Category Archives: Public Safety

NSA PRISM, Writs of Assistance, Rattlesnakes, and the Fourth Amendment

British Crown dragnets of information against smuggling led to the U.S. Fourth Amendment, and U.S. defense against those dragnets was the origin of the Gadsden rattlesnake flag. Those colonial Writs of Assistance were much like that FISA court order for Verizon call logs and the NSA PRISM wide-range domestic communications dragnet, while Senators Feinstein and Chambliss act like the colonial royal governors who issued those Writs.

The Fourth Amendment to the U.S. Constitution:

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

Senators Feinstein and Chambliss admit there is no probable cause, and no particular description of the place to be searched or the persons or things to be seized.

The Fourth Amendment was proposed because of things very like that FISA court order to Verizon back in colonial times, namely writs of assistance to stop smuggling:

In 1760, governor [Francis] Bernard of Massachusetts authorized the use by revenue officers of writs of assistance. Writs of assistance were Continue reading

Senators Feinstein and Chambliss shuffle their feet about FISA

Senators Dianne Feinstein (D-CA) and Saxby Chambliss (R-GA) lamely tried to defend the Verizon call log wiretapping, which they full well know is actually part of a dragnet of all U.S. communications. Ed O’Keefe wrote for the Washingtohn Post yesterday, Transcript: Dianne Feinstein, Saxby Chambliss explain, defend NSA phone records program,

Dianne Feinstein:

As far as I know, this is the exact three month renewal of what has been the case for the past seven years. This renewal is carried out by the FISA Court under the business records section of the Patriot Act. Therefore, it is lawful.

It has been briefed to Congress and the letters that we have distributed — and you’ll note on the dates, this is prior to the Patriot Act amendments coming before the body, each of those. As you know, this is just Continue reading

NSA domestic spying: we stopped it in 1977 and we can stop it again

After seven years or more, it’s good people are finally noticing the NSA spying program: now maybe enough people will do something about it like we did in 1977.

Don’t believe it’s just limited to who calls who: since at least 2005, AT&T (and most likely all the other telcos) has been sending all telecommunications to NSA. This stuff started after 9/11 and was legalized by the FISA Amendments Act of 2008. Before 9/11 NSA respected a rigorous wall between it and domestic spying. Time to put that wall back up. Bruce Schneier wrote 29 December 2005, Project Shamrock,

Decades before 9/11, and the subsequent Bush order that directed the NSA to eavesdrop on every phone call, e-mail message, and who-knows-what-else going into or out of the United States, U.S. citizens included, they did the same thing with telegrams. It was called Project Shamrock, and anyone who thinks this is new legal and technological terrain should read up on that program.

Project SHAMROCK…was an espionage exercise that involved the accumulation of all telegraphic data entering into or exiting from the United States. The Armed Forces Security Agency (AFSA) and its successor NSA were given direct access to daily microfilm copies of all incoming, outgoing, and transiting telegraphs via the Western Union and its associates RCA and ITT. Operation Shamrock lasted well into the 1960s when computerized operations (HARVEST) made it possible to search for keywords rather than read through all communications.

Project SHAMROCK became so successful that in 1966 Continue reading

Economists still calling computer networks “virtual” while interconnectivity is exposing economic externalities

While artists and designers have discovered there’s no sharp distinction between “real” and “virtual” (aka the New Aesthetic), economists are still talking about “virtual”, even as the networks of computers they’re referring to are exposing the economic externalities the greed of the “first economy” is built on.

Bill Davidow wrote for the Atlantic 10 April 2012, How Computers Are Creating a Second Economy Without Workers,

“Twenty years ago, if you went into an airport you would walk up to a counter and present paper tickets to a human being. That person would register you on a computer, notify the flight you’d arrived, and check your luggage in. All this was done by humans.”
Well, except for that part about “a computer”. And the flight computers in the airplane. And the FAA computers. And….

