Warring Stories

[Note: Tim Bray is conducting an interesting exercise in public debate over on Google+, testing its commenting capabilities to see how it fares in civil discourse on contentious political topics. His efforts are well worth following. I’m re-posting one of my comments below for posterity – as much for my own benefit as anyone else’s.]

There seems to be a nearly universal preference for narrative over fact in most (if not all) of the US debate over economic policy. People invest the issue with their own biases (a common propensity) then construct or defend the most closely aligned story.

In short, people have been led to believe that the whole situation:

a) makes sense;
b) can be simply expressed; and
c) has a straightforward solution, if only the rest of the world can be made to see it.

This explains not only the refusal even to grant that a debt policy must of necessity consider revenue generation AND reduced spending, but also the tendency to draw the Hayek/Keynes/Friedman debate as a zero-sum argument.

Government, at the best of times, is more a clusterfuck than anything else. It requires a level of opportunism and ideological/ethical/moral compromise that few of us can stomach. Tragically, it breeds people who can stomach it far too easily.

Human society requires narrative in order to make sense of this otherwise senseless situation. (We can’t all be Sartre or Clauswitz – and really, who wants to be?) But its desire for narrative has been cynically abused so consistently and for so long by propaganda that the possibility for civic (not to say civil) discourse has been reduced nearly to zero.

The increasingly (irretrievably?) fictional rhetoric driven by the various camps within the anarchic village that is Washington has made mutual understanding (and therefore compromise) impossible. We can, in other words, no longer talk usefully amongst ourselves.

On Pseudonymity

My friend Skud (yes, Skud) recently had her Google+ account suspended, apparently for not using her ‘real’ name. The section of Google’s privacy policy dealing with the issue of names says only this:

To help fight spam and prevent fake profiles, use the name your friends, family or co-workers usually call you. For example, if your full legal name is Charles Jones Jr. but you normally use Chuck Jones or Junior Jones, either of those would be acceptable.

Audrey Watters at ReadWriteWeb got a little further clarification from a Google spokesperson concerning Google Profiles and the use of real names:

“We are not requiring people to use their ‘real name’, but rather they need their Google profile to include the name they commonly go by in daily life. I know that sounds like the same thing, but there are some differences. For a hypothetical example, Samuel Clemens could choose to be known as ‘Mark Twain,’ although we wouldn’t allow him to go by Authordude88. And for a real life example, 50 Cent is using Google+, after we verified that this is the name he is commonly referred to. More details can be found here.

That page goes on to say that your name should use your first and last names, avoid ‘unusual’ characters (more about this below) and that your profile should represent only one person.

There are numerous problems with this policy which, taken together, make it impossible to implement it consistently or, indeed, objectively. Arguably, this policy would have disallowed some or all of the following:

Jesus Christ
‘Christ’ is an title, not an actual name
Buddha
It’s really a title, and it’s only one word
Pol Pot, Lenin & Stalin
All noms de guerre, associated with illegal and subversive activities at some point in history.
The Apostle Paul
He was ‘really’ Saul
Socrates
What, no last name?
Ellery Queen
‘He’ is actually a ‘they‘.
Acton, Currer and Ellis Bell
The Bronte sisters, who hid their identities (and location) to avoid scandal in their community
George Eliot and George Sand
Just a couple of the most notable women who could only be taken seriously after assuming a male identity

I could go on at great length, but suffice it to say that there are problems. You’ll note, by the way, that many of the names listed above refer to individuals who were guilty of subversive and often illegal activities. In many cases, too, there was a point in time where these names were not commonly known, or were disputed (even proscribed) by large segments of society, or by the powers that be.

Let me try to make these apparently silly examples clearer. It’s easy, with the benefit of hindsight to say, “Dude, that’s JESUS. Everybody knows he’s the Christ.” Well, that may be true now, but what about when he was some misfit wandering from town to town, pissing off a lot of Pharisees in the process? And yes, knowing what we know now, maybe we wouldn’t want to give a voice to Pol Pot, Lenin or Stalin. But how would we have felt about them in the early years of the 20th Century?

My question is: Are we on the side of the Pharisees, the Tsars and the Cambodian despots? Because that’s who we’re helping here, metaphorically speaking.

I’m not advocating taking a particular side. I’m suggesting exactly the opposite – not taking sides. That’s why I deliberately included some decidedly contentious figures in the list. (I could just as easily have included the authors of the Federalist Papers.) I just want to know that there’s room in our society for gadflies like Socrates, that it’s okay for some as-yet-unknown literary genius to speak freely and loud.

(And that, yes, even the soon-to-be villains can be captured in the public dialogue. There’s actually an argument to be made for listening to nuts like bin Laden and Breivik, in order that we better understand – and engage – our enemy.)

There are technical problems with any set of rules applying to names. As Patrick McKenzie eloquently demonstrates, just about any rule you think might apply to names actually doesn’t. Furthermore, the rationale that disallowing pseudonyms would have any effect whatsoever on spam and/or civility in public discourse, let alone that it will ‘help people know who they’re talking to,’ is entirely unproven.

But the issue is bigger than just technical. Skud writes that disallowing pseudonymity can be discriminatory and downright dangerous. The fact that her argument isn’t comprehensive makes it all the more compelling.

