Catholic websites on the web; it just shouldn’t feel that it must be the only good Catholic website. 32 Chapter 3 Cosmopoesis: A Theological Interpretation of Information Ethics 33 Chapter 3: Cosmopoesis 3.1 The Ontology of Goodness Luciano Floridi’s Information Ethics project is based around a fundamental axiom: that being has a fundamental value over non-being.1 At first glance, this assertion doesn’t appear to be controversial, but the precise meaning of it reveals how extraordinary it is. The salient definition of being here does not mean the binary condition of either existing or not existing; rather, Floridi is viewing being through an Informational level of abstraction. Information and being are correlated together — information here meaning something more akin to “structured existence” rather than existence itself. Floridi’s system has a base observation, and a basic value judgement, from which it derives all further ethical conclusions: 1. Inforgs exist 2. Ceteris Paribus, this existence is a good thing 3. Therefore, existing inforgs have “a Spinozian right to persist in its own status, and a Constructionist right to flourish, i.e. to improve and enrich its existence and essence.2 ” While it is true that all philosophy must begin from some postulates, and this is a well-developed set of postulates, it is ultimately unsatisfying to the theologian. For a Christian, God is both good and the source of goodness, so any reference to goodness absent a reference to God is incoherent for a theologian. Thankfully, however, Floridi’s second postulate isn’t difficult to connect with a notion of God; indeed, it actually flows quite well from traditional understandings of God, albeit understood in a new, informational way. 1 2 Floridi, ‘Information Ethics: Its Nature and Scope’ (as in n. 3), p. 47. Ibid., p. 48. 34 Chapter 3: Cosmopoesis 3.1.1 God the Sustainer The metaphysical properties of God are a subject of considerable confusion and controversy within Christian theology. While there are three major properties in the traditional theistic formulation (omnipotence, omniscience, and omnibenevolence) which have bedeviled believers tackling theodicy since the beginning of theological discourse, there is another, less prominent attribute of God in the Christian tradition which dovetails well with an informational perspective. This is God as sustainer — the guarantor of being. In this view, existence itself is the result of the continuing action of God. Since God’s actions are, by definition, good, existence is therefore good. Taken informationally, this view means that information is nothing short of the product of God’s actions, and, in some sense, the continuing presence of God. This assertion is not given as much prominence in the west as it is in the east, especially in Hinduism, where Lord Shiva’s primary attribute is the sustainer. However, a Judeo/Christian version of this notion finds its basis both in Scripture and in the broader tradition. St. Paul’s Speech in the areopagus in the Acts of the Apostles is especially noteworthy: For “In him we live and move and have our being”; as even some of your own poets have said,“For we too are his offspring.” (Acts 17:28) The context of this verse is Paul speaking to the stoic and epicurean philosophers in Athens, proclaiming to them the gospel of Christ, whom he sees as the “unknown God” which the Athenians have dedicated an altar to in the Areopagus. Paul brings a Judaic reading to a quote from a (lost) Greek poem, and it is the final word of the poem, “esmen” which is the crucial hook. While its proper interpretation of whether or not it connotes participation or merely dependence3 on the divine life, either reading 3 Luke Timothy Johnson; Daniel J. Harrington, SJ, editor, The Acts of the Apostles, Volume 5, 35 Chapter 3: Cosmopoesis adequately emphasizes God’s role as sustainer of being for this argument. St. Augustine also mused on this topic in the opening paragraphs of his Confessions: [S]ince without thee nothing would be which does exist . . . Therefore I would not exist – I would simply not be at all – unless I exist in thee, from whom and by whom and in whom all things are.4 Here, the Doctor of Grace is much more direct than St. Paul. He directly states that his existence must be due to some minimal participation in the divine life. God’s own action sustains Augustine’s being, and he credits God’s grace with sustaining his own life. This is quite consistent with Augustine’s litany throughout the entire sum of the Confessions that all goodness ultimately derives from God’s own actions. 3.1.2 Meonic Evil The postive assertions are actually the contrapositives of Floridi’s main arguments. While I have heretofore argued about Floridi’s positive assertions, most of his ontology of Good has actually been an ontology of evil, or, more accurately, an ontology of entropy, which he sees as synonymous with evil. Of his four famous laws, three are all formulated to deal with minimizing entropy. This view is a platonic one, which finds evil as the absence of being. Such a view is quite common in the Orthodox east, where evil is said to be meonic, which is greek for “anti-being”5 . The whole sum of this theological reading gets at the core Floridi’s reasoned critique of environmentalist ethics — that the kind of prima facie dignity granted to Sacra Pagina, (Liturgical Press, 1992), p. 316. 4 St. Augustine; Albert C. Outler, editor, Confessions and Enchiridion, Volume 7, Library of Christian Classics, trans. by Albert C. Outler (Westminster Press, 1955) hURL: http://www.ccel. org/ccel/augustine/confessions.htmli, pp. 16-17, I.ii.2. 5 Stanley S. Harakas, Toward Transfigured Life: The Theoria of Eastern Orthodox Ethics, (Light & Life Publishing Company, 1983), p. 34. 36 Chapter 3: Cosmopoesis life in environmentalism is quite proper, but that it doesn’t go far enough. Floridi argues for moving the locus of ethical concern outward even farther than environmental ethics has moved it. Environmentalism sought to move ethics from anthropocentrism to biocentrism, Floridi’s argument is to move from biocentrism to ontocentrism. In a purely secular arena, such an assertion may well be quite controversial, but in a Christian setting, arguing that the presence of God is preferable to God’s absence — the core of this reading of Floridi — is not only uncontroversial, it is tautological. 3.2 Homo Poieticus: Christianizing Floridi’s Philosophical Anthropology 3.2.1 Floridian Anthropology The definition of Good and Evil demonstrated in the previous section relates directly to Floridi’s philosophical anthropology. Floridi first begins by examining a seemingly marvelous property of living things, and humans in particular: we are able to, at least locally, reverse entropy’s effects, and create order from disorder. Thermodynamically, of course, this is impossible — expenditure of energy inevitably means that net disorder increases. However, since Floridi means something more akin to the popular, rather than the thermodynamic definition of entropy — a corruption of information, rather than a measure of disorder — the gains we are able to make are real, albeit temporary. In particular, this anti-entropic characteristic is the single most essential thing about humanity. In particular, Floridi contends that there are three major ontic powers which humanity possesses: 37 Chapter 3: Cosmopoesis 1. Control 2. Modelling 3. Creation The critical things about these powers is that they are ontic — that is, that they represent an ability to affect the nature of things. Floridi’s critique of virtue ethics is that it describes only what happens when these powers are reflexively directed, rather than being extended outward towards society and the world at large. Ethics consist not merely in proper formation of the self (egopoiesis), but also proper formation of society (sociopoiesis) and perhaps even proper formation of the world at large — a concept we will return to in a moment. 3.2.2 Christian Anthropology As with many things dealing with a religion spanning three millennia, there is a great deal of difficulty in making sweeping declarations about what a broadly “Christian” anthropology is or might be. However, there are a few salient characteristics which can be marshaled for the sake of this argument. A great deal of Christian anthropology has been a continuing exegesis on Genesis’s creation narratives: the priestly account (Genesis 1-2:4a), and the yahwistic account (2:4b-3:2). While most of modern biblical scholarship holds that they were written by two different authors, and were later combined by a later redactor, we can still assume that the two accounts, while separate, both contain core points which must be harmonized in any coherent Biblical worldview, even if such harmonization dispenses with a literal hermeneutic. 38 Chapter 3: Cosmopoesis Priestly Account The priestly account is notable for its heavy use of repetitious, liturgical language. One of the refrains, which happens after almost every one of God’s creative acts, is that “God saw that it was good.” Such an affirmation has been the source of notions of the dignity of creation throughout most environmental theology. It is also the foundational place for any theology of creation — at least at some point, creation was good. The continuing question comes later, when trying to harmonize the Priestly account with the yahwistic account: does the fall of man alter creation’s dignity? While early christians may well have affirmed such a stance by following St. Paul, and seeing anything worldly as in opposition to things of the sprit. However, modern reflections have refined the understanding of the fall — while the sins of our forbears may well have done violence to human nature, creation’s dignity wasn’t fundamentally altered. With the previous discussion of the ontology of evil, it is easy to see how — if part of that dignity is the continuing presence of God, then it is difficult to affirm that anything can be completely corrupted, especially the inanimate. Another major point is that God creates man in “our image and likeness.” While legions of theologians have been trying to explicate the very mysterious phrase, it is understood that this sets humans apart from the rest of the created order — only we have been created this way, and there are is also an implication that such a state is superior to other created beings. Accordingly, there is a tendency to see those things which separate us from other “lower” beings as being constituent in what the image and likeness of God is. Finally, God says to human beings, “. . . [H]ave dominion over the fish of the sea and over the birds of the air and over every living thing that moves upon the earth.” (Genesis 1:28). This passage, which at one point was interpreted to mean that the 39 Chapter 3: Cosmopoesis created world was created for humanity’s exploitation, more modern reflection has replaced the notion of king (the logical antecedent to dominion) with the equally biblical notion of steward. Humanity is therefore seen not as despots ruling over the created order, but rather as viceroys, in place until the true king — Christ — returns. Yahwist Account The Yahwist account is the familiar story of the creation, flourishing, and eventual downfall of the archetypal first humans, Adam and Eve. The fall is the great theological grist of the passage, and arguably most of western theology has been continual examination and reexamination of this passage’s connection to the Gospels. However, the salient passage here is not the actual fall, but is considerably earlier in the story, in Genesis 2:19. God, having decided that Adam needs a companion, brings all of the animals to the (as yet unnamed) man. What happens next is one of the most extraordinary things in the entire passage. God allows the man to call each beast by a name that the man gives to it. By any reckoning, this is a seriously important passage to the theological anthropology of the Bible. God voluntarily relinquishes the authority to name his own creation, and instead gives that authority to Adam. As usual in Biblical interpretation, there is a deeper dimension to this act. Rather than giving to the man mere autonomy over language (so that Adam would decide what he would call the animals; essentially a form of taxonomic nominalism), God instead gives Adam control over what the name the animal will actually have. Broader than the mere ceding of divine authority (and, make no mistake, that is an enormous decision), is how this affects the character of Adam, and, by the same theological extension that arrived at the doctrine of original sin, humanity as a whole. In short, it is the beginning of Adam’s ontic powers. 40 Chapter 3: Cosmopoesis 3.2.3 Reconciling the Floridian and Biblical accounts God grants human beings authority in both the priestly account and the yahwistic account. In the Priestly account, God says to human beings, “. . . [H]ave dominion over the fish of the sea and over the birds of the air and over every living thing that moves upon the earth.” (Genesis 1:28) The yahwistic account gives the power to name (semantic authority) to Adam, which God voluntarily cedes to humanity. These are also the only authority given to people in either account, so it is not a stretch to assume that the “dominion” over creation given in the priestly account is deeply related to the nominative authority granted in the yahwistic account. The nominative authority granted to Adam must therefore be deeper than mere language. Reflection on the meaning of the verb “to name” reveals that implicit in semantic authority also includes the ability to categorize, to systematize, to order, and to generalize — in short, to reason. Thus, implicit in Genesis’s nominative authority is the gift of reason to human beings, something which must speak to modern readers deeply. This also has deep ethical implications — reasoning, far from being a theologically suspect activity, is, in a very profound sense, a constituent of human flourishing, and therefore commanded by God. This also dovetails well with the notion of ontic powers that Floridi attributes to human beings. If we are able to affect things at a deeper level than mere linguistic labels by means of reason, then it is perfectly rational to associate our semantic authority with our ontic powers. In fact, this sort of semantic authority can be shown to cohere with each of Floridi’s three primary ontic powers of humanity. 