December 15, 2010

You have no secrets

Privacy? No way. Government, business and even the kid next door know what you're up to.

Headbone connects to the headphones
Headphones connect to the iPhone
iPhone connected to the Internet
Connected to the Google
Connected to the government.

—M.I.A., “The Message”

You are being watched.

Your Facebook friends are watching you. So are their Facebook friends, and total strangers. The guys who run Facebook, too. Your keystrokes are being logged. Your mouse-clicks are being monitored and digested. Your behavioral patterns are being analyzed, monetized: what you buy on Amazon, who you follow on Twitter, where you say you eat on Yelp, your most shameful Google searches.

The photos you post on Flickr are encoded with little bits of geospatial metadata that pinpoint where they were taken and can reveal where you live. Your smartphone—jam-packed with apps coded by who-knows-who and potentially loaded with spyware—is a pocket homing beacon, trackable by satellite. There are trucks with cameras on their roofs, trundling past your apartment, duly noting your unsecured Wi-Fi signal.

Wal-Mart is putting radio frequency identification (RFID) tags in your underwear.

You can barely remember all the different passwords to the ever-proliferating number of websites to which you’ve entrusted personal photos and videos, likes and dislikes, credit-card info and your Social Security number. Then there are the photos of you that other people have posted without your knowledge, or the things they may have written about you on blogs or message boards—things that have a good chance of remaining online and searchable for perpetuity.

And that’s to say nothing of the vast and classified surveillance apparatus—“so large, so unwieldy, and so secretive that no one knows how much money it costs, how many people it employs, how many programs exist within it, or exactly how many agencies do the same work,” according to the Washington Post—that could (who knows?!) be silently taking note of the e-mails you’ve sent and the phone calls you’ve made.

Facebook, keeping tabs on its 500 million members—who share 30 billion bits of information each month yet are mostly ignorant of its privacy policy, which is longer than the United States Constitution—looks like a Class of 1984 high-school yearbook by comparison.

Public is the new private

Over just the past decade or so, the Web has turned things upside down. As Danah Boyd said, speaking in the spring at SXSW in Austin, we’ve seen “an inversion of defaults when it comes to what’s public and what’s private.”

Time was, what you said and did was “private by default, public through effort,” said Boyd, a fellow at Harvard’s Berkman Center for Internet and Society. That’s all changed: “Conversation is public by default, private through effort. You actually have to think about making something private because, by default, it is going to be accessible to a much broader audience . . . And, needless to say, people make a lot of mistakes learning this.”

To a degree unheard of even five years ago, we live our lives mediated by Firefox browsers and Droid screens. And that means—whether it’s ostensibly protected sensitive data (financial and medical data), ostensibly inconsequential personal data (Flickr photos, YouTube channels, Twitter feeds), or ostensibly de-personalized behavioral data (browsing patterns, search queries, HTTP cookies)—our lives are nowhere near as private as we might presume them to be.

“Precisely because the tech advances have come in so many places, it’s really quite hard to pick any one particular spot that’s the biggest problem,” says Lee Tien, senior staff attorney at the Electronic Frontier Foundation. “They all converge. Because we have a giant personal information superhighway, where all of our information travels around both the government and the business sector, what gets picked up in one place is being transferred to another place. So it all ends up, not necessarily in a central basket, but in a lot of different baskets—where it can always be accessed.”

“Data collection is becoming ubiquitous,” says Jules Polonetsky, co-chair and director of the Future of Privacy Forum, and former chief privacy officer at AOL. “It’s not science fiction anymore to think there are lots of databases that have everything we’ve done: every search we’ve done, every website we’ve visited.”

It might be comforting to think that our online identities are just anonymous strings of ones and zeros, but that’s just not true anymore. So what we used to loosely define as “privacy”—an admittedly amorphous concept—is changing fast. And only recently do consumers, voters, politicians, and the media seem to be grasping that fact.

Before, “we had privacy from obscurity,” says David Ardia, another fellow at the Berkman Center, and the director and founder of the Citizen Media Law Project. Now, almost everything worth knowing about almost anyone is online. 

“That means it’s searchable, and it’s available forever. And I don’t think we’ve caught up to that change in the way we structure our lives and the way we understand privacy.”