Throughout history, and for countless reasons, the use of pseudonyms and the appropriation of unofficial names are common, reputable and widely accepted practices,

One of the most common responses to these (and other) objections can be stated succinctly enough: Google’s Service – Google’s Rules. Fair enough, but let’s consider the implications of this. If we as a society allow ourselves to be utterly circumscribed by corporate policies over which we have no control (and which, as here, are pretty much arbitrary in nature), we’re in effect voting ourselves back into feudalism, where the rule of law becomes meaningless – or rather, indistinguishable from fiat.

I know some of you are writhing in your chairs right now, waiting to shout, “Oh come on, Crumb! Lighten up. This is a bloody social network we’re talking about, not some proletarian revolutionary struggle.” Well, no. This is a social network, and if it wants to reflect society then it needs to bloody well reflect it. In many parts of the world, just hanging out with your buddies on a service like this can get you into a lot of trouble.

Identity matters, for political, economical, social and philosophical reasons. The ability to define one’s identity freely is a fundamental human right. Google’s aim is to reduce bad behaviour, and that’s laudable. But if they want to do it right, they should focus on behaviour, not practices that are only tangentially linked to the problem.

If Google really wants their network to reflect society rather than deform it, they need to back off the name issue and look at fostering a culture of respect and civility instead.

Vanuatu Applauds Call for ‘Government Intelligence’

[Originally published on sathed.vu – Vanuatu’s Satire website]

Police Commissioner Joshua Bong’s call for improved government intelligence was roundly supported by all sectors of Vanuatu Society. The announcement, made at the closing of a recent security conference, met with enthusiastic responses from everyone this writer interviewed.

A survey of 100 people asking the question ‘Do you support intelligence in government?’ resulted in a 97% response for the ‘yes’ side. Two respondents, both MPs, had not finished reading the question when the poll closed. The third, a prominent minister, replied that he has campaigned for intelligence and that he supported the idea of intelligence in principle, but he could not condone its use in government at this time, as it might undermine the balance of power.

There were a few mixed responses. The reaction of one group of youths was difficult to gauge, as their sustained laughter made it impossible for them to speak. A chief from Kivimani village on the island of Futua Lava seemed to call for part-time intelligence, observing, “Ol minista oli waes finis, be waes ia i kasem olgeta long aftanun nomo.

Approached for comment, a police spokesman said, “That’s not the kind of intelligence we meant. We meant analysis and data gathering and…. Oh. Right. Yeah, I think I see what you mean. Yes, I think intelligence in government would be a great idea.

More on this breaking story as it appears. Assuming more intelligence actually does appear.

The Wealthy Programmer

In discussion today about programming for money – as opposed to programming for the love of it, or helping to change the shape of modern technology – someone made the following point:

I’d have thought striving to be independently wealthy would be an admirable goal – it’s a lot easier to be a philanthropist when you don’t have to worry about the roof over your head and where your next meal is coming from.

You’d have thought, but you’d have been wrong.

The pursuit and acquisition of wealth generally breeds greater stress and worry rather than less. Granted, there is a level of income below which one struggles constantly to manage even the most basic aspects of daily living.

Having lived on both sides of the divide, I can say with some assurance that living in poverty is debilitating, but so is significant wealth.

The one lesson of any value I’ve learned is that if you’re really serious about helping others (or helping make important things happen), you’re doing it already. Opportunities tend to look for people willing to accept them. You don’t have to be rich or powerful to achieve important things. Most of the time, you’ll find yourself pitted against the rich and powerful – at least you will if what you’re doing represents any sort of change. Even then, there are always influential allies to be found. Put in enough hours, demonstrate – no, prove – your abilities and Good Things do happen.

But here’s the catch. To do so is to accept uncertainty and risk as your constant companions. You are guaranteed to fail more than you succeed. Every victory, save a very choice few, will be temporary or mitigated by compromise. Your own needs and satisfaction will always take second place to those of others. You’ll find yourself – as I do – older, wiser, largely contented, but with very little to guarantee a contented, comfortable retirement.

All of this, of course, runs counter to the American myth of Success, where the sole measure of influence and importance is wealth. Rightly or wongly, it highlights people like Steve Jobs, Bill Gates and Mark Zuckerberg, relegating Knuth, Woz, Mohammed Younus and countless other more meritorious figures to the shadows. This is a distortion. It’s not false, but it’s fake.

In rare cases, wealth will accompany accomplishment, but that’s not always the case, and if you let the former stand for the latter, that’s all you’ll have. As a wise man once said to me, ‘If you go into the hills looking for gold, all you’ll find is gold.’

Infowar – A Case Study

[This weekend’s Opinion column in the Daily Post]

The recent decision by the Mubarak regime in Egypt to cut off all Internet access for its citizens is a textbook example of using a silver bullet to shoot oneself in the foot.

The whys and wherefores of how they’ve gone about doing so provide a useful opportunity to understand the paradox of control over the Internet and the costs involved when governments and other actors indulge their desire to dam the torrent of information that flows across their networks.

In order to do that, we need to dispel a rather pesky myth.

Perhaps the most dangerous misconception of the Internet is its survivability. It’s true that, as one information activist put it, the Internet treats censorship as damage and routes around it. But that statement is predicated on the actual presence of an Internet in the first place.