41 Chapter 3: Cosmopoesis Modeling While modeling is the second of Floridi’s three powers, it is easiest to tackle this first. The most important notion one must remember about Floridi is that he is an epistemic constructivist as well as an ethical constructivist. For Floridi, reality-in-itself is a black box; its ultimate secrets fundamentally inaccessible to us. However, using the celebrated method of levels of abstraction, we can construct models of reality. While our models are not guaranteed to be true in the sense of corresponding to ultimate reality (thus retaining epistemic fallibilism), our models can be built and refined to correspond to observable reality at a given level of abstraction. Newtonian physics as a model for reality is quite consistent with reality at a human-scale level of abstraction, but breaks down at the cosmic and the quantum scale. Likewise, special relativity and quantum mechanics are (developing) models of reality at their respective levels of abstraction. Thus, when Floridi grants to humans the ability to model, what he is really granting is an epistemic ability. To be able to model is to be able, in whatever sense the word can be applied, to know. Therefore, the assertion that humans have a unique ability to model is a restatement of our ability, unique among inforgs, to understand our surroundings. This epistemic step is the one most intimately connected with our semantic authority, since the ability to use language is what gives us this ability to reason in the first place. Models, in large part, are semantic objects — they are constructed out of language — be that language mathematical or prosaic. An authority based in language as a divine gift leads directly to a unique epistemic access to a closer approximation of truth. This also provides a convenient demarcation line between human beings and other inforgs — artificial and natural alike. While artificial agents can be models themselves 42 Chapter 3: Cosmopoesis (e.g. a weather forecasting computer model), the kind of privileged epistemic access that allows meaningful information to be gleaned from such a model is reserved to humans alone. As a result, moral responsibility — as Floridi has maintained — remains with humans alone. On the other hand, moral accountability — the ability to produce entropy, and therefore evil — is not contingent on understanding or intention, and can therefore be attributed to artificial agents. Control From understanding comes control. It’s important to differentiate here between two types of control. Obviously, all inforgs have some limited ability to affect their environment; without it, they could not be dynamic organisms — at best, they would be mere passive participants in the world around them. But there remains a difference between the limited control that most inforgs are able to exert over their environment, and the deeper control that humans have, which derives, ultimately, from our semantic authority. Our models — an ability proper only to human beings — grant us a similarly privileged, albeit limited, ability to control our environment. All living things, for example have the ability to search and hunt for food, but humans have a detailed model of ecology and agriculture, which allows human beings to appropriately alter our environment to grow our own food. Without understanding, the ability to control that inforgs have is severely curtailed. Indeed, much of this control — or, in Biblical language, dominion — ultimately derives from our ability to understand our surroundings, and thereby rule it. 43 Chapter 3: Cosmopoesis Creation The final power Floridi attributes to human beings is creation. In many ways this element of creation is both the source of his name for humans (homo poieticus), but is also more profound than that. Creation is also the final extension of human beings’ powers of control. While a sufficiently detailed model of agriculture is enough to tend a small vegetable garden and make it prosper with merely rudimentary tools, modern agriculture is a truly extraordinary effort, which requires very sophisticated, monumental tools. For this, we need machines — other inforgs — whose sole purpose is to accomplish the task we have set out to do in accordance with our model. Thus, our powers of control are most augmented by our ability — unique among inforgs — to spawn separate inforgs to accomplish our goals. This seems straightforward enough — after all, in order to plow a field, humanity first used crude tools, then used those same tools to fashion better tools, and so on. Sharpened sticks gave way to plows, which in turn gave way to specialized tractors, which can plow extraordinary expanses at once. But this seems to stretch our theological definition — semantic authority may well account for our ability to model, and through those models, control. But from where comes our ability to create? The answer is, in short, semantic authority doesn’t guarantee our ability to create. What does allow us the ability to create is our creation in the image and likeness of God. God is the first creator, and, as discussed before, existence is, at some minimal level, the continuing presence of God. Therefore it makes sense that semantic authority would not enable creation, since it is a theological tautology that only God can make God present in the world. This does run against some currents in Floridi; indeed, his Homo Poieticus was initially developed as a response to modernism’s proclamation of, among other things, 44 Chapter 3: Cosmopoesis the death of God6 . This is rather problematic for those who reject the divine obituary. However, it need not be cause for abandoning the project of harmonization. It simply requires a reframing of human capacities. Christians must reject the notion of humans’ being a demiurge – though Floridi emphasizes the original, Platonic meaning of the word, it is difficult to see how flawed humanity would not ultimately become demiurges more in line with the Gnostic conception. However, the same sentiment — a kind of radical awakening to agency, on a scale not dissimilar to the Enlightenment motto sapere aude, can still be taken to heart, albeit with a motto like concipere aude. Rather than taking God’s place due to a vacancy in the office of Creator, we must awaken to our own radical agency alongside God in bringing about the Kingdom of God. What it means to be created in the image and likeness of God is an ability to participate, in some way, in the divine life. Given a standard trinitarian description of the Trinity as comprised of Creator, Redeemer, and Sanctifier, participation in the Divine life allows human beings to be co-participants in these three divine activities — creation, redemption, and sanctification. Creation we have explored here; redemption and sanctification we will explore in the next section. 3.3 Cosmopoiesis: The Information Ethics Teleology and Eschatology Having established a solid ontology of goodness, as well as an anthropology, we can now tackle two separate but intimately related topics: the eschatology and teleology of the information ethics project. As with the theological anthropology, we must first establish two separate escha6 Luciano Floridi, ‘Two Approaches to the Philosophy of Information’, Minds and Machines, 13 (2003), p. 464. 45 Chapter 3: Cosmopoesis tologies: Floridi’s, and a traditional Christian view, and then seek to harmonize the two. 3.3.1 Information Ethics Eschatology The information Ethics eschatology primarily deals with entropy. While Floridi has said repeatedly that IE’s conception of entropy is not the technical definition, the similarities are marked and intentional. In both cases, entropy is “fated to win” — that is to say, all order, and thus all information, will (eventually) be destroyed on a cosmological time scale. In Floridi’s understanding, however, this ultimately pessimistic stance is not, in fact, a cause for nihilism. Rather, our moral agency as sentient inforgs confer upon us a special status. There are two wrong ways for anti-entropic agents to understand Entropy’s inevitable victory. They can passively accept the death of the Universe as inevitable and unchangeable fact, and therefore not worthy of effort to ontically change. This might prompt a terrifying sort of Nietzchean nihilism. Conversely, it could also prompting a vain effort to prolong the death of the universe. To quote Dylan Thomas, these agents should Do not go gentle into that good night. Rage, rage against the dying of the light. For Floridi, both approaches are wrong. The proper way is to help to facilitate this death in the most gracious way possible. Ethics, then, is a sort of ars moriendi for the universe — comparable to Jeremy Taylor’s famous Holy Dying. Since failure is inevitable, the important thing is graceful failure of the universe. In this sense, the anti-entropic agent isn’t trying to remove all entropy from the infosphere, since that, writ large, is impossible. Rather, the anti-entropic agent’s goal is to target her (limited) 46 Chapter 3: Cosmopoesis ontic powers to ensure that the failure of some inforgs does not catastrophically impact others. 3.3.2 Christian Eschatology Like the previous discussion of Christian anthropology, it is difficult to come to any sort of concrete points of agreement within a movement as diverse, and as old, as Christianity. eschatology, however, is uniquely difficult to generalize; while everyone agrees that anthropology is a critical topic, because of its direct effects upon the most critical subject of all in Christian Theology — soteriology. However, the relative importance of eschatology, especially cosmic eschatology as opposed to personal eschatology, is a matter of debate. The concerns about eschatology, if not the systematization thereof, was clearly very important to the early church, which, following St. Paul, expected the second coming in the imminent future. Sts. Peter and Paul both fully expected to see Christ’s return within their own lifetimes, and some of their admonitions (especially Paul’s), reflect that fact. Indeed, it’s not difficult to see how a simple reading of the gospel would give a great deal of credence to that reading. However, as time went on, it became clear that the parousia was not quite as imminent as early Christians believed. Indeed, much of the interest in the Cosmic eschatology was shaped by intense persecution, and a desperate desire to see divine retribution for a litany of heinous crimes. As Christianity went from being outlawed to officially sanctioned with Constantine’s conversion in 312, and from sanctioned to established with the edict of Thessalonica in 380, Christianity underwent a radical change. As Christendom became the official religion of the Roman empire, injustices did 47 Chapter 3: Cosmopoesis not cease, but the people committing them did. Thus, Christian longing for a great righting of wrongs changed from wanting God to judge a whole city or nation of oppressors (i.e. Pagan Rome) to wanting God to judge individual oppressors (i.e. a cruel magistrate, etc.); As a result, emphasis shifted away from a cosmic eschatology — the great final judgement, where Christians as an oppressed minority would be vindicated — to a personal judgement — where believers would be vindicated as part of a victorious collective; the church militant. This split in emphasis persists into the modern day, where two separate groups of Christians have two very different views on the importance of cosmic eschatology — Evangelicals, broadly, tend to see the cosmic apocalypse as a very important topic for reflection, going into great detail about theories like “the rapture,” and even going so far as to explore that theme in a series of popular novels.7 Mainline Protestants and Catholics, on the other hand, tend to focus on individual questions of salvation; and see the interpretation of apocalyptic prophecy as a difficult business, and not one terribly relevant to the life of the church. Thus, since consensus is difficult to find, the only real concrete point of agreement in cosmic eschatology seems to be the anticipation, however distant, of a concrete, temporal end of history. Indeed, parts of the Synoptic gospels (c.f. Matthew 24:43-44; 25:1-13) seem to indicate this, as well as St. Paul’s writings (I Thessalonians 4:13-18) seem to indicate that, at some point in the hazy, indistinct future, there will be a second coming, and a specific time at which history will end. 7 c.f. Tim LaHaye and Jerry B. Jenkins, Left Behind: A Novel of the Earth’s Last Days, 1st edition. (Tyndale House, 1996) 48 Chapter 3: Cosmopoesis 3.3.3 Harmonizing Information Ethics and Christian Eschatology Coming to a harmony between these two points of view is difficult, since philosophical reasoning about the end of history is necessarily speculative, and prophecy interpretation is difficult to do even in retrospect, let alone in prospect. Thus, it’s difficult to say anything with certainty about the ultimate fate of the universe. However, such definitive statements are not what is required in order to be a Christian information ethicist. Rather, it is only sufficient to show that the two views do not contradict one another, and that it is therefore possible to affirm both at the same time. The best way to do this is to show how the Christian view can be compatible with the information ethics view. Although it is easy enough to conclude from the Parable of the Virgins (Matthew 25:1-13), and, especially, the Parable of the Thief (Matthew 24:43-44), that Christians are to expect an unexpected parousia, one major verse within Matthew’s apocalyptic discourse seems to contradict that view: “Heaven and earth shall pass away, but my words shall not pass away.” (Matthew 24:35) In the context of the apocalyptic discourse, it serves as a highlight to the major emphasis of the passage — that the second coming’s arrival cannot be predicted; the Matthean Jesus even goes so far as to say that no man knows the time of the parousia, and implies that even he doesn’t know the time of the arrival (Matthew 24:36). By indicating that heaven and earth — here taken to mean the whole of creation — will pass away, Matthew’s author seems to allow that the parousia may well be delayed until the end of time as we understand it. So, if we permit that the delay of the parousia may well arrive at the triumph of entropy, how does this affect the ethical life of the Christian? Can the notion of 49 Chapter 3: Cosmopoesis palliative care for the universe developed by Floridi be reframed in Christian terms? And whence the Resurrection? Both of these concepts can be explained with reference to the anthropology developed in the previous section. As beings created in the image and likeness of God, we are imperfect co-participants in the divine life. We have already shown how we are co-participants in the divine life of the Creator; the important question now is how we are co-participants in the divine life of the Redeemer and the Sanctifier. In order to be able to adequately argue that we can be co-participants in this way, it is better to understand, informationally, what we mean by these terms. Redemption is fundamentally concerned with the idea that, in the primeval disobedience, humanity lost its connection with the divine (as described in the Yahwistic creation story above). While in the past, the primeval disobedience had been blamed for introducing evil writ-large into the cosmos, more recent reflection along with the environmental movement has reaffirmed the dignity of creation, and has therefore limited most of the spiritual violence associated with the primeval disobedience has been primarily confined to humanity. Redemption, then, is the divine process of restoring what was lost as a result of the primeval disobedience. Our participation in the divine life of the Redeemer (the second person of the trinity) amounts to the role of our free will in our own salvation — a topic which has been far more extensively covered by far more eloquent theologians. The life of the Sanctifier, on the other hand, is much more interesting from an informational point of view. Sanctification, unlike redemption, applies to all inforgs, rather than just humanity. Sanctification — the process of becoming more holy — is a process of becoming closer to God. Since we have already identified that at least part of that participation is the literal presence of God in the world as expressed through inforgs’ structured existence, this leads to the synergy between the Information Ethics 50 Chapter 3: Cosmopoesis approach and the theological approach — that our participation in sanctification is the removal of entropy and the expansion of structured existence and, therefore, divine presence. This provides a theological grounding to Floridi’s four laws, provided that Sanctification, or at least our own participation in such, is regarded as an imperative. Such an imperative can be grounded in, and is at least part of, the true meaning of the evangelical imperative that the Gospel imposes upon the faithful. However, the true depth of such a conviction is broader than it may appear at first blush. Floridi’s ontocenric ethic has much to teach a tradition which has traditionally framed its questions in anthropocentric terms. However, Floridi’s work also exploded the proper scope of ethical action. Far from merely trying to shape ourselves, our family, our society, or even our planet, the proper locus of ethical concern is the infosphere, or, in theological terms, the entirety of creation. This is the real extraordinary leap that Floridi’s ethics can teach us. The explicit refocusing of ethical concern to include the whole of the created order is almost unprecedented, and Floridi is certainly the first to develop a philosophy which has made such case explicit. The best distillation is from the late Romanian Orthodox priest Ion Bria: “The cosmos is becoming ecclesia”8 . Such a formulation encapsulates the essence of Floridi’s project — the proper understanding of ethics is not merely the proper formation of the self, or society, or even biosphere. Since ethics should be ontocentric, the proper understanding of ethics is the proper formation of the created order itself. Such a notion gives rise to its own term — not egopoiesis, or biopoiesis, but cosmopoiesis. 