‘They want to know more about us’

To begin with, privacy is a problematic notion.

“It’s a very misunderstood concept from a constitutional point of view,” says civil liberties attorney Harvey Silverglate. “There are some parts of the Constitution, and of the Bill of Rights in particular, that are quite specific about it. And there are others that are quite general and amorphous.”

While the First Amendment is very explicit, for instance (“Congress shall make no law…”), the Fourth Amendment (“unreasonable searches and seizures”…“probable cause”) leaves a lot more wiggle room. It’s “seemingly intentionally vague,” says Silverglate—as if “left for the particular era and particular culture to define.” The result is a wording that suggests people are entitled to a reasonable degree of privacy—but just what it is differs in any given environment.

Obviously, the Framers “didn’t envision the Internet or telephones, but they obviously understood that this was an area that was going to be evolving, and they couldn’t define it.”

And so we find ourselves, at the beginning of the second decade of the 21st century, still trying to figure all this out.

The problem, says Silverglate, “is that the pace of technological change is proceeding so quickly that the courts, which were always a little bit behind in the development of technology, are now being left in the dust.”

Indeed, says Tien, “technology has advanced and the law has not.” Moreover, “Privacy is not easy to define. It means different things to different people.” But above all else, he says, the most acute threat nowadays is that both the government and the private sector have such vested interests in chipping away at whatever privacy actually is.

“You and I might view the information that we give off online, that we don’t want others to capture, as a negative thing like pollution in the air,” says Tien. But “for government and industry, it’s a nutrient. It’s something they can feed on. They want to know more about us.”

No such agency

“A hidden world, growing beyond control,” wrote Dana Priest and William Arkin in their Washington Post special report, “Top Secret America” —describing “some 1,271 government organizations and 1,931 private companies [working] on programs related to counterterrorism, homeland security, and intelligence in about 10,000 locations across the United States. An estimated 854,000 people, nearly 1.5 times as many people as live in Washington, D.C., hold top-secret security clearances.”

If you don’t think a goodly number of those folks are listening in to the occasional Skype conversation, you haven’t been paying attention these past 10 months.

“I’m worried about a number of phenomena,” says Silverglate. “First, because of the increasing number of searches being done by the terror warriors—the CIA, the NSA, the FBI, and God knows who else—the chaos in the federal investigative establishment is unbelievable. If you think they can’t get the mail delivered on time, just think about the wiretaps and the electronic surveillance.”

It’s enough to make the most intrusive data-mining operation seem tame by comparison. After all, says Silverglate, a corporation “can spy on you but they can’t arrest you.” And when they do spy on you, it’s “because they want to sell you something, not kill you.”

Don’t (just) worry about the government

The problem comes when governments start strong-arming those companies into doing their bidding. Consider the controversy surrounding AT&T’s cooperation with the NSA (National Security Agency), without the knowledge of its customers, on a “massive program of illegal dragnet surveillance of domestic communications” (as the Electronic Frontier Foundation charged) back in 2006. “AT&T just allowed them access to the control room,” marvels Silverglate.

The Feds, in other words, “enlist the brilliance and expertise of companies like Google for the purposes of snooping on its citizens.”

It’s a job at which Google has allegedly acquitted itself quite well in recent months.

In May, news broke that the omnipresent (and sometimes seemingly omnipotent) corporation had been vacuuming up data about citizens’ Wi-Fi networks and what sorts of content was being accessed thereon. Like in a B-movie stakeout, it was all monitored from inside a van—those camera-equipped Street View trucks that patrol the world’s cul-de-sacs and capture images of sword-and-sorcery LARPers, “horse boy,” and, well, your front door.

Google insists that the data sweeps were “unintentional” and that at any rate, were only viewed a very limited number of times, by mistake. You’re not the only one who’s dubious. Massachusetts Congressman Ed Markey has asked the Federal Trade Commission (FTC) to determine whether Google’s privacy breach broke the law. Galaxy Internet Services, an ISP based in Newton, Massachusetts, has brought suit. And Connecticut Attorney General Richard Blumenthal is heading a multi-state investigation.