That may sound like a silly statement, but the Internet might not be as enduring as many assume it to be.

While many of the software and communications protocols that define the Internet are, by design, remarkably resistant to outside control, the physical networks through which our data passes are not nearly so robust.

James Cowie, a network analyst from Renesys Corporation, has written excellent analyses of state intervention in national communications both during the post-election strife in Iran and more recently in Egypt. Using forensic evidence gathered in real time, he constructs a vivid scenario: In contrast to Iranian authorities, who elected to use physical choke-points in the communications infrastructure to reduce the flow of information to a trickle, Egyptian authorities appear to have instructed all national Internet Service Providers simply to cut all communications with the outside world.

Starting at midnight (Egyptian time) on the 27th of January 2011, Egypt’s largest ISPs began disappearing from the Internet. Within a period of about 13 minutes, they simply stopped delivering data to and from their customers.

Cowie writes:

“[T]his sequencing looks like people getting phone calls, one at a time, telling them to take themselves off the air. Not an automated system that takes all providers down at once; instead, the incumbent leads and other providers follow meekly one by one until Egypt is silenced.”

How did this happen? Every large ISP participates in a cooperative system called the Border Gateway Protocol, or BGP. BGP allows them to discover how traffic destined to a remote network should be directed. Simply put, each ISP announces which address blocks it supports. These blocks can represent tens or even hundreds of thousands of individual machine addresses.

Designed for simpler times, BGP is a trust-based protocol. It relies implicitly of the good faith of all participants to continue working. This makes it remarkably vulnerable to the machinations of states or organisations whose interests don’t align with others’. Back in 2008, Pakistan Telecom caused a furore when, for a little over 2 hours, their bungled attempt to use BGP to block YouTube domestically resulted in the site disappearing from much of the Internet.

Just last year, a change to BGP traffic announcements resulted in about 15% of all Internet traffic being routed through networks in China for a brief period. This resulted in breathless speculation that the disruption was not accidental. Some claimed that it amounted to a reconnaissance in force, as it were, a probing of the global Internet to determine its resilience in the face of attack.

Intentional or not, these disruptions to the BGP apparatus make it abundantly clear that choke points exist on the Internet and that they are remarkably easy to subvert.

Debate continues to rage in technical circles about what can be done to mitigate BGP’s innate deficiencies. Changes will doubtless be necessary. But the liability wouldn’t be so grave if our physical communications networks weren’t so hopelessly centralised.

Egypt offers us a particularly vivid example of this. A country of over 80 million people, it has only a half a dozen or so large Internet providers. Only one of them, the Noor Group, initially resisted the demand to drop services. Some have speculated that its continued online presence was due to its extensive list of blue chip clients, including many banks and the Egyptian Stock Exchange.

Ultimately, though, it was a limited victory. Noor advertised only 83 of the roughly 3500 data routes in and out of Egypt. They were eventually forced off the air a week after their IT confrères.

In Iran, population 72 million, there are only 5 significant international links, all of which flow through a single Government-run office. Such centralisation makes it easy for the state to exert its influence.

(One European-owned company, Vodaphone, washed its hands of the decision to cut service to its Egyptian customers, claiming that the Mubarak regime had the legal right to issue the order. This rhetorical line apes the rationale provided by Nokia-Siemens when it was discovered that their equipment enabled Iranian authorities to block most traffic and eavesdrop on the rest.)

The Internet as a principle –that is, the idea of an open network allowing free communication regardless of source or sender– is not as popular as some might believe. It made its way into the commercial world more by stealth than by deliberation. Telcos didn’t really understand the Internet as a service; they just knew they had to offer it in order to compete.

One thing was clear to them: The sum of all services across a global network was clearly more valuable than those offered by a single provider. Equally attractive was the perception that these services came more or less for free with the connection.

But the seductive power of the Net hasn’t changed attitudes entirely.

Telecommunications companies, with a long legacy of market-controlling behaviour, still build and deploy their infrastructure using centralised models. Recently, some of them have begun lobbying for the right to exert control over the data that passes over their networks, potentially penalising services that compete with their own. Comcast, one of the largest ISPs in the US, recently got approval to acquire NBC Universal and its content-creation ecosystem, giving rise to fears that they might leverage their control over the information pipeline to dictate what passes through it.

Put simply, carriers would love nothing better than to go back to the telephone service model, where fees are based on where you are and who you talk to, with no conversation possible unless you’ve paid your toll.

The principle of an end-to-end network –that is, one that allows direct, unmediated connections between two parties– militates strongly in the opposite direction. Its appeal is remarkably seductive, leading most Internet users to view with displeasure the telcos’ (or governments’) desire to mediate communications.

Renesys quite rightly remarks that if cuts to Egypt’s Internet had lasted much longer, the reduction in commercial activity could have been catastrophic for the nation.

Furthermore, Cowie remarks, it wasn’t only Egypt’s pipelines that were at risk:

“[T]he majority of Internet connectivity between Europe and Asia actually passes through Egypt. The Gulf States, in particular, depend critically on the Egyptian fiber-optic corridor for their connectivity to world markets.

“Are the folks at Davos thinking about this? They should be.”

In a perfect world, consumer choice and basic business commonsense would always win. But the problem is that centralised networks not only cost a lot of money (placing their design and construction into the hands of the most powerful), they make a lot of money, too.

In monetary and political terms, the wealth of the network itself tends to pool rather than to flow.

A fundamental change has already overtaken the public’s perception about the value and nature of digital communications. Passive consumption of news through the television is considered passé, or at least diminished in relation to the sharing of photos, videos and words across the Internet.

As individual control over the flow of information rises, central control wanes. And this, obviously, is the crux of the dilemma facing businesses and governments across North Africa and throughout the world. They are belatedly coming to realise that they are fighting a many-headed hydra. As they cut off one avenue of communication, another rears its head.

But that hydra has a body, and the body is the network itself.

As this column goes to press, it appears that Egypt’s decision to cut off the Internet failed in every important regard. One protester is reported to have said, “F*** the internet! I have not seen it since Thursday and I am not missing it.… Go tell Mubarak that the people’s revolution does not need his damn internet!

I would be amazed, however, if this fact led other governments to act differently, should they find themselves in a similar situation. Indeed, the US Congress is currently considering legislation that would provide the President with an ‘Internet Kill Switch’ for use in case of emergency.

Likewise, I see no evidence that the ultimate futility of attempting to control the flow of information will change attitudes in the board rooms and offices where our increasingly centralised networks are planned. For telcos, the challenge is merely technical.

For the Internet –as it was originally intended– to become fully realised and fully resistant to coercion, the devices and infrastructure through which our data travels will need to reflect the same principle of decentralisation as the software and protocols we use today. That implies the construction of communications devices that are very different from the locked-in, network-centric phones, tablets and computers we’re familiar with. I can think of no short-term scenario in which the development of such products will take place in any significant way.

For some time to come, we will continue to live in a world in which the powerful continue to load silver bullets and take aim squarely at their own feet.

My Privacy, Your Secrecy

In the years to come, it’s possible that historians will place the battle over privacy alongside the universal suffrage and civil rights movements as one of the core social conflicts in recent history.

On one side of the issue is a definition of privacy closely linked to individual freedom and the right to protect oneself from scrutiny by the state. Fundamentally, it can be expressed as follows: “As long as no one gets hurt, what I think, say or do is nobody’s business but my own.” Essentially, it posits that you don’t have the right to know certain things about me and vice versa.

At the other end of the continuum is the contention that people have no expectation of privacy in public places. And the digital world is a very public place.

To make matters worse, many state and non-state actors deny that sauce for the goose is sauce for the gander. While they have no qualms about using the vastly more powerful surveillance capabilities that modern technology affords them, when the same tools are applied to their own secrets they call it calumny, espionage and even treason.

There are two things wrong with this argument for privacy: The first is that it imagines, paradoxically, that a legal privacy framework will be enforceable without transparency. Second, it imagines that society actually wants privacy for everyone.

Let’s take these points in turn.

Those who conceive of the battle over privacy as a Manichean struggle between individual privacy and universal surveillance are missing a fundamental fact. We are becoming a society without walls. With few exceptions, electronic data has become cheaply, nearly infinitely copyable. Steps can be taken to make it more difficult to do, but it only needs to be copied once.

The immediate problem we face, however, is unequal access to data.

If recent experience has taught us anything, it is this: Anyone in control of the flow of information inevitably leverages that control to view and manipulate the data crossing their wires.

Google is perhaps the most obvious example of this. Their stock in trade is the fact that they can see virtually everything you do and say on the Net. They use that insight to send you advertisements as well as to refine their services, giving them still greater abilities where behavioural analysis is concerned. To their credit, they credibly argue that their data mining is mostly automated. In other words, no human actually sees what you’re up to, and the computer algorithms that do watch you don’t judge you in any way. They have gone to court and even walked away from entire markets rather than divulge information about specific individuals to governments.

This is almost certainly due to the influence of founder Sergei Brin, who spent his early childhood growing up in the surveillance society that was the Soviet Union. One can only shudder when considering what will happen to personal privacy when, inevitably, he and co-founder Larry Page (also a strong defender of civil liberties) hand over the reins to their vastly powerful data store.

Google’s restraint is, however, the exception rather than the rule. Other commercial data mining operations –Facebook, for example– are not nearly as reluctant to trade in personal information. With sufficient effort, you can find out vastly more about any individual with an active online life than they would willingly divulge to you face to face.

Among the most powerful data mining operations in the world is the US intelligence establishment. The National Security Agency almost certainly monitors all information crossing US communications networks, and a great many more besides. The fact that, to date, they have contented themselves with mere eavesdropping is cold comfort.

Modern computing capabilities are such that, with sufficient resources, organisations could quite literally store details about every email, telephone conversation, text message, Facebook update and social network linkage for every single citizen on the Net. And to the extent that they can, they do.

But technology is (more or less) an equal opportunity tool. Author Bruce Sterling, in a superb essay on the WikiLeaks debacle, observes that there’s really not a lot of daylight between the spooks at the NSA and WikiLeaks founder Julian Assange:

“The geeks who man the NSA don’t look much like Julian Assange, because they have college degrees, shorter haircuts, better health insurance and far fewer stamps in their passports. But the sources of their power are pretty much identical to his. They use computers and they get their mitts on info that doesn’t much wanna be free.”