8 Emphasis in original; Stanley S. Harakas, Toward Transfigured Life: The Theoria of Eastern Orthodox Ethics, (Light & Life Publishing Company, 1983), p. 31 51 Chapter 4 Mercy and Justice in Robot Ethics: A Christian Approach Power without love is reckless and abusive, and love without power is sentimental and anemic. Power at its best is love implementing the demands of justice, and justice at its best is power correcting everything that stands against love. Dr. Martin Luther King, Jr. Where Do We Go From Here: Chaos or Community? 52 Chapter 4: Mercy and Justice in Robot Ethics 4.1 Introduction We are entering a new age of warfare. While the ages of the archer, the knight, the cannon, the bomber, and the nuclear warhead have each in turn presented themselves to humanity, we are entering the age of a new type of weapon: the robot. Robots have been a staple of science fiction since at least the 1920s, when Karel Čapek coined the term in his play R.U.R. (Rossum’s Universal Robots), but the idea of an artificial human being goes back at least as far as they myth of Talos (τ άλως), the man of bronze who guarded the island of Crete from the argonauts. Despite dreams that such artificial warriors or mechanical marines might actually supplant traditional armed forces, this reality is only now coming to fruition. The reasons for this delay are manifold — the difficulty of making delicate computer systems sufficiently rugged to exist within the harsh environments of the battlefield, the difficulty of certain computer problems, and the expense, until recently, of processors capable of handling such problems in a reasonable amount of time. However, at the dawn of the 21st Century, the barriers to robots on the battlefield finally appear to be coming down. The Christian community has had a long history of influential reflection on war and peace. Indeed, even avowedly secular philosophers cite church fathers like Augustine when trying to comment on contemporary developments at the Pentagon. More recently, the United States Conference of Catholic Bishops, at the height of the cold war, released the pastoral letter “The Challenge of Peace1 ,” dealing with the horror of the nuclear arms race — an example of political religion which helped to turn public opinion, broadly speaking, against unbridled accretion of nuclear arms. This paper will attempt to bring a Christian perspective to troubling ethical 1 United States Conference of Catholic Bishops (as in n. 5). 53 Chapter 4: Mercy and Justice in Robot Ethics questions raised by the use of robotic warfare. In particular, we will consider the following major questions and sub-questions in turn: 1. Are Semi-Autonomous robots ethical to deploy on the battlefield? (a) If so, how can they be ethically deployed? 2. Are Autonomous robots ethical to deploy on the battlefield? (a) If so, what architectural constraints should be placed upon their design to ensure an ethical robot? 4.2 Christian Foundations Before going too deeply into the topic at hand, it is necessary to clarify a few things from the beginning. First, the Christian tradition, like any tradition that spans millennia, does not speak with one voice on matters of peace and war. Indeed, there are three distinct Christian perspectives on war and peace2 , each of which draws on a separate part of the tradition: 1. Holy War, or Christian Triumphalism 2. Christian Pacifism 3. Just, or Limited War 4.2.1 Holy War Some voices in the Christian tradition have seen it as endorsing violence in certain situations. Drawing on Old Testament sources which portray Yhwh as a mighty warrior, as well as apocalyptic literature on the New Testament3 , some Christians view 2 James A. Reimer, Christians and War: A Brief History of the Church’s Teachings and Practices, (Fortress Press, 2010). 3 Ibid., pp. 17-19, 36-39. 54 Chapter 4: Mercy and Justice in Robot Ethics war as a positive thing, embodying the struggle of righteousness against corruption. Historically, this line of thinking reached its apogee in the Crusades — a series of theopolitical wars launched by Christian europeans in the 11th , 12th , and 13th century against the Muslim inhabitants of present-day Israel/Palestine. However, growing modern consciousness about the horrors of war — especially in the aftermath of the first and second world wars, and the enormous casualties that resulted — have qualitatively changed the religious and political discourse surrounding war, especially in the United States, the world’s sole remaining superpower4 . In modern America, this kind of Christian triumphalism is usually limited to conservative Evangelical protestants. In the face of the extended conflicts in Iraq and Afghanistan, even evangelical thought may well be shifting. The extreme limitations of this view, then, prevent it from being the basis upon which this paper can be based. 4.2.2 Christian Pacifism Diametrically opposed to Holy War is the viewpoint of Christian pacifism. These Christians take Jesus’s admonition to turn the other cheek5 quite literally, and argue that it is morally indefensible to pursue violence of any kind – whether offensive or defensive, retaliatory or peremptory. Like the crusader point of view, this view has traditionally been held by a minority of Christians throughout history, most recently by the Mennonites, Quakers, and other anabaptist groups. Indeed, many of these smaller groups oppose extensive involvement between Christians and the wider society, adopting the model of what H. Richard Niebuhr called “Christ against culture,” and tend to regard violence as the inevitable result of attempting to mix the fundamentally incompatible demands of Christianity 4 Lisa Sowle Cahill, Love Your Enemies: Discipleship, Pacifism, and Just War Theory, (Augsburg Fortress, 1994), p. 1-14. 5 c.f. Matt. 5:39 55 Chapter 4: Mercy and Justice in Robot Ethics and government. Unlike the triumphalist position, which has largely fallen out of favor in the wake of WWI and WWII, Christian pacificism’s voice has only gotten stronger. While still a minority position, the arguments of Christian pacifism have convinced notable ethicists like Lisa Sowle Cahill that the only two defensible stances of Christians and war are pacifism or a limited war view. Even the Roman Catholic Church, the birthplace and bastion of the just war view, have voiced respect for the strength of Christian pacifist’s convictions.6 However, to adopt this view is ultimately to abdicate pastoral responsibility for guidance on the use of force. In some cases, this can be justified — the United States Conference of Catholic Bishops, in their letter The Challenge of Peace 7 famously adopted what is essentially a pacifist stance on the use of nuclear weapons, declaring that nuclear weapons so grossly violate the principle of proportionality inherent in just war theory that they could not be used justly, and they therefore declined to give guidance on their appropriate deployment; instead arguing only for an absolute prohibition on their use and for gradual worldwide nuclear disarmament. The salient question regarding robotic ethics, then, is whether the use of robots poses such a grave threat that pacifism is the only ethical alternative. This is a contested question, and serious voices, including Peter Asaro, Noel Sharkey, and Robert Sparrow8 have argued that there are such issues. 6 United States Conference of Catholic Bishops (as in n. 5), ¶119, p. 37. Ibid., ¶142-177, pp. 44-56. 8 Asaro; Noel Sharkey, ‘Cassandra or False Prophet of Doom: AI Robots and War’, Intelligent Systems, 23 (2008):4; Robert Sparrow, ‘Killer Robots’, Journal of Applied Philosophy, 24 (2007):1 hURL: http://www.sevenhorizons.org/docs/SparrowKillerRobots.pdfi. 7 56 Chapter 4: Mercy and Justice in Robot Ethics 4.2.3 Just, or Limited War The final position, and the one which has the widest acceptance, is the notion of just or limited war. Fundamentally, the Just War theorist argues that, at least in certain situations, war is ultimately the lesser of two evils. While the just war theorist does not celebrate war in the manner of the triumphalist, and views violence as at least prima facie morally unacceptable, but perhaps necessary by the principle of minus malum. Furthermore, just war theory prescribes certain constraints on warfare in order to circumscribe its destructiveness (hence, the limited war sobriquet). Modern just war theory has three major branches: Jus Ad Bellum — Proper conduct in the declaration of war Jus In Bello — Proper prosecution of war itself Jus Post Bellum — Proper conclusion of war and reestablishment of peace While the ethics of robots touch all three options, this paper will focus on Jus In Bello concerns. Within Jus in Bello, there are three major criteria according to traditional theory9 , with the recent addition of a fourth10 : 1. Commensurability of Means to Ends 2. Proportionality of Means to Ends 3. An Absolute Prohibition of targeting Noncombatants 4. Respect for International Law Overall, this principle is an attempt to balance justice — the defense of the weak, and a respect for, and pursuit of, the common good — with the demands of mercy, 9 St. Thomas Aquinas; Kevin Knight, editor, Summa Theologica, trans. by Fathers of the English Dominican Province Second and Revised edition. (1920) hURL: newadvent.org/summa/i, Secunda Secunda Partis, 40, 1. 10 Reimer (as in n. 2), p. 74. 57 Chapter 4: Mercy and Justice in Robot Ethics which far beyond mere clemency, is the responsible use of power by those who have it. Thus, just war is always a delicate balance — an attempt to always choose the lesser evil, and balance justice and mercy. The question before us, then, is which stance to take: pacifism, or just war?. Two major guides are instructive. First, robotization appears to be inevitable, and so to adopt a pacifistic stance toward robotic warfare is, to quote William F. Buckley, “standing athwart history yelling ‘Stop!”’ This is not necessarily a bad thing — the US bishops famously could find no adequate justification for the use, or even the threat to use nuclear weapons11 , and therefore tolerated them as a deterrent only under duress, and advocated drawdown and eventual disarmament. With the collapse of the Soviet Union, the sole justification for the United States’ extensive nuclear stockpile has collapsed along with it, and the bishops now advocate nuclear drawdown. However, robotic warfare does not appear to present the same sorts of challenges that nuclear weapons do. The bishops’ principal objection to nuclear weapons was how seemingly disproportionate they were, as well as their indiscriminate nature, both of the weapon itself as well as the inevitable fallout. However misguided the attempt to build a mechanical marine may be, it does not appear, prima facie to present the same sort of risk of indiscriminate destruction that characterizes nuclear weapons. With this in mind, to adopt a pacifist stance and declare these weapons verboten appears to be somewhat misguided, as well as an abdication of pastoral duty. The drive for mechanization does not happen in a vacuum, and while these weapons present ethical challenges, they also improve upon earlier weapons — something we will examine later in the paper. For the moment, then, this paper will assume a just war stance for pragmatic, pastoral reasons. 11 United States Conference of Catholic Bishops (as in n. 5), p. 44-56. 58 Chapter 4: Mercy and Justice in Robot Ethics 4.3 The Problem Why mechanize the army at all? Why spend billions of dollars in order to build machines which do the jobs of regular soldiers? One reason among many, but the one most often cited by proponents of mechanization, is that Jus in Bello is difficult, and seemingly getting harder. In 2006 and 2008, the US Surgeon General’s office commissioned two major reports from the Mental Health Advisory Team on the mental health of soldiers in Iraq during the years 2005-200712 and 2006-200813 , respectively. For the first time in a conflict since WWII, the team examined unethical behavior in Soldiers and Marines, and the results were disturbing. As is evident from the figures, the attitude of soldiers and marines toward noncombatants (Iraqi civilians) as well as their behavior speaks volumes about how even the most well-trained military in the world has difficulty prosecuting war ethically. It is in the face of this situation — the fact that even a highly-trained, professional military has difficulty conducting war ethically, that the advocates of robotic war step to the forefront. They claim that passionless robots, not animated by the dreadful human impulses toward revenge or bloodlust would allow war to become more surgical, more precise, and, hence, more ethical1415 . The question this chapter will scrutinize, then, is the claim that robots can, in some circumstances, act more morally than humans, or at least allow humans to act 12 Office of the Surgeon Multi-National Force-Iraq and Office of the Surgeon General, United States Army Medical Command, Mental Health Advisory Team (MHAT) IV: Operation Iraqi Freedom 05-07, (United States Army, November 2006) – Technical report. 13 Idem, Mental Health Advisory Team (MHAT) V: Operation Iraqi Freedom 06-08, (United States Army, February 2008) – Technical report. 14 Ronald C. Arkin, Governing Lethal Behavior in Autonomous Robots, (Chapman & Hall, 2009), p. 29-36. 15 John P. Sullins, ‘RoboWarfare: can robots be more ethical than humans on the battlefield?’ Ethics and Information Technology, 12 (2010):3 hURL: http://goo.gl/aMOcji. 59 Chapter 4: Mercy and Justice in Robot Ethics 38% All non-combatants should be treated with dignity and respect 47% 17% 17% All non-combatants should be treated as insurgents 44% 41% Torture should be allowed if it will save the life of a Soldier/Marine 39% 36% Torture should be allowed in order to gather important info about insurgents 24% 25% I would risk my own safety to help a non-combatant in danger 0% 25% 50% 75% 100% Percent Agree or Strongly Agree (Marines) Percent Agree or Strongly Agree (Soldiers) Figure 4.1: Soldier and Marine attitudes towards the treatment of insurgents and non-combatants (MHAT IV) Insulted/cursed at non-combatants in their presence 30% 28% Damaged/destroyed Iraqi property when it was not necessary 12% 9% Physically hit/kicked non-combatant when it was not necessary 7% 4% Members of unit modify Rules of Engagement in order to accomplish mission 9% 8% Members of unit ignore Rules of Engagement in order to accomplish mission 7% 5% 0% 20% 40% 60% 80% 100% Percent Reporting One or More Times (Marines) Percent Reporting One or More Times (Soldiers) Figure 4.2: Soldier and Marine battlefield ethical behaviors. (MHAT IV) 60 Chapter 4: Mercy and Justice in Robot Ethics more morally in war than they do at present. 