In June, Representative John Conyers of Michigan requested that Google CEO Eric Schmidt enlighten him as to just how those cars came to intercept that Wi-Fi info. In his letter, Conyers got out the virtual police tape, asking that Google “retain the data collected by its Street View cars, as well as any records related to the collection of such data, until such time as review of this matter is complete.”

It was about this time that Conyers sent a letter to Mark Zuckerberg, Facebook’s twerpy bazillionaire of a CEO, inquiring whether the site shared user data “without the knowledge of the account holders.”

But however much kerfuffle there was about Facebook’s Orwellian Beacon program or its labyrinthine privacy settings , no matter how sinister David Fincher’s movie The Social Network makes Zuckerberg’s enterprise seem, when it comes to privacy, Facebook is probably the least of your problems.

Sure, it’s bad. “The interplay between the multiple options is so complex” on Facebook, says Polonetsky. “Your location. What apps you use. Your friends’ apps. Different segments of your profile. Your contact information. It’s this incredibly complicated maze. Even I gotta sit sometimes and think before I answer a question.”

But too few people realize that this stuff is everywhere these days.

“You go to a site and there’s a lot going on!” says Polonetsky. “A lot of different data being collected. Regular cookies. Flash cookies. Behavioral retargeting. Analytics. There’s data being sent to an ad exchange. There might be an affiliate program because they’re selling ads not on a click basis, but on a commission basis. There’s 20 or 30 places your browser may go when you visit a site, and then [there’s] all the different things you have to do if you want to turn that off. Your cookie settings. viagra discount Your Adobe Flash player settings. You could spend hours just disabling the data transmission that happens.”

Anonymous Rex

The omniscient eye of corporate-abetted Big Brother may get the blockbuster treatment in the Post. But oftentimes privacy intrusions grow much closer to home—and are much more damaging.

“We used to think of the threat as ‘us against them,’” says Tien. “Now, because of the Internet and ubiquitous portable devices, there’s a much more lateral threat as well.” After all, “kids can ruin each other’s privacy without really even trying. They think they’re just in a Facebook squabble, but there are a lot of other people who have access to that data. So there’s both a Big Brother problem and a Little Brother problem. And that Little Brother problem has gotten worse.”

Who is Little Brother? He’s all those people you know, sort-of-know, or wish you didn’t know: creepy, barely remembered high-school classmates; Machiavellian coworkers; your angry ex. But mostly you really don’t know who Little Brother is, because Little Brother is anonymous. He or she is part of a sea of nameless faces: the anonymity-emboldened tough guy on a message board, or an auteur posting a sadistic video on YouTube, or an obsessive Twitter-stalker, or, sometimes, a malicious suburban mom hiding behind a hoax identity while taunting a teenager to suicide.

Inexorably, we seem to be drawn to a battle between two conflicting notions—and the winner of that battle may determine what kind of Internet we end up with. The voices advocating for increased privacy protections argue that our actions online should remain invisible—unless we give our express consent to be watched and tracked. But some of the most powerful voices on the Web are beginning to suggest that you should be held responsible for your online actions: that your anonymity on the Web is dangerous.

Speaking at the Techonomy conference in Lake Tahoe a couple of months ago, Google’s Schmidt opined that the rise of user-driven technology—and the dangers posed by those who would misuse it—required a new approach. “The only way to manage this is true transparency and no anonymity,” he said. “In a world of asynchronous threats, it is too dangerous for there not to be some way to identify you. We need a [verified] name service for people. Governments will demand it.”

And Schmidt is right. The same governments that are investigating Google’s breaches of their citizens’ privacy are also demanding that their citizens be accountable for their online identities in ways that must make the world’s totalitarian regimes smile. That’s the paradox: Any measure that would allow Google to track the sources of a Chinese hacker attack would also enable the Chinese government to track its own dissidents.

Even on our shores, a look at recent government action on privacy shows how confused the issue has become.

On the one hand, US lawmakers and the nation’s top consumer-protection agency are so spooked by online marketing practices that they are threatening legislation if the industry doesn’t begin to self-regulate. By doing so, they’re affirming the public’s right to retain its anonymity.

