[Infowarrior] - E-Speech: The (Uncertain) Future of Free Expression
Richard Forno
rforno at infowarrior.org
Thu Oct 30 02:22:56 UTC 2008
E-Speech: The (Uncertain) Future of Free Expression
http://www.truthdig.com/report/item/20081024_e_speech_the_uncertain_future_of_free_expression/
Posted on Oct 28, 2008
By Aram Sinnreich and Masha Zager
Imagine this: It’s the day before your daughter’s birthday. She lives
in another state, so you make a video of the rest of the family
singing “Happy Birthday to You” on your camcorder and put the
videotape in a box with her address on it. But at the post office,
you’re told the box will take two weeks to deliver unless you pay your
daughter’s local mail carrier an extra delivery fee.
So instead, you write her a letter describing the video and including
the lyrics to “Happy Birthday to You.” She never receives the letter;
unbeknownst to you, the post office has opened it en route, and,
seeing that you’ve enclosed copyrighted materials (yes, the “Happy
Birthday” song is copyrighted), has decided not to deliver the
envelope to her. You write her another letter, without the song
lyrics, and although it arrives on her doorstep intact, she can’t open
it because you used a large manila envelope and her electric letter
opener works only on size A2, A6 and A7 envelopes.
You decide to fly out and deliver your birthday wishes in person.
After the usual hour-long wait at the airport, you reach the metal
detector. A TSA officer asks you to come to a private room, where you
are searched and questioned, and left waiting for six hours. The
airport security officers repeatedly ask you about your plans for a
future visit to China, which is strange, because you mentioned these
plans only once, during a private conversation with a friend.
Finally you are allowed to board a plane, and a few hours later your
daughter meets you when you land. You give her a big hug and try to
sing “Happy Birthday.” However, when you open your mouth, no sound
comes out. You can speak perfectly well, but for some reason you are
unable to sing.
If this scenario sounds absurd, that’s because it is. If it sounds
unrealistic, that’s because you haven’t been paying attention.
Although no one is slowing down or opening your posted letters, spying
on your face-to-face conversations or restricting your physical
ability to make music, all of these barriers to free speech—and more—
are becoming increasingly prevalent in the world of digital
communications. And as tools like the Web, e-mail, voice over IP,
Internet video, mobile phones and peer-to-peer file sharing become
increasingly vital to our relationships with family, friends,
colleagues, businesses and government institutions, these limitations
on speech and threats to our privacy are becoming increasingly
important civil rights issues.
When we talk about unequal access to computers and other digital
communication technologies, we speak about the “digital divide.” When
we talk about the concentrated ownership of the Internet access
business, we can point to a simple, powerful statistic: Four companies
control nearly 60 percent of the American ISP market, and four
companies control nearly 90 percent of the American mobile phone
market. But there’s no simple way to talk about the interrelated
issues of electronic surveillance, network neutrality, asymmetry and
“walled garden” technologies that collectively threaten free
expression in the digital world.
Without a name for the big picture, it’s difficult to do anything
about it. Imagine trying to reverse global warming, reduce pollution
and save species from extinction without the umbrella of the word
environmentalism connecting the issues. Therefore, we propose the term
e-speech as a concept to unite these issues, and to discuss potential
solutions to the problem they collectively pose. First, however, we
should briefly discuss the issues themselves.
Most of us have read about the surveillance of our phone
conversations, and the recent amendment to the Foreign Intelligence
Surveillance Act (FISA) retroactively granting immunity to companies
like AT&T and Verizon for illegally handing our private information
over to the federal government. However, fewer people are aware of the
Stored Communications Act (SCA), which the government has used to
obtain access to Web-based e-mail without getting a warrant or
notifying the account holder.
