We are heading into an era of uncontrolled and uncontrollable informat
ion flow. In the past, the tools of information flow required large in
vestments, and the persons controlling them were easily identifiable.
Now, effective long-range communication with large numbers of people c
an be done-using tools that are easily affordable to the average citiz
en. Moreover, it can be done in ways that make monitoring and control
virtually impossible. This is not a worrisome future change that can b
e averted by prompt action; it is a fait accompli and there is no reve
rsing it. However, this is not necessarily clear to those interested i
n monitoring and control. Unfortunately, the bulk of electronic commun
ication is still relatively exposed to monitoring and control, and is
likely to remain so for a while. The danger is that the authorities, t
rying to retain a grip on a situation that is irretrievably slipping a
way, will react to the extremes of the problem in ways that leave ordi
nary users' privacy unprotected. The best approach is to adapt traditi
onal solutions rather than inventing new ones. The safeguards built in
to the traditional solutions may not be precisely appropriate, but the
y are far better than nothing.