Earlier this year, the FTC began floating the idea of a no-track list, which would prevent advertisers from gathering information from a user’s online behavior much as the federal Do Not Call list restricts the practices of telemarketers. The ability of marketers to track you has shifted so quickly, and the information they can glean is so frighteningly accurate, that in July, Congress hauled a who’s-who of the Interwebs, including representatives from Google, Facebook, Apple, and AT&T, in front of the Senate Commerce Committee, threatening to push bills through both the House and the Senate if the industry didn’t start explaining to consumers what information is being collected and how it’s being used.

After the Senate hearings, Massachusetts Senator John Kerry announced that he would draft legislation (to complement bills already introduced in the House) that would give people more control over how their information is collected and distributed online.

“Take the single example of a cancer survivor who uses a social network to connect with other cancer survivors and share her story,” said Kerry in a statement. “That story is not meant for her employer or everyone she e-mails, or marketers of medical products promising herbal cures. Misapplied and poorly distributed, this information could lead to a lost job opportunity or higher insurance rates. Even distributed without malice this information could pigeonhole her identity as a cancer survivor, which may not be how she wants to face the world.”

Deciding who gets that information “should be her right,” Kerry continues. “Whether or not she acts to protect its distribution, private firms should start with the premise that they should treat her and her information with respect. The fact that no law limits the collection of this information or its distribution is a problem that threatens an individual’s sense of self.”

That very month, however, the Obama administration tried to make it easier for the FBI to obtain records of “online transactions,” including a list of who you’ve e-mailed and what Web sites you’ve visited, without a warrant. Around the same time, the Electronic Frontier Foundation reported that the White House has circulated a draft of its plan for securing identity online, which calls for individuals to “voluntarily request a smart identity card from her home state” to “authenticate herself for a variety of online services” including “securely accessing her personal laptop computer, anonymously posting blog entries, and logging onto Internet e-mail services using a pseudonym.”

The proposal, called the National Strategy for Trusted Identities in Cyberspace, sounded alarming to some critics.

“If I’m posting on a blog, reading, browsing, who needs to know who I am? Why is it so important that my identity be verified and authenticated?” says Tien. “We have a tendency to say, ‘Well, gee, there are all these problems so we need to know people’s identity.’ But identity isn’t security. You don’t automatically know what to do about someone just because you know who they are.”

Contested concepts

At any rate, even a raft of new laws and legal precedents can’t be the only answer. Beyond legal remedies, there has to be a cultural component.

“Much of our sense of privacy in the world isn’t guaranteed by law,” says Tien. “It’s guaranteed by people acting within traditional bounds.” Unfortunately, “technology screws this up. It accelerates social change in ways where people aren’t sure what the norms are.”

Justin Silverman, a law student who blogs for Suffolk Media Law and the Citizen Media Law Project, says he suspects that ultimately people’s sensibilities will adapt as folks get “more comfortable with information online” and a lot these issues will “solve themselves.” In the meantime, he says, “the market will take care of some things.”

Indeed, even as they’ve helped create some of these issues, technology and the private sector have huge roles to play. People are starting to demand it. The Wall Street Journal reported recently that “companies with ideas on how to protect personal information”—firms such as Abine and TRUSTe—“are a new favorite of venture capitalists.”

A lot of Internet companies, according to Polonetsky, are simply saying, “I’ve had enough of this. I have some pretty big plans to do some pretty good things with technology, and I don’t want to be called a bad guy. I’m ready to have the practices that seem to be of grave concern taken off the table so I can roll things out.”

Even as the technology evolves, and legislators and courts and corporations slowly smarten up, and society gets more Web-savvy, some of this stuff will always be with us.

Tien mentions a phrase he likes from philosophy: essentially contested concept. That’s an idea that pretty much everybody recognizes and agrees exists in theory—“justice,” say—but on which there’s little concurrence about just what it is and how to achieve it.

“Privacy is essentially contested,” says Tien. “We want to protect our privacy, but there are grand incentives to know more about us. Combine this problem of competing incentives with the problem of how hard a problem it is to solve and how every era changes the technology: Even if the problem gets solved for the telephone it didn’t get solved for e-mail and it didn’t get solved for social networking. It’s always going to be work.”—Mike Miliard

Permalink • Print • Comment

April 17, 2010

ACTA Treaty: Can Seize, Destroy Your PC, Electronics

by Bill Lindner infopackets.com on 20100312 @ 12:44AM EST

The Anti-Counterfeiting Trade Agreement (ACTA) is a far-reaching proposal that the U.S. government has insisted was too sensitive to be exposed to the public. Now that the 44-page (PDF) has been leaked, it’s easy to see why the U.S. wanted to keep it a secret. (Source: die-linke.de)

ACTA, in its present form, is heralded by the Film and Music industries and their fight against piracy. However, if upheld, citizens will pay a heavy price for their privacy.

Gov’t Can Search, Seize and Destroy Electronics

Former President George W. Bush and current President Barack Obama both favor ACTA, which is a result of countless millions of dollars in international lobbying money from the media industry.

ACTA was designed to enact the constant monitoring of everyone’s online activities — both legitimate and non-legitimate — and gives border agents in the U.S. and other member states the power to search and seize your equipment without a warrant. Effectively, it gives these officials the power to destroy U.S. citizens’ laptops, iPods or CDs if the agents suspect they might contain copyright-infringing content.

The worst part about giving border patrol agents the power to search and seize your electronics is that the U.S. citizens will be paying for it without their knowledge.

U.S. Keeps ACTA Secret from Public

Surprisingly, there are only a few nations named in the treaty that support the U.S. government’s intentions of keeping the terms of ACTA secret. Dutch officials ‘accidently’ leaked a memo from a secret ACTA negotiation meeting in Mexico detailing who supported keeping ACTA secret from citizens of member nations.

Belgium, Portugal, Germany, Denmark, South Korea and Singapore all supported keeping ACTA secret, with Denmark being the most vocal supporter of secrecy.

ACTA Secrecy Raises Questions

The Netherlands, Sweden, Finland, Ireland, Hungary, Poland, Estonia, Austria, the UK, and Japan all supported releasing ACTA details to the public. Japan and the UK were particularly vocal about transparency. Canada, Australia, ordering viagra and New Zealand weren’t listed in the memo, but have also advocated transparency.

The U.S. fought to keep the terms of ACTA secret, and with the help of a few nations supporting secrecy, successfully prevented ACTA details from being aired. Despite their best attempts at secrecy, much information about ACTA had already been made public due the the whistleblower websites like Wikileaks.org.

Permalink • Print • Comment

March 5, 2009

The Pirate Bay trial and a tough new Swedish law

James Hall on 26 February 2009

According to the Local, various members of the IFPI (International Federation of the Phonographic Industry) have taken the stand in the ongoing trial against the Pirate Bay now unfolding in Sweden. At one point, John Kennedy, chairman of the IFPI, was silenced in the middle of his testimony by the judge after Per E. Samuelson, defence attorney for the Pirate Bay, protested that Kennedy had drifted into giving what amounted to a "political speech" on behalf of the recording industry.

Later, Per Sundin, the head of the Swedish wing of Universal Music, claimed that "Sweden has the worst respect for copyright in the world" before, as Neowin had anticipated, he brought up the recent leak of U2's new album, No Line on the Horizon, in the days leading up to its official release. Samuelson challenged him by pointing out that the premature release of the album was due to an industry error (the album was accidentally made available for digital download in Australia prior to its official release date).

Samuelson then asked him exactly what the Pirate Bay had to do with that leak and the copyright infringement that followed. The point is a valid one, as Neowin has noted earlier today. The infringement of copyright is down to individuals using bittorrent clients. The Pirate Bay may provide the torrent files themselves, but these files contain no material that directly infringes copyright.

Sundin's confused reply was, "If we had more resources we would have [gone after individual users]. But we're going after the biggest and baddest villain of the piece and buy viagra now that is The Pirate Bay." This may be the way Sundin and the IFPI view the matter, but it is unlikely that the Pirate Bay personnel on trial will be found guilty of anything.

Besides, up to now, it has been difficult to go after individual file-sharers in Sweden (unlike in the United States), but this situation has changed in the recording industry's favour.