Similarly, the Anti-Counterfeiting Trade Agreement (ACTA), an
international treaty currently under negotiation, may allow customs
officials to search our computers, MP3 players and other electronic
devices for unpermissioned content when we travel, and may force ISPs
to disclose more information about our online activities to copyright
owners claiming infringement. ACTA negotiations have been held in
secret, and what little we know is the result of leaks. Despite not
telling us much about it, the Office of the United States Trade
Representative (USTR) says it is trying to “complete the new agreement
as quickly as possible.” The Electronic Frontier Foundation and Public
Knowledge recently filed suit against the USTR, demanding more
information about ACTA before it’s actually ratified.
Another potential threat to civil liberties online is the end of
network neutrality, or nondiscriminatory delivery of online
communications. Some ISPs have begun to argue that they should be
allowed to collect an extra fee from the application provider for
delivering an e-mail, Web page or video to an end user. Former AT&T
CEO Ed Whitacre summed up their justification well, arguing that “for
a Google or Yahoo or Vonage or anybody to expect to use these pipes
[for] free is nuts!” However, this argument doesn’t hold much water
when you consider that both the originator and the end user are paying
for their Internet access; in essence, the ISPs would like to get paid
by three separate parties to deliver a single e-mail or voice message
from point A to point B.
In reality, the purpose of such fees would be to protect ISPs’ video
services from competition by Internet-based video (such as YouTube),
and ISPs’ phone services from competition by Internet-based VoIP (such
as Skype). And for any Internet communications that did take place,
major publishers and advertisers could outbid the rest of us,
consigning us to the slow lane. In the short term, this could make Web-
based services like audio/video chatting and video sharing more
expensive. In the longer term, it could bring an end to the
proliferation of new voices and creative new services that we’ve
gotten used to seeing on the Web.
There is no legislation supporting or rejecting net neutrality (this
may change soon; several bills have been introduced on both sides);
however, net neutrality currently stands as Federal Communications
Commission policy. Even so, there are many cases in which Internet
providers have apparently broken the rules. Most famously, Comcast,
the nation’s second-largest ISP, was caught throttling bandwidth for
customers who used the BitTorrent file sharing protocol. Although the
FCC ruled that the company had to stop, Comcast has appealed the
decision. In the meantime, Comcast has amended its broadband user
policy, capping monthly usage at 250 gigabytes (not much for fans of
digital video).
Yet another hindrance to free speech and open communications online is
asymmetrical access (the “A” in “ADSL”). Nearly all broadband ISPs—
even in the age of YouTube, Skype and MySpace—offer downstream speeds
(from the Internet to the user) that are much faster than upstream
speeds (from the user to the Internet). This is a legacy of the cable
networks’ origins in the unidirectional world of TV programming, and
of the antiquated vision of the Internet as an “information
superhighway” by which consumers would access information. Few people
anticipated that Americans would be as interested in producing content
as they were in consuming it, or that they might want to use video for
communicating. So regulators failed to address communication to the
Internet, and the original vision of the Internet became enshrined in
industrywide technology standards. Today, most providers still use
technologies that are downstream-oriented. A few new technologies
(Active Ethernet, GPON, VDSL2) support high upstream speeds, but it
will take years, and hundreds of billions of dollars, to upgrade all
of our networks to use them.
Finally, free speech online is threatened by “walled garden” services
and technologies, in which the ISP or wireless provider determines
what content the user has access to, what software the user can
install, and even what formats are permissible for encoding audio or
video. Walled garden services for the PC had their heyday in the 1990s
(remember AOL, CompuServe and Prodigy?), but we are only beginning to
see the extent to which they will dominate the Internet on wireless
devices.
A great example of a walled garden is Apple’s iPhone. Spending several
hundred dollars to purchase one doesn’t give you permission to install
the software of your choice or distribute software to other users.
Apple has already used its power to block software providers
attempting to compete with Apple’s own software, such as the e-mail
application that comes bundled with the device. Even more worrisome,
Apple CEO Steve Jobs has acknowledged that iPhones are equipped with a
“kill switch” that allows the company to remotely delete applications
from your phone. The company calls this a last-ditch security protocol
to disable malware, but it comes at the cost of consumer control.
Imagine if General Electric could remotely remove food from your
fridge that it deemed unsafe. Now imagine that GE is also one of the
top providers of meat, cheese and veggies to American supermarkets.