4.4 Autonomous vs. Semi-Autonomous Robots There is a major division in wartime robotics — semi-autonomous robots, and autonomous robots. It is important to be clear about what we mean by the word autonomous in this context. While it normally refers to a moral agent, in this context, it refers to a robot’s ability (or lack-thereof) to perform actions apart from a human’s direct intervention. As Sparrow16 helpfully points out, Autonomy is not a trinary condition (not autonomous, semi-autonomous, autonomous), but is rather a spectrum; a robot can be said to be more autonomous than another robot by comparing the length of time it can function without human intervention. For the purposes of this work, I define the terms as follows: Semi-Autonomous Robot: A semi-autonomous robot is one which requires a human tele-operator, but can take simple directions without direct human intervention. An example is the infamous Predator drone currently in use in Pakistan — while it needs a human to activate its weapons manually, it is capable of flying according to a set of GPS coordinates without human intervention. This ability allows a single pilot to be able to man several drones at once; giving the pilot the ability to survey many different areas and, if necessary, conduct several air strikes in quick succession. Autonomous Robot: An autonomous robot is one which is designed to operate away from a human operator for a matter of hours, and be empowered to 16 Robert Sparrow, ‘Building a Better WarBot: Ethical Issues in the Design of Unmanned Systems for Military Applications’, Science and Engineering Ethics, 15 (2009):2. 61 Chapter 4: Mercy and Justice in Robot Ethics make kill-decisions on its own. No such robot currently exists in a battlefield environment; however they are acknowledged to be in active development. 4.5 Ethical Issues in Semi-Autonomous Robots Not all Semi-Autonomous robots are ethically controversial; robots used for bombdisposal, for example, appear to be utterly uncontroversial, and perhaps even morally superior to putting humans needlessly at risk. Most of the ethical issues raised in Semi-Autonomous robots focus on their ability to take direction from a pilot who can be extraordinarily distant — most of the drone strikes currently being conducted in Pakistan are being piloted from Creech Air Force Base outside Las Vegas, Nevada; a distance of about 7,750 miles from their intended target. On the one hand, proponents17 argue that a semi-autonomous robot’s controller would be unaffected by human urges of anger, revenge, or bloodlust. Opponents are frightened by the same emotional disconnect18 , arguing that this disconnect could produce an airman numb to the horrors of war. Ethical questions, then, turn on questions of virtue and character. It is clear from the MHAT data that extended deployments do violence to soldiers’ character. Longer deployments and combat experience correlated positively both to mental illness and to unethical behaviors19 . Furthermore, an insurgency necessarily instills in soldiers a sort of paranoia that anyone they see could be working among 17 Arkin, Governing Lethal Behavior in Autonomous Robots (as in n. 14). James Detert, Linda Klebe Trevino and Vicki Sweitzer, ‘Moral Disengagement in Ethical Decision Making: A Study of Antecendents and Outcomes’, Journal of Applied Psychology, 93 (2008):2; Lambèr Royakkers and Rinie van Est, ‘The Cubicle Warrior: the Marionette of Digitalized Warfare’, Ethics and Information Technology, 12 (2010):3 hURL: http://goo.gl/ZuByui. 19 Office of the Surgeon Multi-National Force-Iraq and Office of the Surgeon General, United States Army Medical Command, ‘Mental Health Advisory Team (MHAT) IV: Operation Iraqi Freedom 05-07’ (as in n. 12), p. 38-42. 18 62 Chapter 4: Mercy and Justice in Robot Ethics the enemy. It is debatable, and beyond the scope of this paper, whether military training itself does violence to soldiers’ character, but the report leaves little doubt that soldiers’ moral fiber is endangered by extended deployments. Unfortunately, little hard data exists on the effects of tele-war on pilots’ character. The only literature with even marginal relevance are studies of video-gamers, and the studies themselves are often produced by Evangelical groups with a preexisting bias against that particular medium. However, while solid data is sparse, anecdotal evidence abounds about the dehumanization of other players in online environments like X-Box Live 20 . The fear that warfare could look more like a Halo tournament than an armed conflict is a terrifying thought, indeed. The measure, according to the Christian, of any human being is the person of Christ. Jesus is the fullest, most true human who ever lived, and Christian anthropology consists of examining Christ and finding ways of imitating Christ. The most salient feature of Christ for this discussion is the paschal sacrifice — Christ’s self-sacrifice for the redemption of humanity. It is clear that all Christians are called toward the imitation of Christ’s sacrifice, but few are called to quite as literal a sacrifice as the soldier. It is telling, and distressing, that less than a quarter of soldiers and marines understand that they should be willing to put their lives on the line in defense of the innocent — be they American or Iraqi. From this viewpoint, It is quite conceivable that by placing soldiers out of danger, you enable them to sacrifice themselves more readily, since they are not facing death itself. If the sacrifice is not the final sacrifice, it is doubtless easier to make. Indeed, the sort of practice in sacrificing oneself could conceivably make airmen more likely to be able to make the final sacrifice should it be necessary. However, the emotional and epistemological distancing that results from teleoper20 Chipman. 63 Chapter 4: Mercy and Justice in Robot Ethics ated warfare can make the airman less connected to the reality of battle; numb to the intense suffering the airman is causing. Indeed, this may be called the Quake effect 21 ; when one’s enemies are merely marks on a screen, it becomes easier to be cruel to them. On balance; it seems that tele-operated warfare may actually be morally salutary — the smaller footprint of a drone, combined with the sacrificial nature of the work, if necessary, objectively lessens casualties on the prosecutorial side. However, great care, it appears, must be taken to ensure that Airmen are acutely aware at all times of the gravity of their actions, and are reminded that they are not playing a videogame. 4.6 Ethical Issues in Autonomous Robots Ethical issues in Autonomous Robots are considerably more complex. Part of this complexity derives from the fact that an autonomous robot is still hypothetical at the moment, although such a robot appears to be coming closer and closer to reality with each passing month. Most of the current controversy involves system architecture — how does one construct an ethical robot? How should one build a robot to make ethical decisions? Before proceeding, it is important to establish one key point. There has been some controversy over the ethical status of robots themselves — are they moral agents? Mere instruments? Some hybrid of both? The questions are fascinating, and Floridi and Sanders’ seminal paper on the subject22 has been the subject of intense speculation, research, and criticism. However, as interesting as these questions are, and as intriguing as this premise is, it remains a minority view. Thus, this paper will 21 A neologism coined by me; the name is taken from a classic first-person shooter videogame Luciano Floridi and J.W. Sanders, ‘On the Morality of Artificial Agents’, Minds and Machine, 14 (2004):3 hURL: http://goo.gl/fhwOZi. 22 64 Chapter 4: Mercy and Justice in Robot Ethics assume the current majority view — that robots are to be viewed as instruments in the classical sense, albeit ones which can function automatically and, in the limited sense given in section 4.4, are autonomous. 4.6.1 Embedded Values Not all instruments are created equal. Voices as disparate as the philosopher Deborah Johnson23 , and the famous Protestant moralist Oliver O’Donovan24 agree that different instruments can have different moral values. Instruments are normally evaluated based upon what moral agents do with those instruments — an axe could be an implement to chop firewood, or an implement in a grisly murder, à la Lizzie Borden. However, certain instruments, by virtue of their design, take on a moral character. An army rifle is not the same weapon as a sawed-off shotgun with its serial number filed away — the former is more likely to be a morally neutral weapon of war, while the second one has been imbued with certain, terrible values of murder. The question, then, is what values are we imputing to our technology when we design it? Are our robotic weapons more like a standard army rifle or more like the weapon of a criminal? I propose that there are two types of values we can be imputing to our technology: Direct — those we are consciously imparting to our technology Indirect — those we are not consciously imparting to our technology 23 Deborah G. Johnson, ‘Computer Systems: Moral Entities but Not Moral Agents’, Ethics and Information Technology 8 (2006):4. 24 Oliver O’Donovan, The Just War Revisited, (Cambridge University Press, 2003), p. 78-94. 65 Chapter 4: Mercy and Justice in Robot Ethics Within the constraints of robot ethics, this dichotomy becomes: Direct — How are we instructing the robot to make ethical decisions? Indirect — How do the integral systems of the robot prejudice its ethical decisions? Each of these two sets of embedded values is worthy of its own ethical reflection. 4.6.2 Indirect Values The indirect values are, paradoxically, somewhat easier to tackle. Kraemer et al25 have argued persuasively that seemingly inconsequential technical decisions can have a substantial moral impact. In particular, they focus on the technical decisions involved in an MRI machine’s programming — how an unavoidable decision between favoring false negatives and false positives has substantial moral impact. It is trivial to suspect that the same sorts of decisions involved in subroutines of an autonomous robot — everything from identifying targets with the vision system, to aiming the weapon, to deciding whether to fire at all, can be prejudiced by a programmer’s decision. While such decisions obviously need to be balanced by technical realities, it is worth examining the moral impact of such prejudice. The two major premises we have identified earlier as our major guiding principles are justice and mercy; there is a natural tension between them. Justice is the principle which stands against sinfulness, and opposes structures which work against the common good. Mercy, however, is the principle which governs the responsible use of power, and encourages restraint against the abuses inherent in power. In a paradoxical way, the tension between justice and mercy is itself a mirror of the difficult decision of prejudice. Since the two principles are in tension, one must ultimately prejudice one 25 Felicitas Kraemer, Kees van Overveld and Martin Peterson, ‘Is there an ethics of algorithms?’ Ethics and Information Technology, (2010) hURL: http://dx.doi.org/10.1007/ s10676-010-9233-7i, ISSN 1388–1957. 66 Chapter 4: Mercy and Justice in Robot Ethics over the other. The ethical question becomes, then, which principle do we prejudice? I argue that we should prejudice mercy over justice. The reason we should prejudice mercy over justice is that justice presupposes knowledge — the criminal justice system has an elaborate process for determining truth (a trial), which when applied to law results (hopefully) in justice. However, in programming an autonomous robot for a battlefield environment, we know a priori that it impossible to program a robot for all possible contingencies. Thus, in the interest of epistemological humility, we must concede that there will be situations which robots will encounter which are entirely unanticipated by the programmers. While one would hope that the robot would still function as desired in such a situation, it is inevitable that the robot will err. Since we know it will err, we should have it err on the side of the principle which does not presuppose the knowledge which we lack — mercy. By electing to prejudice mercy in the design of a robot, we are electing to say that, where a robot is in doubt, it should err on the side against the use of deadly force. Without such a caveat, we could potentially violate the core reason which justified the use of robots in the first place: the greater ability of a robot to be a discriminate weapon of war. 4.6.3 Direct Values The major controversy regarding the programming of an artificial conscience come from two separate reports detailing two different approaches to the same problem. Lin, et al. ,26 in a report for the Office of Naval Research, advocate a virtue-ethics based approach to the problem, which focuses on machine learning techniques. In essence, 26 Patrick Lin, George Bekey and Keith Abney, Autonomous Military Robotics: Risk, Ethics, and Design, (Office of Naval Research, 2008) – Technical report. 67 Chapter 4: Mercy and Justice in Robot Ethics Lin, et al. see the aforementioned problem of robotic ethics as almost insurmountable. They argue that it is both unreasonable and impossible for programmers to anticipate every situation that a robot may encounter. Rather than attempting to fight the problem, however, Lin et al. embrace a machine-learning approach, wherein they attempt to allow the robot to develop its own internal ethical rules in response to training. In a separate report for the Army Research Office27 , which was later developed into a monograph28 , Ronald Arkin argues for a more classical model of robotic governance. He details an ethical governor subroutine which is based on a fundamentally deontological ethical model, based upon the laws of war and the rules of engagement for a particular conflict. Unlike Lin et al., who produced a white paper arguing for a broad direction of future research, Arkin backs his report with a painstaking technical description of how such a governor could be built. While a technical critique of Arkin’s implementation of his principle is beyond the scope of this paper, the salient question is which of the two approaches to favor. In short, I favor Arkin’s approach over Lin et al.’s, but in order to justify my opposition, we will need a brief diversion on the nature of machine learning. The following is a very compressed, and therefore obviously distorted, description of machine learning. Readers interested in a much more comprehensive description are encouraged to consult Alpaydin’s excellent and very accessible monograph on the subject29 . 27 Ronald C. Arkin, Governing Lethal Behavior: Embedding Ethics in a Hybrid Deliberative/Reactive Robot Architecture, (U.S. Army Research Office, 2007) – Technical report. 28 Idem, Governing Lethal Behavior in Autonomous Robots (as in n. 14). 