Quotulatiousness

June 29, 2011

Corruption as a catalyst for rebellion?

Filed under: Bureaucracy, Germany, Government, Politics, Russia — Tags: , , , — Nicholas @ 07:26

Austin Bay points out that better communications have been important elements in the “Arab Spring” and other populist protests in the world right now, but there’s another element joining them together:

What links the Arab Spring rebellions with political agitation in China and at least another five dozen simmering or emerging crises?

If your answer is “the Internet,” you have identified one of the key information technologies that spread the flames. However, the common human fire in these disparate struggles is intense disgust with embedded corruption.

Tyrants maintain control by isolating and intimidating their subjects. However, since the advent of the printing press and increasing public literacy, preserving tyrannical isolation has become a bit more difficult.

Over time, subjects become aware of social, cultural, economic and political alternatives to the despot’s rule, despite the despot’s propaganda. Just how deeply West German television influenced East German resistance to communism is debatable, but the Iron Curtain could not hide the overwhelming evidence of Western affluence and the West’s ability to occasionally remove corrupt leaders.

Communist elite corruption amidst systemic economic failure certainly influenced resistance throughout Eastern Europe and the Soviet Union. The special stores and vacation homes enjoyed by Communist Party favorites infuriated workers denied similar access. East European workers knew that they were industrialized serfs in handcuffed societies falling further and further behind Western European nations. In 1989, when the Russians concluded the Eastern European security forces could not — or would not — shoot everyone, the Berlin Wall cracked.

June 28, 2011

Government attempts to censor and control the internet spawn opposition

Filed under: Government, Liberty, Media, Technology — Tags: , , , , , , — Nicholas @ 12:06

Loz Kaye makes the point that the recent ratcheting-up of freelance subversion of government and corporate web sites and online communities is a direct reaction to attempts to control the internet:

LulzSec wasn’t an isolated or unique phenomenon. People with passionate beliefs have been using new technological tools to effect change out of a sense of powerlessness. In the last year, I’ve watched 38 Degrees using the strength of association online to change government policy, WikiLeaks force transparency on those who’d rather run from it, even the amorphous mass that is Anonymous taking a stand on whatever issue they feel deserves their attention.

These tools are now themselves under attack. Lord Mandelson’s last gift to us, the Digital Economy Act, is just one of a raft of “three strikes laws” worldwide that threaten to cut off households from the web. Buried in the coalition’s Prevent strategy is the assertion that “internet filtering across the public estate is essential”. Nor is it solely a British issue; Nicolas Sarkozy called for global online governance at the eG8 in his attempt to civilise the “wild west” of the web.

We’re starting to see what this civilising process entails. Open Rights Group revealed that Ed Vaizey and lobbyists held a secret meeting discussing the future of web blocking powers. There was no public oversight and no one asked the net natives. Vaizey has relented a little via Twitter, consenting to open up the discussion — the Pirate Party and I welcome that invitation. It will take more, however, than getting a few NGOs around a table to ease the real sense of anger poisoning the online community.

We’re quickly coming up on a time when we’ll need to enshrine access to the internet (or equivalent data sources) as a formal constitutional right. If we don’t, we will always have this urge to control and to censor on the part of petty authoritarians and bureaucrats.

June 27, 2011

A review of The Declaration of Independents

Filed under: Books, Economics, Liberty, Media, Politics — Tags: , , , — Nicholas @ 08:33

Timothy P. Carney talks about the new book by Nick Gillespie and Matt Welch:

Libertarians today are mostly considered a variety of conservative — Ronald Reagan with fewer bombs and more pot. But Welch and Gillespie don’t cast libertarianism as one of many political ideolgies. Instead, they portray it as a truce. It’s unpolitics. The authors see evidence of a “libertarian moment,” not so much in public opinion on policy matters (though outrage about bailouts helps), but in cultural trends that spill over into politics.

