I laughed out loud when I read the following line in Harlan Yu’s post, “Some Technical Clarifications About Do Not Track“:

“[T]he Do Not Track header compels servers to cooperate, to proactively refrain from any attempts to track the user.”

(Harlan’s a pal, but I’m plain-spoken with friends just like everyone else, so here goes, buddy.)

To a policy person, that’s a jaw-dropping misstatement. An http header is a request. It has no coercive power whatsoever. (You can learn this for yourself: Take 30 minutes and write yourself a plug-in that charges ten cents to every site you visit. Your income will be negative 30 minutes of your time.)

Credit goes to the first commenter on his post who said, “What if they ignore the header? . . . Wouldn’t there also need to be legal penalties in place for violations, in order for this to work? (To encourage advertising companies to put in those lines of code.) Is this in the works?” Continue reading →

On the podcast this week, Declan McCullagh, chief political correspondent for CNET and former Washington bureau chief for Wired News, discusses WikiLeaks. McCullagh gives a quick recap of the WikiLeaks saga so far, comments on the consequences of the leaks themselves, and talks about the broader significance of the affair. He also offers a few insights into Julian Assange’s ideology based on his interactions with Assange in early ’90s “cypherpunk” circles. Lastly, McCullagh discusses the future of diplomacy and the chance that Assange will be indicted in the United States.

Related Links

To keep the conversation around this episode in one place, we’d like to ask you to comment at the web page for this episode on Surprisingly Free. Also, why not subscribe to the podcast on iTunes?

CLU seeks systemic perfection in Tron: Legacy

Note: The following post contains spoilers pertaining to the plot and theme of the film Tron: Legacy.

Near the end of Tron: Legacy, the character CLU (short for Codified Likeness Utility), on the verge of releasing his army of re-purposed computer programs into the brick-and-mortar world to destroy humanity, confronts Kevin Flynn, his creator-turned-nemesis, with a plaintiff, “I did everything you asked.”  Flynn, older and wiser than the character we met in 1982’s Tron, and his techno-idealism tempered by the realization that to save humanity he must destroy both his physical and virtual self, wistfully answers, “I know.”

It’s a rather poignant scene that punctuates the film’s unique take on technology and humanity. Traditionally in the movies, when technology turns evil, it does so with a will of its own. The Matrix and Terminator films are just two examples. Tron: Legacy, however, upends the idea. CLU, sure enough, turns on his human creator, but not out of rebellion, but to carry out his human-engineered programming.

You see, Flynn programmed CLU to create the “perfect system.” In the film, Flynn explains that, as a younger man he thought he could design a technology-based solution that would end war, illness, poverty and hunger and, in a nutshell, make humanity better. But when the Grid—the computer environment Flynn nurtured—actually does something spontaneously, spawning a new life form, so-called isomorphic programs (called isos for short), CLU destroys them. While this act of cybernetic genocide horrifies Flynn, from CLU’s perspective, it was nothing but a logical response. The isos, as free and independent entities that did not respond to his command and control, introduced an element of randomness and uncertainty into the Grid that CLU could not abide. They were an obstacle to the systemic perfection he was programmed to create and therefore had to be eliminated.

Continue reading →

The Technology Policy Institute has released an interesting new study from Robert Crandall and Charles Jackson on “Antitrust in High-Tech Industries,” which takes a close look at the impact of antitrust law in the three most high-profile technology cases of the last half century: IBM, AT&T and Microsoft.  Crandall and Jackson conclude:

In each of our three cases, the ultimate source of major changes in the competitive landscape appears to have been innovation and new technology — technology that was apparently not unleashed by the antitrust litigation. In each case, the government did not and probably could not see how technology would develop over time. Therefore, it was difficult for the government to design remedies that would  accelerate competition when this competition developed from new technologies.