29 E. Alpaydin, Introduction to Machine Learning, (MIT Press, 2010), Adaptive Computation and Machine Learning hURL: http://books.google.com/books?id=_i2WPwAACAAJi, ISBN 9780262012430. 68 Chapter 4: Mercy and Justice in Robot Ethics Brief Intro to Machine Learning There are many problems in computer science that are difficult to solve. What makes them difficult to solve, however, can vary considerably. Some problems are difficult to solve because they are difficult to describe mathematically; when one claims that one wants to build a computer program which can “read” a newspaper, what does that really mean? Is it an attempt to take a scanned image and return out ASCII text? Is it an attempt to process the text and be able to perform statistical analysis on interesting words in the text? Or is it an attempt to tag words within a given text sample with meaningful metadata? The ambiguity in the description of the problem limits the potential of a good solution; the more precisely a problem can be described, the better the solution. Some problems are difficult to solve because they no good algorithm exists to solve it. Consider the famous traveling salesman problem: given a list of cities (say, the capitals of Europe), and a list of distances between any two of them, what is the shortest route that visits all of the capitals of Europe once, without repeating a capital? This is an extensively studied problem, and is part of a class of problems called NP-Complete 30 problems. The only known algorithms which will guarantee the shortest possible route require a number of calculations which grows exponentially with the number of cities. With a sufficiently large list of cities, even the fastest computer on earth could not return a solution within the expected lifetime of the universe. Some problems, however, are hard in a different way. Unlike the previous set where algorithms do exist, albeit lousy ones, to solve a given problem, there are some cases where no algorithm exists to adequately solve a given problem. For example, 30 This classification is one of several in the larger field of complexity theory. 69 Chapter 4: Mercy and Justice in Robot Ethics Figure 4.3: What is the shortest route which travels to all of the capitals once, and does not repeat a capital? Map of Europe with Capitals, courtesy mapsof.net translating passages from one language to another is a very difficult process. A direct dictionary-to-dictionary translation is a bad solution (as anyone who has used Google Translate knows), but difficulties in translation often come from different languages’ requirements for semantic information. English, for example, requires the gender of a linguistic subject to be identified (he did vs. she did), but Hebrew, on the other hand, has no such requirement. The reason that such translation is possible is that the correct translation must be inferred from context, but it is very difficult (and sometimes impossible) to encode subroutines for context. Machine learning is an attempt to make a context-sensitive machine, by allowing the program itself to “learn” by observing a set of training data. The idea behind machine learning is that, rather than provide an explicit algorithm for solving a problem, the machine can develop its own algorithm to solve a given problem. For an adequate example of how machine learning techniques work, let us examine the 70 Chapter 4: Mercy and Justice in Robot Ethics problem of classifying nouns in an piece of English prose31 . Some are easily resolved by resorting to a dictionary (Omaha, for example, can generally only refer to a place), but others are not quite as simple. The word apple can refer to a number of different things — to the computer company, to the literal fruit, the surname of a popular singer-songwriter (Ms. Fiona Apple), or as part of a poetic sobriquet for New York City (the big apple). In order to allow a computer to differentiate which of the types of nouns a given one is, we have to make it sensitive to context. In order to do that, we follow a four-step algorithm. First, one makes an attempt at listing as many different linguistic observations as possible. This is crucial, since the strength of the algorithm can depend on how many independent observations we have. Linguistic observations can be things like: • Is the noun capitalized? • Is the noun followed by a prefix? (e.g. Mr. or Dr.) • Does the noun begin a sentence?, etc. After making as many separate observations as possible, one then decides on a technique to allow the computer to assign weights to each of the different observations (different models can be used in different contexts; examples include a hidden Markov model (HMM), support vector machine (SVM), or an artificial neural network (ANN). Each of these models assigns weight to the series of linguistic observations in a probabilistic sense — if the model is fed training data where every proper noun is capitalized, then capitalization will have significant weight in determining whether or not a given noun is proper. After selecting a model, one subsequently exposes the model to training data — in this case, a set of English prose pieces where the nouns have been properly categorized. 31 part of a field called Natural Language Processing (NLP) 71 Chapter 4: Mercy and Justice in Robot Ethics This allows the model to calibrate the probabilistic weights of each of the separate linguistic observations. After sufficient exposure to training data, the model is then ready to tackle volumes of prose. There are significant benefits to this approach. It allows a machine which can achieve good results, and can categorize massive amounts of material; far more than any human could read. However, there are some drawbacks. First of all, this approach is probabilistic — it is a best guess, based on past experience. This means that, while machine learning algorithms can succeed very often with very high chances of success, these models can, and do, fail. Furthermore, because the models are probabilistic, these models fail unpredictably, and when they fail, they tend to fail badly. A highly visible example is the success of IBM’s Watson 32 system, which, while winning handily against two previous Jeopardy! champions, failed rather spectacularly on the final question; the system answered Toronto to a question whose category was US Cities. Furthermore, these models are uninterrogable; the model itself consists purely of a series of probabilistic weights. It is therefore exceedingly difficult to audit and modify. 4.7 Critique of Machine-Learning in Autonomous Robots Having now established what Machine Learning techniques are, and some salient characteristics of them, we can now begin to get at the heart of why Arkin’s approach is superior to Lin et al.’s. As established earlier, I am arguing against the view of robots as anything more than automatic instruments, especially against those who view robots as having a 32 Markoff. 72 Chapter 4: Mercy and Justice in Robot Ethics kind of quasi-agency. On the one hand, this simplifies some objections to the use of robots that have been raised, both from a legal33 and a moral34 perspective. In order to ensure that an automatic instrument of war is moral, I argue that there are three salient characteristics necessary to fulfill the discriminate criteria of Just War theory: Performance — A robot should perform well (i.e. fire when it should fire, and not fire when it should not fire). Predictability — When the robot fails to perform correctly, a robot should behave predictably (it should be able to be known when the robot tends to fail). Legibility — When a robot does perform an unethical act, it should be capable of being audited to determine why the robot behaved unethically35 . Machine Learning techniques fail on the last two of these three criteria. Lin et al. argue that machine learning techniques could allow a robot to perform better than any other alternative. In sheer terms of performance, they argue, I think persuasively, that performance would be improved by a machine-learning approach, and by guarding carefully the robot from encountering anything drastically unlike the training data36 . However, I remain skeptical that such a set of safeguards could ever practically occur on the battlefield. Furthermore, I do not think that the approach argued for by Lin et al. would guard against the unpredictable failures inherent in a probabilistic model. The consensus view is, I think appropriately, that the military should not hold robotics to a perfect ethical standard, but should expect robotic weapons to perform more ethically, on average, than other weapon systems (e.g. a squad of soldiers). However, the unpredictability 33 Asaro. Sharkey, ‘Intelligent Systems 23 [2008]’ (as in n. 8). 35 I am here indebted to Cory Doctorow, ‘Human-Readable’, in: With a Litle Help, ( SelfPublished, 2011) hURL: http://craphound.com/walh/Cory_Doctorow_-_With_a_Little_Help. html#769i, who is in turn indebted to Natalie Jerimijenko, Feral Robotic Dogs, 2005 hURL: http://www.nyu.edu/projects/xdesign/feralrobots/i 36 Lin, Bekey and Abney (as in n. 26), p. 40. 34 73 Chapter 4: Mercy and Justice in Robot Ethics of a robotic system programmed whose ethics routine was developed using machinelearning techniques undercuts this standard. Not all failures of a system are created equal. As we have already see earlier, it is preferable that a system not fire on an enemy than to fire upon an innocent. Furthermore, some critical failures are considerably worse than others — Sharkey’s nightmare scenario is a robot who mistakes a young girl’s ice-cream cone for a rifle37 ; the is clearly a much more serious error. Lin et al. are not unmindful of this error, and recommend certain workarounds, including only deploying robots in “engagement zones,” or, more prosaically, “kill boxes”38 — areas where all non-combatants are assumed to be evacuated. I am not certain that this is an acceptable compromise, but appears prudent. Indeed, despite my hesitancy, I am also unenthused by some of Arkin’s scenarios39 where he expects a robot to be able to differentiate between non-combatants and combatants in the sort of door-to-door warfare which has characterized war in Iraq. Indeed, this difficulty seems to be the single biggest obstacle to the widespread use of robots in warfare. While it is conceivable that a robot could differentiate between rival armies in a formal battlefield scenario, it is much less likely to work properly in an environment which looks much less like what is traditionally conceived of as a military conflict. Indeed, given their cost, it is unlikely that any but the most well-funded armies will progress towards robotization, despite the breathless hopes of some. While everyone would prefer that the next major conflict would look more like an episode of the television show Battlebots than the grisly footage from Iraq and Afghanistan, it is unlikely, simply because globalization has, for the moment at least, made overt war between the great world powers unlikely. Most of the conflicts of the 37 Noel Sharkey, ‘Automated Killers and the Computing Profession’, Computer, 40 (2007) hURL: http://goo.gl/xPzwzi. 38 Lin, Bekey and Abney (as in n. 26), p. 77. 39 Arkin, Governing Lethal Behavior in Autonomous Robots (as in n. 14), p. 155-176. 74 Chapter 4: Mercy and Justice in Robot Ethics past 10 years have not been conflicts between modern states, but between states and non-state actors like Al-Qaeda, who disregard the traditional laws of war. 4.8 Conclusion The problems of robotic warfare will inevitably come to the forefront in the coming decades. Semi-autonomous robots pose threats to soldiers’ characters, and there will be a great debate as to whether the risks of a airman emotionally distant from the wars she prosecutes is superior to the documented risks that extended deployments pose to soldiers’ mental, emotional, spiritual, and moral health. The lack of hard data on the subject makes ethical conclusions speculative at best; I urge rigorous study of these related questions. The ethical issues relating to autonomous robots are also disconcerting. Ethically, I have argued we should favor mercy over justice when programming for the unforeseeable, and therefore err on the side against lethal force. Furthermore, I argue against using a machine-learning driven virtue-ethics based approach to designing autonomous robots, because they are inscrutable — machine learning techniques can deliver extremely accurate results, but they are not human readable, nor are their failures predicable. In light of the inequality of potential errors, as well as our preexisting decision to prejudice mercy over justice, I hope that we would favor a system which, while perhaps somewhat more error prone, makes more merciful errors than the alternative. The at least partial robotization of the United States military, and the militaries of the other great western powers seems all but unavoidable in the coming decades. Just as the age of the archer, the knight, the cannon, the bomber, and the nuclear warhead have each had their effect on traditional just war thinking, we will soon see reflection 75 on the entrance of robots in the battlefield. Within this reflection, there will doubtless be many voices contributing to the discussion; I can only pray that Christians will be among them, reminding military leaders of the demands of mercy and justice. Furthermore, I hope that military and political leaders contemplating robotization understand the implications of such an endeavor — both on the character of the military itself, and also in the conduct of its autonomous tools. Indeed, I sincerely hope that those tasked both with beginning and prosecuting robotized warfare contemplate their task “with fear and trembling40 ” and, in prayerful contemplation, seek justice tempered with mercy. 40 Philippians 2:12 76 Chapter 5 God in All Code: The Ignatian Spirituality of Hacker Culture 77 Chapter 5: God in All Code Spirituality can be defined as micro-level religious experience — the experience of an individual. In a sense, everyone has his or her own unique spirituality, insofar as everyone has his or her own individual experience of God. Defined this way, such a concept might not seem to be terribly helpful. However, spiritualities are also common to societies and sub-societies. Although everyone’s experience is unique, there are broad currents and patterns that can be characterized across groups of people, as they bring similar concerns, tools, and language to their understanding of God. Thus, one can speak of an african-american spirituality, a spirituality of the poor, a queer spirituality, or a feminine spirituality. There are also spiritualities of health-care workers, for example, or spiritualities of legal professionals. Necessarily as the classes grow larger, the common currents become fewer, and the more general statements must become. Spiritualities also can follow the lead of major spiritual subfigures within a religion. Thus, within the Catholic, Christian tradition, there are still many sub-spiritualities: Ignatian (after St. Ignatius Loyola), Fransciscan (after St. Francis of Assisi), Dominican (after St. Dominic), or Theresan (after St. Therese of Lisieux). One prominent group of people has not had the same level of attention paid to their spirituality, however: computer professionals. Mostly associated with a kind of hyper-rational atheism, many church leaders, either fearful of computers, those who work with them, or both, have tended to ignore modern computer culture, and its attendant spirituality. In this paper, I hope to describe the implicit spirituality in modern Hacker culture, and show its parallels with Ignatian spirituality. 