Wireless & Spectrum Policy

Mike at TechDirt takes issue with an article by Tom Lenard on C|Net that argues that market allocation of “white space” spectrum is more efficient than a “commons” designation. He writes that “Unlicensed spectrum is hardly a ‘centralized allocation system,’ and it’s hard to see how anyone could make such a claim with a straight face.” As I explained in a recent paper, in order to have a “commons” that works, you need to have rules that govern how devices operate in the space so that they don’t interfere with each other. For example, devices in the chunk of spectrum in which Wi-Fi operates, by regulation, cannot operate above 5 Watts EIRP. Therefore, the rules that govern the “commons” we now have are centrally planned by the government. It’s not controversial to say that central planning is inefficient because a planner cannot possibly have all the information about all the possible competing uses of the spectrum.

While there no doubt is a place for unlicensed devices, one has to admit that designating some spectrum as a commons with certain specific rules will prevent that spectrum from being used in another, perhaps more innovative way, that cannot operate within the commons’ rules. In a market you could just buy the spectrum and deploy your more innovative use; in a commons regime you would have to petition the central planner to change the rules (and we all know how well and how quickly that works.)

Second, Mike takes Lenard to task for not understanding the concept of zero, claiming that when scarcity is removed, market oriented folks have a hard time understanding policy. I tend to agree with him, and I think his is a great observation as it applies to intellectual property. Ideas truly are not scarce; their scarcity is created artificially through IP laws. However, I’m afraid that while new technologies have been able to eke out more communications capacity from existing spectrum, that capacity is still finite and, despite the rhetoric one often hears, spectrum scarcity has not been eliminated.

Mike writes that “what those who understand zero recognize, is that unlicensed spectrum turns spectrum into a free input, lowering the costs and allowing companies to provide products that serve the market at much more reasonable rates.” What he doesn’t see is that while unlicensed spectrum might be a “free input” for certain uses, a whole host of other uses are precluded. While a commons can allow low power, near range devices such as Wi-Fi, bluetooth, and cordless phones–great innovations all–you could not deploy a new national wireless competitor in voice or video over unlicensed spectrum. The only way the cost of spectrum could truly be zero is if all potential uses of spectrum could be deployed without precluding any other use. This is the case in intellectual property where I can use any idea as much as I want without ever affecting someone else’s ability to use that same idea. But it’s not the case for spectrum where one use of spectrum (even the use of spectrum for an unlicensed commons) will necessarily preclude some other potential use.

Techdirt flags another inaccurate and alarmist story about the dangers of allowing others to borrow your WiFi connection:

To demonstrate the danger, trouble shooters from Data Doctors take us “War Driving”. It’s where hackers drive around neighborhoods, and for the sport of it, record the address of unsecured networks and map them out on the Internet.

James Chandler, Data Doctors: “It’s strictly a game to them, but they provide a tool for anybody who is interested in the malicious, the criminal intent.”

And after war driving for just a few minutes, we find dozens of open home networks, some even registered in the family name.

James Chandler, Data Doctors: “They’re basically telling you, ‘I’m free, I’m not secure, connect to me.’ All I have to do is click a button and I’m ready to connect.”

And from the car, they could access everything sent across the signal–account numbers, passwords, business documents. If that’s not enough, they can make you criminally liable by downloading illegal material, using your computer’s Internet address.

The article makes the unsupported assumption that anyone seeking a WiFi connection must have criminal intent. In point of fact, a lot of wardrivers are just looking for a convenient place to check their email. Mike also points out that a hacker can only access traffic that’s not encrypted, and nowadays encryption is a standard feature of any website that deals with sensitive data.

As I wrote back in March, the increasing ubiquity of free wireless networks is a generally positive development. While we can and should educate users about the possible risks and how to lock down their network if they choose to do so, we should also recognize that if done properly, the risk of sharing your WiFi is quite small, and the potential to make the world a more helpful place is significant.

According to eWeek, “Google’s begun testing [its proposed Mountain View, CA, muni wi-fi] network and, in so doing, has discovered it might need to add more Wi-Fi transmitters than originally thought to deliver the coverage and service quality it promised[.]” This follows “snags” in the muni wi-fi efforts in St. Cloud, FL. I’ve said it before and I’ll say it again: communications over a “commons” requires government-enforced low-power restrictions like those imposed on wi-fi. Low power works great when you’re in a small area you control: your home, a coffee shop, etc. Wi-fi, and unlicensed/commons communications generally, are not suited for municipality-wide reach (unless you define the municipality as city hall and the town square).