Younger Americans don’t like being told what to think. Gone is the voice-of-God Walter Cronkite figure. Younger adults assemble their own news feeds a la carte, following trusted voices on Twitter and RSS feeds. Even walking through a shopping mall, the authors argue, shows how we’re much more individualistic as a culture than we used to be. The authors say there’s a proliferation of cliques and types in high schools and among adults, too. The Internet has helped people find kindred spirits both near and far, making it less necessary to modify your interests to match an existing group. Americans, increasingly, choose their own way.

And there, in a nutshell, is the traditionalist’s core argument against the internet (grounded in their remembered high school experience): it allows geeks and nerds and other unpopular kids to find solace, support and fellow feeling outside their immediate physical surroundings. That undermines the traditional rule of the jocks and the beautiful people.

Welch and Gillespie see our cultural trends as evidence that “decentralization and democratization” are taking territory from “the forces of control and centralization.” The political corollary, naturally, would be a movement that creates more space for individuality. It would be almost an anti-political movement.

But this is where every dream of an independent or libertarian uprising crashes into reality. You don’t win at politics without being good at politics. The people who are best at politics are the people who stand to gain a lot from it — special interests and people who get like to play the political game. Neither group is likely to include many anti-political decentralizers.

What about the libertarians who are already caught up in politics? The think-tankers, the activists, the journalists? Well, they’re another obstacle to a libertarian revolution. For one thing, this is a group famous for infighting. The Libertarian Party has been racked with strife, splits and feuds for its entire existence. Welch and Gillespie want to pitch a big tent, but Beltway libertarians are famous for imposing “purity tests.” (Q: Should vending machines marketing heroin to children be allowed on public sidewalks? A: There shouldn’t be public sidewalks.)

That last quip is quite true: the very first time I walked in to a libertarian gathering, I was besieged with purity testing of that sort. I nearly walked right back out without a backward glance.

June 24, 2011

Newspapers still trying to adapt to a vastly changed world

Filed under: Britain, Economics, Media — Tags: , , — Nicholas @ 09:04

In a blog post at the Guardian, Roy Greenslade puts the financial changes into a bit of perspective:

So prepare — if you’re of a certain age — for a warm nostalgic bath. In 1950, with TV sets in only 9% of homes, a British street of 100 houses could be relied on to buy 140 newspapers a day and 220 on Sunday.

In 2010, with each of those houses containing an average of 2.6 TVs, the same street bought just 40 papers a day, Monday to Sunday.

Some advertising revenues fled to TV as it developed in the 1950s, 1960s and 1970s, but not in such great numbers as to ruin newspapers, which could still rely on huge circulation sales income.

In 1966, the Daily Mirror sold 5.1m copies a day, the Daily Express 4m and the Daily Telegraph 1.4m. Last month, those titles had circulations of 1.2m, 631,000 and 635,000 respectively.

It was one of the things that struck me on my first trip back to England in 1979 — although not as badly as the bone-chilling damp — was the profusion of newspapers available. I was used to Toronto, where you could get the Toronto Star, the Globe and Mail, and the horrible little upstart pleb rag, the Toronto Sun. Seeing all the different papers was quite an eye-opener.

No wonder why he chose to title the post “Those were the days, my friends, we’d thought they’d never end…”

June 22, 2011

Carr: LulzSec versus the CIA

Filed under: Government, Technology, USA — Tags: , , , , — Nicholas @ 07:50

Paul Carr is somewhat dismissive of the hacking exploits of the LulzSec group:

For the past few weeks, a hacker collective called LulzSec has been leading American and British authorities a merry dance. The group’s targets are seemingly random – Sony, the CIA, contestants of a reality TV show, the Serious Organised Crime Agency (Soca) – but their stated motive has remained constant: “we’re doing it for laughs”, or, to put it in internet parlance, “lulz”.

If one is to believe the media coverage – particularly here in the US‚ no one is safe from the ingenious hackers and their devilishly complex attacks. The truth is, there’s almost nothing ingenious about what LulzSec is doing: CIA and Soca were not “hacked” in any meaningful sense, rather their public websites were brought down by an avalanche of traffic — a so-called “distributed denial-of-service” (DDoS) attack. Given enough internet-enabled typewriters, a mentally subnormal monkey could launch a DDoS attack — except that mentally subnormal monkeys have better things to do with their time.