5.1 Introduction As computers have risen, they have correspondingly given rise to their own distinct culture, apart from their effect on human culture. Rather than merely ordinary people 78 Chapter 5: God in All Code who have accepted that they now type in word-processors instead of on typewriters, or artists who use Adobe Photoshop instead of countless pages of sketchbooks, some people have taken computers a step further, to truly embrace computers’ potential to change their lives, and to make them an integral, rather than tangential part of their lives. This group of people can be identified as a distinct subgroup as far back as the early 1950’s, nurtured at institutions like MIT, where a true embrace of computing — an entire lifestyle, really — could be seized on by undergraduates. Together, they created a culture, known affectionately as hacking. Originally an MIT neologism for the elaborate pranks undergraduates would use at the university, it came to refer to a group of people who found deep joy in the same level of skill It has been carried on at other institutions, like Stanford and the University of California, at Berkeley.1 Now it lives on in the virtual world of the internet, complete with its own argot2 , its own explicit definitions of excellence3 , and its own rites of initiation.4 . It has even received some limited scholarly attention.5 . Thus, the Hacker phenomenon, by anyone’s recognition, qualifies as a subculture, and, as a subculture, it has its own attendant spirituality. However, the theological establishment has been reluctant to engage with computers in general, much less with hackers in particular. While the Vatican has done more than any other organized religious group to at least acknowledge the role of computers in society, by releasing two documents on the matter6 , they are far from a comprehensive cyber-theology. They are much less attending to its spirituality — they make no acknowledgement of 1 See Steven Levy, Hackers: Heroes of the Computer Revolution, 1st edition. (Anchor Press/Doubleday, 1984) 2 Raymond, ‘The Jargon File’. 3 Idem, ‘The Art of Unix Programming’. 4 Idem, ‘How To Become A Hacker’. 5 A.E. Adam, ‘Hacking into hacking: Gender and the hacker phenomenon’, Proceedings of Computer Ethics Philsophical Enquiry [2003]. 6 Pontifical Council for Social Communications, ‘Church in Internet’; idem, ‘Ethics in Internet’. 79 Chapter 5: God in All Code it. Thus, I plan to address it at least briefly in this paper. In section 5.2, I hope to discuss the driving force behind the Hacker phenomenon, and show its parallels to the Ignatian ideal of finding God in all things. From there, in section 5.3, I examine the consequent missionary impulse of modern Hacker culture, and compare it to the historical Jesuit commitment to mission and zeal for souls. In section 5.4, I compare the Hacker zeal for excellence to the Jesuit idea of magis — striving for more, and show how closely they parallel. I examine competing ideas on service and relational anthropology in section 5.5. In section 5.6, I examine hacker ideas of formation, and contrast them with Jesuit ideals of formation. Finally, I close in section 5.7. 5.2 5.2.1 Joy Art, Science, and Play: Hacker’s Joy One key insight into the Hacker mindset is that these are people who have consciously made the decision to embrace computers and programming into their lifestyle. Thus, they derive not merely utilitarian satisfaction from doing so — Business executives are perhaps the ur-example of that framework — they derive satisfaction from doing so. This is most clearly seen in the writings of E. S. Raymond, a self-proclaimed “hacker” and major developer of Linux – something of an elder statesman in this subculture. “Hackers” have a number of characteristics, most clearly addressed in Raymond’s manifesto, “How To Become A Hacker”7 Raymond describes an ethic of constant innovation, with admonitions like “The world is full of fascinating problems waiting to be solved.” and “Boredom and drudgery are evil.”8 Hacker people, then, are those who are constantly internally driven to 7 8 Raymond, ‘How To Become A Hacker’. Ibid. 80 Chapter 5: God in All Code innovate, because they derive value from the act of innovating itself, not from that which results from it. Those who do attempt to use hacker techniques for personal gain – the cyber criminals who give the modern meaning of “hacker” its name – are disparagingly referred to by Raymond as “crackers” and dismissed. The other great source for a qualitative description of the joy which derives from hacking comes from Steven Levy’s work Hackers: Heroes of the Computer Revolution, which has acquired the status of a major work of folklore in the subculture. While the book is inundated with descriptions of hackers, a couple of key passages leap out: “Art, science and play had merged into the magical activity of programming”9 Necessarily, these three ideas — Art, science, and play — come together in this medium. Nowhere else could one find such an environment, which, built on solid scientific principles, one is able to create functional objects. Computer programs are not things like novels, poems, or other objet d’art. They perform functions; they are tools. Yet, they are unlike other tools in that they are insubstantial — easily copied and distributed. This lends itself directly to cooperative play — rather than fighting amongst one another The people in Homebrew were a mélange of professionals too passionate to leave computing at their jobs, amateurs transfixed by the possibilities of technology, and techno-cultural guerrillas devoted to overthrowing an oppressive society in which government, business, and especially IBM had relegated computers to a despised Priesthood.10 9 10 Levy (as in n. 1), p. 120. Ibid., p. 200. 81 Chapter 5: God in All Code Here we see how this is a true manifestation of the joy of programming — the passion within these people melds their work and their play, into the same thing, and they stare, awed at the possibilities of what machines can do for them. Most telling, though is the description of an ideal company by Mark Duchaineau – a young, hacker programmer at Sierra On-Line who, faced with the increasing bureaucratization of his company, dreams of founding his own, utopian workplace: Duchaineau’s company would be a hacker paradise, with programmers having every conceivable tool at their disposal to create awesome software. If a programmer felt the company needed a piece of equipment, say some supercalibrated oscilloscope, he would not have to get permission from unconnected management channels. . . he and his fellow hackers would have a large say in the process.11 It’s a telling description of paradise — one where the people have all of the tools that they need to create awesome software. Duchaineau doesn’t dream of “enough royalties to buy cherry-red Trans-Ams and Caribbean trysts with hot-blooded software groupies.”12 Rather, his ideal company merely gives him the ability to pursue the joy of programming unimpeded. 5.2.2 Moments of Consolation: Ignatian Joy This same sort of deep joy that Ignatius finds in the Spiritual Exercises: The perfect, through constant contemplation and enlightenment of their understanding, more readily consider, meditate, and contemplate God 11 12 Levy (as in n. 1), p. 378. Ibid., p. 389. 82 Chapter 5: God in All Code our Lord as being present in every creature by his essence, presence, and power13 Ignatius makes a few key qualifications here: 1. He’s referring to the perfect here; so this is clearly to be taken not as a declarative statement, but instead as an ideal to be striven toward. Indeed, the word “perfect” as it occurs in Matthew’s Gospel is teleios 14 (τ ǫ́λǫις); what Ignatius seems to be quoting is not perfection in the English sense of being without flaw or without limitation, but rather in the sense of being completed, or brought to its final end. Thus, it might be rephrased as, “the whole person, considers, meditates, and contemplates God our Lord as being present in every creature . . . ” 2. God’s essence is present in every creature. For Ignatius, this means recognizing the fundamental divine nature in all interactions by virtue of its creation. This same attribute could be attributed to hackers, who recognize the beauty of a computer system in its boundless possibility. 3. God is not merely present essentially (in an Aristotelian, Thomistic sense) with creation; he is, in fact present within creation — God, himself, for Ignatius, is present in all things, using them for divine ends. Ignatius takes a strong view of providence — for Ignatius, everything is a tool for God to bring about a better end, including people; the great triumph of his spirituality, then, is his suscipe prayer, where the human not only acknowledges this sense, but embraces it: 13 Ignatius of Loyola, The Spiritual Exercises of St. Ignatius, trans. by George E. Ganss, SJ (Loyola Press, 1992), p. 36. 14 James F. Keenan, SJ, ‘”Whose Perfection is it Anyway?”: A Virtuous Consideration of Enhancement’, Christian Bioethics, 5 (1999):2. 83 Chapter 5: God in All Code “Take, Lord, and receive all my liberty, my memory, my understanding, and all my will — all that I have and possess. You, Lord, have given all that to me. I new give it back to you, O Lord. All of it is yours. Dispose of it according to your will. Give me love of yourself, along with your grace, for that is enough for me.”15 4. God, finally, is present in his power; this is perhaps the greatest level of overlap. For Ignatius, God is present through an ongoing process of creation — rather than being a singular event, at the beginning of time as described in Genesis, it is a continually ongoing process, and God is not only creator, but also sustainer, and human beings are co-participants, ultimately, in creation. It is this which brings the mystic out of the computer hacker16 ; there is a sense in which the hacker, through his or her own act of creating software, is also participating in the divine act of creation. 5.3 5.3.1 Mission The Contagious, Wondrous Joy of Programming: Hackers’ Mission The joy and elation that hackers find in the Divine Presence as described in Section 5.2 is contagious. Once established, there is a powerful urge among people in the hacking community to share their results with one another — to their way of thinking, there are only problems to be solved, and reduplicating work is an offense akin to a 15 16 Ignatius of Loyola (as in n. 13), p. 95. Raymond, ‘The Jargon File’. 84 Chapter 5: God in All Code sin. Although they can be curmudgeonly to the utterly clueless,17 there is a general collegiality which is implicit in the culture. Levy describes it when Lee Felsenstein began working on the Sol computer, which was intended to be a computer for the masses — essentially a PC, for community use, a full 10 years before its time. The computer itself was described thusly: Sol Computer Lee Felsenstein’s terminal-and-computer, built in two frantic months, almost the computer that turned things around. Almost wasn’t enough.18 Felsenstein is man both entranced and horrified at the powers that computers give to people. His colleague, Efrem Lipkin, an activist from New York who found himself at Berkeley in 1973, said, “I love computers and hate what computers can do”19 Computers at the time of Levy’s writing were inextricably bound up with large institutions — tools reserved for the wealthy and powerful, who could afford to pay large machines to replace men and women for things like payroll checks. Felsenstein’s computer, then, is a revolutionary statement: one which considers the missionary imperative so powerful that he is driven to work to his physical extreme: Completing the Sol was a process that took six weeks of fourteen- to seventeen-hour days, seven days a week.20 Again, we see hackers, so driven in their pursuit of excellence, that they are willing to ignore, when necessary, basic human comforts, because they thrive so dearly on the joy of the job at hand. This kind of missionary zeal is the same sort of ability to deny 17 There is an entire essay on how to properly ask questions, see Eric S. Raymond and Rick Moen, How To Ask Questions The Smart Way, 2008 hURL: http://www.catb.org/˜esr/faqs/ smart-questions.htmli 18 Levy (as in n. 1), Appendix. 19 Ibid., p. 159. 20 Ibid., p. 237. 85 Chapter 5: God in All Code the physical necessities of existence in favor of their urge to bring the kind of joy they experience in programming to the people. It can even be seen in their eyes: He would often entertain the young hardware hackers who designed these products, and his wife would always recognize them at a glance. “Because they all had the same thing,” Solomon would later explain. “That little burning inside the eyeball. She used to say there was an inside personality, and though they looked like disreputable bums, you looked them in the face, you looked in those eyes and you knew who they were. She’d look at them and what would come out was the brightness, the intense-ness [sic].” 5.3.2 Ignatian Indifference: Poverty, and the Mission This kind of burning, sustaining passion (even something that transcends social standing), is what characterizes both the Hacker and the Jesuit. Initially, when Ignatius was beginning to write the Constitutions, he raised some eyebrows by describing the fourth vow — the full profession which is only characteristic of the eldest Jesuits. The fourth vow is one of special obedience to the pope in matters of mission, and not to request anything in order to complete it21 . Although many at the time thought that at least the first part of the vows (special obedience to the Pope) was at least implicit to any religious order22 , the critics of the Jesuits missed the point. Ignatius’s conception of the Jesuits was, to borrow a military metaphor, an ecclesiastical “special forces” unit, deployable anywhere, at a moment’s notice. Such a mindset even figures into their conception of poverty. Ignatius departs notably from other leaders like Francis in his conception of Poverty. While Francis 21 John Hungerford Pollen, ‘The Society of Jesus’, (Robert Appleton Company, 1912) hURL: http://www.newadvent.org/cathen/14081a.htmi. 22 John W. O’Malley, The First Jesuits, (Harvard University Press, 1993). 86 Chapter 5: God in All Code referred to poverty as “his divine mistress,” Ignatius’s attitude to poverty places it squarely under his emphasis on mission; Jesuits do not actively disavow money like the Fransciscans; rather, they instead disavow any personal ownership of their resources, and place them all in the service of the mission. Levy discusses a similar approach by some hackers: “Our initial goal was not necessarily to get infinitely rich,” explained co-founder Mike Levitt in 1983, “but to control our own destiny. We don’t owe anybody anything.”23 Levitt is discussing a company broken off from the famed MIT-Artificial Intelligence Lab, who were making a business to implement LISP, one of the first high-level programming languages which is still in use — only FORTRAN is older. The idea of a LISP machine — a machine with a sufficiently abstract programming language that one could write programs for any given computer, not merely this particular machine, was a liberating one. Its promise was so great that it even caused strife among the hackers themselves: Greenblatt was so focused on making LISP machines, on the mission of hacking, on the work that had to be done, that he often neglected to acknowledge people’s humanity.24 Why do these things have to be done? Because this mission, this intense drive, is characteristic of hacking. Cory Doctorow, a noted blogger and author, also describes the missionary zeal in his young adult novel, “Little Brother.” 