history

You are currently browsing the archive for the history category.

My sister Jan — student of history, Navy vet and a Wise One — sent me an email a couple days ago that I thought would make a good guest post. She said yes to that suggestion and here it is…

Is the new born-in-connectivity generation going to re-define privacy?   They may try — from the comfort of their parents’ homes or the cocoon of youth — but first they have to understand what constitutes privacy.  They are going to learn, albeit the hard way, that what you make available is no longer private and therefore you cannot expect it to be protected by the norms of privacy.  The norms of privacy, however, aren’t universally understood.

America is one of the few — perhaps the only if we’re talking large scale — modern countries that was created though one people’s individual exploration and individual settlement into an ever-moving frontier.  After initial sputtering wealth-seeking attempts, the true settlement along the coast line of north America was primarily under private sponsorship rather than military incursion.   It was “relatively” benign colonization in that the goal was not to annihilate, enslave or ‘save’ the indigenous people through religious conversion or education.  The arriving colonists primarily sought freedom to work and worship and the opportunity to better their lives and raise their social standing.  The principal asset needed to obtain those goals was land, which was seen as limitless and free for the taking provided the native population withdrew beyond the frontier and one had the strength and determination to tame the land as needed.

The leading edge of this frontier movement started with those who built the original settlements in the early 17th century and continued to move out in the lower 48 until the mid-20th century and in very remote areas continues still.  The “frontier” society was composed of people who took the initiative and individually ventured into new areas where there was little law, oversight or judgement.  Although they brought morals and manners of every social strata, they also had to rely on each other and build some form of community where ever they settled in order to survive and thrive.  But in the frontier, in the place of established laws, there were protocols — unwritten codes of correct conduct — born of common consent and enforced by common acceptance  that enabled the community to function, grow and improve.  These protocols became the societal norm for most of the expansion into the US as it is today.

In the rest of the world connected by the major trade routes during this same period, societies grew and countries were formed primarily from the top down by gathering like together, or by force, and they were ruled through laws and protocols that came into being to enable financial investors, religions or conquerors to subjugate and /or extort populations.

But America came into existence and continued to expand as one contiguous country because the key unifying principle was individual liberty, and our legal and societal norms developed to support that principle.  This is what made America so singular as a nation in it’s early days. This is at the heart of what some call exceptionalism today.  Exceptional may be an egotistical term for it — as Putin just called it and as the push-backers deny — if one interprets exceptional as being “above average,” or “extraordinary” or any other superlative.  But America is exceptional if one uses the term in the context of “deviation from the norm.”

Now overlay this frontier concept onto the development of the Internet and our other networking systems.  How were they developed?  Was it by governments pushing out into or conquering a new frontier with laws and protocols in hand or was it by individuals determining the most effective protocols that would help them solidify what they had achieved and enable them to push the frontier borders out further, wider and deeper?

A unique concept of individual privacy was part of America’s frontier society;  it wasn’t a place of one’s past but rather a place of new starts, of re-creation, a place where a person made themselves anew, a place where it didn’t matter where or what you came from but rather where you were going and what you would do.  Therefore individual privacy became an expectation rather than an exception in the country that frontier society created.

However, that ingrained individualism is not the norm in the rest of the world, a world that technology has rapidly connected.  As of today, the concept of individual privacy is not universally understood, now that online, networked and connected  technology is at a confluence of cultures.  Because of the universality of the usage of connective technology, privacy is going to need a universally accepted definition.  And at the heart of privacy is the idea of identity:  is it vested in the individual or the collective?

In this comment and this one under my last post, Ian Falconer brings up a bunch of interesting points, some of which are summarized by these paragraphs from his first comment…

Here in the UK most people over 40 will remember placing calls via a human operator. A real life person who had a direct interaction with both caller and receiver when reversing the call charges. In smaller towns and villages this meant that the operator knew who was phoning who, when and often, given their overarching view, could assume why.

This was socially accepted as the operators were usually local and subject to the same social norms as the friends and neighbors they ‘surveilled’.