This is also true:

“Today, you walk into an airport and look for a machine. You put in a frequent-flier card or credit card, and it takes just three or four seconds to get back a boarding pass, receipt, and luggage tag. What interests me is what happens in those three or four seconds. The moment the card goes in, you are starting a huge conversation conducted entirely among machines. Once your name is recognized, computers are checking your flight status with the airlines, your past travel history, your name with the TSA (and possibly also with the National Security Agency). They are checking your seat choice, your frequent-flier status, and your access to lounges.”
While Bruce Sterling can (rightly, I think) say that’s not AI, nonetheless it all happens without much human intervention. And pixelated images of airplanes don’t start to indicate what’s going on in there.

The punchline:

“Here’s the challenge: In the past, every million-dollar increase in economic output generated on the order of ten jobs. In the future, in the productive Second Economy, it may generate only one or two.”
That’s not new. I’m a farmer, and 90% of farm jobs in this country Continue reading

Stop Internet censorship —Internet Engineers

Parker Higgins and Peter Eckersley wrote for EFF 15 December 2011, An Open Letter From Internet Engineers to the U.S. Congress
Today, a group of 83 prominent Internet inventors and engineers sent an open letter to members of the United States Congress, stating their opposition to the SOPA and PIPA Internet blacklist bills that are under consideration in the House and Senate respectively.
The signatories are people such as Vint Cerf you may have heard of even if you know nothing about the technical details of Internet, and many other people who helped produce the network you are using now. I know many of them, and they are right. If you want a free and open Internet, call or write your Senators and Congress members today, and tell them to vote against PIPA and SOPA.

The full text of the letter is appended below.

-jsq

We, the undersigned, have played various parts in building a network called the Internet. We wrote and debugged the software; we defined the standards and protocols that talk over that network. Many of us invented parts of it. We’re just a little proud of the social and economic benefits that our project, the Internet, has brought with it.

Last year, many of us wrote to you and your colleagues to warn about the proposed “COICA” copyright and censorship legislation. Today, we are writing again to reiterate our concerns about the SOPA and PIPA derivatives of last year’s bill, that are under consideration in the House and Senate. In many respects, these proposals are worse than the one we were alarmed to read last year.

If enacted, either of these bills will create an environment of tremendous fear and uncertainty for technological innovation, and seriously harm the credibility of the United States in its role as a steward of key Internet infrastructure. Regardless of recent amendments to SOPA, both bills will risk fragmenting the Internet’s global domain name system (DNS) and have other capricious technical consequences. In exchange for this, such legislation would engender censorship that will simultaneously be circumvented by deliberate infringers while hampering innocent parties’ right and ability to communicate and express themselves online.

All censorship schemes impact speech beyond the category they were intended to restrict, but these bills are particularly egregious in that regard because they cause entire domains to vanish from the Web, not just infringing pages or files. Worse, an incredible range of useful, law-abiding sites can be blacklisted under these proposals. In fact, it seems that this has already begun to happen under the nascent DHS/ICE seizures program.

Censorship of Internet infrastructure will inevitably cause network errors and security problems. This is true in China, Iran and other countries that censor the network today; it will be just as true of American censorship. It is also true regardless of whether censorship is implemented via the DNS, proxies, firewalls, or any other method. Types of network errors and insecurity that we wrestle with today will become more widespread, and will affect sites other than those blacklisted by the American government.

The current bills — SOPA explicitly and PIPA implicitly — also threaten engineers who build Internet systems or offer services that are not readily and automatically compliant with censorship actions by the U.S. government. When we designed the Internet the first time, our priorities were reliability, robustness and minimizing central points of failure or control. We are alarmed that Congress is so close to mandating censorship-compliance as a design requirement for new Internet innovations. This can only damage the security of the network, and give authoritarian governments more power over what their citizens can read and publish.

The US government has regularly claimed that it supports a free and open Internet, both domestically and abroad. We cannot have a free and open Internet unless its naming and routing systems sit above the political concerns and objectives of any one government or industry. To date, the leading role the US has played in this infrastructure has been fairly uncontroversial because America is seen as a trustworthy arbiter and a neutral bastion of free expression. If the US begins to use its central position in the network for censorship that advances its political and economic agenda, the consequences will be far-reaching and destructive.

Senators, Congressmen, we believe the Internet is too important and too valuable to be endangered in this way, and implore you to put these bills aside.

Signed,

  • Vint Cerf, co-designer of TCP/IP, one of the “fathers of the Internet”, signing as private citizen
  • Paul Vixie, author of BIND, the most widely-used DNS server software, and President of the Internet Systems Consortium
  • Tony Li, co-author of BGP (the protocol used to arrange Internet routing); chair of the IRTF’s Routing Research Group; a Cisco Fellow; and architect for many of the systems that have actually been used to build the Internet
  • Steven Bellovin, invented the DNS cache contamination attack; co-authored the first book on Internet security; recipient of the 2007 NIST/NSA National Computer Systems Security Award and member of the DHS Science and Technology Advisory Committee
  • Jim Gettys, editor of the HTTP/1.1 protocol standards, which we use to do everything on the Web
  • Dave Kristol, co-author, RFCs 2109, 2965 (Web cookies); contributor, RFC 2616 (HTTP/1.1)
  • Steve Deering, Ph.D., invented the IP multicast feature of the Internet; lead designer of IPv6 (version 6 of the Internet Protocol)
  • David Ulevitch, David Ulevitch, CEO of OpenDNS, which offers alternative DNS services for enhanced security.
  • Elizabeth Feinler, director of the Network Information Center (NIC) at SRI International, administered the Internet Name Space from 1970 until 1989 and developed the naming conventions for the internet top level domains (TLDs) of .mil, .gov, .com, .org, etc. under contracts to DoD
  • Robert W. Taylor, founded and funded the beginning of the ARPAnet; founded and managed the Xerox PARC Computer Science Lab which designed and built the first networked personal computer (Alto), the Ethernet, the first internet protocol and internet, and desktop publishing
  • Fred Baker, former IETF chair, has written about 50 RFCs and contributed to about 150 more, regarding widely used Internet technology
  • Dan Kaminsky, Chief Scientist, DKH
  • Esther Dyson, EDventure; founding chairman, ICANN; former chairman, EFF; active investor in many start-ups that support commerce, news and advertising on the Internet; director, Sunlight Foundation
  • Walt Daniels, IBM’s contributor to MIME, the mechanism used to add attachments to emails
  • Nathaniel Borenstein, Chief Scientist, Mimecast; one of the two authors of the MIME protocol, and has worked on many other software systems and protocols, mostly related to e-mail and payments
  • Simon Higgs, designed the role of the stealth DNS server that protects a.root-servers.net; worked on all versions of Draft Postel for creating new TLDs and addressed trademark issues with a complimentary Internet Draft; ran the shared-TLD mailing list back in 1995 which defined the domain name registry/registrar relationship; was a root server operator for the Open Root Server Consortium; founded coupons.com in 1994
  • John Bartas, was the technical lead on the first commercial IP/TCP software for IBM PCs in 1985-1987 at The Wollongong Group. As part of that work, developed the first tunneling RFC, rfc-1088
  • Nathan Eisenberg, Atlas Networks Senior System Administrator; manager of 25K sq. ft. of data centers which provide services to Starbucks, Oracle, and local state
  • Dave Crocker, author of Internet standards including email, DKIM anti-abuse, electronic data interchange and facsimile, developer of CSNet and MCI national email services, former IETF Area Director for network management, DNS and standards, recipient of IEEE Internet Award for contributions to email, and serial entrepreneur
  • Craig Partridge, architect of how email is routed through the Internet; designed the world’s fastest router in the mid 1990s
  • Doug Moeller, Chief Technology Officer at Autonet Mobile
  • John Todd, Lead Designer/Maintainer – Freenum Project (DNS-based, free telephony/chat pointer system), http://freenum.org/
  • Alia Atlas, designed software in a core router (Avici) and has various RFCs around resiliency, MPLS, and ICMP
  • Kelly Kane, shared web hosting network operator
  • Robert Rodgers, distinguished engineer, Juniper Networks
  • Anthony Lauck, helped design and standardize routing protocols and local area network protocols and served on the Internet Architecture Board
  • Ramaswamy Aditya, built various networks and web/mail content and application hosting providers including AS10368 (DNAI) which is now part of AS6079 (RCN); did network engineering and peering for that provider; did network engineering for AS25 (UC Berkeley); currently does network engineering for AS177-179 and others (UMich)
  • Blake Pfankuch, Connecting Point of Greeley, Network Engineer
  • Jon Loeliger, has implemented OSPF, one of the main routing protocols used to determine IP packet delivery; at other companies, has helped design and build the actual computers used to implement core routers or storage delivery systems; at another company, installed network services (T-1 lines and ISP service) into Hotels and Airports across the country
  • Jim Deleskie, internetMCI Sr. Network Engineer, Teleglobe Principal Network Architect
  • David Barrett, Founder and CEO, Expensify
  • Mikki Barry, VP Engineering of InterCon Systems Corp., creators of the first commercial applications software for the Macintosh platform and the first commercial Internet Service Provider in Japan
  • Peter Rubenstein,helped to design and build the AOL backbone network, ATDN.
  • David Farber, distinguished Professor CMU; Principal in development of CSNET, NSFNET, NREN, GIGABIT TESTBED, and the first operational distributed computer system; EFF board member
  • Bradford Chatterjee, Network Engineer, helped design and operate the backbone network for a nationwide ISP serving about 450,000 users
  • Gary E. Miller Network Engineer specializing in eCommerce
  • Jon Callas, worked on a number of Internet security standards including OpenPGP, ZRTP, DKIM, Signed Syslog, SPKI, and others; also participated in other standards for applications and network routing
  • John Kemp, Principal Software Architect, Nokia; helped build the distributed authorization protocol OAuth and its predecessors; former member of the W3C Technical Architecture Group
  • Christian Huitema, worked on building the Internet in France and Europe in the 80’s, and authored many Internet standards related to IPv6, RTP, and SIP; a former member of the Internet Architecture Board
  • Steve Goldstein, Program Officer for International Networking Coordination at the National Science Foundation 1989-2003, initiated several projects that spread Internet and advanced Internet capabilities globally
  • David Newman, 20 years’ experience in performance testing of Internet
    infrastructure; author of three RFCs on measurement techniques (two on firewall performance, one on test traffic contents)
  • Justin Krejci, helped build and run the two biggest and most successful municipal wifi networks located in Minneapolis, MN and Riverside, CA; building and running a new FTTH network in Minneapolis
  • Christopher Liljenstolpe, was the chief architect for AS3561 (at the time about 30% of the Internet backbone by traffic), and AS1221 (Australia’s main Internet infrastructure)
  • Joe Hamelin, co-founder of Seattle Internet Exchange (http://www.seattleix.net) in 1997, and former peering engineer for Amazon in 2001
  • John Adams, operations engineer at Twitter, signing as a private citizen
  • David M. Miller, CTO / Exec VP for DNS Made Easy (IP Anycast Managed Enterprise DNS provider)
  • Seth Breidbart, helped build the Pluribus IMP/TIP for the ARPANET
  • Timothy McGinnis, co-chair of the African Network Information Center Policy Development Working Group, and active in various IETF Working Groups
  • Richard Kulawiec, 30 years designing/operating academic/commercial/ISP systems and networks
  • Larry Stewart, built the Etherphone at Xerox, the first telephone system working over a local area network; designed early e-commerce systems for the Internet at Open Market
  • John Pettitt, Internet commerce pioneer, online since 1983, CEO Free Range Content Inc.; founder/CTO CyberSource & Beyond.com; created online fraud protection software that processes over 2 billion transaction a year
  • Brandon Ross, Chief Network Architect and CEO of Network Utility Force LLC
  • Chris Boyd, runs a green hosting company and supports EFF-Austin as a board member
  • Dr. Richard Clayton, designer of Turnpike, widely used Windows-based Internet access suite; prominent Computer Security researcher at Cambridge University
  • Robert Bonomi, designed, built, and implemented, the Internet presence for a number of large corporations
  • Owen DeLong, member of the ARIN Advisory Council who has spent more than a decade developing better IP addressing policies for the internet in North America and around the world
  • Baudouin Schombe, blog design and content trainer
  • Lyndon Nerenberg, Creator of IMAP Binary extension (RFC 3516)
  • John Gilmore, co-designed BOOTP (RFC 951), which became DHCP, the way you get an IP address when you plug into an Ethernet or get on a WiFi access point; current EFF board member
  • John Bond, Systems Engineer at RIPE NCC maintaining AS25152 (k.root-servers.net.) and AS197000 (f.in-addr-servers.arpa. ,f.ip6-servers.arpa.); signing as a private citizen
  • Stephen Farrell, co-author on about 15 RFCs
  • Samuel Moats, senior systems engineer for the Department of Defense; helps build and defend the networks that deliver data to Defense Department users
  • John Vittal, created the first full email client and the email standards still in use today
  • Ryan Rawdon, built out and maintains the network infrastructure for a rapidly growing company in our country’s bustling advertising industry; was on the technical operations team for one of our country’s largest residential ISPs
  • Brian Haberman, has been involved in the design of IPv6, IGMP/MLD, and NTP within the IETF for nearly 15 years
  • Eric Tykwinski, Network Engineer working for a small ISP based in the Philadelphia region; currently maintains the network as well as the DNS and server infrastructure
  • Noel Chiappa, has been working on the lowest level stuff (the IP protocol level) since 1977; name on the ‘Birth of the Internet’ plaque at Stanford); actively helping to develop new ‘plumbing’ at that level
  • Robert M. Hinden, worked on the gateways in the early Internet, author of many of the core IPv6 specifications, active in the IETF since the first IETF meeting, author of 37 RFCs, and current Internet Society Board of Trustee member
  • Alexander McKenzie, former member of the Network Working Group and participated in the design of the first ARPAnet Host protocols; was the manager of the ARPAnet Network Operation Center that kept the network running in the early 1970s; was a charter member of the International Network Working Group that developed the ideas used in TCP and IP
  • Keith Moore, was on the Internet Engineering Steering Group from 1996-2000, as one of two Area Directors for applications; wrote or co-wrote technical specification RFCs associated with email, WWW, and IPv6 transition
  • Guy Almes, led the connection of universities in Texas to the NSFnet during the late 1980s; served as Chief Engineer of Internet2 in the late 1990s
  • David Mercer, formerly of The River Internet, provided service to more of Arizona than any local or national ISP
  • Paul Timmins, designed and runs the multi-state network of a medium sized telephone and internet company in the Midwest
  • Stephen L. Casner, led the working group that designed the Real-time Transport Protocol that carries the voice signals in VoIP systems
  • Tim Rutherford, DNS and network administrator at C4
  • Mike Alexander, helped implement (on the Michigan Terminal System at the University of Michigan) one of the first EMail systems to be connected to the Internet (and to its predecessors such as Bitnet, Mailnet, and UUCP); helped with the basic work to connect MTS to the Internet; implemented various IP related drivers on early Macintosh systems: one allowed TCP/IP connections over ISDN lines and another made a TCP connection look like a serial port
  • John Klensin, Ph.D., early and ongoing role in the design of Internet applications and coordination and administrative policies
  • L. Jean Camp, former Senior Member of the Technical Staff at Sandia National Laboratories, focusing on computer security; eight years at Harvard’s Kennedy School; tenured Professor at Indiana Unviersity’s School of Informatics with research addressing security in society.
  • Louis Pouzin, designed and implemented the first computer network using datagrams (CYCLADES), from which TCP/IP was derived
  • Carl Page, helped found eGroups, the biggest social network
    of its day, 14 million users at the point of sale to Yahoo for around $430,000,000, at which point it became Yahoo Groups
  • Phil Lapsley, co-author of the Internet Network News Transfer Protocol (NNTP), RFC 977, and developer of the NNTP reference implementation
  • Jack Haverty (MSEE, BSEE MIT 1970), Principal Investigator for several DARPA projects including the first Internet development and operation; Corporate Network Architect for BBN; Founding member of the IAB/ICCB; Internet Architect and Corporate Founding Member of W3C for Oracle Corporation
  • Glenn Ricart, Managed the original (FIX) Internet interconnection point

a worldwide social network that has fomented revolution in multiple countries

Who would have thought that twitter and facebook could foment a revolution? Yet Wael Ghonim says it did. He’s one of the people behind the “We are all Khaled Said” facebook page, and he spent a dozen days in jail for it: Here’s his TED Talk:
“Because of the Internet, the truth prevailed.
And everyone knew the truth.
And everyone started to think that this guy can be my brother.”

Here’s a post from that facebook page on 3 March 2011:

“I really want you ALL to understand that your support to Free Egypt & Egyptians is vital. Don’t you ever think that sitting on FaceBook supporting & commenting help help Egypt. A whole revolution started on Facebook & is now bringing Freedom & starting a new modern Egypt.”

Other Egyptian organizers say similar things:

“Online organising is very important because activists have been able to discuss and take decisions without having to organise a meeting which could be broken up by the police,” he said.’
( “Internet role in Egypt’s protests,” by Anne Alexander, BBC, 9 February 2011.)

Many of the Egyptians involved were poor and not usually thought of as Internet users, but David D. Kirkpatrick expalined that in the NY Times 9 Feb 2011, Wired and Shrewd, Young Egyptians Guide Revolt:

The day of the protest, the group tried a feint to throw off the police. The organizers let it be known that they intended to gather at a mosque in an upscale neighborhood in central Cairo, and the police gathered there in force. But the …organizers set out instead for a poor neighborhood nearby, Mr. Elaimy recalled.

Starting in a poor neighborhood was itself an experiment. “We always start from the elite, with the same faces,” Mr. Lotfi said. “So this time we thought, let’s try.” ‘

The NY Times story goes into detail about how the online organizing interfaced with and instigated the initial meatspace protests.

And you don’t need a laptop or a desktop computer to use social media. As Reese Jones points out,

in 2010 75% of the population of Egypt had cell phones (60 million phones in service likely with SMS) possible to message via Facebook via SMS at http://m.facebook.com/.
And this was all after similar efforts in Tunisia had successfully exiled their tyrant and inspired the Egyptians, who in turn inspired the Lybians, etc. And what inspired the Tunisians to start was Wikileaks posts of U.S. cables showing the U.S. thought the Tunisian dictator was just as clueless and corrupt as the Tunisians thought.

So yes, social networking on the Internet has fomented multiple revolutions.

-jsq

700Mhz Owners and Uses: Public Safety Counts, Too

700owners.gif There are other issues in 700Mhz spectrum allocation than AT&T’s bottom line:
“It is a life or death issue,” said Harold Hurtt, Houston Chief of Police and President of Major Cities Chiefs, an organization that represents 63 of the nation’s largest police organizations. Hurtt made his comments in a video interview distributed during the Association of Public-Safety Communications Officials (APCO) International 71st annual convention in Denver.

700 MHz On The Line by samc, dailywireless.org, Monday, September 5th, 2005 at 1:00 pm.

And some of that spectrum has already been allocated. AT&T just cherrypicked the biggest previous 700Mhz spectrum holder, Aloha Partners, but there are more than a dozen others. Don’t be surprised if some of those get gobbled up, too.

-jsq

Intended vs. Legal

richard-m-nixon-sized.jpg Shortly after a high level U.S. official acknowledged that telephone companies have helped the government in illegal spying, this comes out:
WASHINGTON — The Bush administration wants the power to grant legal immunity to telecommunications companies that are slapped with privacy suits for cooperating with the White House’s controversial warrantless eavesdropping program.