Clearly, this is not a combination in the consumer’s best interest.
(To be fair, most wireless phones have even more “walls” and less
“garden” than the iPhone does.)
What are we to do about these threats to liberty, privacy and autonomy
in the digital world? In view of the problems we’ve discussed,
unfettered Internet access requires either:
• Laws that strictly protect digital privacy and net neutrality, deter
abuse of market power, and encourage investment in new ultra-broadband
technologies; or
• User-owned or unmanaged networks with very-high-speed connections.
For the sake of argument, let’s dismiss the first of these as
impractical, or at least unlikely in the current political climate.
But how about the second?
In theory, you could buy a length of fiber optic cable (which can
support tremendous symmetrical bandwidth over long distances) and run
it directly from your house to the nearest Internet point of presence
(POP). You then buy an electronic gadget for each end of the cable.
You plug one gadget into your computer and the other one into the
Internet. Now you can upload and download whatever you like, and
there’s no ISP to tell you what you can or can’t do—or turn over your
records to some inquisitive government agency.
Is this any more feasible than passing a bunch of laws opposed by
telecom providers? Well, not exactly. It’s expensive, and complicated.
It won’t work unless there’s also fiber at the POP. And what will your
neighbor say when you run your cable through her backyard?
The solution would be viable if you were, say, a hospital with a lot
of money and an IT staff and a need to upload and download gigantic
medical image files. In fact, customer-owned fiber is a reality today
for such large organizations. For smaller companies, however,
“condominium fiber” may be a better option. Condo fiber providers
install the fiber backbone and negotiate rights of way with the
neighbors. Then they sell individual strands of fiber to their
customers and collect a small annual maintenance fee.
For individuals, no such solution has been developed. But different
organizations are inching toward it from different angles, and if we
can take the best aspects of each approach, an e-speech solution might
emerge. Here are four of the partial solutions being proposed:
• In Canada, CANARIE—the public/private organization that runs
Canada’s advanced research network—is trying to jump-start a
residential condo fiber project. Bill St. Arnaud, CANARIE’s chief
research officer, asked residents in an Ottawa neighborhood whether
they wanted their own fiber connections to the Internet; about a third
said they did. He then convinced a business fiber provider to run a
trunk line through the neighborhood, and to agree to run a connection
to the nearest Internet POP for any neighborhood resident who could
pay about $1,500. He also worked out a complex financing scheme (he
calls it “green broadband”—don’t ask) to make the fiber easily
affordable for those who can’t buy it outright.
At the POP, customers will have to connect their fiber to an ISP’s
equipment. In theory, customers can choose among ISPs. But there’s a
slight hitch: As of this writing, no ISPs have agreed to participate.
• Many Swedish cities operate publicly owned systems that work in ways
similarly to the CANARIE scheme. These municipal fiber networks are
open to any ISP—some have dozens of competing ISPs—and the operator
will run fiber to any building where the owner pays for a connection.
Individual homeowners finance their fiber connections by adding around
$10 to their monthly mortgage payments (a better investment than
granite countertops in terms of resale price). As in the CANARIE plan,
customers can decide whether and when to install the fiber; once
connected, they can change ISPs at the click of a mouse.
This model is starting to catch on in other European countries, such
as the Netherlands. In the U.S. there are about 60 municipal fiber
networks—some states allow them, others don’t—and a few have succeeded
in attracting multiple ISPs. None of them, however, put the customer
in charge of connecting to the network, even though customer-
controlled fiber helps attract ISPs due to the low investment costs
and high degree of customer loyalty.
• A company called Copowi (short for Community Powered Internet) was
launched in 2007 as the first strictly “net neutral” ISP. It now
offers broadband services in 12 Western states over DSL lines
wholesaled by Verizon, AT&T and Qwest. Copowi promises not to block,
degrade or modify data or to discriminate for commercial advantage on
the basis of source or destination—with exceptions for necessities
such as spam prevention and, of course, law enforcement. It also
provides encryption for e-mail and Web surfing, both to help users
protect their privacy and to make it more difficult for network owners
to implement non-neutral access.