23 24 Levy (as in n. 1). Ibid. 87 Chapter 5: God in All Code If you’ve never programmed a computer, you should. There’s nothing like it in the whole world. When you program a computer, it does exactly what you tell it to do. It’s like designing a machine – any machine, like a car, like a faucet, like a gas-hinge for a door – using math and instructions. It’s awesome in the truest sense: it can fill you with awe.25 In this way, Doctorow’s work has a hortatory facet; the novel is aimed at young people, and here he describes the joy associated with this practice of programming in order to entice them to practice it themselves. This is another part of the missionary impulse: to educate a new generation of enthusiastic programmers to create awesome software. Hacker culture has built up a substantial mythos around the process of young people becoming hackers, involving first an interest in hacking26 , followed by what is termed larval stage 27 — a period of growing, and deepening focus and attention on hacking, not unlike the Spiritual Exercises of a young Jesuit. The Exercises, in canonical form, are a period of intense reflection, over a monthlong period, following a strict plan of meditations under the guidance of a trained director. Hacker culture’s analogue isn’t nearly as structured as the exercises (Hackers tend to have an anti-authoritarian streak, after all), but it does follow the same general idea. 5.4 5.4.1 Magis Raymond’s Ethic of Constant Innovation Another aspect where Hackers and Jesuits are similar is in their mutual striving toward excellence. Ignatius himself gave the order its motto: Ad Maiorem Dei Gloriam — 25 Doctorow, ‘Little Brother’, p. 49. Raymond, ‘How To Become A Hacker’. 27 Idem, ‘The Jargon File’. 26 88 Chapter 5: God in All Code “For the Greater Glory of God.” Hackers have a similar, but distinct idea of collegiality that all involves working toward a common end. Raymond gives a good description in his guide for beginners, “How to Become a Hacker.” He first begins by assuming his first premise: “The world is full of fascinating problems waiting to be solved.” Having established that, he goes on: 2. No problem should ever have to be solved twice. Creative brains are a valuable, limited resource. They shouldn’t be wasted on re-inventing the wheel when there are so many fascinating new problems waiting out there. To behave like a hacker, you have to believe that the thinking time of other hackers is precious – so much so that it’s almost a moral duty for you to share information, solve problems and then give the solutions away just so other hackers can solve new problems instead of having to perpetually re-address old ones.28 Raymond’s ethic, then, is one of constant innovation. He’s arguing that there is a moral dimension to innovation — that hackers not only are compelled to do so by the joy they find as discussed in Section 5.2, but that there is a moral imperative to innovate. He covers it more explicitly further on: 3. Boredom and drudgery are evil. Hackers (and creative people in general) should never be bored or have to drudge at stupid repetitive work, because when this happens it means they aren’t doing what only they can do – solve new problems. This 28 Raymond, ‘How To Become A Hacker’. 89 Chapter 5: God in All Code wastefulness hurts everybody. Therefore boredom and drudgery are not just unpleasant but actually evil. To behave like a hacker, you have to believe this enough to want to automate away the boring bits as much as possible, not just for yourself but for everybody else (especially other hackers). (There is one apparent exception to this. Hackers will sometimes do things that may seem repetitive or boring to an observer as a mind-clearing exercise, or in order to acquire a skill or have some particular kind of experience you can’t have otherwise. But this is by choice – nobody who can think should ever be forced into a situation that bores them.) This is a pretty startling claim. While almost everyone would agree that boredom and drudgery are deeply unpleasant things, to be avoided if at all possible, very few people would equate them as evils. That is, however, exactly what Raymond is doing — he’s essentially being a moral utilitarian, except good is tied directly to technical innovation. Real evils, for Raymond, come from those things which impede innovation — it is morally wrong to impede (more than necessary), bright, technical people who are trying to solve problems. 5.4.2 Ignatian Ethic of Striving for Perfection This doesn’t sound like a particularly Christian, let alone Ignatian, worldview. In one sense it’s not, but when compared to Ignatius himself, there are striking similarities: Principle and Foundation The other things on the face of the earth are created for the human beings, to help them in the pursuit of the end for which they are created. 90 Chapter 5: God in All Code From this it follows that we ought to use these things to the extent that they help us toward our end, and free ourselves from them to the extent that they hinder us from it. To attain this it is necessary to make ourselves indifferent to all created things, in regard to everything which is left to our free will and is not forbidden. Consequently on our own part we ought not to seek health rather than sickness, wealth rather than poverty, honor rather than dishonor, a long life rather than a short one, and so on in all other matters. Rather, we ought to desire and choose only that which is more conducive to the end for which we are created.29 Ignatius, interestingly, takes almost the same line of reasoning that Raymond does. He places one goal — salvation — above all others, and argues that its pursuit is the sole imperative — do what brings you salvation (that which God commands), all else is irrelevant. However, it is not enough for Ignatius to adopt a position that one should merely seek salvation — Ignatius, though moderate in most respects, brooks no compromise with moderation here — this is dogged, full-throated, unequivocal support for pursuing the salvific, despite everything. Ignatius isn’t content with that, though — far from it. Rather, he engages in a full-on pursuit of perfection. Ignatius, like any good chivalric candidate, is not content with merely pursuing the good — he’s aiming squarely at the best. The hackers emulate this, as well. One prominent example can be found in the annals of the Homebrew Computer Club, one of the first Amateur Computer clubs to arise in the greater San Francsico Bay Area (known now as Silicon Valley): 29 Ignatius of Loyola (as in n. 13), p. 32. 91 Chapter 5: God in All Code “. . . I remember I had trouble with a teletype machine at my office and one guy [at Homebrew] said he’d check it out. Not only did he check it out but he came out with a little kit and he put in four or five different parts, oiled it, lubed it, adjusted all the gears. I said, ‘How much do I owe you?’ He said, ‘Nothing.’ ” To the Junk Man, that was the essence of Homebrew.30 This pursuit of excellence is the essence of Homebrew — hacking, in general, really. The group goal — excellence, is put above all others, including personal gain. The hacker named is not under any external coercion to aid his fellow; he does it voluntarily. This mirrors Ignatius’s conception of resources within his new, Jesuit order: selfless exercise of resources in pursuit of common salvation. 5.5 Service As we have already seen, Hackers and Jesuits share a common zeal — the Jesuits for souls, the hackers for solutions. But what is at the heart of both of these cultures’ dedication and fervor? The answer lies in how both groups see the interrelationships between people, and how these interrelationships form the basis of their respective societies. 5.5.1 Men and women for others: Jesuit faith that does justice One hallmark of Jesuit faith, especially since the superior-generalship of Pedro Arrupe, came the notion of a faith that does justice: 30 Levy (as in n. 1), p. 214. 92 Chapter 5: God in All Code Today, our prime education objective must be to form men-and-womenfor-others . . . people who cannot even conceive of love of God which does not include love for the least of their neighbors; people convinced that love of God which does not issue in justice for human beings is a farce.31 Indeed, the “frontier ministry” which characterizes the Jesuits has always meant that care for others has always been at the center of Jesuit spiritual life. Ignatius’s own mission was simple, yet infinitely malleable: “Help souls.”32 The ideal Jesuit, then, does not simply find God in the activities he participates in, but rather in the people he loves. The ideal Jesuit takes to heart the notion that “. . . just as you did it to one of the least of these who are members of my family, you did it to me.33 ” 5.5.2 Shared labor: Hacker cooperation The notion of others in hacker culture is quite different. Since members of the culture seldom meet apart from online contexts, contact is radically different. Raymond freely admits that hacker culture is a gift culture 34 , wherein social merit is given to those who can contribute the greatest to common endeavor. While it is tempting to see this exchange as explaining the peculiar altruism of the community, it does not. The reason that the hacker community is a gift culture lies in the fundamental value of problem-solving associated with the community. As Raymond puts it, “No problem should ever have to be solved twice,” arguing that one’s compatriots’ time is so precious that “it’s almost a moral duty for [one] to share information, solve 31 George W. Traub, SJ, ‘Do You Speak Ignatian: A Glosary of Terms Used in Ignatian and Jesuit Circles’, in: Idem, editor, An Ignatian Spirituality Reader, (2008), p. 260-261. 32 O’Malley (as in n. 22), p. 22. 33 Matthew 25:40 34 Raymond, ‘How To Become A Hacker’. 93 Chapter 5: God in All Code problems and then give the solutions away just so other hackers can solve new 35 problems instead of having to perpetually re-address old ones.” Ultimately, this altruism derives from a love of community — boredom and drudgery are considered so evil that self-interest is completely unacceptable. This notion of service, while not quite rooted in the Christian love of God in neighbor like that of the Jesuits, is still profoundly allocentric. The devaluation of the self, and the high regard for the other that characterizes hacker culture is extraordinary, and can find parallels in Jesuit love. 5.6 5.6.1 Formation Jesuit Formation Another major similarity between Hacker culture and Ignatian spirituality, especially in the modern incarnation of the Jesuits, is a conscious, intentional focus at forming young people. Both the Hacker community and Ignatius’s disciples begins with a particular vision of the perfect36 human person, and outline a path toward forming a person into that ideal. The Jesuits have many avenues toward formation, but the major two are the formation of Jesuits themselves and their students. Much of Ignatius’s work in the Constitutions is dedicated toward the proper formation of his novices. Indeed, Jesuit training is the longest in the Catholic world. It has five stages37 , typically lasting a dozen years: 35 emphasis in the original by perfect, I mean in the sense of complete rather than in the sense of without flaw. 37 Jesuits of the New England Province. 36 94 Chapter 5: God in All Code 1. Novitiate — a two year “introduction” to the society; a man makes the first three vows of poverty, chastity, and obedience at the conclusion 2. First Studies — a three year period of study of philosophy and theology, reflecting the academic beginnings and apostolic ministry of the society, which is the beginning of the Jesuit’s ordination studies. 3. Regency — a three year liminal period between First Studies and Theology Studies, where the Jesuit is encouraged to take full part in the apostolic work of the society in order to remain grounded in its work 4. Theology Studies — three year period of full-time study in Theology in preparation for ordination to the priesthood 5. Tertianship — a three-to-five year period of full-time ministry which concludes the formative process, ending with the Final Vows Along the way, Jesuits undergo a number of formative experiences on their own, including a long retreat of 30 days, conducted largely in silence, and a pilgrimage, conducted without any external resource at all. While each of these steps are themselves important, the broader picture is the point of reference — the ideal of the whole person; a man38 utterly in love with Christ — who, seeing the hand and the love of God at work in every movement in his heart, pursues the goal of sharing this love with an intensity bordering on ferocity, befitting Ignatius’s admonition to Xavier to, “go and set the world aflame.” Jesuit Universities also have very specific idea of what the whole person 39 consists of, and how to form people according to that ideal: 38 39 As a Catholic order of priests, Jesuits are exclusively male Traub, SJ (as in n. 31). 95 Chapter 5: God in All Code “Formation” can be a problematic term if it suggests indoctrination, imposing values from the outside, stamping each student from a common mold that blurs unique gifts and aspirations. It can be a useful term, however, if it means that a college proposes certain intellectual, social, moral, and spiritual standards to its students as worth acquiring and living by, equips them with the knowledge and skills to understand and critically interpret the world in light of these values, and yet respects their freedom to discern how these standards can be embodied in the decisions they make about their own lives.40 Ignatius himself had a very academic ideal of God, who he saw as teaching him as a schoolmaster taught a particularly obstinate pupil41 . In much the same way, as the academic ministry and the “intellectual apostolate” became a major charism of the society, the society in turn developed the Ratio Studiorum 42 — a plan to educate the students according to the dictates of cura personalis 43 , a latin phrase meaning “care of the whole person.” In essence, this pedagogy was to attempt to bring the whole character of a student — intellectual, moral, social, and spiritual — under the care and conscious direction of the institution. 5.6.2 Hacker Formation This same sort of notion of formation also shows up in Hacker Culture. Probably the singular text on entrance (though it claims not to be) is Eric Raymond’s How 40 Boston College Center for Student Formation, The Journey into Adulthood: Understanding Student Formation, (Self-Published, 2010). 41 John C. Olin, ‘The Idea of Pilgrimage in the Experience of Ignatius Loyola’, Church History: Studies in Christianity and Culture, 48 (1979):04 hURL: http://dx.doi.org/10.1017/ S0009640700040269i, p. 390. 42 Traub, SJ (as in n. 31), p. 264. 43 Ibid., p. 251. 