But they were also employees of the GPO (General Post Office) with a national security obligation and had a direct reporting route into the national security apparatus, so that, if they felt that something fishy was afoot (especially in times of war), they were assumed to be both reliable and honest witnesses.

No-one assumed secrecy in an operator-mediated system. They assumed discretion on the part of the operator.

Is an ISP any different just because the data is package-based rather than analogue ? It conducts all the same functions as the old operator.

The shift from public ownership to private and from land-lines to mobile has not changed the underlying model of presumed access (as far as teleco users are concerned) and assumed responsibility (on the part of the national security apparatus). And though both are now legally defined under the license terms of privatised telecos, few of the UK’s public know how their comms systems actually work, so often assume a similar design ethos to the US, where constitutionally defined rights are a starting point for systems organisation.

That British Telecom evolved from the GPO is no accident, but neither is it necessarily a designed progression intend on increased surveillance.

… and these from his second:

Against most evidence US Congress doesn’t set UK law. The EU & UK governments do that. And against most evidence the US doesn’t set global social norms. So while I’m not saying Brits explicitly like spies and respect code breakers, there is a history here that forms a backdrop to the national mind set and it looks towards Bletchley Park, Alan Turing & James Bond rather than The Stasi, Senator McCarthey or Hoover’s G-Men.

The time and place to look for a failure of oversight is the sale of rights to spectrum access but a global technological fix for a perceived lack of communicational security, especially a US-led one, seems unlikely. The righteous indignation with respect to Huwei hardware looks like a starting point rather than an end point right now.

To me these events and discoveries more likely to work to fragment the rough and ready constellation of networks into national gardens once more. This would force comms through regulated conduits making in-out surveillance even easier and I tentatively suggest that in the legislation of whatever-comes-next those carrying out oversight do a better job, if legally-enshrined privacy is their aim.

I am somewhat familiar with the UK, having spent a number of years consulting BT. I have also spent a lot of time in the EU, mostly studying and collaborating with VRM developers, a large percentage of which are located in the UK and France.

Here in the U.S. many of us (me included) still had “party lines” and required operator assistance for long-distance calls as recently as the mid-’70s. With party lines phone connections were shared by as many as six other homes, and people could listen in on each other easily. Operators could listen to anything, any time. Thus, as Ian says, discretion rather than secrecy was assumed.

And discretion is The Thing. As it was with the old phone system it also was with spying, which every government does, and we have always assumed was going on — much of it outside the laws that apply to the rest of us — and hopefully for some greater good. Thus whatever we end up with on the Internet will rest on a system of manners and not just of laws and technologies.

Ideally law, technology and manners work in harmony and support each other. What we have had so far, in the era that began with personal computing and grew to include the Internet and smart mobile devices, has been a disharmonious cacophony caused by technology development and adoption with little regard for the incumbent systems of manners and law. And it is still early in the evolution of all three toward working harmony such as we have long experienced in the physical world.

Of those three, however, manners matter most. It seems no accident, to me at least, that the Internet is defined by protocols, which are nothing more than mannerly agreements between network operators and among the human and organizational operators of the network’s billions of end points.

Security of the telco-like centralized locked-down sort was never in the DNA of the Internet Protocol, which is one reason why it never would have been invented by the very companies and governments through whose local, national and international networks the Internet connects us all.

So it should be no surprise, aside from all the privacy concerns currently on the front burner of popular consciousness, that telcos, cablecos, national governments and institutions such as the ITU have busied themselves with stuffing the Internet, in pieces, back inside the regulatory, billing and nationally bordered bottles from which it more or less escaped, at first un-noticed, in the 1980s and early 1990s.

J.P. Rangaswami, when he was at BT, famously noted that a telco’s main competency was not communications but billing. It still is. China’s censored national subset of the world wide Internet is for many countries a model rather than an aberration. And the drift of Net usage to cellular mobile devices and networks has re-acclaimated users to isolated operation within national borders (lest they suffer “bill shock” when they “roam” outside their country) — something the landline-based Internet overcame by design.

All these things play into our evolution toward privacy in the virtual world that is recognizably similar to what we have long experienced in the physical one.