After a year in business, Copowi has about 4,000 customers, according
to founding partner George Matafonov. Eventually it would like to
partner with more network owners or even to build its own networks,
but first it needs to develop a larger subscriber base, which isn’t
easy for a niche player.
• New “mesh” wireless networking gear—which lets people share Internet
access something like BitTorrent lets them share files—has made it
easy and inexpensive to create decentralized networks. Wireless mesh
networks are now being used in locations as diverse as low-income
housing projects, Indian reservations and South African schools.
Citywide (or nearly citywide) mesh networks are being built in places
like San Francisco and Urbana, Ill. Internet access becomes much less
expensive because neighbors can share a commercial DSL connection in
the same way that co-workers in an office do.
However, mesh networks tend to be less decentralized in practice than
they are in theory, and for technical reasons any really large mesh
network seems to require a degree of structure and management. And
even a decentralized mesh network is dependent on an ISP to
communicate with others outside the neighborhood.
All of these efforts offer partial solutions to the problem of
guaranteeing free expression over digital networks. Remember that the
components of the problem we identified include unwarranted government
intrusion; ISP self-dealing (net neutrality and the walled garden);
and asymmetry. Looking at each of the solutions in turn:
Private condo fiber, if it ever exists, will solve the asymmetry
problem nicely and give the customer some ammunition against ISP self-
dealing. However, it will do nothing to combat government intrusion.
Public condo fiber (the Swedish solution) will face an uphill battle
in the U.S., where phone and cable companies routinely delay municipal
broadband projects with nuisance lawsuits and sometimes derail them
altogether with legislation. However, when public fiber networks are
built, they solve the asymmetry problem. And, if they attract
competing service providers, they may help counter ISP self-dealing.
Also, local governments may be able to stand up to unwarranted federal
law-enforcement demands more effectively than private operators can,
though the odds of this aren’t great.
Net neutral ISPs (such as Copowi) are a terrific solution to net
neutrality and walled-garden problems, but they can’t address the
asymmetry issue because they rely on existing network technology. This
solution also fails to address governmental intrusions on privacy,
because Copowi is legally obligated, just as AT&T, Comcast and the
other large ISPs are, to cooperate with these intrusions.
Decentralized wireless mesh networks offer some hope of protecting
freedom of communications within the network, if not between the
network and the public Internet. As community wireless activist Sascha
Meinrath writes, “What happens when a group of friends get together
and buys a single line that is then shared among them? What happens
when an apartment building buys a line and shares it? What happens
when a community or neighborhood gets a line and shares it? … Who
‘owns’ an ownerless network? Because that (non)entity is required by
[law] to provide surveillance capabilities on that network … [it]
represents an unenforceable mandate.”
But wireless mesh networks are not well equipped to handle the other
problems we’ve discussed. Because a wireless network can’t communicate
with the Internet until it finds a wire, it is dependent on a single
ISP. Ultimately it is limited by the ISP’s access speeds and network
management policies.
If wireless devices were ever to become powerful and prevalent enough
for the mesh to replace much of the Internet as we know it, every
mobile phone and laptop could become a voluntary peer in a global
community of equals, without oversight or restrictions. Alternatively,
if virtualization, a technology that slices up computers into multiple
“virtual” machines, is ever successfully applied to the hardware at
the Internet POP (right now it’s busy transforming the corporate data
center), we could conceivably all afford to be our own ISPs someday.
But the limitations of current technology—as well as the opposition of
ISPs and telcos, fighting to fend off what they see as a doomsday
scenario—make these blissful utopias unlikely anytime soon.
In the meantime, keeping in mind our mantra of “e-speech,” we can
continue to push federal regulators and access providers to support
net neutrality and lower their garden walls, and we can continue to
experiment with new models for community-owned and decentralized
access. Most important, however, we have to remain aware of our civil
liberties in the Digital Age, and to realize how easily—and invisibly—
they can be removed.
More information about the Infowarrior
mailing list