The Federal Communications Commission has established a new advisory group called the “Technological Advisory Council.” Among other things it will advise the agency on “how broadband communications can be part of the solution for the delivery and cost containment of health care, for energy and environmental conservation, for education innovation and in the creation of jobs.”
This is an agency that is radically overspilling its bounds. It has established goals that it has no proper role in fulfilling and that it has no idea how to fulfill. As we look for cost-cutting measures at the federal level, we could end the pretense that communications industry should be regulated as a public utility. Shuttering the FCC would free up funds for better purposes such as lowering the national debt or reducing taxes.
As we enter day 5 of the standoff between Cablevision and News Corp. over the retransmission of local Fox stations, the controversy over a supposed net neutrality violation has died down, but pressure on the FCC to interfere with the parties’ negotiations is mounting. Sen. Kerry has also released a draft bill [PDF] that would reform the Cable Act’s retransmission consent rules to force TV stations to accept FCC mediation and allow carriage of their signals during a contract dispute.
It’s almost ironic that some would call for more FCC interference to solve a problem that is at least partly caused by FCC regulation. Cablevision is in New York, and what it wants is to carry Fox programming. The local Fox stations, owned and operated by News Corp., are demanding what Cablevision considers too high a price. So why wouldn’t Cablevision just turn to a Fox affiliate in Michigan for the content? The answer is that FCC regulations authorized by the Cable Act take that excellent bargaining chip away from video providers. Continue reading →
I’ve been looking into the cybersecurity issue lately, and I finally took the time to do an in-depth read of the Securing Cyberspace for the 44th Presidency report, which is frequently cited as one of the soundest analyses of the issue. It was written by something of a self-appointed presidential transition commission called the “Commission on Cybersecurity for the 44th President,” chaired by two congressmen and with a membership of notables from the IT industry, defense contractors, and academia, and sponsored by CSIS.
What I was struck by is the complete lack of any verifiable evidence to support the report’s claim that “cybersecurity is now a major national security problem for the United states[.]” While it offers many assertions about the sorry state of security in government and private networks, the report advances no reviewable evidence to explain the scope or probability of the supposed threat. The implication seems to be that the authors are working from classified sources, but the “if you only knew what we know” argument from authority didn’t work out for us in the run up to the Iraq war, and we should be wary of it now.
Continue reading →
Today I testified at a hearing by Massachusetts Attorney General Martha Coakley on commercial sexual exploitation and the Internet. When I first learned about it, I feared the worst: time to demonize the Internet. After all, the hearing announcement openly targeted Craigslist and websites generally. But this was not the case at all—as we heard, NGOs, law enforcement, and industry all have roles to play.
Instead of Internet-bashing, the hearing was a constructive dialogue. We learned why children are forced into prostitution and how classified ads on the Internet can promote this illegal activity. I was there to learn how we can help.
Commercial sexual exploitation is big business. Over 100,000 women are in the illegal sex trade. Often these women are actually teenage girls, vulnerable and with no place to go. Their lives are run by pimps, they cater to “johns,” and their lives are a living hell – except that these women become so desensitized that they eventually have no life at all.
These child prostitutes show up in advertisements for “escort services” or “adult services.” Traditionally, these ads were in the yellow pages. Now they exist on the Internet, and these listings can often be graphic. But it’s hard to tell whether these ads involve women against their will or underage girls. That’s why there are folks who would like to see all these ads disappear. And they’ll blame Internet classifieds—indeed, one witness called sites like Craigslist and Backpage “electronic pimps.”
Unfortunately, there are those that think it is better to force the shut down of the adult services section of these sites. But as we heard from danah boyd of Microsoft and a fellow at the Harvard Berkman Center, merely shutting down the listed supply of adult services is superficial. Continue reading →
When the only tool you have is a hammer, as the old cliché goes, everything looks like a nail.
Net neutrality, as I first wrote in 2006, is a complicated issue at the accident-prone intersection of technology and policy. But some of its most determined—one might say desperate—proponents are increasingly anxious to simplify the problem into political slogans with no melody and sound bites with no nutritional value. Even as—perhaps precisely because—a “win-win-win” compromise seems imminent, the rhetorical excess is being amplified. The feedback is deafening.
In one of the most bizarre efforts yet to make everything be about net neutrality, Public Knowledge issued several statements this week “condemning” Fox’s decision to prohibit access to its online programming from Cablevision internet users. In doing so, the organization claims, Fox has committed “the grossest violations of the open Internet committed by a U.S. company.”
This despite the fact that the open Internet rules (pick whatever version you like) apply only to Internet access providers. Indeed, the rules are understood principally as a protection for content providers. You know, like Fox. Continue reading →
I’d like to draw your attention to a recently released GAO report analyzing the challenge of implementing the 200+ recommendations included in the FCC’s Broadband Plan and comparing the U.S. to broadband efforts in other countries. Turns out things are not as dire as the FCC and the Administration would have us believe. Some highlights:
-
Broadband internet is available to 95 percent of American households. This is comparable to other developed nations despite the U.S.’s larger geographic size and population.
-
“[T]he United States has more subscribers than any other OECD country—81 million, or more than twice as many as Japan, which has 31 million, the second highest number of subscribers.”
-
The U.S. broadband adoption rate is 26.4 subscriber lines per 100 inhabitants, which is higher than the 23.3 average for developed countries.
So we have more subscribers than any other developed nation by more than double, and almost all households have access to broadband. I know it’s not fashionable to say, but it looks like we’re doing pretty damn well.
This might explain the results of a Pew Internet and American Life survey released last month that found that “A majority of Americans (53%) do not believe that increasing the availability of affordable high-speed internet connections should be a federal government priority.” Interestingly, Americans who do not use the Internet are the least interested in seeing government spending on broadband—presumably for them. “Fully 45% of non-users say the government should not attempt to make affordable broadband available to everyone, just 5% say access should be a top priority.”
Continue reading →
On the podcast this week, Kevin Kelly, a founding editor of Wired magazine, a former editor and publisher of the Whole Earth Catalog, and one of the most compelling thinkers about technology today, talks about his new book, What Technology Wants. Make no mistake: the singularity is near. Kelly discusses the technium–a broad term that encompasses all of technology and culture–and its characteristics, including its autonomy and sense of bias, its interdependency, and how it evolves and self-replicates. He also talks about humans as the first domesticated animals; extropy and rising order; the inevitability of humans and complex technologies; the Amish as technology testers, selecters, and slow-adopters; the sentient technium; and technology as wilderness.
Related Links
To keep the conversation around this episode in one place, we’d like to ask you to comment at the web page for this episode on Surprisingly Free. Also, why not subscribe to the podcast on iTunes?
The WSJ ran a front page, above-the-fold headline screaming that Facebook has had a privacy breach. But as Steve DelBianco discusses over at the NetChoice blog, today’s WSJ “breach” is all smoke and no fire.
The WSJ is saying that some of Facebook’s applications are accidentally sharing the public username on my Facebook page, in violation of the company’s privacy policy. This story was nothing like a breach where my credit card numbers or sensitive personal information was leaked or hacked. A closer look at the issue indicates that there is far m
ore smoke than fire in the WSJ piece.
Moreover, the WSJ should step-back from using tabloid-style headings to attract eyeballs (and advertising revenue) to their research and writing. The breathless headline is clearly meant to feed the privacy beast that is increasingly in danger of doing far more harm than good.
While details are still forthcoming, it appears that the issue at hand involves external actions between application developers and advertising companies. Facebook has stepped-up and is holding third parties accountable to existing privacy requirements.
Today’s hot topic is that thousands of Cablevision customers in New York were faced with blacked out News Corp. channels, including Fox, when the two companies were not able to come to an agreement on fees. As a result, Cablevision did not carry the Giants-Lions game and may not carry the next game against the Cowboys. Glee on Tuesday is certainly threatened, and I feel for Cablevision because I wouldn’t wish a spurned Glee fan’s wrath on anyone.
The beautiful thing about this event is that the FCC has put out a Consumer Advisory enumerating all the various choices available to consumers. They can switch to a different pay service, and the FCC counts five: “AT&T, DIRECTV, DISH Network, RCN (limited areas of Brooklyn), and Verizon FIOS.” They can also tune in via over-the-air (rabbit ears) broadcast.
This hasn’t stopped Congress or “consumer advocates” from going apoplectic over American’s god-given right to the Simpsons. And, since it seems News Corp. cut access to Fox shows on Hulu.com and Fox.com for Cablevision internet service subscribers, they fear this is terrible violation of net neutrality.
Let’s put aside for a moment whether it’s a net neutrality violation or not since it’s difficult to tell what that means. (Notice that in this case is not big telecom carriers blocking access to content they don’t like, it’s a content provider blocking an ISP.) What exactly is the problem here?
Given that the FCC has helpfully pointed out all the options available to Consumers, there’s little chance that a consumer who wants to get Fox content won’t be able to do so. If Cablevision and News Corp. don’t come to an agreement, and Cablevision doesn’t carry Fox, consumers who value Fox will switch to a different service. The same goes for Internet service. The important issue here is not a universal human right to content or a net neutrality principle, but choice.
As long as there is market competition and consumer choice, we don’t need the FCC or Ed Markey to ensure that the we’ll get the Giants and the Cowboys in HD and Glee on Fox.com.
Late last month, the National Research Council released a book entitled “Biometric Recognition: Challenges and Opportunities” that exposes the many difficulties with biometric identification systems. Popular culture has portrayed biometrics as nearly infallible, but it’s just not so, the report emphasizes. Especially at scale, biometrics will encounter a lot of challenges, from engineering problems to social and legal considerations.
“[N]o biometric characteristic, including DNA, is known to be capable of reliably correct individualization over the size of the world’s population,” the report says. (page 30) As with analog, in-person identification, biometrics produces a probabilistic identification (or exclusion), but not a certain one. Many biometrics change with time. Due to injury, illness, and other causes, a significant number of people do not have biometric characteristics like fingerprints and irises, requiring special accommodation.
At the scale often imagined for biometric systems, even a small number of false positives or false negatives (referred to in the report as false matches and false nonmatches) will produce considerable difficulties. “[F]alse alarms may consume large amounts of resources in situations where very few impostors exist in the system’s target population.” (page 45)
Consider a system that produces a false negative, excluding someone from access to a building, one time in a thousand. If there aren’t impostors attempting to defeat the biometric system on a regular basis, the managers of the system will quickly come to assume that the system is always mistaken when it produces a “nonmatch” and they will habituate to overruling the biometric system, rendering it impotent.
Context is everything. Biometric systems have to be engineered for particular usages, keeping the interests of the users and operators in mind, then tested and reviewed thoroughly to see if they are serving the purpose for which they’re intended. The report debunks the “magic wand” capability that has been imputed to biometrics: “[S]tating that a system is a biometric system or uses ‘biometrics’ does not provide much information about what the system is for or how difficult it is to successfully implement.” (page 60) Continue reading →