National mind sets are important, because those embody manners too. Public surveillance is far more present, and trusted, in the U.K. than in the U.S. I also sense a more elevated (and perhaps evolved) comprehension of privacy (as, for example, “the right to be left alone”) in Europe than in the U.S. I am often reminded, in Europe, of the consequences of detailed records being kept of citizens’ ethnicities when WWII broke out. Memories of WWII are much different in the U.S. We lost many soldiers in that war, and took in many refugees. But it was not fought on our soil.

There is also in Europe a strong sense that business and government should operate in symbiosis. Here in the U.S., business and government are now posed in popular consciousness (especially on the political and religious right) as opposing forces.

But all these things are just factors of our time. What matters most is that the whole world will need to come to new terms with the three things I listed in my earlier Thoughts on Privacy post: 1) ubiquitous computing power, 2) ubiquitous Internet access, and 3) the unlimited ability to observe, copy and store data. All these capacities are new to human experience, and we have hardly begun to deal with what they mean for civilization.

I suspect that only the generation that has grown up connected — those under, say, the age of 25 — begin to fully comprehend what these new states of being are all about. I’ve been young for a long time (I’m 66 now), but the best I can do is observe in wonder those people who (in Bob Frankston‘s words) assume connectivity as a natural state of being. My 16-year old son feels this state, in his bones, to a degree neither I nor my 40-something kids don’t. To us elders, connectivity is an exceptional grace rather than a natural state.

Manners among the connected young, however, have barely evolved past the reptile stage. In Report: Every Potential 2040 President Already Unelectable Due To Facebook, The Onion was not fully joking (it never is) when it said “A troubling report finds that by 2040 every presidential candidate will be unelectable to political office due to their embarrassing Facebook posts.”

I just hope that the laws we are making today (protecting yesterday from last Thursday, as all new laws tend to do) will be improved by new generations made wiser by their experiences with technologies made ubiquitous by their elders.

On February 25, 2008, the FCC held a hearing on network management practices in the Ames Courtroom at Harvard Law Schoolhosted by the Berkman Center. In that hearing David P. Reed, one of the Internet’s founding scientists, used a plain envelope to explain how the Internet worked, and why it is wrong for anybody other than intended recipients to look inside the contents of the virtual envelopes in which communications are sent over the Internet. It was a pivotal moment in the debate, because the metaphor illustrated clearly how the Internet was designed to respect privacy.

Respect, that is. Not protect.

In the early days of postal communications, the flaps of envelopes were sealed with blobs of wax, usually imprinted by the sender with a symbol. These expressed the intent of the sender — that the contents of the letter were for the eyes of the recipient only. Yes, a letter could be opened without breaking the seal, but not without violating the wishes of the sender.

The other day I wrote, “clothing, for example, is a privacy technology. So are walls, doors, windows and shades.” In the physical world we respect the intentions behind those technologies as well, even though it might be easy to pull open the shirts of strangers, or to open closed doors without knocking on them.

The virtual world is far less civilized. Proof of that is in the pudding of privacy rights violations by agencies of the U.S. government, which is clearly acting at variance with the Fourth Amendment of the Constitution, which says,

The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.

I see three ways to approach these violations.

One is to rely on geeks and whistleblowers to pull the pants down on violators. In Welcome to the end of secrecy says the very openness that invites privacy violations is our best protection against the secrecy concealing those violations.

Another is through the exercise of law. In The Only Way to Restore Trust in the NSA, security guru Bruce Schneier writes, “The public has no faith left in the intelligence community or what the president says about it. A strong, independent special prosecutor needs to clean up the mess.” And that’s on top of moves already being made by legislators, for example in South Africa. Given the scale of the offenses now coming to light, we’ll see a lot more of that, even if no special prosecutors get appointed. The law of the jungle will give way to a jungle of new laws. Count on it.

The third is through business — specifically, business modeled on postal services. For many generations, postal services have respected the closed envelope as a matter of course. Yes, we knew there were times and places when mail could be inspected for legitimate reasons. And there were also many things it was not legal to do, or to send, through postal systems. But, on the whole, we could trust them to keep our private communications private. And we paid for the service.

The Googles of the world — companies making their money on advertising — aren’t likely to take the lead here, because they have too much invested in surveillance (of the legal sort) already. But others will step forward. The market for privacy is clear and obvious, and will only become more so as the revelations of abuse continue to pour out.

Perhaps the businesses best positioned to offer secure communications are the postal services themselves. They’ve already been disrupted plenty. Maybe now is the time for them to do some positive disruption themselves.

 

 

In , opens with this sentence: “On any person who desires such queer prizes, New York will bestow the gift of loneliness and the gift of privacy.” Sixty-four years have passed since White wrote that, and it still makes perfect sense to me, hunched behind a desk in a back room of a Manhattan apartment.

That’s because privacy is mostly a settled issue in the physical world, and a grace of civilized life. Clothing, for example, is a privacy technology. So are walls, doors, windows and shades.

Private spaces in public settings are well understood in every healthy and mature culture. This is why no store on Main Street would plant a tracking beacon in the pants of a visiting customer, to report back on that customer’s activities — just so the store or some third party can “deliver” a better “experience” through advertising. Yet this kind of thing is beyond normative on the Web: it is a huge business.

Worse, the institution we look toward for protection from this kind of unwelcome surveillance — our government — spies on us too, and relies on private companies for help with activities that would be a crime if the  still meant what it says. ( more than two years ago.)

I see two reasons why privacy is now under extreme threat in the digital world — and the physical one too, as surveillance cameras bloom like flowers in public spaces, and as marketers and spooks together look toward the “Internet of Things” for ways to harvest an infinitude of personal data.

Reason #1

The was back-burnered when  (aka ) got baked into e-commerce in the late ’90s. In a single slide  summarizes what happened after that. It looks like this:

The History of E-commerce
1995: Invention of the cookie.
The end.

For a measure of how far we have drifted away from the early promise of networked life, re-read ‘s “Death From Above,” published in January 1995, and his “Declaration of the Independence of Cyberspace,” published one year later. The first argued against asymmetrical provisioning of the Net and the second expressed faith in the triumph of nerds over wannabe overlords.

Three years later  was no less utopian. While it is best known for its 95 Theses (which include “” and ““) its most encompassing clue came before of all those. Chris Locke wrote it, and here’s what it says, boldface, color and all:

if you only have time for one clue this year, this is the one to get…
we are not seats or eyeballs or end users or consumers. we are human beings and our reach exceeds your grasp. deal with it.

Note the first and second person voices, and the possessive case. Our reach was everybody’s. Your grasp was companies’.

Fourteen years later, companies have won. Our reach has not exceeded their grasp. In fact, their grasp is stronger than ever.

Another irony: the overlords are nerds too. And  they lord over what Bruce Schneier calls a feudal system:

Some of us have pledged our allegiance to Google: We have Gmail accounts, we use Google Calendar and Google Docs, and we have Android phones. Others have pledged allegiance to Apple: We have Macintosh laptops, iPhones, and iPads; and we let iCloud automatically synchronize and back up everything. Still others of us let Microsoft do it all. Or we buy our music and e-books from Amazon, which keeps records of what we own and allows downloading to a Kindle, computer, or phone. Some of us have pretty much abandoned e-mail altogether … for Facebook.

These vendors are becoming our feudal lords, and we are becoming their vassals. We might refuse to pledge allegiance to all of them – or to a particular one we don’t like. Or we can spread our allegiance around. But either way, it’s becoming increasingly difficult to not pledge allegiance to at least one of them.

Reason #2

We have loosed three things into the digital world that we (by which I mean everybody) do not yet fully comprehend, much less deal with (through policy, tech or whatever). Those are:

  1. Ubiquitous computing power. In the old days only the big guys had it. Now we all do.
  2. Ubiquitous Internet access. This puts us all at zero virtual distance from each other, at costs that also veer toward zero as well.
  3. Unlimited ability to observe, copy and store data, which is the blood and flesh of the entire networked world.

