Out of curiosity, were you saying the same thing five years ago? -- Sent from my Palm Pre On Jun 12, 2011 5:46 PM, Julian Cain <jul...@junglecat.org> wrote:
On Jun 12, 2011, at 8:26 PM, David Barrett <dbarr...@quinthar.com> wrote: > > Anyway, interesting challenge to consider. Especially since as Julian > claims we'll all be using it ourselves shortly enough. > You may trust our government but I don't. I also do not trust corporations as they are one in the same. Remember I said this and look back in five years. They have the headstart. Prepare. > -david > > On 06/12/2011 04:56 PM, Julian Cain wrote: >> Yes. If we don't do this same activity in the USA we will find ourselves unable to speak one day. The Internet isn't free anymore. It's corporate controlled. If your asleep wake up. :-) >> >> >> >> On Jun 12, 2011, at 7:25 PM, David Barrett<dbarr...@quinthar.com> wrote: >> >>> Thanks Julian, care to comment on the technology elements or any of the >>> factual items in the article? >>> >>> -david >>> >>> On 06/12/2011 04:11 PM, Julian Cain wrote: >>>> The Obama administration helping dissidents? That's a lie. He's doing the opposite. Sheeple >>>> >>>> >>>> >>>> On Jun 12, 2011, at 5:47 PM, David Barrett<dbarr...@quinthar.com> wrote: >>>> >>>>> Anybody know anything about this? Sounds cool! >>>>> >>>>> -david >>>>> >>>>> http://www.nytimes.com/2011/06/12/world/12internet.html?_r=1 >>>>> >>>>> The Obama administration is leading a global effort to deploy “shadow” >>>>> Internet and mobile phone systems that dissidents can use to undermine >>>>> repressive governments that seek to silence them by censoring or >>>>> shutting down telecommunications networks. >>>>> Multimedia >>>>> >>>>> Slide Show >>>>> Technology for ‘Shadow’ Internet Networks >>>>> >>>>> Graphic >>>>> Creating a Stealth Internet >>>>> The effort includes secretive projects to create independent cellphone >>>>> networks inside foreign countries, as well as one operation out of a spy >>>>> novel in a fifth-floor shop on L Street in Washington, where a group of >>>>> young entrepreneurs who look as if they could be in a garage band are >>>>> fitting deceptively innocent-looking hardware into a prototype “Internet >>>>> in a suitcase.” >>>>> >>>>> Financed with a $2 million State Department grant, the suitcase could be >>>>> secreted across a border and quickly set up to allow wireless >>>>> communication over a wide area with a link to the global Internet. >>>>> >>>>> The American effort, revealed in dozens of interviews, planning >>>>> documents and classified diplomatic cables obtained by The New York >>>>> Times, ranges in scale, cost and sophistication. >>>>> >>>>> Some projects involve technology that the United States is developing; >>>>> others pull together tools that have already been created by hackers in >>>>> a so-called liberation-technology movement sweeping the globe. >>>>> >>>>> The State Department, for example, is financing the creation of stealth >>>>> wireless networks that would enable activists to communicate outside the >>>>> reach of governments in countries like Iran, Syria and Libya, according >>>>> to participants in the projects. >>>>> >>>>> In one of the most ambitious efforts, United States officials say, the >>>>> State Department and Pentagon have spent at least $50 million to create >>>>> an independent cellphone network in Afghanistan using towers on >>>>> protected military bases inside the country. It is intended to offset >>>>> the Taliban’s ability to shut down the official Afghan services, >>>>> seemingly at will. >>>>> >>>>> The effort has picked up momentum since the government of President >>>>> Hosni Mubarak shut down the Egyptian Internet in the last days of his >>>>> rule. In recent days, the Syrian government also temporarily disabled >>>>> much of that country’s Internet, which had helped protesters mobilize. >>>>> >>>>> The Obama administration’s initiative is in one sense a new front in a >>>>> longstanding diplomatic push to defend free speech and nurture >>>>> democracy. For decades, the United States has sent radio broadcasts into >>>>> autocratic countries through Voice of America and other means. More >>>>> recently, Washington has supported the development of software that >>>>> preserves the anonymity of users in places like China, and training for >>>>> citizens who want to pass information along the government-owned >>>>> Internet without getting caught. >>>>> >>>>> But the latest initiative depends on creating entirely separate pathways >>>>> for communication. It has brought together an improbable alliance of >>>>> diplomats and military engineers, young programmers and dissidents from >>>>> at least a dozen countries, many of whom variously describe the new >>>>> approach as more audacious and clever and, yes, cooler. >>>>> >>>>> Sometimes the State Department is simply taking advantage of >>>>> enterprising dissidents who have found ways to get around government >>>>> censorship. American diplomats are meeting with operatives who have been >>>>> burying Chinese cellphones in the hills near the border with North >>>>> Korea, where they can be dug up and used to make furtive calls, >>>>> according to interviews and the diplomatic cables. >>>>> >>>>> The new initiatives have found a champion in Secretary of State Hillary >>>>> Rodham Clinton, whose department is spearheading the American effort. >>>>> “We see more and more people around the globe using the Internet, mobile >>>>> phones and other technologies to make their voices heard as they protest >>>>> against injustice and seek to realize their aspirations,” Mrs. Clinton >>>>> said in an e-mail response to a query on the topic. “There is a historic >>>>> opportunity to effect positive change, change America supports,” she >>>>> said. “So we’re focused on helping them do that, on helping them talk to >>>>> each other, to their communities, to their governments and to the world.” >>>>> >>>>> Developers caution that independent networks come with downsides: >>>>> repressive governments could use surveillance to pinpoint and arrest >>>>> activists who use the technology or simply catch them bringing hardware >>>>> across the border. But others believe that the risks are outweighed by >>>>> the potential impact. “We’re going to build a separate infrastructure >>>>> where the technology is nearly impossible to shut down, to control, to >>>>> surveil,” said Sascha Meinrath, who is leading the “Internet in a >>>>> suitcase” project as director of the Open Technology Initiative at the >>>>> New America Foundation, a nonpartisan research group. >>>>> >>>>> “The implication is that this disempowers central authorities from >>>>> infringing on people’s fundamental human right to communicate,” Mr. >>>>> Meinrath added. >>>>> >>>>> The Invisible Web >>>>> >>>>> In an anonymous office building on L Street in Washington, four unlikely >>>>> State Department contractors sat around a table. Josh King, sporting >>>>> multiple ear piercings and a studded leather wristband, taught himself >>>>> programming while working as a barista. Thomas Gideon was an >>>>> accomplished hacker. Dan Meredith, a bicycle polo enthusiast, helped >>>>> companies protect their digital secrets. >>>>> >>>>> Then there was Mr. Meinrath, wearing a tie as the dean of the group at >>>>> age 37. He has a master’s degree in psychology and helped set up >>>>> wireless networks in underserved communities in Detroit and Philadelphia. >>>>> >>>>> The group’s suitcase project will rely on a version of “mesh network” >>>>> technology, which can transform devices like cellphones or personal >>>>> computers to create an invisible wireless web without a centralized hub. >>>>> In other words, a voice, picture or e-mail message could hop directly >>>>> between the modified wireless devices — each one acting as a mini cell >>>>> “tower” and phone — and bypass the official network. >>>>> >>>>> Mr. Meinrath said that the suitcase would include small wireless >>>>> antennas, which could increase the area of coverage; a laptop to >>>>> administer the system; thumb drives and CDs to spread the software to >>>>> more devices and encrypt the communications; and other components like >>>>> Ethernet cables. >>>>> >>>>> The project will also rely on the innovations of independent Internet >>>>> and telecommunications developers. >>>>> >>>>> “The cool thing in this political context is that you cannot easily >>>>> control it,” said Aaron Kaplan, an Austrian cybersecurity expert whose >>>>> work will be used in the suitcase project. Mr. Kaplan has set up a >>>>> functioning mesh network in Vienna and says related systems have >>>>> operated in Venezuela, Indonesia and elsewhere. >>>>> >>>>> Mr. Meinrath said his team was focused on fitting the system into the >>>>> bland-looking suitcase and making it simple to implement — by, say, >>>>> using “pictograms” in the how-to manual. >>>>> >>>>> In addition to the Obama administration’s initiatives, there are almost >>>>> a dozen independent ventures that also aim to make it possible for >>>>> unskilled users to employ existing devices like laptops or smartphones >>>>> to build a wireless network. One mesh network was created around >>>>> Jalalabad, Afghanistan, as early as five years ago, using technology >>>>> developed at the Massachusetts Institute of Technology. >>>>> >>>>> Creating simple lines of communication outside official ones is crucial, >>>>> said Collin Anderson, a 26-year-old liberation-technology researcher >>>>> from North Dakota who specializes in Iran, where the government all but >>>>> shut down the Internet during protests in 2009. The slowdown made most >>>>> “circumvention” technologies — the software legerdemain that helps >>>>> dissidents sneak data along the state-controlled networks — nearly >>>>> useless, he said. >>>>> >>>>> “No matter how much circumvention the protesters use, if the government >>>>> slows the network down to a crawl, you can’t upload YouTube videos or >>>>> Facebook postings,” Mr. Anderson said. “They need alternative ways of >>>>> sharing information or alternative ways of getting it out of the country.” >>>>> >>>>> That need is so urgent, citizens are finding their own ways to set up >>>>> rudimentary networks. Mehdi Yahyanejad, an Iranian expatriate and >>>>> technology developer who co-founded a popular Persian-language Web site, >>>>> estimates that nearly half the people who visit the site from inside >>>>> Iran share files using Bluetooth — which is best known in the West for >>>>> running wireless headsets and the like. In more closed societies, >>>>> however, Bluetooth is used to discreetly beam information — a video, an >>>>> electronic business card — directly from one cellphone to another. >>>>> >>>>> Mr. Yahyanejad said he and his research colleagues were also slated to >>>>> receive State Department financing for a project that would modify >>>>> Bluetooth so that a file containing, say, a video of a protester being >>>>> beaten, could automatically jump from phone to phone within a “trusted >>>>> network” of citizens. The system would be more limited than the suitcase >>>>> but would only require the software modification on ordinary phones. >>>>> >>>>> By the end of 2011, the State Department will have spent some $70 >>>>> million on circumvention efforts and related technologies, according to >>>>> department figures. >>>>> >>>>> Mrs. Clinton has made Internet freedom into a signature cause. But the >>>>> State Department has carefully framed its support as promoting free >>>>> speech and human rights for their own sake, not as a policy aimed at >>>>> destabilizing autocratic governments. >>>>> >>>>> That distinction is difficult to maintain, said Clay Shirky, an >>>>> assistant professor at New York University who studies the Internet and >>>>> social media. “You can’t say, ‘All we want is for people to speak their >>>>> minds, not bring down autocratic regimes’ — they’re the same thing,” Mr. >>>>> Shirky said. >>>>> >>>>> He added that the United States could expose itself to charges of >>>>> hypocrisy if the State Department maintained its support, tacit or >>>>> otherwise, for autocratic governments running countries like Saudi >>>>> Arabia or Bahrain while deploying technology that was likely to >>>>> undermine them. >>>>> >>>>> Shadow Cellphone System >>>>> >>>>> In February 2009, Richard C. Holbrooke and Lt. Gen. John R. Allen were >>>>> taking a helicopter tour over southern Afghanistan and getting a >>>>> panoramic view of the cellphone towers dotting the remote countryside, >>>>> according to two officials on the flight. By then, millions of Afghans >>>>> were using cellphones, compared with a few thousand after the 2001 >>>>> invasion. Towers built by private companies had sprung up across the >>>>> country. The United States had promoted the network as a way to >>>>> cultivate good will and encourage local businesses in a country that in >>>>> other ways looked as if it had not changed much in centuries. >>>>> >>>>> There was just one problem, General Allen told Mr. Holbrooke, who only >>>>> weeks before had been appointed special envoy to the region. With a >>>>> combination of threats to phone company officials and attacks on the >>>>> towers, the Taliban was able to shut down the main network in the >>>>> countryside virtually at will. Local residents report that the networks >>>>> are often out from 6 p.m. until 6 a.m., presumably to enable the Taliban >>>>> to carry out operations without being reported to security forces. >>>>> >>>>> The Pentagon and State Department were soon collaborating on the project >>>>> to build a “shadow” cellphone system in a country where repressive >>>>> forces exert control over the official network. >>>>> >>>>> Details of the network, which the military named the Palisades project, >>>>> are scarce, but current and former military and civilian officials said >>>>> it relied in part on cell towers placed on protected American bases. A >>>>> large tower on the Kandahar air base serves as a base station or data >>>>> collection point for the network, officials said. >>>>> >>>>> A senior United States official said the towers were close to being up >>>>> and running in the south and described the effort as a kind of 911 >>>>> system that would be available to anyone with a cellphone. >>>>> >>>>> By shutting down cellphone service, the Taliban had found a potent >>>>> strategic tool in its asymmetric battle with American and Afghan >>>>> security forces. >>>>> >>>>> The United States is widely understood to use cellphone networks in >>>>> Afghanistan, Iraq and other countries for intelligence gathering. And >>>>> the ability to silence the network was also a powerful reminder to the >>>>> local populace that the Taliban retained control over some of the most >>>>> vital organs of the nation. >>>>> >>>>> When asked about the system, Lt. Col. John Dorrian, a spokesman for the >>>>> American-led International Security Assistance Force, or ISAF, would >>>>> only confirm the existence of a project to create what he called an >>>>> “expeditionary cellular communication service” in Afghanistan. He said >>>>> the project was being carried out in collaboration with the Afghan >>>>> government in order to “restore 24/7 cellular access.” >>>>> >>>>> “As of yet the program is not fully operational, so it would be >>>>> premature to go into details,” Colonel Dorrian said. >>>>> >>>>> Colonel Dorrian declined to release cost figures. Estimates by United >>>>> States military and civilian officials ranged widely, from $50 million >>>>> to $250 million. A senior official said that Afghan officials, who >>>>> anticipate taking over American bases when troops pull out, have >>>>> insisted on an elaborate system. “The Afghans wanted the Cadillac plan, >>>>> which is pretty expensive,” the official said. >>>>> >>>>> Broad Subversive Effort >>>>> >>>>> In May 2009, a North Korean defector named Kim met with officials at the >>>>> American Consulate in Shenyang, a Chinese city about 120 miles from >>>>> North Korea, according to a diplomatic cable. Officials wanted to know >>>>> how Mr. Kim, who was active in smuggling others out of the country, >>>>> communicated across the border. “Kim would not go into much detail,” the >>>>> cable says, but did mention the burying of Chinese cellphones “on >>>>> hillsides for people to dig up at night.” Mr. Kim said Dandong, China, >>>>> and the surrounding Jilin Province “were natural gathering points for >>>>> cross-border cellphone communication and for meeting sources.” The >>>>> cellphones are able to pick up signals from towers in China, said Libby >>>>> Liu, head of Radio Free Asia, the United States-financed broadcaster, >>>>> who confirmed their existence and said her organization uses the calls >>>>> to collect information for broadcasts as well. >>>>> >>>>> The effort, in what is perhaps the world’s most closed nation, suggests >>>>> just how many independent actors are involved in the subversive efforts. >>>>> From the activist geeks on L Street in Washington to the military >>>>> engineers in Afghanistan, the global appeal of the technology hints at >>>>> the craving for open communication. >>>>> >>>>> In a chat with a Times reporter via Facebook, Malik Ibrahim Sahad, the >>>>> son of Libyan dissidents who largely grew up in suburban Virginia, said >>>>> he was tapping into the Internet using a commercial satellite connection >>>>> in Benghazi. “Internet is in dire need here. The people are cut off in >>>>> that respect,” wrote Mr. Sahad, who had never been to Libya before the >>>>> uprising and is now working in support of rebel authorities. Even so, he >>>>> said, “I don’t think this revolution could have taken place without the >>>>> existence of the World Wide Web.” >>>>> >>>>> >>>>> Reporting was contributed by Richard A. Oppel Jr. and Andrew W. Lehren >>>>> from New York, and Alissa J. Rubin and Sangar Rahimi from Kabul, >>>>> Afghanistan. >>>>> _______________________________________________ >>>>> p2p-hackers mailing list >>>>> p2p-hackers@lists.zooko.com >>>>> http://lists.zooko.com/mailman/listinfo/p2p-hackers >>>> _______________________________________________ >>>> p2p-hackers mailing list >>>> p2p-hackers@lists.zooko.com >>>> http://lists.zooko.com/mailman/listinfo/p2p-hackers >>> _______________________________________________ >>> p2p-hackers mailing list >>> p2p-hackers@lists.zooko.com >>> http://lists.zooko.com/mailman/listinfo/p2p-hackers >> _______________________________________________ >> p2p-hackers mailing list >> p2p-hackers@lists.zooko.com >> http://lists.zooko.com/mailman/listinfo/p2p-hackers > _______________________________________________ > p2p-hackers mailing list > p2p-hackers@lists.zooko.com > http://lists.zooko.com/mailman/listinfo/p2p-hackers _______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers
_______________________________________________ p2p-hackers mailing list p2p-hackers@lists.zooko.com http://lists.zooko.com/mailman/listinfo/p2p-hackers