96 Chapter 5: God in All Code to Become a Hacker 44 , and the corresponding document on Hacker anthropology, A Portrait of J. Random Hacker 45 . Like the Jesuit ideal of formation, both begin with an ideal of a human being, and both proceed toward it. Furthermore, as we have seen, the anthropology of what precisely constitutes a hacker overlaps considerably with the Jesuit ideal of the whole person. In particular, the notion, as we have already seen, of a Hacker being driven by a notion of mission and service overlaps nicely with the Ignatian model. What distinguishes Hacker formation from Jesuit formation is how much looser Hacker formation is. While this is not terribly surprising, given the general anarchist and adhocratic tendencies of the community, Raymond instead lays out five attitudes, four skills, and five markers of status. While Raymond offers an essential course of how to form oneself, it’s much looser than the general plan of the Ignatian plan. Indeed, the very notion of self-formation is a departure from the Ignatian tradition, wherein the institution (the order, the university, etc. is responsible for that formation). However, the same notion of cura personalis is, in fact, at play. Raymond’s portrait isn’t purely of a dynamic programmer, or even of a general purpose geek. Rather, he lays out, in his Portrait, a view of a sort of person which is both descriptive and normative. And, despite the curmudgeonly descriptions given, Raymond does describe an ultimate community consensus which lays out his idea of formation. The hacker community, while not taking the same active role in formation as the Jesuits, still lays out expectations as to how their members should be, and invites others to join them. 44 45 Raymond, ‘How To Become A Hacker’. Idem, ‘The Jargon File’, Appendix B.. 97 Chapter 5: God in All Code 5.7 Conclusion The hacker culture that has arisen in response to the computer revolution is a significant force in the Information Age. From fundamentally maintaining UNIX, the operating system of the internet, to reinventing the way we see software though first the free software movement, and later the open-source movement, including the darling among web browsers, Mozilla Firefox. However, hacker culture hasn’t been given the scholarly respect it deserves from many quarters. It has had a complex relationship with computer scientists, who generally admire the displays of prodigious skill and communal impulse exhibited by hackers, while disdaining the culture’s lack of interest in scholarly pursuits and academic rigor. The rest of academia, however, has either not even noticed them for the potent cultural force that they are, or has dismissed them as a group of disaffected nerds — isolated from society, isolated in a technocratic echo-chamber, where they hold forth childishly on matters of mere technical importance, ignorant to the broader culture that they scorn. Such a characterization could not be more wrong, or more dangerous. Whether or not it goes acknowledged, the writings of people like Richard Stallman and Eric Raymond have had, and continue to have, a major effect both on those who identify with their subculture, and those who interact with it — not merely enthusiast programmers, but also the substantial majority of the world’s computer engineering professionals. The impact of the computer on daily life has been underestimated and dismissed by the theological establishment in general, to its detriment. While the distinct antipathy of many of the major leaders in the movement to “conventional, faith- 98 Chapter 5: God in All Code holding Christianity46 ” hasn’t helped matters, in no way should this be seen as tacit permission to ignore them. Real moral and ethical challenges have arisen with the dawn of the information age, including concerns about privacy, intellectual property, and free speech, among others. To leave these questions in the secular realm is to do a disservice to both Theology and Philosophy — simply put, people of Faith have things to say, as well, even if they’re only able to speak to their co-religionists. My work in this paper comparing Jesuit and hacker spirituality is not to equate them. I have no illusions that such such a project could be done, for to impose a thin veil of Christianity over the existing hacker culture, which is already drawing on other, separate sources (some of them spiritual, notably Zen Buddhist) is disingenuous and intellectually dishonest. Rather, I have attempted to describe some of the striking similarities between the hacker and the Jesuit mindset in order to provide a ground for dialogue. Without the two traditions at least engaging each other in mutually comprehensible language, dialogue is doomed to failure. However, failure will surely see us off with a worse society — which, whether one is motivated to God’s greater glory, or in the name of solving interesting problems, is, ultimately, a failure. Such a dialogue is ultimately necessary, however, because hacker culture has a significant impact upon the culture of computer science as a whole. While hackers remain a minority subculture, some of the major products of that subculture — notably the GCC compiler, the GNOME desktop environment, and to a certain degree the Firefox web browser have taken on major acceptance within the broader technology community. With that broad acceptance has come a great deal of cultural capital — the values associated with the open-source and hacker community have become very important. 46 Raymond, ‘The Jargon File’. 99 Chapter 5: God in All Code There are three major results that could emerge from such a dialogue. The first is evangelization — a term I use hesitantly. I do not mean empty or unenlightened proselytism; such an effort, I think, would be (rightly) rejected. Rather, I mean ’ evangelism in the fullest of the sense of its greek root ǫ υαγγǫ́λιoν — to share good news. Indeed, part of any authentic dialogue with the Christian community includes a witness to the joy which the Christian community finds in its communion with Christ. The second, of course, is the converse of evangelization — what Christianity can learn from hacker culture. While there are many significant points of departure, Christianity can stand to learn a great deal from the passionate embrace and analytical altruism which characterizes modern hacker culture. Indeed, Levy47 makes a plausible case that most of hacker culture that we know grew out of the academic culture of the MIT artificial intelligence lab. Just as Christianity has grown and developed through its embrace of academic culture, it can also grow as it embraces hacker culture. The final, and perhaps most important reason for the embrace of Hacker culture is pedagogical. The sheer impact upon the discipline of computer science and the culture of its professionals demands that Christian, and especially Catholic schools grant to their students an awareness of where two major cultural crossroads can synchronize and where there is tension. The cultural power of both of these traditions is intense, and to ignore them is to risk allowing students to be caught unaware in a cultural whirlpool. At the very least, opening students’ eyes to the similarities and differences between these two major cultures follows the dictates of cura personalis. 47 Levy (as in n. 1). 100 Appendix: Bibliography Bibliography Adam, A.E., ‘Hacking into hacking: Gender and the hacker phenomenon’, Proceedings of Computer Ethics Philsophical Enquiry [2003]. Alpaydin, E., Introduction to Machine Learning, (MIT Press, 2010), Adaptive Computation and Machine Learning hURL: http://books.google.com/books?id= _i2WPwAACAAJi, ISBN 9780262012430. Anarcho Babe, Interview with Richard Stallman, 2004 hURL: http://www.gnu.org/ philosophy/rms-interview-edinburgh.htmli – visited on 12-18-08. Aquinas, St. Thomas; Knight, Kevin, editor, Summa Theologica, trans. by Fathers of the English Dominican Province Second and Revised edition. (1920) hURL: newadvent.org/summa/i. Arkin, Ronald C., Governing Lethal Behavior: Embedding Ethics in a Hybrid Deliberative/Reactive Robot Architecture, (U.S. Army Research Office, 2007) – Technical report. Arkin, Ronald C., Governing Lethal Behavior in Autonomous Robots, (Chapman & Hall, 2009). Asaro, Peter, ‘Robots and Responsibility from a Legal Perspective’, in: Proceedings of the IEEE 2007 International Conference on Robotics and Automation, Workshop on RoboEthics, (2007) hURL: http://www.peterasaro.org/writing/ASARO% 20Legal%20Perspective.pdfi. Augustine, St.; Outler, Albert C., editor, Confessions and Enchiridion, Volume 7, Library of Christian Classics, trans. by Albert C. Outler (Westminster Press, 1955) hURL: http://www.ccel.org/ccel/augustine/confessions.htmli. Benedict XVI, Message of His Holiness Pope Benedict XVI for the 44th World Communications Day: ”The Priest and Pastoral Ministry in a Digital World: New Media at the Service of the Word”, 2010 hURL: http://goo.gl/k6MZji. Boston College Center for Student Formation, The Journey into Adulthood: Understanding Student Formation, (Self-Published, 2010). 101 Appendix: Bibliography Cahill, Lisa Sowle, Love Your Enemies: Discipleship, Pacifism, and Just War Theory, (Augsburg Fortress, 1994). Chipman, Bob, Building a Better Gamer, 2010 hURL: http://gameoverthinker. blogspot.com/2010/03/episode-33-building-better-gamer.htmli. Detert, James, Trevino, Linda Klebe and Sweitzer, Vicki, ‘Moral Disengagement in Ethical Decision Making: A Study of Antecendents and Outcomes’, Journal of Applied Psychology, 93 (2008):2, pp. 374–391. Doctorow, Cory, Little Brother, 2007 hURL: http://craphound.com/ littlebrother/Cory_Doctorow_-_Little_Brother.pdfi. Doctorow, Cory, ‘Human-Readable’, in: With a Litle Help, ( SelfPublished, 2011) hURL: http://craphound.com/walh/Cory_Doctorow_-_ With_a_Little_Help.html#769i. Floridi, Luciano, ‘Two Approaches to the Philosophy of Information’, Minds and Machines, 13 (2003), pp. 459–469. Floridi, Luciano; van den Hoven, Jeroen and Weckert, John, editors, Chap. 3 In ‘Information Ethics: Its Nature and Scope’, (Cambridge University Press, 2008), pp. 40–65. Floridi, Luciano and Sanders, J.W., ‘On the Morality of Artificial Agents’, Minds and Machine, 14 (2004):3, pp. 349–379 hURL: http://goo.gl/fhwOZi. Harakas, Stanley S., Toward Transfigured Life: The Theoria of Eastern Orthodox Ethics, (Light & Life Publishing Company, 1983). Hughes, Justin, ‘The Philosophy of Intellectual Property’, The Georgetown Law Journal, 77 (1988):2, pp. 287–366. Ignatius of Loyola, The Spiritual Exercises of St. Ignatius, trans. by George E. Ganss, SJ (Loyola Press, 1992). International Commission on English in the Liturgy, Welcome to ICEL, hURL: http: //www.icelweb.org/whatis.htmi. International Commission on English in the Liturgy, Publication Policies of the International Committee on English in the Liturgy, Inc. Revised edition. (2008). Jerimijenko, Natalie, Feral Robotic Dogs, 2005 hURL: http://www.nyu.edu/ projects/xdesign/feralrobots/i. Jesuits of the New England Province, Stages in Becoming a Jesuit, 2010 hURL: http://www.sjnen.org/page.aspx?pid=227i. 102 Appendix: Bibliography Johnson, Deborah G., ‘Computer Systems: Moral Entities but Not Moral Agents’, Ethics and Information Technology 8 (2006):4. Johnson, Luke Timothy; Harrington, SJ, Daniel J., editor, The Acts of the Apostles, Volume 5, Sacra Pagina, (Liturgical Press, 1992). Keenan, SJ, James F., ‘”Whose Perfection is it Anyway?”: A Virtuous Consideration of Enhancement’, Christian Bioethics, 5 (1999):2, pp. 104–120. Kimppa, Kai, Problems with the Justification of Intellectual Property Rights in Relation to Software and Other Digitally Distributable Media, Ph. D thesis, (Turku Centre for Computer Science, 2003). Kraemer, Felicitas, van Overveld, Kees and Peterson, Martin, ‘Is there an ethics of algorithms?’ Ethics and Information Technology, (2010), pp. 1–10 hURL: http:// dx.doi.org/10.1007/s10676-010-9233-7i, 10.1007/s10676-010-9233-7, ISSN 1388–1957. LaHaye, Tim and Jenkins, Jerry B., Left Behind: A Novel of the Earth’s Last Days, 1st edition. (Tyndale House, 1996). Levy, Steven, Hackers: Heroes of the Computer Revolution, 1st edition. (Anchor Press/Doubleday, 1984). Lin, Patrick, Bekey, George and Abney, Keith, Autonomous Military Robotics: Risk, Ethics, and Design, (Office of Naval Research, 2008) – Technical report. Markoff, John, Computer Wins on ‘Jeopardy!’: Trivial, It’s Not, 2011 hURL: http: //www.nytimes.com/2011/02/17/science/17jeopardy-watson.htmli. O’Donovan, Oliver, The Just War Revisited, (Cambridge University Press, 2003). Office of the Surgeon Multi-National Force-Iraq and Office of the Surgeon General, United States Army Medical Command, Mental Health Advisory Team (MHAT) IV: Operation Iraqi Freedom 05-07, (United States Army, November 2006) – Technical report. Office of the Surgeon Multi-National Force-Iraq and Office of the Surgeon General, United States Army Medical Command, Mental Health Advisory Team (MHAT) V: Operation Iraqi Freedom 06-08, (United States Army, February 2008) – Technical report. Olin, John C., ‘The Idea of Pilgrimage in the Experience of Ignatius Loyola’, Church History: Studies in Christianity and Culture, 48 (1979):04, pp. 387–397 hURL: http://dx.doi.org/10.1017/S0009640700040269i. O’Malley, John W., The First Jesuits, (Harvard University Press, 1993). 103 Appendix: Bibliography Paul VI, Dogmatic Constitution on Divine Revelation – Dei Verbum, 1965 hURL: http://www.vatican.va/archive/hist_councils/ii_vatican_council/ documents/vat-ii_const_19651118_dei-verbum_en.htmli – visited on 5/18/10. Pollen, John Hungerford, ‘The Society of Jesus’, (Robert Appleton Company, 1912) hURL: http://www.newadvent.org/cathen/14081a.htmi. Pontifical Council for Social Communications, Church in Internet, 2002 hURL: http://www.vatican.va/roman_curia/pontifical_councils/pccs/ documents/rc_pc_pccs_doc_20020228_church-internet_en.htmli – visited on 4-13-09. Pontifical Council for Social Communications, Ethics in Internet, 2002 hURL: http://www.vatican.va/roman_curia/pontifical_councils/pccs/ documents/rc_pc_pccs_doc_20020228_ethics-internet_en.htmli – visited on 4-13-09. Raymond, Eric S., The Art of Unix Programming, 2004 hURL: http://www.catb. org/˜esr/writings/taoup/html/i – visited on 11-30-08. Raymond, Eric S., The Jargon File, 2007 hURL: http://catb.org/jargon/html/ index.htmli. Raymond, Eric S., How To Become A Hacker, 2008 hURL: http://www.catb.org/ ˜esr/faqs/hacker-howto.htmli – visited on 11-30-08. Raymond, Eric S. and Moen, Rick, How To Ask Questions The Smart Way, 2008 hURL: http://www.catb.org/˜esr/faqs/smart-questions.htmli. Reimer, James A., Christians and War: A Brief History of the Church’s Teachings and Practices, (Fortress Press, 2010). Royakkers, Lambèr and van Est, Rinie, ‘The Cubicle Warrior: the Marionette of Digitalized Warfare’, Ethics and Information Technology, 12 (2010):3, pp. 289– 296 hURL: http://goo.gl/ZuByui. Sharkey, Noel, ‘Automated Killers and the Computing Profession’, Computer, 40 (2007), pp. 122–124 hURL: http://goo.gl/xPzwzi. Sharkey, Noel, ‘Cassandra or False Prophet of Doom: AI Robots and War’, Intelligent Systems, 23 (2008):4, pp. 14–17. Sparrow, Robert, ‘Killer Robots’, Journal of Applied Philosophy, 24 (2007):1, pp. 62–77 hURL: http://www.sevenhorizons.org/docs/SparrowKillerRobots.pdfi. 104 Appendix: Bibliography Sparrow, Robert, ‘Building a Better WarBot: Ethical Issues in the Design of Unmanned Systems for Military Applications’, Science and Engineering Ethics, 15 (2009):2, pp. 169–187. Spinello, Richard, Cyberethics: Morality and Law in Cyberspace, 3rd edition. (Jones and Bartlett, 2006). Sullins, John P., ‘RoboWarfare: can robots be more ethical than humans on the battlefield?’ Ethics and Information Technology, 12 (2010):3, pp. 263–275 hURL: http://goo.gl/aMOcji. Tavani, Herman T., ‘Locke, Intellectual Property Rights, and the Information Commons’, Ethics and Information Technology, 7 June (2005):2, pp. 87–97. Traub, SJ, George W., ‘Do You Speak Ignatian: A Glosary of Terms Used in Ignatian and Jesuit Circles’, in: Idem, editor, An Ignatian Spirituality Reader, (2008), pp. 250–269. United States Conference of Catholic Bishops, The Challenge of Peace: God’s Promise and Our Response, (Office of Publishing Services, USCCB, 1983). 105