And here we arrive at the second major flaw in treating privacy as just another article in a notional Bill of Rights: As much as we might value our own privacy, we don’t value that of others.

My privacy is your secrecy.

We respect a private person; we get suspicious if they’re secretive. We’re all big fans of transparency until it affects our own ability to get things done. We’ll say the most scandalous things about others, right up to the moment when we realise they might hear. When someone else, however, repeats those same scurrilous details in public, we are delighted. As long as they don’t implicate us, that is.

The immense relief you feel when someone stands up at a gathering and says the uncomfortable thing you’ve been thinking evaporates when they turn to you and say, “And I know you’ll agree with me on this.”

Viewed in this light, there’s nothing surprising at all about the US Department of State sponsoring an Open Internet policy and at the same time calling for the extra-legal suppression of the release of their own cables. That the vast majority of these missives are little more than embarrassing is barely germane. The fact is, someone’s told tales out of school, so they can’t be friends any more. There’s hardly a person in the world who would act differently.

That’s going to change.

In an interview with New York Magazine, Author William Gibson argues that technology, not culture, is in the driver’s seat now. Technology “is not only what we do, it’s literally who we are as a species. We’ve become something other than what our ancestors were.

It’s closer to the truth to say that technology and culture are inextricably entwined. In any case, the plain fact is that secrets, as we in the West know them, are dead. If you record your thoughts or actions –and in this increasingly digital world, you inevitably do– they will be copied. And if they are copied once, they can be copied infinitely. The only limitation on this is human interest.

This is going to force some very uncomfortable compromises. Scientist and author David Brin has taken the rather unpopular stance that the answer to this unprecedented assault on privacy is more openness, not less:

“Instead of trying to blind the mighty –a futile goal, if ever there was one– we have emphasized the power of openness, giving free citizens knowledge and unprecedented ability to hold elites accountable. Every day, we prove it works, rambunctiously demanding to know, rather than trying to stop others from knowing.”

In essence, Brin is arguing for a return to village life, but for everyone, not just individuals. Companies, governments, organisations of all kinds who trade in data, should become subject to precisely the same scrutiny they impose on everyone else.

Secrecy, in other words, will be replaced by confidentiality, an unwritten social contract not to penalise people for exposing their own human foibles, provided they don’t harm others.

It’s a nice idea, and if Vanuatu society’s ability to make scandal and impropriety public without (necessarily) using it as a scourge is any indication, it could even be made to work. But it works in Vanuatu because there’s no alternative. The moment someone has the ability to evade the watchful eyes of the community, you can bet your boots they’ll do so.

Constant scrutiny is at the core of this dynamic.

The way the Internet is shaped these days, individual privacy is vastly disadvantaged relative to state and corporate secrecy. This imbalance will only be perpetuated unless the physical networks through which our data runs are restructured. As things stand right now, virtually all of our communications pass through an increasingly limited number of physical cables, websites and service providers.

If we learn nothing else from the repressive measures imposed on free speech on the Internet, it is that ownership of the means of transmission matters more than anything else. If a government or corporation has enough leverage over a significant portion of the communications network, they can define exactly how it behaves.

In a recent essay in Foreign Affairs, New York University professor Clay Shirky recounts how attempts by the Philippine Congress to co-opt the 2001 impeachment of then-President Joseph Estrada were subverted by a spontaneously organised protest, largely catalysed by a text message saying, “Go 2 EDSA. Wear blk.” (EDSA is Epifanio de los Santos Avenue, a major intersection in Manila.) Within two days, over a million black-shirted people had congregated.

The government was caught flat-footed and fell as a result.

He then describes how attempts by the Iranian Green Movement to replicate this kind of effect were quickly trumped by the government’s ability to monitor mobile and Internet traffic and to reduce it to a trickle at critical junctures. This aided them significantly in the subsequent crackdown and wholesale imprisonment of dissident activists.

The victory came at significant cost to the credibility of the state, but in the short term, the state prevailed.

The tension between privacy and secrecy is becoming increasingly lop-sided. The only comfort we can take is that even if the physical networks are increasingly centralised and therefore pulling in the direction of secrecy, the communications protocols that run across these wires are still what we call end-to-end. In other words, they allow us (or rather, our computers, smart phones, etc.) to speak directly to each other.

It may seem counter-intuitive, but the ability to communicate one-to-one militates strongly in favour of openness. Because we are the ones choosing to communicate, the network transmits only what we freely share. Above all else, we love to share what we know about others. Now, this phenomenon needs to be leavened by an awareness that the rest of the online world is within earshot. If we say something sufficiently embarrassing, be it about ourselves or someone else, the world will quickly know we said it.

Following the massive breach of diplomatic secrecy perpetrated by WikiLeaks, international relations have already seen a fundamental change in perspective. The banner of Transparency has been lowered from the ramparts. Many state and non-state actors are moving quickly to reshape the world into something they are more comfortable with, one in which a culture of secrecy prevails once more.

Odds are, they will eventually lose this ground. Just as resistance to market forces has ultimately proven futile in the global economy, those who fight openness with increasingly centralised control are working at a disadvantage to those who are willing to be more opportunistic, flexible and accepting of the opportunities that better access to information give them.

