May 2011

On the podcast this week, Joseph Menn, a Financial Times technology reporter and the author of Fatal System Error: The Hunt for the New Crime Lords Who Are Bringing Down The Internet, discusses cyber crime. Menn says that one of the main challenges of cybersecurity is that the internet was never intended for many of the things it’s used for today, like e-commerce or critical infrastructure management. He talks about the implications of the internet still being in beta form and comments on the recent Sony data breach and other similar cyber attacks. Menn also discusses his book, telling a few anecdotes about the people who go beyond computer screens in pursuit of internet crime lords.

Related Links

To keep the conversation around this episode in one place, we’d like to ask you to comment at the web page for this episode on Surprisingly Free. Also, why not subscribe to the podcast on iTunes?

Here’s a quick excerpt from an interesting press release sent out over PR Newswire last week—it sounds like someone is angling for a fat government contract:

EMC® announced the 2011 Data Hero Awards winners and finalists

First annual Data Hero Visionary award goes to Vivek Kundra, the first Chief Information Officer (CIO) of the United States of America

EMC just happens to be huge provider of cloud storage solutions, which they’re actively trying to sell to the public sector, and apparently already have.

Kundra, of course, was honored:

I’m truly honored to be recognized for this 2011 Data Hero visionary award. The modern economy is powered by data and technology. That’s why we strive to find innovative paths to lower government cost, engage citizens and institute radical transparency to bring them closer to their government and to help move us all forward, together.

I really like the way he worked in the bit on “radical transparency.”  It’s not as though if you say something enough, it magically changes reality, but that doesn’t stop the flow of awards.

Be on the lookout for an EMC press release involving a massive federal government cloud computing project.

Just a final reminder that it isn’t too late to still register for this Wednesday’s Mercatus Center event on “The State of Wireless Competition” featuring Thomas W. Hazlett, Professor of Law & Economics, George Mason University School of Law; Joshua D. Wright, Assistant Professor of Law, George Mason University School of Law; Robert M. Frieden, Professor of Telecommunications & Law, Penn State University; and Harold Feld, Legal Director, Public Knowledge. These experts will discuss the FCC’s upcoming Wireless Competition Report and the debate:

  • What does a proper analysis of wireless competition look like?
  • What should we expect from the FCC’s report this year?
  • How should the FCC address competition in the future?

Again, the event will take place this Wednesday (May 18) from 4:00 – 5:30 p.m at George Mason University’s Arlington Campus, just ten minutes from downtown Washington. (Founders Hall, Room 111, 3351 N. Fairfax Drive, Arlington, VA). A reception will follow.

To RSVP for yourself and your guests, please contact Megan Gandee at 703-993-4967 or mmahan@gmu.edu no later than May 16, 2011. Hope to see some regular TLF readers there!

I’ve written two articles on the Protect IP Act of 2011, introduced last week by Sen. Leahy (D-Vt.).

For CNET, I look at some of the key differences, better and worse, between Protect IP and its predecessor last year, known as COICA.

On Forbes this morning, I have a long meditation on what Protect IP says about the current state of the Internet content wars.  Copyright, patent, and trademark are under siege from digital technology, and for now at least are clearly losing the arms race.

The new bill isn’t exactly the nuclear option in the fight between the media industries and everyone else, but it does signal increased desperation. Continue reading →

As a rule of thumb, when I have to spend a given amount of time straightening out a company’s poor service or unscrupulous practices, I’ll spend an equivalent amount of time giving that company some payback. Today’s victim: T-Mobile. Fear the blog post.

A letter from Asurion Warranty Services arrived in my mail today thanking me for signing up for their “Premium Handset Protection Bundle” for T-Mobile phones.

Oh no I didn’t. It costs $5.99 a month for repair and replacement of my newly upgraded phone. That’s pretty much the price of a phone per year for such protections. Bad deal. I haven’t lost or damaged a phone in a decade, and I didn’t agree to get have this charge added to my phone bill.