I enjoyed the paper and encourage others to read the entire thing.  It’s very much in line with what we’ve written here in the past on the antitrust and high-tech markets.  See, for example, my review of Gary Reback’s recent book on antitrust and high-tech markets.  As I noted there, the crucial, ‘conflict of visions‘ issue comes down to an appreciation for dynamic competition and technological evolution over the sort of static competition, fixed-pie mindset that so many antitrust defenders espouse.  Those of us who believe in dynamic competition see markets in a constant state of flux and expect that sub-optimal market developments or configurations are exactly the spark that incentivizes new form of market entry, innovation, technological disruption, price competition, and so on.  But the static competition crowd looks at the same situation and imagines that the only hope is to wheel in the wrecking ball of antitrust regulation since they have little faith that things might change for the better. Moreover, they ignore the profound costs associated with such regulation and litigation.  Crandall and Jackson’s paper explains why patience is the better policy.

For CNET, I posted a long piece describing a full day at CES’s Tech Policy Summit largely devoted to spectrum issues.  Conference attendees in several packed sessions heard from FCC Chairman Julius Genachowski and three of the four other FCC Commissioners (Commissioner Copps was absent due to illness), as well as former Congressman Rick Boucher and industry representatives.

The  message was as clear as it is worrisome.  The tremendous popularity of wireless broadband, on view in a remarkable range of new devices and gizmos on display at the Vegas Convention Center, is rapidly outpacing the radio frequencies available to handle the data.

The mobile Internet needs more spectrum, and there isn’t any to give it.  The app revolution is in danger of hitting a hard stop, perhaps as soon as 2015.

As the exclusive manager of America’s radio waves, only the FCC can reallocate spectrum.  And the good news is that the agency recognizes the crisis as well as its role in solving it.  Chairman Genachowski told the audience that spectrum reform will be the agency’s top priority for 2011.

Reading the Chairman’s prepared comments, however, I was struck by the sense that I’d heard something similar before.  Perhaps in the very same room.  Perhaps by the very same speaker. Continue reading →

It might take Facebook a while to turn identity provision into a revenue opportunity, but if it is a money-maker, it could be a substantial one. Simson Garfinkel has a piece in Technology Review that goes into some of the things Facebook is doing with its “Connect” service.

As security professionals debate whether the Internet needs an “identity layer”—a uniform protocol for authenticating users’ identities—a growing number of websites are voting with their code, adopting “Facebook Connect” as a way for anyone with a Facebook account to log into the site at the click of a button.

It’s a good, relatively short article, worth a read.

As an online identity provider, Facebook could facilitate secure commerce and communication in a way that’s easy and familiar for consumers. That adds value to the Internet ecosystem, and Facebook may be able to extract some of the surplus for itself—perhaps by charging sites and services that are heavy users small amounts per login via Connect. The security challenges of such a system would grow as more sites and services rely on it, of course, and Garfinkel highlights them in an accessible way.

Quibbles are always more interesting, so I’ll note that I cocked my head to one side where Garfinkel asks “whether it’s a good thing for one company to hold such a position of power.” Strange.

Taking “power” in its philosophical sense to mean “a measure of an entity’s ability to control its environment, including the behavior of other entities,” Facebook Connect gives the company very little power. Separate, per-site logins—or a parallel service that might be created by Google, for example—are near at hand and easy to switch to for anyone who doesn’t like Facebook’s offering.

Ironically, Garfinkel refers to these identity services as “Internet driver’s licenses,” inviting a comparison with the power structure in the real-world licensing area. If you want to drive a car legally, there are no alternatives to dealing with the state, so the state can impose onerous conditions on licensing. Drivers’ licenses require one to share a great deal of information, they cost a lot of money (relative to Facebook’s dollar price of “free”), and switching is not an option if the issuer starts to change the bargain and enroll licensees in a national ID system. Garfinkel himself noted how drivers’ licenses enhance state power in a good 1994 Wired article.

In sum, the upsides of an identity marketplace are there, for both consumers and for Facebook. The downsides are relatively small. The “power” exercised by any provider in a marketplace for identity provision is small compared to the alternative of using states as identity providers.

Here at TLF, our privacy discussions often center around such concepts as expectations of privacy, notice and choice, opt-in/out, and the like. These are all important and legitimate of course, but the privacy issue that seems to make news more than any other is Google Spy-Fi, and the defiant attitude Google has against governments. And this has me worried.

Not that I think governments necessarily need to regulate privacy, or that Google’s data collection from unsecured hotspots was even illegal. I’m thinking much more practically. People are concerned about privacy, governments are investigating Google to see what data it really collected, and Google seems to be cherry-picking the kinds of information it provides to different authorities. And in this defiant game of chicken, it’s the rest of the industry that’s the bacon – and I’m afraid we’re all slowly being fried.

There’s an old adage among practitioners of non-violent resistance that “an eye for an eye” retaliation leaves everyone blind. With yesterday’s news that authorities raided Google’s Korean office and found massive amounts of personal data, I’m wondering when—not if—bad behavior from the industry leader will result in a black eye for all online companies.

Korea’s National Police Agency claims to have found hundreds of thousands of emails, instant messages and other personal data” on Google’s hard drives. This is the latest finding similar to a string of other countries like Germany, Canada, Germany, France and the UK.

If it were all just foreign, that would be one thing. Continue reading →

Please join us on January 19, 2011 in Washington, DC for the launch of The Next Digital Decade: Essays on the Future of the Internet, a collection of 31 essays from 26 leading cyber thought leaders, including Tim Wu, Hal Varian, the Hon. Alex Kozinski, Stewart Baker, Jonathan Zittrain, Milton Mueller, Eric Goldman, and Yochai Benkler—as well as the TLF’s own Adam Thierer, Larry Downes and Geoff Manne.

This event will feature panel discussions of several of the book’s organizing questions:

  • Internet Optimism, Pessimism & the Future of Online Culture
  • Internet Exceptionalism & Intermediary Deputization
  • Who Will Govern the Net in 2020?

The January 19 event will run from 12:30pm to 5:30pm immediately following the State of the Net conference in the same location: the Columbia B room at the Hyatt Regency (400 New Jersey Ave NW, Washington DC). The event will begin with lunch and end with a cocktail reception between 5:30pm and 7:00pm. Admission is free but space is limited so RSVP now!

Registered attendees will receive a free copy of the book, which can be read online or downloaded as a PDF, or purchased in hardcover. Free eBook versions are coming soon. To learn more about the book, check out the foreword and introduction, or the table of contents.

Visit NextDigitalDecade.com for details or follow us on Twitter or Facebook for updates!

I published an article for CNET late last night on a spirited debate at CES yesterday over the FCC’s recently-enacted “open Internet” rules, aka net neutrality.  Panelists from the FCC, Congress, AT&T, Verizon, Google and the Center for Democracy and Technology actually agreed on one point, which is that the neutrality saga has only completed its first chapter.

(The session was the most popular of the day.  Several people were turned away from the packed room, and former Congressman Rick Boucher and FCC Commissioner Mignon Clyburn almost didn’t get in!)

While some panelists believe the next step is more regulation, others promised Congressional and perhaps court challenges aimed at undoing the Commission’s “Christmas Surprise.”  As I note in the piece, the new Congress, with its Republican majority in the House, has already taken up reversing the rulemaking as a priority.  Rep. Marsha Blackburn has introduced legislation, signed by 60 other members including at least one Democrat, that would make clear the FCC’s lack of authority over broadband access. Continue reading →

TLF blogger and Heritage Foundation senior fellow James Gattuso gets his 15 seconds of fame — or at least 9 seconds — in this recent clip that appeared on the “Tonight Show with Jay Leno.” Probably not the sort of media impact he was looking for, but I bet he’ll take it!