The battle –and make no mistake, this is a battle– is far from over. I sympathise with Bruce Sterling when he expresses a rather melancholic, depressed response to this first open conflict between secrecy and the transparency of the network:

“[Assange is] a different, modern type of serious troublemaker. He’s certainly not a “terrorist,” because nobody is scared and no one got injured. He’s not a “spy,” because nobody spies by revealing the doings of a government to its own civil population. He is orthogonal. He’s asymmetrical. He panics people in power and he makes them look stupid. And I feel sorry for them. But sorrier for the rest of us.”

There is a new, defining conflict in the world. Technology’s assault on secrecy will succeed just as surely as it has on our privacy. There are only two ways to come to terms with Wikileaks and its successors: Repression or negotiation. Repression is not a long-term viable option, because the costs are always greater than the benefits for the majority. A totalitarian crackdown lasting generations is possible, but unlikely. And with anything less than that, there will inevitably be a correction in the direction of openness.

Negotiation requires a state of uncomfortable, shifting compromise in which we establish new cultural tabus based on each party’s knowledge of the other. It’s almost Victorian in its essence: We retain a pretence of propriety and respect; I don’t reveal your more awkward secrets so that you won’t reveal mine.

This is an awkward and innately unfair scenario, because disparities in wealth (i.e. knowledge) will almost certainly bring about the same injustices as we see in unbridled capitalism. Only concerted social opprobrium will keep bad actors at bay.

Societies will certainly go through convulsions coming to terms with this new détente. But we will inevitably do so. Like it or not, technology makes us what we are.

No matter what the outcome, I worry about the cost.

"Journalism"

[Updated slightly to fix the facts around the policy more accurately reflect reality.]

Jillian York, in her rather timid defense of WikiLeaks, states that she[*] some people ‘got off the bus’, metaphorically speaking, shortly after the release of the ‘Collateral Murder’ video. Describing her personal ambivalence about the latest leak, she draws a distinction between what she characterises as WikiLeaks’ ‘firehose’ approach and conventional journalism.

But to accept that distinction, we have to ignore what happens when we back up a little from our current context and ask: what, exactly, is journalism? I think we can accept that, essentially, it is a means (until recently, our primary means) of obtaining verifiable and ostensibly reliable information about the world around us. The fact that it has become formalised -indeed, institutionalised- is a collateral feature. It does not follow that its formalisation via a collection of ethical practices is necessary to the provision of information. Journalistic ethics, in other words, are very much defined by their context and indeed their application.

As the Judith Miller debacle showed us, unconditional protection of anonymous sources can prove detrimental to the integrity of the craft. Neither selective leaks nor ‘access’ to anonymous sources are sufficient to healthy reporting. Truth, ultimately, is the only reliable measure of the effectiveness of a particular news source. It goes without saying that truth is an increasingly adulterated alloy in popular news reporting these days. It’s not even sufficient to speak nothing but truth; one must, somehow, find a way to tell all the truth that pertains to a particular subject.

WikiLeaks, for better or for worse, represents the logical conclusion of this train of reasoning. I’m open to arguments that it is actually an over-correction, but I don’t feel I’ll be moved without reference to particular details. And that requires access to sufficient information; in short, you can only make that argument retrospectively.

You can see where I’m going with this….

I’m not arguing that complete access to all information is the only true form of journalism. I’m suggesting that making a distinction between WikiLeaks and ‘journalism’ as we understand the word does not describe the process; it describes the actors.


[*] Reading comprehension FAIL on my part. I mistakenly elided the first two letters of ‘some’, changing the meaning fundamentally. Jillian was kind enough to call this mistake to my attention.


‘Nother update: I just re-read this sentence:

Neither selective leaks nor ‘access’ to anonymous sources are sufficient to healthy reporting.

I’m tempted to be a even more provocative and to ask whether they are even necessary to healthy reporting.

As a gendakenexperiment, I wonder what the journalistic craft would look like if secrets of all kinds were tabu.

As students of the Englightenment, most of us immediately shy away from the thought of an environment in which individual privacy is nearly absent. But having lived on the edges of Vanuatu village culture for the last seven years, I can attest to the fact that there are indeed ways to accommodate oneself to a world more akin to what David Brin describes than the ideal world of a doctrinaire libertarian.

Individual privacy is not as axiomatic as many in the West tend to assume….

Open Source Diplomacy

[This column appeared in the Vanuatu Daily Post.]

Say what you like about wikileaks and their recent dump of over 250,000 US diplomatic cables, but there is probably not a single researcher in International Relations, History or Political Science without a tingle in their pants today. Never in modern history has so much information been made available in such a readily accessible format. This is, for researchers, a gift that will keep on giving for decades to come.

The thing that impressed me most from my brief perusal of the 200-odd documents released on the first day was not so much the content as the quality of the analysis. The cables were well-written and obviously well-researched. I suspect that there’s more than one junior foreign officer out there with a quiet smile on their face today, because finally the world will see just how good they are.

Yes, I’m ignoring completely the ethics and morality of the situation. That horse is out of the barn, and incidentally, what a barn it is….

These cables will provide more insight and understanding into American diplomacy than anything else ever has. Just as access to hitherto proprietary source code sometimes unearths dirty secrets of which even its author is ashamed, there is likely to be a lot of unpleasantness to be found in the cables.

I think the longer term result, however, will be that much of what’s good about the US diplomatic corps (and there’s a lot of that) will assist countless others to improve their own work. In fact I think it’s likely there might be more than one diplomat that might actually be relieved to see the unspeakable spoken aloud. This torrent of data just might break more logjams than it creates.

The rise of the Free Software movement in the 1990s increased access to the source code that runs our computers and caused fundamental changes in software development. Their echoes are still quite strong today. Code that was once hidden behind thick corporate walls was now being handed about in a vast open source bazaar. This discomfited many vendors who were dismayed to discover that their crown jewels could become valueless overnight as software became commoditised.

A lot of dirty laundry got aired in the process. Bug-reports, software update schedules, coding practices all became subjects of open discussion and, yes, dispute. Tolerance for second-rate code dwindled significantly. Emphasis began to fall more and more on results. As one acerbic commenter wrote: “A single line of running code trumps a thousand lines of argument.”

Companies who attempted to retain their secretive ways were simply bypassed and their flaws exposed for all to see. Sound familiar?

In the late 1990s, Microsoft identified Linux specifically and Free Software generally as the greatest strategic threat to their organisation. They were right. Microsoft’s stagnation is partly attributable to the advantage that FOSS has given several of its competitors. IBM, Apple and Google have all leveraged open source software to jump-start various endeavours that compete directly with Microsoft. Likewise, Microsoft’s need to increase the pace of development resulted directly in their death-march to Windows Vista.

Just as Microsoft was able to drive Netscape Communications out of the market by commoditising the web browser, others are commoditising vast swathes of the computing industry by leveraging FOSS.

The commoditisation of information proceeds apace, and although the stakes are perceived to be higher in this case, the effects will probably be similar in nature. A fractious dialectic is already emerging between those who truly believe in the benefits of information resources like those circulated to millions of US military and government staffers on SIPRNET, and those who seek to leverage proprietary knowledge for their country’s -and sometimes their own- gain.

All secrets are like kindling. Used at the right time, gossip can provide warmth, build allegiance and influence. Used rashly, well… you know where this is heading. In that sense, wikileaks may seem like a 10 year old boy with a stolen box of matches. But applied judiciously and with a sober sense of timing, the same principles of openness as a default stance and and a predilection toward sharing that are at the heart of free software development (and the Internet itself) could usefully animate international diplomacy.

To be perfectly clear: I’m not suggesting that there is no need for secrecy whatsoever in diplomacy. I’m suggest that, as we’ve discovered with programming processes, secrecy might prove to be less necessary -and effective- to security than it appears to be.

Blogging for Dollars

Over at the Wired Epicenter blog, people are speculating that Next Monday’s big announcement from Facebook’s Mark Zuckerberg will be a webmail client, aimed directly at stealing Google’s technological thunder.

Reaction from commenters was universally negative. People complained about privacy concerns, made silly FailMail jokes and observed that Google would be pretty hard to beat in terms of simplicity, reliability and functionality.

But the comment that caught my eye was this:

“I’ll sign up at Failmail when Zuckerberg personally starts sending my PP around 40$ a month.”

Haha, very fu- Hang on a sec….

On reflection, that probably would work, wouldn’t it? Zuckerberg could do that, too. Well, not for everyone, certainly not all the time. But think about it: Knowing what we do about human nature, what’s to stop someone from creating a social networking site that operated using cash as a measure of social connectedness and success?

The mechanism would be simple enough. Members join for a nominal fee, not high enough to be painful, but enough so that someone would have to make a deliberate decision to join. More to the point, it would have to be enough that, for many, peer pressure would be necessary to drive them into the fold. Once there, an algorithm would identify the most connected, popular and useful members of the community and award them a share of the pot.

Call it a Social Credit Union.

Right, you’re probably thinking. Exactly how many seconds would it take for someone to begin gaming the system for money? The answer is alarmingly simple: as long as people like something and/or find it interesting, who cares? As Randall Munro so aptly put it: “Mission. Fucking. Accomplished.”

Seriously, as long as the integrity of the metrics and the security of the cash flow are not compromised, it won’t really matter how someone connects with others, impresses and/or influences them. I’ll grant you, the potential for absurdity is very high, especially when one considers just how stupid people are willing to be for free.

Humanity may have some spectacular examples of its inanity, its shallowness and its capacity for self-deception. But they are, happily, in proportion to its ability to explore beauty, wit and learning. A social credit union would reward each without fear or favour.

The capitalists in the audience are no doubt asking why someone would pay -and continue to pay- for a service that a) they could get for free; and b) which rewards others but costs them? It’s been demonstrated time and again that people will actually deny themselves in order to spite others. Surely the service would last exactly long enough for it to be castigated as a cesspool of self-promoting poseurs, a pyramid preying on the socially naive?

Yeah, that could happen. In fact, it’s as likely an outcome as any other. I’d give odds that if you started a dozen of these, 8 of them would implode within months. But here’s the thing: with the right dynamic and the right ethos, it could succeed, and those who wish they could spend more time writing, researching arcana, making fanvids… doing all of those niche activities that add spice and, occasionally, actual art to our online existence – some of them, at least, could prosper.