At the same time Sundin was berating the Pirated Bay as "the biggest and baddest villain", the Riksdag (the Swedish parliament) passed a tough new law making it easier for copyright-holders to go after individuals suspected of infringement. Green Party Lage Rahm, one of many on the left who objected to the law, stated, "To stop file sharing a police state is required where all internet traffic is under surveillance. Is it worth it? We think copyright is important, but the problem is that it's not right to criminalize people for what they do for private use."

Rahm also expressed his fear that the new legislation would lead to "blackmail situations" where people accused of infringement would agree to "pay off" the record companies rather than face a trial. This fear contains an implicit reference to what has routinely happened in the United States and is often referred to as "extortion" by legal commentators, noting how the RIAA has systematically used the American legal system to bully individuals into "settling" out of court.

Still, proponents of the new law feel that sufficient safeguards will be in place to stop recording-industry attorneys from simply pushing the "threat" button to bypass the courts in order to use citizens as cash machines, as those critical of the RIAA's activities in America have portrayed the matter.

On a lighter note, and in keeping with the Pirate Bay's correspondence with the recording and film industry, "Kopimi" has sent a "Nigerian 409" email (of sorts) to John Kennedy, chairman of the IFPI, asking for £47,500,000.

Permalink • Print • Comment

February 28, 2009

Bill proposes ISPs, Wi-Fi keep logs for police

February 19, 2009 10:45 PM PST
usa cialis align=”justify”>
by Declan McCullagh

Republican politicians on Thursday called for a sweeping new federal law that would require all Internet providers and operators of millions of Wi-Fi access points, even hotels, local coffee shops, and home users, to keep records about users for two years to aid police investigations.

The legislation, which echoes a measure proposed by one of their Democratic colleagues three years ago, would impose unprecedented data retention requirements on a broad swath of Internet access providers and is certain to draw fire from businesses and privacy advocates.

"While the Internet has generated many positive changes in the way we communicate and do business, its limitless nature offers anonymity that has opened the door to criminals looking to harm innocent children," U.S. Sen. John Cornyn, a Texas Republican, said at a press conference on Thursday. "Keeping our children safe requires cooperation on the local, state, federal, and family level."

Joining Cornyn was Texas Rep. Lamar Smith, the senior Republican on the House Judiciary Committee, and Texas Attorney General Greg Abbott, who said such a measure would let "law enforcement stay ahead of the criminals."

Two bills have been introduced so far–S.436 in the Senate and H.R.1076 in the House. Each of the companion bills is titled "Internet Stopping Adults Facilitating the Exploitation of Today's Youth Act," or Internet Safety Act.

Each contains the same language: "A provider of an electronic communication service or remote computing service shall retain for a period of at least two years all records or other information pertaining to the identity of a user of a temporarily assigned network address the service assigns to that user."

Translated, the Internet Safety Act applies not just to AT&T, Comcast, Verizon, and so on–but also to the tens of millions of homes with Wi-Fi access points or wired routers that use the standard method of dynamically assigning temporary addresses. (That method is called Dynamic Host Configuration Protocol, or DHCP.)

"Everyone has to keep such information," says Albert Gidari, a partner at the Perkins Coie law firm in Seattle who specializes in this area of electronic privacy law.

The legal definition of electronic communication service is "any service which provides to users thereof the ability to send or receive wire or electronic communications." The U.S. Justice Department's position is that any service "that provides others with means of communicating electronically" qualifies.

That sweeps in not just public Wi-Fi access points, but password-protected ones too, and applies to individuals, small businesses, large corporations, libraries, schools, universities, and even government agencies. Voice over IP services may be covered too.

Under the Internet Safety Act, all of those would have to keep logs for at least two years. It "covers every employer that uses DHCP for its network," Gidari said. "It covers Aircell on airplanes–those little pico cells will have to store a lot of data for those in-the-air Internet users."

In the Bush administration, Attorney General Alberto Gonzales had called for a very similar proposal, saying that subscriber information and network data should be logged for two years.

Until Gonzales' remarks in 2006, the Bush administration had generally opposed laws requiring data retention, saying it had "serious reservations" about them. But after the European Parliament approved such a requirement for Internet, telephone and VoIP providers, top administration officials began talking about the practice more favorably.

