Select your localized edition:

Close ×

More Ways to Connect

Discover one of our 28 local entrepreneurial communities »

Be the first to know as we launch in new countries and markets around the globe.

Interested in bringing MIT Technology Review to your local market?

MIT Technology ReviewMIT Technology Review - logo


Unsupported browser: Your browser does not meet modern web standards. See how it scores »

{ action.text }

Would Amnesty International mount a letter-writing campaign to get a human rights activist out of jail if she had been arrested for pirating Microsoft Word? Probably not, says Ball. Amnesty International, the world’s richest human-rights group, buys properly licensed copies of Microsoft Office for its computers. But when rich organizations use expensive, proprietary software, they implicitly encourage the poorer organizations with whom they work and share documents to do the same. And that requires either violating the law or using scarce resources to buy legitimate software. This is a compelling reason to push for the widespread adoption of free software. The pervasive use of Microsoft Office, combined with a staunch antipiracy program, amounts to economic colonialism.

There is another reason for human rights organizations to eschew Windows: verifiability. Whenever death squads make threats against a villager who speaks with rights workers, those workers have a moral responsibility to be sure their computers are secured with the best technology available. Lives depend on it. There is no way to verify the security of Windows: the software is secret. Indeed, Microsoft’s latest license agreements give the company the right to go into computers without their owners’ permission (or knowledge) to load software and retrieve “technical” information at Microsoft’s sole discretion. A hostile government could probably exploit these vulnerabilities, reaching through the Internet to break into a rights worker’s computer, never even setting foot in that person’s office.

The only way a human rights organization (or anybody else) can be sure there are no back doors into its software is to have an expert remove all parts of the program that allow remote access. Clearly, this verification would require access to the source code. In practice, the need for verification rules out not only Windows but also any other closed-source system, including those on Macintoshes and on Palm handheld devices.

Even two years ago, it wasn’t practical for nongeeks to run Linux and the rest of the free-software mlange. (Articles in computer magazines that claimed otherwise were prematurely enthusiastic.) But today, thanks to Red Hat Software and OpenOffice, free software is a viable alternative. The current version of Red Hat Linux runs on a wide range of hardware, automatically loads OpenOffice, and provides a usable and visually attractive desktop.

There’s another reason for my becoming more bullish about free software. A few months ago, a system administrator in a Central American human-rights office e-mailed Ball that the office had stopped running its pirated copy of Microsoft Exchange and had switched its e-mail system to Red Hat Linux. The reason: it was nearly impossible to run Exchange without expensive books and training courses. Free software, by contrast, comes with free documentation. And monetary freedom translates into political freedom by eliminating at least one way oppressive governments can thwart these groups’ good works.

0 comments about this story. Start the discussion »

Tagged: Computing

Reprints and Permissions | Send feedback to the editor

From the Archives


Introducing MIT Technology Review Insider.

Already a Magazine subscriber?

You're automatically an Insider. It's easy to activate or upgrade your account.

Activate Your Account

Become an Insider

It's the new way to subscribe. Get even more of the tech news, research, and discoveries you crave.

Sign Up

Learn More

Find out why MIT Technology Review Insider is for you and explore your options.

Show Me