Even the genuine hacks are barely worthy of the word. Many large organisations use databases with known security holes that can easily be exploited by anyone who has recently completed the first year of a computer science degree: it’s no coincidence that so many of these hacker collectives appear towards the end of the academic year.

June 19, 2011

“You have reached 75% of your available bandwidth”

Filed under: Randomness — Tags: — Nicholas @ 10:50

Hmmmm. I just got a notice from Rogers that we’ve used 75% of our bandwidth already this month. I don’t think we’ve done that for years . . . and this hasn’t been a particularly heavy internet usage month for us. I wonder if they’ve lowered our bandwidth cap recently. That might explain it.

Update: Ah, mystery explained . . . while the notice talks about a month, it’s not the calendar month. We hit 75% on the last day of the billing period.

Cyber-espionage in theory and practice

Filed under: China, Government, Military, Technology, USA — Tags: , , , — Nicholas @ 09:50

An interesting article at Strategy Page discussing online espionage:

Firms with the most to lose, like financial institutions, guard their data most successfully. They do this the old-fashioned way, with layers and layers of security, implemented by the best (and most highly paid) people and pushed by senior managers who take the time to learn about what they are dealing with, and what it will take to stay on top of the problem.

It’s different in the defense business. If the Chinese steal data on some new weapon, there might be a problem years down the road, when the Chinese offer a cheaper alternative to an American weapon, for the export market. But even that problem has a silver lining, in that you can get away with insisting that those clever Chinese developed your technology independently. Meanwhile, everyone insists that there was no espionage, cyber or traditional, involved. As a further benefit, the American firm will get more money from a terrified government, in order to maintain the American technical edge. It’s the same general drill for military organizations. But for financial institutions, especially those that trade in fast moving currency, derivatives and bond markets, any information leaks can have immediate, and calamitous consequences. You must either protect your data, or die.

It’s not exactly a secret that China has been active in this area, but the extent of their official activity is hard to state. However, just as non-state actors take advantage of individuals who fail to use anti-virus software on their computers, ignorance and apathy are tools for state actors:

But the biggest problem, according to military Cyber War commanders, is the difficulty in making it clear to political leaders, and non-expert (in Internet matters) military commanders, what the cyber weapons are, and the ramifications of the attacks. Some types of attacks are accompanied by the risk of shutting down much, or all, of the Internet. Other types of operations can be traced back to the source. This could trigger a more conventional, even nuclear, response. Some attacks use worms (programs that, once unleashed, keep spreading by themselves.) You can program worms to shut down after a certain time (or when certain conditions are met). But these weapons are difficult, often impossible, to test “in the wild” (on the Internet). By comparison, nuclear weapons were a new, very high-tech, weapon in 1945. But nukes were easy to understand; it was a very powerful bomb. Cyber weapons are much less predictable, and that will make them more difficult for senior officials to order unleashed.

So the first order of business is to develop reliable techniques to quickly, and accurately, educate the senior decision makers about what they are about to unleash. This would begin with the simplest, and cheapest, weapons, which are botnets, used for DDOS attacks. In plain English, that means gaining (by purchase or otherwise) access to hundreds, or thousands, of home and business PCs that have had special software secretly installed. This allows whoever installed the software that turned these PCs into zombies, to do whatever they want with these machines. The most common thing done is to have those PCs, when hooked up to the Internet, to send as many emails, or other electronic messages, as it can, to a specified website. When this is done with lots of zombies (a botnet), the flood of messages becomes a DDOS (Distributed Denial of Service) attack that shuts the target down. This happens because so much junk is coming in from the botnet, that no one else can use the web site.

June 17, 2011

DARPA’s “National Cyber Range” on schedule

Filed under: Government, Technology, USA — Tags: , , , , — Nicholas @ 10:07

In order to determine ways to fend off or prevent attacks on the internet, DARPA is hoping to have their scale model of the internet ready sometime next year for testing:

The US defence agency that invented the forerunner to the internet is working on a “virtual firing range” intended as a replica of the real internet so scientists can mimic international cyberwars to test their defences.

Called the National Cyber Range, the system will be ready by next year and will also help the Pentagon to train its own hackers and refine their skills to guard US information systems, both military and domestic.

The move marks another rise in the temperature of the online battlefield. The US and Israel are believed to have collaborated on a sophisticated piece of malware called Stuxnet that targeted computers controlling Iran’s nuclear centrifuge scheme. Government-authorised hackers in China, meanwhile, are suspected to have been behind a number of attacks on organisations including the International Monetary Fund, French government and Google.

[. . .]

Darpa is also working on other plans to advance the US’s cyber defences. A program known as Crash — for Clean-slate design of Resilient, Adaptive, Secure Hosts — seeks to design computer systems that evolve over time, making them harder for an attacker to target.

The Cyber Insider Threat program, or Cinder, would help monitor military networks for threats from within by improving detection of threatening behaviour from people authorised to use them. The problem has loomed large since Bradley Manning allegedly passed confidential state department documents to WikiLeaks, the anti-secrecy website.

Another is a Cyber Genome, aimed at automating the discovery, identification and characterisation of malicious code. That could help figure out who was behind a cyber-strike.

May 30, 2011

Cory Doctorow: “Every pirate wants to be an admiral”

Filed under: Economics, Law, Liberty, Media, Technology — Tags: , , , , — Nicholas @ 10:09

May 25, 2011

Australia: leading the charge to our over-Nannied future

Filed under: Australia, Bureaucracy, Health, Liberty — Tags: , , , — Nicholas @ 12:31

There once was a time when the popular image of Australia celebrated its rugged, independent, free-spirited approach to life. It’s hard to recognize that in today’s Nanny State paradise:

Last week, the Preventative Health Taskforce published a report which, in its words, launched a ‘crackdown’ on drinking, smoking and the eating of ‘energy-dense, nutrient-poor’ food. This report made 122 recommendations, called for 26 new laws and proposed establishing seven new agencies to change the behaviour of Australians. To take just a few examples related to tobacco, the Taskforce called for the price of 30 cigarettes to rise to ‘at least $20’ (£13) by 2013, for a ban on duty-free sales, a ban on vending machines and a ban on smoking in a host of places including multi-unit apartments, private vehicles and ‘outdoors where people gather or move in close proximity’. They even contemplate a ban on filters and the prohibition of additives that enhance the palatability of cigarettes.

As in so many countries, Australia’s anti-smoking campaign has acted as a Trojan horse in the effort to fundamentally change the relationship between citizen and state. By no means does it end with tobacco. The Taskforce also wants to ban drinks advertising during programmes that are watched by people under 25 — a category so broad as to include virtually every programme — and calls for graphic warnings similar to those now found on cigarette packs to be put on bottles of beer. It also wants the government to establish ‘appropriate portion sizes’ for meals, to tax food that is deemed unhealthy and to hand out cash bonuses to those who meet the state’s criteria of a healthy lifestyle.

And it’s not just the booze and ciggies getting the full Nanny treatment, either. Australia is very concerned about the internet browsing and video game habits of the citizens:

It is the professed concern for the well-being of children that props up so much authoritarian legislation in both hemispheres. This does not just apply to smoking, nor even health issues in general. Australia has a unenviable record of internet censorship, for example, and a national website filter has been proposed to protect children from pornography and gambling. It also has a longer list of banned video games than any other Western democracy. And so if you, as an Australian adult, want to exercise your right to gamble and play violent video games, that’s just too bad. The rights of some hypothetical teenager to enjoy freedom from grown-up pursuits trump your own rights to pursue them.

Netflix now the 500lb gorilla sitting on your internet bandwidth

Filed under: Economics, Media, Technology — Tags: , , , — Nicholas @ 07:41

In a shocking display that if you make something legally accessible, people are willing to pay for it (who’d ever have expected that?), Netflix has supplanted Bittorrent as the largest user of peak-time internet traffic:

Is solving the copyright “wars” really so difficult? New traffic research shows that Netflix has overtaken Bittorrent as America’s favourite internet application, knocking http into third place. “P2P is here to stay,” note the authors in Sandvine’s Global Internet Report, Spring 2011 edition, which shows that demand for legal, paid-for stuff is the single biggest internet traffic trend.

Copyright-holders who are slow to bless legal services, by contrast, find themselves being swamped by pirates.

Netflix now accounts for 24.71 per cent of peak time aggregate traffic in the US, pushing Bittorrent into second place with 17.23 per cent. By contrast, the Sandvine numbers show that in markets where there are no legal services, pirate services flourish. In Latin America, file-sharing program Ares grabs 15.48 per cent of peak-time (fixed line) internet traffic, behind http. In Europe, Bittorent rules, with 28.4 per cent of peak-time traffic, ahead of http. Here, YouTube grabs third place, with almost 12 per cent of peak-time traffic.

We signed up for a month-long trial of Netflix (on the recommendation of Dark Water Muse) and have been quite happy with the service. In fact, it was a major factor in our buying a PS3 over the weekend, as our existing Blu-Ray player was incompatible with Netflix.

May 24, 2011

Why is the move to IPv6 so important?

Filed under: Media, Technology — Tags: , — Nicholas @ 08:42

As you may remember, June 8th is World IPv6 Day, where hundreds of major players including Google, Facebook, and Yahoo will all turn on IPv6 access (but then turn it off again at the end of the day). It seems odd to make a big to-do about IPv6 Day then go back to business as usual after 24 hours. Most end users will not notice the change, as most of us connect through our various ISP networks using IPv4 addresses anyway.

So, what happens if IPv6 isn’t taken up by the movers and shakers of the networking world?

Proponents of IPv6 make dire predictions about the fate of the Internet if usage of IPv6 doesn’t rise dramatically in the next few years. They say the complexity of the Internet infrastructure will increase, network operations costs will rise, and innovation will be hampered. This is due to the multiple layers of network address translation (NAT) devices that will be required to share limited IPv4 addresses among a rapidly growing base of users and devices.

“If IPv6 fails to catch on, then the Internet will include nesting of NAT upon NAT,” says Russ Housley, chairman of the Internet Engineering Task Force (IETF), the Internet standards body that created IPv6. “I hope this is not our future because it would be a very fragile Internet, making innovation more difficult. On the other hand, IPv6 will greatly reduce the need for NAT, restoring the opportunities for innovation that were envisioned by the original Internet architecture.”

Dorian Kim, vice president of IP engineering, Global IP Network at NTT America, a leading provider of IPv6 services in the United States, says that without IPv6 the Internet “will be even more heavily NATed than it currently is, but life will mostly go on. Unfortunately, such an Internet likely will have a negative effect on potential development of application or service innovation due to inherent issues with NATs. Additionally, should service providers become more and more reliant on NATs, this will probably change the cost and scaling trajectories of Internet services over time due to high cost and limited scalability of large-scale NAT solutions.”

May 11, 2011

QotD: The instinctive reaction to progress

Filed under: Humour, Media, Quotations, Technology — Tags: , , — Nicholas @ 12:39

I suppose earlier generations had to sit through all this huffing and puffing with the invention of television, the phone, cinema, radio, the car, the bicycle, printing, the wheel and so on, but you would think we would learn the way these things work, which is this:

1) everything that’s already in the world when you’re born is just normal;

2) anything that gets invented between then and before you turn thirty is incredibly exciting and creative and with any luck you can make a career out of it;

3) anything that gets invented after you’re thirty is against the natural order of things and the beginning of the end of civilisation as we know it until it’s been around for about ten years when it gradually turns out to be alright really.

Apply this list to movies, rock music, word processors and mobile phones to work out how old you are.

Douglas Adams, “How to Stop Worrying and Learn to Love the Internet”, Sunday Times, 1999-08-29

Michael Geist: the “Lawful Access” legislation does not criminalize hyperlinking

Filed under: Cancon, Law, Liberty, Technology — Tags: , , , — Nicholas @ 12:16

At least, on a reasonable person’s reading of the proposed law, it doesn’t criminalize hyperlinks to material that “incites hatred”:

The source of the latest round of concern stems from the Library of Parliament’s Parliamentary Information and Research Service legislative summary of Bill C-51. On the issue of hyperlinking, it states:

Clause 5 of the bill provides that the offences of public incitement of hatred and wilful promotion of hatred may be committed by any means of communication and include making hate material available, by creating a hyperlink that directs web surfers to a website where hate material is posted, for example.

I must admit that I think is wrong. The actual legislative change amends the definition of communicating from this:

“communicating” includes communicating by telephone, broadcasting or other audible or visible means;

to this:

“communicating” means communicating by any means and includes making available;

The revised definition is obviously designed to broaden the scope of the public incitement of hatred provision by making it technology neutral. Whereas the current provision is potentially limited to certain technologies, the new provision would cover any form of communication. It does not specifically reference hyperlinking.

Michael is much more informed about this issue than I am, so I find his confidence as a welcome balm to all the concern raised about this issue. The bill itself, of course, remains a civil liberty disaster in other ways, even with this issue addressed:

As I have argued for a long time, there are many reasons to be concerned with lawful access. The government has never provided adequate evidence on the need for it, it has never been subject to committee review, it would mandate disclosure of some personal information without court oversight, it would establish a massive ISP regulatory process (including employee background checks), it would install broad new surveillance technologies, and it would cost millions (without a sense of who actually pays). Given these problems, it is not surprising to find that every privacy commissioner in Canada has signed a joint letter expressing their concerns.

How resilient is the internet?

Filed under: Economics, Media, Technology — Tags: , , , — Nicholas @ 09:57

Richard Clayton summarizes a recent study by European Network and Information Security Agency (ENISA) on the internet’s ability to cope with disruptions. Among the ways the internet is vulnerable are:

First, the Internet is vulnerable to various kinds of common mode technical failures where systems are disrupted in many places simultaneously; service could be substantially disrupted by failures of other utilities, particularly the electricity supply; a flu pandemic could cause the people on whose work it depends to stay at home, just as demand for home working by others was peaking; and finally, because of its open nature, the Internet is at risk of intentionally disruptive attacks.

Second, there are concerns about sustainability of the current business models. Internet service is cheap, and becoming rapidly cheaper, because the costs of service provision are mostly fixed costs; the marginal costs are low, so competition forces prices ever downwards. Some of the largest operators — the ‘Tier 1′ transit providers — are losing substantial amounts of money, and it is not clear how future capital investment will be financed. There is a risk that consolidation might reduce the current twenty-odd providers to a handful, at which point regulation may be needed to prevent monopoly pricing.

Third, dependability and economics interact in potentially pernicious ways. Most of the things that service providers can do to make the Internet more resilient, from having excess capacity to route filtering, benefit other providers much more than the firm that pays for them, leading to a potential ‘tragedy of the commons’. Similarly, security mechanisms that would help reduce the likelihood and the impact of malice, error and mischance are not implemented because no-one has found a way to roll them out that gives sufficiently incremental and sufficiently local benefit.

Fourth, there is remarkably little reliable information about the size and shape of the Internet infrastructure or its daily operation. This hinders any attempt to assess its resilience in general and the analysis of the true impact of incidents in particular. The opacity also hinders research and development of improved protocols, systems and practices by making it hard to know what the issues really are and harder yet to test proposed solutions.

H/T to Bruce Schneier for the link.

« Newer PostsOlder Posts »

Powered by WordPress