After Gonzales left the Justice Department, the political will for data retention legislation seemed to ebb for a time, but then FBI Director Robert Mueller resumed lobbying efforts last spring.

This tends to be a bipartisan sentiment: Attorney General Eric Holder, a Democrat, said in 1999 that "certain data must be retained by ISPs for reasonable periods of time so that it can be accessible to law enforcement." Rep. John Conyers, the Democratic chairman of the House Judiciary Committee, said that FBI proposals for data retention legislation "would be most welcome."

Smith, who sponsored the House version of the Internet Safety Act, had previously introduced a one-year requirement as part of a law-and-order agenda in 2007.

A 1996 federal law called the Electronic Communication Transactional Records Act regulates data preservation. It requires Internet providers to retain any "record" in their possession for 90 days "upon the request of a governmental entity."

Because Internet addresses remain a relatively scarce commodity, ISPs tend to allocate them to customers from a pool based on whether a computer is in use at the time. (Two standard techniques used are the Dynamic Host Configuration Protocol and Point-to-Point Protocol over Ethernet.)

In addition, Internet providers are required by another federal law to report child pornography sightings to the National Center for Missing and Exploited Children, which is in turn charged with forwarding that report to the appropriate police agency.

The Internet Safety Act is broader than just data retention. Other portions add criminal penalties to other child pornography-related offenses, increase penalties for sexual exploitation of minors, and give the FBI an extra $30 million for the "Innocent Images National Initiative."

Permalink • Print • Comment

February 3, 2009

Should federal government go open source?

January 24th, 2009

Posted by Richard Koman

Could the federal government be going open source? The BBC reports that President Obama has asked former Sun CEO Scott McNealy to report on the relative benefits of open source software. Imagine that: a president who has heard of open source software.

And McNealy will report just how large those benefits are.

It’s intuitively obvious open source is more cost effective and productive than proprietary software. Open source does not require you to pay a penny to Microsoft or IBM or Oracle or any proprietary vendor any money.

And he wants open source mandates.

The government ought to mandate open source products based on open source reference implementations to improve security, get higher quality software, lower costs, higher reliability – all the benefits that come with open software.

Coming from McNealy, the opinion is hardly a neutral analysis. Sun is a vigorous proposal of open source and Unix; cofounder Bill Joy was a primary author of BSD. During his tenure as CEO, McNealy’s hallmark was his constant attacks on Microsoft and Bill Gates.

In his inaugural speech, Obama said:

those of us who manage the public’s dollars will be held to account, to spend wisely, reform bad habits, and do our business in the light of day, because only then can we restore the vital trust between a people and their government.

The question is how much longer spending huge amounts of taxpayer money on proprietary solutions can be justified as “spending wisely” or something other than a “bad habit.”

Michael Tiemann, VP of RedHat and head of the Open Source Initiative, estimated the global waste in using proprietary software at more than $1 trillion annually.

This is the kind of change we need if we are ever going to see the government reform its operational capabilities and cost basis. If they fail to do this, it’s one more stick in the mud. The capital markets are telling us today we can no longer afford much more status quo.

At TruthOut, Dean Baker has called for a $2 billion investment to further development of open source for the desktop.

This money can be used to further develop and simplify open source operating systems such as Linux, as well other forms of free software. The payoffs from this spending would be enormous. Imagine that every computer buyer in the world would be able to get a computer for which the operating system was free, as was almost all the software that they would ever use.

This would surely save consumers an average of at least $200 per computer. With sales at close to 20 million a year, cialis usa the savings in the United States alone could easily exceed the cost of supporting software development. Adding in the benefits (and presumably some contributions) from the rest of the world, we will be way ahead by going the route of publicly funded open software.

I think Baker probably misses the ball on this one. I fully support expanded government funding of open source developments. But the real benefit is not in demolishing Microsoft’s market for Windows but in developing more and more robust database, cloud and distributed computing solutions. Cost savings for government and business would free up money to invest in R&D, expand into new markets and increase hiring.

Permalink • Print • Comment
« Previous PageNext Page »
Made with WordPress and Semiologic • Sky Gold skin by Denis de Bernardy