The vast majority of people would never get more than a few pennies back, of course. Which leads the Adam Smith devotees in the audience to ask, ‘Who in their right mind would pay for something that they could otherwise get for free, and continue to pay even after it becomes clear that they will likely never be rewarded for their use of the service?’

The answer is dead simple. People pay to phone and text; they pay for Internet; they pay club memberships; they buy people beers; they spend vast amounts of money trying to buy social credit. As long as they receive a useful level of service (for some amalgam of collective and individual perception of what constitutes service), and as long as membership is less costly than being left out, they will pay.

This is not a new Athenian Agora we’d be building[*]. The most likely people to profit will be the very same people we hated in high school: Pretty, cool, witty and self-assured, funnier and sometimes -only sometimes- smarter and more interesting than the rest of us. Nonetheless, if you’re a creative person looking for a way to survive in the 1st Century of the Internet, this is probably your best hope.


[*] Well, actually, it is. Remember that the Agora was not only where Socrates sat with his students, but where the whores, petty thieves, shysters, con men and plain old merchants all hung out.

Next Generation Internet in the Pacific

[Originally published in the Vanuatu Daily Post.]

PM Edward Natapei Nipake addresses the PacINET 2010 conferenceVanuatu welcomed over 140 attendees from Vanuatu and throughout the Asia-Pacific region this week to the annual PacINET technology conference. It was organised by the Pacific Islands Chapter of the Internet Society (PICISOC) and by the Vanuatu IT Users Society (VITUS).

At Wednesday’s opening ceremony, Prime Minister Edward Nipake Natapei highlighted Vanuatu’s leadership role in driving technological development in the country.

The effects,” he said, “have been revolutionary. As a result of our telecommunications policies, economic activity has increased, adding an additional 1% to GDP growth at a time when the world economy was shrinking. Studies show that social bonds are strengthened, too, making families safer and stronger in a time of increased mobility and migration.

The theme of this year’s conference is ‘Next Generation Internet: Security and Governance’. Among the highlights were deployment through the Pacific region of a new Internet protocol that will allow Internet-based businesses and organisations to continue to grow, a day-long investigation of the One Laptop Per Child project and another all-day workshop aimed at school principals – key stakeholders in ICT for development in Vanuatu.

Backing all these efforts is something people in Vanuatu understand better than most in the world – a thriving Pacific ICT community willing to share knowledge, experience and insight to make life better, not just for IT geeks, but for everyone.

Without the efforts of a devoted band of volunteers, the success of information and communications technologies (ICT) as tools for development would be severely limited. While the developed world has benefited significantly from entrepreneurialism and business development to drive technological advancement, the soul of the Pacific lies in the sense of community service that we all share.

Our resources are limited, we rely (some say too much) on donor aid for most improvements in our day-to-day lives, and though market players such as TVL have a tremendously influential role to play, their success is largely contingent on the willingness and capacity of the community to take advantage of their products and services.

Indeed, one the defining characteristics of these commercial operations is their close ties to the local community. Every day we saw TVL staffers contributing time and attention to ensuring the conference ran smoothly. Many attendees commended the quality and performance of the WiMax broadband link donated by TVL, one of the largest deployed to date in Vanuatu. The consensus is that it was every bit as good as they’d seen in conferences in Australia or New Zealand.

But all the Internet bandwidth in the world won’t help us if we don’t make the most of what we have. It was for this reason that conference organisers decided to concentrate on the next generation of Internet technologies. All week long, IT professionals focused on the deployment of a new kind of addressing system for the Internet.

Called IPv6, this protocol will allow the Internet to continue to grow in the years to come. Just as every mobile phone needs its own number, every computer connected to the Internet requires a unique address in order for others to be able to talk to it. The first allocation of about 4 billion numbers is about to run out, and unless action is taken, this will severely limit the growth of the Internet in the Asia-Pacific region.

Once we’ve assured that everyone can get an address, the next task is to help people find a way to make use of those addresses. That’s why PacINET 2010 organisers helped arrange a meeting between Michael Hutak, Oceania director of the One Laptop Per Child project and the Prime Minister. PM Natapei showed his continuing commitment to the development of a comprehensive ICT policy, promising his support for a year long trial of up to 2000 of these robust, low-cost and low-power devices in Vanuatu’s outer islands.

Following the meeting, Hutak was quick to point out that one cannot simply parachute laptops into a community and expect everything to work swimmingly. “Follow up,” said Hutak, “is crucial.”

He was preaching to the choir. Led by volunteer George Tasso with significant support from the Department of Education, VITUS members organised a full-day event for school principals aimed at informing them of the perils and profits involved in ICT deployment in schools.

Tasso and others have been working for over a year now with local IT volunteers, pairing them up with schools in Port Vila and organising high-level support and assistance from more experienced VITUS members. The result is that young volunteers not only get the opportunity to learn from more experienced colleagues, but schools benefit from no-cost, on-site technical support.

This week’s workshop featured the announcement of a partnership between Edwards Computer Foundation and Vanuatu schools in which IT graduates will be paired with a mentor from within the VITUS community and given the opportunity to spend time in a post-graduation work-study programme in community schools.

The Internet helps make old things new again. It provides a new and powerful way to ensure that the bonds of family and society continue to tie everyone in Vanuatu together. At this year’s PacINET conference, we saw yet again how strong communities make society healthier and more able to develop itself.