For those of you in the DC area TOMORROW at 4:00, The George Mason University School of Law’s Information Economy Project is launching its “Big Ideas about Information” series with a discussion on “FCC License Auctions: Lessons from a Tumultuous Twelve Years.” The event will feature a conversation with Vernon Smith, Professor of Economics & Law at George Mason University and 2002 Nobel Laureate in Economics, and David Porter, Professor, Interdisciplinary Center for Economic Science at George Mason University. Both men are internationally renowned experts on the structure of auctions.

The event will be held at the George Mason University School of Law (Room 120). The GMU law school is located on 3301 Fairfax Drive in Arlington, Virginia and is right next to the Virginia Square-GMU Metro (Orange Line).

You can find more info and register at: http://www.law.gmu.edu/events/upcoming.php?ID=420

Next Tuesday, Nobel Laureate and George Mason Professor Vernon Smith and Prof. David Porter, both internationally renowned experts on the structure of auctions, will be speaking about their experiences helping craft the FCC wireless auctions. They will asses the auction system and discuss how auctions have affected the allocation of radio spectrum. Event deets: Tuesday, May 2, 4 p.m. (reception following) – GMU School of Law Room 120 – Admission is free, but seating is limited. RSVP to Masha Khazan, mkhazan@gmu.edu.

Well it didn’t take long for a young, rebellious punk to turn into a paranoid, condescending parent. I’m already talking to my kids in ways that used to make me resent my own parents. And I’m already beginning to think about how to watch over their every move like a hawk to make sure that they stay out of trouble.

The difference between raising a kid today versus the past, however, is that technology–much to the dismay of independent-minded children–makes this task even easier for parents. In my recent paper discussing how”Parents Have Many Tools to Combat Objectionable Media Content,” I mentioned how new cell phones targeted to kids come embedded not only with a variety of parental controls, but also GPS / geo-location technology. This enables parents to monitor the movements of their children wherever they may go.

Even though my kids are still too young to have their own cell phones, I’ve already begun thinking about how I might use such tracking technologies in the future. Even though both of my kids are under five years of age, I sometimes sit around thinking about what they are doing or exactly where they are at. This is despite the fact that I know exactly where my kids are: My daughter is always at her pre-school and my son is always at home with our nanny. Yet, I’m still paranoid, and sometimes find myself wondering if they are exactly where they should be. Could they have wondered off? Are the teachers or my nanny taking the kids places I don’t know about? Has someone snatched them?!?

I know this is all quite pathetic in one sense, but that’s the sort of paranoid thinking that sometimes goes on in the heads of parents. And in my most paranoid moments, I sometimes think how cool it would be if I could just convert the wi-fi radar on my laptop (which searches for nearby hotspots and maps them on a big radar screen on my computer) into a kid-tracker instead. It could track their cell phones, or their GPS-enable watches or lunchboxes. Or perhaps even the RFID chip I could plant under their skin!

Again, this is the sort of stuff that what have driven me into to hyper-rebellion as a kid, especially as a teenager. The thought of my parents tracking my every move would have driven me nuts, and I my computer-nerd brother and I probably would have worked hard to defeat or trick any geo-location technologies that our parents might have tired to use with us. (My brother would have probably reprogrammed them to trace our cats instead of us.)

Is there a happy balance here? I think so.

Continue reading →

The Houston Chronicle’s TechBlog has a post this morning accusing me of taking security issues to lightly in my wireless piggybacking op-ed:

Reading Lee’s bio at the Technology Liberation Front, where he is a contributor, you can tell that he knows better. He’s a former systems administrator and savvy in the ways of Mac, Unix and Perl. I think his skimming over the security issue is disingenuous.

If he’s been paying attention, he knows that illegal music and movie sharing is rampant, and that the recording and film industries are coming after those who do it frequently. He also knows that these trade associations’ lawyers hunt down their prey via IP address, and that a “friendly neighbor” with a thirst for illegal music and movies can bring unwanted legal attention to the owner of an open WiFi network.

And that’s just the most minor of crimes that can be committed over a WiFi network. Granted, the chance that a kiddie porn addict or someone trying to hack the Pentagon will use your open bandwidth is slim–but do you even want to take that chance?

This is an interesting point, and is actually a different security issue than the one I had in mind when I pooh-poohed the security risks of open WiFi. I had in mind the worry that someone would log into your wireless network and hack into your computer or eavesdrop on your network traffic.

But what he’s talking about isn’t really a security issue at all, it’s a liability issue. And it is a real risk. If somebody does something bad with your Internet connection–shares copyrighted songs, trades child pornography, or sends a death threat to the president–there’s a chance you could get sued, or even arrested.

However, the odds of that happening is pretty small. And if it does happen, you’re not likely to be convicted. It is, after all, a case of mistaken identity–it’s not a crime to have someone use your network for lawbreaking without your consent. It’s likely that if you get a call from the RIAA or the FBI about illegal activity on your network, they’ll be willing to let you off the hook if you help them catch the culprit.

The other possible argument is that by leaving your network open, you’re making it easier for people to get away with doing illegal things. But there are millions of networks connected to the Internet. You’re never going to close all of them. So closing your network will simply caues criminals to move on to the next one.

Update: Mike at TechDirt chimes in to say that opening up your WiFi network qualifies you as an ISP under the Communications Decency Act, under which you’re not liable if someone does something illegal via your network.

The Broadband Buffet

by on March 17, 2006

Felix Salmon links approvingly to my op-ed yesterday, but he takes exception to my claim that using your neighbor’s bandwidth as a permanent Internet connection is borderline theft of service:

Well, is it theft of service or isn’t it? And who’s being stolen from here, Lee or the ISP? Would Lee slap on that password because he feels a debt of gratitude to his ISP for its service, and hopes that maybe the price will come down if his “unscrupulous neighbor” pays a monthly charge as well?

The answer is that you’re stealing from the ISP. Think of an all-you-can-eat buffet: they charge you $7 for all the food you can eat because they make reasonable assumptions about how much the typical person eats. Some particularly large people eat mor than $7 worth of food, but the average customer eats less than $7 worth of food, and so the buffet is able to make money.

If you take your table scraps home to your dog, the buffet probably doesn’t care. The amount of food involved is trivial, and you wouldn’t have brought the dog in anyway. But if you shovel a bunch of food into a tupperware container to share with your friends, that’s not kosher because you’re breaking the terms of the “all you can eat” agreement.

By the same token, the broadband provider provides you with an “all you can download” service for you and the members of your household. The viability of this arrangement depends on people not “cheating” by sharing the service with neighboring households. Sharing your wireless connection is analogous to sneaking food out of the all-you-can-eat buffet. Sure you could have consumed all of that bandwidth yourself, but the fact is that you wouldn’t have. The flat-rate pricing model only works because most customers pay for their own connections.

Promote Thyself

by on March 16, 2006 · 4 comments

I’ve got an op-ed in the New York Times today that expands on my post last week on wireless “piggybacking.”

The quality of mainstream media coverage of wireless “piggybacking” leaves a lot to be desired:

Martha Liliana Ramirez, who lives in Miami, said she had not thought much about securing her $100-a-month Internet connection until recently. Last August, Ms. Ramirez, 31, a real estate agent, discovered a man camped outside her condominium with a laptop pointed at her building.

When Ms. Ramirez asked the man what he was doing, he said he was stealing a wireless Internet connection because he did not have one at home. She was amused but later had an unsettling thought: “Oh my God. He could be stealing my signal.”

Yet some six months later, Ms. Ramirez still has not secured her network.

If you take out the alarmist rhetoric, here’s what happened: Ms. Ramirez purchased a wireless router and made access to her network available to the general public. The gentleman in the car used the connection she made available. What’s the problem?

There are some nuances to the story, obviously. Apparently, Ms. Ramirez would rather that strangers not access her network, although it doesn’t explain why. And it’s possible that securing her network is beyond her technical capability, in which case she is, in a sense, having her network used against her will. But that’s not a terribly good excuse. Setting a wireless network password isn’t that hard. If she doesn’t know how to do it, there is surely at least one computer geek in her life who could show her. And if, after 6 months, she hadn’t gone to the trouble of figuring it out, she can’t possibly be that concerned.

Continue reading →