The authority would effectively shut down dozens of lawsuits filed against telecommunications companies accused of helping set up the program.

The vaguely worded proposal would shield any person who allegedly provided information, infrastructure or “any other form of assistance” to the intelligence agencies after the Sept. 11, 2001 terror attacks. It covers any classified communications activity intended to protect the country from terrorism.

Bush Seeks Legal Immunity for Telecoms, By KATHERINE SHRADER, Associated Press Writer, August 31, 2007 – 5:02 p.m. EDT

Let’s let President Nixon sum it up:

Well, when the president does it that means that it is not illegal.

Richard M. Nixon interviewed by David Frost, 19 May 1977.

Yet the same administration can’t be proactive about effective regulation of first-mile Internet access for effective competition.

-jsq

Achille’s Dark Heel

raymond_kelly.jpg
Raymond Kelly

JohnArquilla2.jpg
John Arquilla

“The Internet is the new Afghanistan,” [New York police commissioner Raymond] Kelly said, as he released a New York Police Department (NYPD) report on the home-grown threat of attacks by Islamist extremists. “It is the de facto training ground. It’s an area of concern.”

The report found that the challenge for Western authorities was to identify, pre-empt and prevent home-grown threats, which was difficult because many of those who might undertake an attack often commit no crimes along the path to extremism.

The report identified the four stages to radicalization as pre-radicalization, self-identification, indoctrination, and jihadization, and said the Internet drove and enabled the process.

Internet is “the new Afghanistan”: NY police commissioner, By Michelle Nichols and Edith Honan, Reuters, Wed Aug 15, 3:51 PM ET

Nevermind that this makes about as much sense as saying “the telephone is the new Afghanistan” or “talking is the new Afghanistan”. Of course the Internet enables that process! The Internet enables every communication process.

Let’s look beyond communication and information to what people think they know because of those things:

As the information age deepens, a globe–circling realm of the mind is being created — the “noosphere” that Pierre Teilhard de Chardin identified 80 years ago. This will increasingly affect the nature of grand strategy and diplomacy. Traditional realpolitik, which ultimately relies on hard (principally military) power, will give way to the rise of noöpolitik (or noöspolitik), which relies on soft (principally ideational) power. This paper reiterates the authors’ views as initially stated in 1999, then adds an update for inclusion in a forthcoming handbook on public diplomacy. One key finding is that non–state actors — unfortunately, especially Al Qaeda and its affiliates — are using the Internet and other new media to practice noöpolitik more effectively than are state actors, such as the U.S. government. Whose story wins — the essence of noöpolitik — is at stake in the worldwide war of ideas.

The promise of noöpolitik, by David Ronfeldt and John Arquilla, First Monday, volume 12, number 8 (August 2007)

This sounds almost like what the NYPD is saying. Continue reading

FCC’s Martin Wireless Auction Plan

rmm.jpg The Post has some interesting analysis of which FCC commissioners said what when they approved Chairman Kevin Martin’s 700Mhz wireless auction plan:
The “open-access” provision was endorsed last month by FCC Chairman Kevin J. Martin, a Republican, and gained support from the two Democratic commissioners, Jonathan S. Adelstein and Michael J. Copps. Deborah Taylor Tate, a Republican commissioner, also voted in favor of the deal. Martin said he hoped the proposal would encourage a new entrant to compete with the cable and phone companies that provide broadband service.

Republican Commissioner Robert M. McDowell voted against the proposal, arguing that placing any conditions on the sale of airwaves would hurt smaller carriers by making smaller licenses without any requirements appealing to larger bidders.

“Smaller players, especially rural companies, will be unable to match the higher bids of the well-funded giants,” he said.

FCC Approves Airwave Use For All Phones, Wireless Network Opened To Options if Not Firms, By Kim Hart, Washington Post Staff Writer, Wednesday, August 1, 2007; Page D01

It’s not clear to me where the bigger players will find enough smaller licenses without any requirements to be worth their while. Unless those licenses are also attractive because of the Universal Service Fund.

What did the corporate players say? Continue reading