I am on hold right now, trying to learn just how this got onto my bill. Friendly, helpful T-Mobile customer service people have told me that I should go down to the T-Mobile store where I upgraded in order to straighten this out. No I shouldn’t. T-Mobile should be straightening this out right now over the phone, with an apology and a thank you.

I am done with my 40-minute phone call, in which friendly customer service supervisor Kassidy K. (#1204178) tried to assign me the task Monday of calling the store where I upgraded my phone to get this straightened out. I explained to Kassidy K. that I’ve made the only call I need to—that’s the call we were on. Her next work-day is Wednesday, and I told her I expected to hear from her about this being cleared up.

If I have to make another call, it’s just as likely to be about returning my phone and canceling my service as getting this charge removed from my bill.

You people can argue all you want about top-down—whether the government should allow the AT&T-T-Mobile merger. I’ll do bottom-up—whether T-Mobile should get my business.

My latest Forbes column is a celebration of 47 U.S.C. §230, otherwise known as “Section 230.” Sec. 230 turns 15 years old this year and I argue that this important law has “helped foster the abundance of informational riches that lies at our fingertips today” and has served as “the foundation of our Internet freedoms.”  Sadly, however, few people have even heard of it. Worse yet, as I note in my essay, this important law is under attack from various academics and organizations who want it modified to address a variety of online problems. But, as I note:

If the threat of punishing liability is increased, the chilling effect on the free exchange of views and information would likely be quite profound. Many site administrators would immediately start removing massive amounts of content to avoid liability. More simply, they might just shut down any interactive features on their sites or limit service in other ways.

Head over to Forbes to read the rest. And here’s a graphic I put together illustrating all the new fault lines in the war against Sec. 230. It will be included in a new paper on the issue that I am wrapping up right now.

Last November, I penned an essay on these pages about the COICA legislation that had recently been approved unanimously by the U.S. Senate Judiciary Committee. While I praised Congress’s efforts to tackle the problem of “rogue websites” — sites dedicated to trafficking in counterfeit goods and/or distributing copyright infringing content — I warned that the bill lacked crucial safeguards to protect free speech and due process, as several dozen law professors had also cautioned. Thus, I suggested several changes to the legislation that would have limited its scope to truly bad actors while reducing the probability of burdening protected expression through “false positives.” Thanks in part to the efforts of Sen. Ron Wyden (D-Ore.), COICA never made it a floor vote last session.

Today, three U.S. Senators introduced a similar bill, entitled the PROTECT IP Act (bill text), which, like COICA, establishes new mechanisms for combating Internet sites that are “dedicated to infringing activities.” I’m glad to see that lawmakers adopted several of my suggestions, making the PROTECT IP Act a major improvement over its predecessor. While the new bill still contains some potentially serious problems, on net, it represents a more balanced approach to fighting online copyright and trademark infringement while recognizing fundamental civil liberties.

Continue reading →

Sometimes free-marketeers are branded “free market fundamentalists” or something similar by their ideological opponents. The implication is that our preference for a society in which free people interact voluntarily to organize society’s resources is an irrational desire or a religion. I’m sure there’s a similar epithet we give to nanny staters—oh, there’s one, “nanny staters”—who we believe to have excessive faith in government solutions.

Market processes have decent theoretical explanations, such as Friedrich Hayek’s essay, “The Use of Knowledge in Society.” It’s not the easiest read, but lovers of the Internet, who see the genius of its decentralization, should see similar genius in markets as a method for discovering society’s wants and uniting to achieve them—without coercion.

From time to time, we also point out examples of how market processes work to deliver even intangible goods like privacy. So, for example, I noted market pressure against Facebook’s privacy-invasive “beacon” advertising system in 2007. Berin pointed out in 2008 that market forces caused Google to remove an oppressive clause from the Chrome end user license agreement. Google competitor Cuil made a run at the search behemoth based on privacy that year, something I noted briefly then (and Ryan and I discussed in the comments). I’ve also noted the failure of many to find true market failures.

As Cuil illustrates, not every privacy play works, but companies routinely pitch the public on the privacy merits of their products and the demerits of others’. It’s not a highly visible process, but it sometimes gets a little more visible when it fails. So thank you, Facebook, for a big #FAIL in the privacy competition area this week. You provide us a nice lesson in one of the ways markets work to meet consumer privacy demands.

You see, Facebook hired PR firm Burson-Marsteller to do a whisper campaign on the privacy demerits of a Google product called Social Circle. By pushing the story of privacy problems with a Google effort in the social networking space, Facebook hoped to thwart a competitor that it fears. Success would also be a success for privacy protection. If Google were doing something wrong, and Facebook were to make the case to the public, Google would lose face and it would lose business. Most importantly, a privacy-invasive product—as determined by public consensus—would recede. Markets often work by silently shunning products that don’t cut it. (Again, hard to see if you’re not looking for it, or if you’re committed to disbelieving it.)

Facebook appears not to have succeeded. Prickly privacy advocate Chris Soghoian outed the Burson-Marsteller campaign. Dan Lyons of the Daily Beast cornered Facebook into confessing its role in the attack on Google. And privacy commentator Kashmir Hill gives the privacy issues with Social Circle a “meh.”

When it happens differently, you get a change in a service like Social Circle—the way Facebook changed “beacon” and Google changed the Chrome EULA. These are anecdotes, and they reflect but one element of the market processes that shape products and services. But it’s something that “market denialists” should consider as they dig deep to explain to themselves and others how various mechanisms in our society work.

In [a post at Techland yesterday](http://techland.time.com/2011/05/10/new-emergency-alert-system-comes-to-your-phone/) I noted that the FCC and FEMA’s new “PLAN” text-based emergency alert system might do little good since new media seems to always beat government to get out critical information:

>If history is any guide, however, you may not get any messages from 1600 Pennsylvania. Since the Emergency Alert System was created in 1963, it’s never been activated, despite hurricanes, earthquakes, tornadoes, the Cuban Missile Crisis, the Oklahoma City bombing, and 9/11. Why?

>The chairman of the FCC during the 9/11 attacks, Michael Powell, says that “The explosion of 24-hour-a-day, 7-day-a-week media networks in some ways has proven to supplant those original conceptions of a senior leader’s need to talk to the people.”

>Given that it was Twitter, and not the President’s address, that recently broke the killing of Osama Bin Laden, you have to wonder whether the new service will be just as swiftly supplanted.

Another thing occurred to me talking to a colleague today. The PLAN system relies on cell carriers’ ability to track your geographic location so that targeted warning messages can be sent to your phone depending on where it is you are at the moment. Also, as far as I can tell from [the FCC’s fact sheet](http://docs.google.com/viewer?url=http://www.fcc.gov/Daily_Releases/Daily_Business/2011/db0510/DOC-306417A2.pdf), you’re automatically signed up for the system when you buy a phone and you cannot opt-out of presidential messages. I wonder if we’ll see a congressional hearing on the use of geo data without consumer consent?

San Francisco, often the breeding ground for “interesting” public policy proposals, decided recently to back off its mandate the would have required retailers of cell phones to label them with radiation levels and pass out material explaining the level of SAR in each device (SAR= Specific Absorption Rate).

This has not been done anywhere else and faced stiff opposition from the wireless industry, which filed suit against the ordinance last year.

We’ve commented on the ridiculous nature of this ordinance before. Suffice to say, in the year since this issue hit, there has still been no evidence offered that cell phones pose any sort of carcinogenic threat. This great piece in the NY Times Magazine goes into more detail on the problems of testing this hypothesis but also highlights the common error of confusing causality with coincidence. The author’s main point: Continue reading →