In tech, what can be done will be done, sooner or later, especially if it’s possible to do it in secret — and if it helps make money, fight a war or both. This is why we have bad acting on a massive scale: from click farms gaming the digital advertising business, to the NSA doing what we now know it does.

Last month I gave a keynote at an  event in New York. One of my topics was personal privacy, and how it might actually be good for the advertising business to respect it. Another speaker was , a “gentleman hacker” and CEO of WhiteOps, “an internet security company focused on the eradication of ad fraud.” He told of countless computers and browsers infected with bots committing click-fraud on a massive scale, mostly for Russian hackers shunting $billions from the flow of money down the online advertising river. The audience responded with polite applause. Privacy? Fraud? Why care? The money’s rolling in. Make hay while the power asymmetry shines.

Just today an executive with a giant company whose name we all know told me about visiting “click farms” in India, which he calls “just one example of fraud on a massive scale that nobody in the industry wants to talk about.” (Credit where due: the IAB wouldn’t have had us speaking there if its leaders didn’t care about the issues. But a .org by itself does not an industry make.)

Yet I’m not discouraged. In fact, I’m optimistic.

These last few months I’ve been visiting dozens of developers and policy folk from Europe to Australia, all grappling productively with privacy issues, working on the side of individuals, and doing their best to develop enlightened policy, products and services.

I can report that respect for privacy — the right to be left alone and to conceal what one wishes about one’s self and one’s data — is far more evolved elsewhere than it is in the U.S. So is recognition that individuals can do far more with their own data than can any big company (or organization) that has snarfed that data up. In some cases this respect takes the form of policy (e.g. the EU Data Protection Directive). In other cases it takes the form of advocacy, or of new businesses. In others it’s a combination of all of those and more.

Some examples:

 is a policy and code development movement led by Ann Cavoukian, the Information & Privacy Commissioner of Ontario. Many developers, enterprises and governments are now following her guidelines. (Which in turn leverage the work of Helen Nissenbaum.)

, the Fondation Internet Nouvelle Génération, is a think tank of leading French developers, scientists, academics and business folk, convened to guide digital transformation across many disciplines, anchored in respect for the individual and his or her full empowerment (including protection of privacy), and for collective action based on that respect.

 is a Fing project in which six large French companies — Orange, La Poste, Cap-Digital, Monoprix, Alcatel-Lucent and Societe Generale — are releasing to 300 customers personal data gathered about those customers, and inviting developers to help those customers do cool things on their own with that data.

The  in the UK is doing a similar thing, with twenty UK companies and thousands of customers.

Both Midata and Etalab in France are also working the government side, sharing with citizens data collected about them by government agencies. For more on the latter read Interview with Henri Verdier: Director of Etalab, Services of the French Prime Minister. Also see Open Data Institute and PublicData.eu.

In Australia,    and  are working on re-building markets from the customer side, starting with personal control and required respect for one’s privacy as a base principle.

In the U.S. and Europe, companies and open source development groups have been working on personal data “stores,” “lockers,” “vaults” and “clouds,” where individuals can harbor and use their own data in their own private ways. There is already an  and a language for “” and “pclouds” for everything you can name in the Internet of Things. I posted something recently at HBR about one implication for this. (Alas, it’s behind an annoying registration wall.)

On the legal front, Customer Commons is working with the  at the Berkman Center on terms and privacy requirements that individuals can assert in dealing with other entities in the world. This work dovetails with , the  and others.

I am also encouraged to see that the most popular browser add-ons and extensions are ones that block tracking, ads or both. AdblockPlus, Firefox’s Privowny and  are all in this game, and they are having real effects. In May 2012,  a 9.26% ad blocking rate in North America and Europe. Above that were Austria (22.5%), Hungary, Germany, Finland, Poland, Gibraltar, Estonia and France. The U.S. was just below that at 8.72%. The top blocking browser was Firefox (17.81%) and the bottom one was Explorer (3.86%). So it was no surprise to see Microsoft jump on the Do Not Track bandwagon with its latest browser version. In sum what we see here is the marketplace talking back to marketing, through developers whose first loyalties are to people.

(The above and many other companies are listed among developers here.)

More context: it’s still early. The Internet most of us know today is just eighteen years old. The PC is thirty-something. Pendulums swing. Tides come and go. Bubbles burst.

I can’t prove it, but I do believe we have passed Peak Surveillance. When Edward Snowden’s NSA revelations hit the fan in May, lots of people said the controversy would blow over. It hasn’t, and it won’t. Our frogs are not fully boiled, and we’re jumping out of the pot. New personal powers will be decentralized. And in cases where those powers are centralized, it will be in ways that are better aligned with individual and social power than the feudal systems of today. End-to-end principles are still there, and still apply.

Another reason for my optimism is metaphor, the main subject in the thread below. In , George Lakoff and Mark Johnson open with this assertion: The mind is inherently embodied. We think metaphorically, and our metaphorical frames arise from our bodily experience. Ideas, for example, may not be things in the physical sense, but we still talk of “forming,” “getting,” “catching” and “throwing out” ideas. Metaphorically, privacy is a possession. We speak of it in possessive terms, and as something valuable and important to protect — because this has been our experience with it for as long as we’ve had civilization.

Possession is “nine-tenths of the law” because it is nine-tenths of the three-year-old. She says “It’s mine!” because she has hands with thumbs that give her the power to grab. Possession begins with what we can hold.

There is also in our embodied nature a uniquely human capacity called indwelling. Through indwelling our senses extend outward through our clothes, our tools, our vehicles, enlarging the boundaries of what we do and experience in the physical world. When drivers speak of “my wheels” and pilots of “my wings,” it is because their senses dwell in those things as extensions of their bodies.

This relates to privacy through exclusion: my privacy is what only I have.

The clothes we wear are exclusively ours. We may wear them to express ourselves, but their first purpose is to protect and conceal what is only ours. This sense of exclusivity also expands outward, even though our data.

 “the Internet is a copy machine.” And it is. We send an email in a less literal sense than we copy it. Yet the most essential human experience is ambulation: movement. This is why we conceive life, and talk about it, in terms of travel, rather than in terms of biology. Birth is arrival, we say. Death is departure. Careers are paths. This is why, when we move data around, we expect its ownership to remain a private matter even if we’re not really moving any of it in the postal sense of a sending a letter.

The problem here is not that our bodily senses fail to respect the easily-copied nature of data on networks, but that we haven’t yet created social, technical and policy protocols for the digital world to match the ones we’ve long understood in the physical world. We still need to do that. As embodied beings, the physical world is not just our first home. It is the set of reference frames we will never shake off, because we can’t. And because we’ve had them for ten thousand years or more.

The evolutionary adaptation that needs to happen is within the digital world and how we govern it, not the physical one.

Our experience as healthy and mature human beings in the physical world is one of full agency over personal privacy. In building out our digital world — something we are still just beginning to do — we need to respect that agency. The biggest entities in the digital world don’t yet do that. But that doesn’t mean they can’t. Especially after we start leaving their castles in droves.

Tags: , , , ,

In mass this morning only two words the priest said during the homily stuck in my mind: it’s alright.

Because they called ZZ Top to mind. Specifically, the song Legs. It beginsShe’s got legs. She knows how to use them. Then the boys sing a bunch of other stuff over this repetitive throbbing riff that sounds like it’s made by thousand-pound bees. At the end of the first verse they sum things up with this: yeah, it’s alright.

A few months back I turned my sixteen year old son on to ZZ Top, starting with Legs, and he got a huge laugh out the alright thing. It might not be deep, but it’s still cool. Meaning: it’s alright.

Here’s the original music video, just so ya’ll know what MTV looked like, back in the decade.

Bonus link.

@BlakeHunskicer has a kickstarter project, Fleeing the War at Home: An interactive documentary introducing the crisis in Syria through the personal histories and dreams of Syrian refugees, with a few days and a few thousand dollars left to go.

Blake is one of the graduate students I got to know this last year as a visiting scholar in @JayRosen_NYU‘s Studio20 (@Studio20NYU) class at NYU. He’s a terrific journalist and photographer already, and will put both skills to good use for a good cause. Join me in helping him make it happen.

In Bubkes, Stephen Lewis has lately been blogging with depth and insight on many topics — music, architecture, culture, infrastructure and events historic and current — in two cities with which he is intimately familiar: Istanbul and Sofia.

In Taksim Underpass: Ask Gertrude Stein, Dorothy Parker, Jane Jacobs, and Robert Moses, he writes,

By itself, the Turkish government’s plan to shunt traffic under and past Taksim Square might indeed lessen vehicular congestion, thus freeing this iconic location from dominance by motor vehicle traffic. In conjunction with the plan to replace all of Taksim Square and Gezi Park with a massive complex of shopping mall, mosque, and fantasy reconstruction of a 19th-century military barracks, however, the underpass will instead deliver more automobile traffic into the urban core, a further step toward transforming a vital, unplanned, dense, “legacy” urban agglomeration into just another suburb.

In Istanbul Conflicts From Afar: Issues and Aspersions, Headscarves and Rambo, he visits specious tales by the Turkish Prime Minister and his sympathizers, of protestors “harassing pious Muslim women and tearing off their headscarves” (among other offenses for which there is no confirming hard evidence), and compares them to equally wrong tales from the Vietnam War era. That was when “US antiwar activists were stigmatized — and crocodile tears poured forth — over reports that US soldiers returning from tours duty in Vietnam were being spit upon by opponents of the war.  Not a single person, however — neither spitter, spat upon, nor witness thereto — ever stepped forward to confirm any such attack.” In support of this he recalls an On the Media program confirming the purely propogandized nature of the claim. I just did some digging and found the program transcript. Here it is.

In Sofia, Bulgaria: From Protest to Protest to Protest, Steve visits “the Balkan blurring of what is said and what is, and what is and what could or should be” and how in Bulgaria “nothing is what is seems to be at first glance, and words, no matter how clear, often refer to alternate realities (click here for my long-ago online discourse on the wisdom and convenience of the oft-heard Bulgarian-language phrase po printsip, tr. ‘in principle‘).” His next post, Plovdiv, Bulgaria, 1997: Musicians Marching in Protest, recalls an earlier protest, again accompanied by an excellent photo.

In Istanbul: Water, Fountains, Taksim, and Infrastructural Tourism, Steve reports on joining a colleague in visiting “the layers of infrastructure — including Ottoman-era fountains — that have served Istanbul over centuries past and during its ten-fold growth in population during the twentieth.” I share with Steve a passion for what he and his colleague call “infrastructural tourism” — a practice which, he adds, “appears already to be underway, albeit searching for its own content and method, as per this report at Design Observer.” Wonderful link, that one. Go read that too.

In From the Archives: Fading Fragments of Legacy Infrastructure, he begins,

Two decades ago, I began to photograph the historic water fountains (çeșme) and water kiosks (sebil) of Istanbul.  I began, not with the grand and monumental, but with obscure and abandoned — those in backstreets, alleyways, and courtyards, functioning and non-functioning fragments of legacy urban infrastructure, overlooked by scholars,  their features surrendered to the elements, decay, and neglect. The forgotten origins and gradual disappearance of many of these structures seemed symbolic of larger urban processes of decline and abandonment — processes that are as central to the functioning and continuity of cities as are restoration and (re)development.

I’ve been doing something similar in New York and New Jersey, where I grew up. A few days ago, driving back to Manhattan from a meeting in Edgewater, New Jersey, I found myself following Google Maps’ navigation to the George Washington Bridge, turning onto Bruce Reynolds Boulevard before bearing right onto a ramp leading into the toll lanes. Paused at a light,  I saw on the right an old street sign marking the late Hoyt Avenue, and realized I was exactly where my parents lived when I was born: at 2063 Hoyt. Ninety-three years earlier, this was the view from that very same spot. (And here’s the larger photo set, with shots old and new. Credit for the old ones goes to my late father and to his little sister Grace, now 101 years old and doing fine.) I hope, when Steve next returns to New York (his home town), we can do some infrastructural touring together, cameras in hand.

Bonus link: Steve’s latest, