Yes. If we don't do this same activity in the USA we will find ourselves unable to speak one day. The Internet isn't free anymore. It's corporate controlled. If your asleep wake up. :-)
On Jun 12, 2011, at 7:25 PM, David Barrett <dbarr...@quinthar.com> wrote: > Thanks Julian, care to comment on the technology elements or any of the > factual items in the article? > > -david > > On 06/12/2011 04:11 PM, Julian Cain wrote: >> The Obama administration helping dissidents? That's a lie. He's doing the >> opposite. Sheeple >> >> >> >> On Jun 12, 2011, at 5:47 PM, David Barrett<dbarr...@quinthar.com> wrote: >> >>> Anybody know anything about this? Sounds cool! >>> >>> -david >>> >>> http://www.nytimes.com/2011/06/12/world/12internet.html?_r=1 >>> >>> The Obama administration is leading a global effort to deploy “shadow” >>> Internet and mobile phone systems that dissidents can use to undermine >>> repressive governments that seek to silence them by censoring or >>> shutting down telecommunications networks. >>> Multimedia >>> >>> Slide Show >>> Technology for ‘Shadow’ Internet Networks >>> >>> Graphic >>> Creating a Stealth Internet >>> The effort includes secretive projects to create independent cellphone >>> networks inside foreign countries, as well as one operation out of a spy >>> novel in a fifth-floor shop on L Street in Washington, where a group of >>> young entrepreneurs who look as if they could be in a garage band are >>> fitting deceptively innocent-looking hardware into a prototype “Internet >>> in a suitcase.” >>> >>> Financed with a $2 million State Department grant, the suitcase could be >>> secreted across a border and quickly set up to allow wireless >>> communication over a wide area with a link to the global Internet. >>> >>> The American effort, revealed in dozens of interviews, planning >>> documents and classified diplomatic cables obtained by The New York >>> Times, ranges in scale, cost and sophistication. >>> >>> Some projects involve technology that the United States is developing; >>> others pull together tools that have already been created by hackers in >>> a so-called liberation-technology movement sweeping the globe. >>> >>> The State Department, for example, is financing the creation of stealth >>> wireless networks that would enable activists to communicate outside the >>> reach of governments in countries like Iran, Syria and Libya, according >>> to participants in the projects. >>> >>> In one of the most ambitious efforts, United States officials say, the >>> State Department and Pentagon have spent at least $50 million to create >>> an independent cellphone network in Afghanistan using towers on >>> protected military bases inside the country. It is intended to offset >>> the Taliban’s ability to shut down the official Afghan services, >>> seemingly at will. >>> >>> The effort has picked up momentum since the government of President >>> Hosni Mubarak shut down the Egyptian Internet in the last days of his >>> rule. In recent days, the Syrian government also temporarily disabled >>> much of that country’s Internet, which had helped protesters mobilize. >>> >>> The Obama administration’s initiative is in one sense a new front in a >>> longstanding diplomatic push to defend free speech and nurture >>> democracy. For decades, the United States has sent radio broadcasts into >>> autocratic countries through Voice of America and other means. More >>> recently, Washington has supported the development of software that >>> preserves the anonymity of users in places like China, and training for >>> citizens who want to pass information along the government-owned >>> Internet without getting caught. >>> >>> But the latest initiative depends on creating entirely separate pathways >>> for communication. It has brought together an improbable alliance of >>> diplomats and military engineers, young programmers and dissidents from >>> at least a dozen countries, many of whom variously describe the new >>> approach as more audacious and clever and, yes, cooler. >>> >>> Sometimes the State Department is simply taking advantage of >>> enterprising dissidents who have found ways to get around government >>> censorship. American diplomats are meeting with operatives who have been >>> burying Chinese cellphones in the hills near the border with North >>> Korea, where they can be dug up and used to make furtive calls, >>> according to interviews and the diplomatic cables. >>> >>> The new initiatives have found a champion in Secretary of State Hillary >>> Rodham Clinton, whose department is spearheading the American effort. >>> “We see more and more people around the globe using the Internet, mobile >>> phones and other technologies to make their voices heard as they protest >>> against injustice and seek to realize their aspirations,” Mrs. Clinton >>> said in an e-mail response to a query on the topic. “There is a historic >>> opportunity to effect positive change, change America supports,” she >>> said. “So we’re focused on helping them do that, on helping them talk to >>> each other, to their communities, to their governments and to the world.” >>> >>> Developers caution that independent networks come with downsides: >>> repressive governments could use surveillance to pinpoint and arrest >>> activists who use the technology or simply catch them bringing hardware >>> across the border. But others believe that the risks are outweighed by >>> the potential impact. “We’re going to build a separate infrastructure >>> where the technology is nearly impossible to shut down, to control, to >>> surveil,” said Sascha Meinrath, who is leading the “Internet in a >>> suitcase” project as director of the Open Technology Initiative at the >>> New America Foundation, a nonpartisan research group. >>> >>> “The implication is that this disempowers central authorities from >>> infringing on people’s fundamental human right to communicate,” Mr. >>> Meinrath added. >>> >>> The Invisible Web >>> >>> In an anonymous office building on L Street in Washington, four unlikely >>> State Department contractors sat around a table. Josh King, sporting >>> multiple ear piercings and a studded leather wristband, taught himself >>> programming while working as a barista. Thomas Gideon was an >>> accomplished hacker. Dan Meredith, a bicycle polo enthusiast, helped >>> companies protect their digital secrets. >>> >>> Then there was Mr. Meinrath, wearing a tie as the dean of the group at >>> age 37. He has a master’s degree in psychology and helped set up >>> wireless networks in underserved communities in Detroit and Philadelphia. >>> >>> The group’s suitcase project will rely on a version of “mesh network” >>> technology, which can transform devices like cellphones or personal >>> computers to create an invisible wireless web without a centralized hub. >>> In other words, a voice, picture or e-mail message could hop directly >>> between the modified wireless devices — each one acting as a mini cell >>> “tower” and phone — and bypass the official network. >>> >>> Mr. Meinrath said that the suitcase would include small wireless >>> antennas, which could increase the area of coverage; a laptop to >>> administer the system; thumb drives and CDs to spread the software to >>> more devices and encrypt the communications; and other components like >>> Ethernet cables. >>> >>> The project will also rely on the innovations of independent Internet >>> and telecommunications developers. >>> >>> “The cool thing in this political context is that you cannot easily >>> control it,” said Aaron Kaplan, an Austrian cybersecurity expert whose >>> work will be used in the suitcase project. Mr. Kaplan has set up a >>> functioning mesh network in Vienna and says related systems have >>> operated in Venezuela, Indonesia and elsewhere. >>> >>> Mr. Meinrath said his team was focused on fitting the system into the >>> bland-looking suitcase and making it simple to implement — by, say, >>> using “pictograms” in the how-to manual. >>> >>> In addition to the Obama administration’s initiatives, there are almost >>> a dozen independent ventures that also aim to make it possible for >>> unskilled users to employ existing devices like laptops or smartphones >>> to build a wireless network. One mesh network was created around >>> Jalalabad, Afghanistan, as early as five years ago, using technology >>> developed at the Massachusetts Institute of Technology. >>> >>> Creating simple lines of communication outside official ones is crucial, >>> said Collin Anderson, a 26-year-old liberation-technology researcher >>> from North Dakota who specializes in Iran, where the government all but >>> shut down the Internet during protests in 2009. The slowdown made most >>> “circumvention” technologies — the software legerdemain that helps >>> dissidents sneak data along the state-controlled networks — nearly >>> useless, he said. >>> >>> “No matter how much circumvention the protesters use, if the government >>> slows the network down to a crawl, you can’t upload YouTube videos or >>> Facebook postings,” Mr. Anderson said. “They need alternative ways of >>> sharing information or alternative ways of getting it out of the country.” >>> >>> That need is so urgent, citizens are finding their own ways to set up >>> rudimentary networks. Mehdi Yahyanejad, an Iranian expatriate and >>> technology developer who co-founded a popular Persian-language Web site, >>> estimates that nearly half the people who visit the site from inside >>> Iran share files using Bluetooth — which is best known in the West for >>> running wireless headsets and the like. In more closed societies, >>> however, Bluetooth is used to discreetly beam information — a video, an >>> electronic business card — directly from one cellphone to another. >>> >>> Mr. Yahyanejad said he and his research colleagues were also slated to >>> receive State Department financing for a project that would modify >>> Bluetooth so that a file containing, say, a video of a protester being >>> beaten, could automatically jump from phone to phone within a “trusted >>> network” of citizens. The system would be more limited than the suitcase >>> but would only require the software modification on ordinary phones. >>> >>> By the end of 2011, the State Department will have spent some $70 >>> million on circumvention efforts and related technologies, according to >>> department figures. >>> >>> Mrs. Clinton has made Internet freedom into a signature cause. But the >>> State Department has carefully framed its support as promoting free >>> speech and human rights for their own sake, not as a policy aimed at >>> destabilizing autocratic governments. >>> >>> That distinction is difficult to maintain, said Clay Shirky, an >>> assistant professor at New York University who studies the Internet and >>> social media. “You can’t say, ‘All we want is for people to speak their >>> minds, not bring down autocratic regimes’ — they’re the same thing,” Mr. >>> Shirky said. >>> >>> He added that the United States could expose itself to charges of >>> hypocrisy if the State Department maintained its support, tacit or >>> otherwise, for autocratic governments running countries like Saudi >>> Arabia or Bahrain while deploying technology that was likely to >>> undermine them. >>> >>> Shadow Cellphone System >>> >>> In February 2009, Richard C. Holbrooke and Lt. Gen. John R. Allen were >>> taking a helicopter tour over southern Afghanistan and getting a >>> panoramic view of the cellphone towers dotting the remote countryside, >>> according to two officials on the flight. By then, millions of Afghans >>> were using cellphones, compared with a few thousand after the 2001 >>> invasion. Towers built by private companies had sprung up across the >>> country. The United States had promoted the network as a way to >>> cultivate good will and encourage local businesses in a country that in >>> other ways looked as if it had not changed much in centuries. >>> >>> There was just one problem, General Allen told Mr. Holbrooke, who only >>> weeks before had been appointed special envoy to the region. With a >>> combination of threats to phone company officials and attacks on the >>> towers, the Taliban was able to shut down the main network in the >>> countryside virtually at will. Local residents report that the networks >>> are often out from 6 p.m. until 6 a.m., presumably to enable the Taliban >>> to carry out operations without being reported to security forces. >>> >>> The Pentagon and State Department were soon collaborating on the project >>> to build a “shadow” cellphone system in a country where repressive >>> forces exert control over the official network. >>> >>> Details of the network, which the military named the Palisades project, >>> are scarce, but current and former military and civilian officials said >>> it relied in part on cell towers placed on protected American bases. A >>> large tower on the Kandahar air base serves as a base station or data >>> collection point for the network, officials said. >>> >>> A senior United States official said the towers were close to being up >>> and running in the south and described the effort as a kind of 911 >>> system that would be available to anyone with a cellphone. >>> >>> By shutting down cellphone service, the Taliban had found a potent >>> strategic tool in its asymmetric battle with American and Afghan >>> security forces. >>> >>> The United States is widely understood to use cellphone networks in >>> Afghanistan, Iraq and other countries for intelligence gathering. And >>> the ability to silence the network was also a powerful reminder to the >>> local populace that the Taliban retained control over some of the most >>> vital organs of the nation. >>> >>> When asked about the system, Lt. Col. John Dorrian, a spokesman for the >>> American-led International Security Assistance Force, or ISAF, would >>> only confirm the existence of a project to create what he called an >>> “expeditionary cellular communication service” in Afghanistan. He said >>> the project was being carried out in collaboration with the Afghan >>> government in order to “restore 24/7 cellular access.” >>> >>> “As of yet the program is not fully operational, so it would be >>> premature to go into details,” Colonel Dorrian said. >>> >>> Colonel Dorrian declined to release cost figures. Estimates by United >>> States military and civilian officials ranged widely, from $50 million >>> to $250 million. A senior official said that Afghan officials, who >>> anticipate taking over American bases when troops pull out, have >>> insisted on an elaborate system. “The Afghans wanted the Cadillac plan, >>> which is pretty expensive,” the official said. >>> >>> Broad Subversive Effort >>> >>> In May 2009, a North Korean defector named Kim met with officials at the >>> American Consulate in Shenyang, a Chinese city about 120 miles from >>> North Korea, according to a diplomatic cable. Officials wanted to know >>> how Mr. Kim, who was active in smuggling others out of the country, >>> communicated across the border. “Kim would not go into much detail,” the >>> cable says, but did mention the burying of Chinese cellphones “on >>> hillsides for people to dig up at night.” Mr. Kim said Dandong, China, >>> and the surrounding Jilin Province “were natural gathering points for >>> cross-border cellphone communication and for meeting sources.” The >>> cellphones are able to pick up signals from towers in China, said Libby >>> Liu, head of Radio Free Asia, the United States-financed broadcaster, >>> who confirmed their existence and said her organization uses the calls >>> to collect information for broadcasts as well. >>> >>> The effort, in what is perhaps the world’s most closed nation, suggests >>> just how many independent actors are involved in the subversive efforts. >>> From the activist geeks on L Street in Washington to the military >>> engineers in Afghanistan, the global appeal of the technology hints at >>> the craving for open communication. >>> >>> In a chat with a Times reporter via Facebook, Malik Ibrahim Sahad, the >>> son of Libyan dissidents who largely grew up in suburban Virginia, said >>> he was tapping into the Internet using a commercial satellite connection >>> in Benghazi. “Internet is in dire need here. The people are cut off in >>> that respect,” wrote Mr. Sahad, who had never been to Libya before the >>> uprising and is now working in support of rebel authorities. Even so, he >>> said, “I don’t think this revolution could have taken place without the >>> existence of the World Wide Web.” >>> >>> >>> Reporting was contributed by Richard A. Oppel Jr. and Andrew W. Lehren >>> from New York, and Alissa J. Rubin and Sangar Rahimi from Kabul, >>> Afghanistan. >>> _______________________________________________ >>> p2p-hackers mailing list >>> p2p-hackers@lists.zooko.com >>> http://lists.zooko.com/mailman/listinfo/p2p-hackers >> _______________________________________________ >> p2p-hackers mailing list >> p2p-hackers@lists.zooko.com >> http://lists.zooko.com/mailman/listinfo/p2p-hackers > _______________________________________________ > p2p-hackers mailing list > p2p-hackers@lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers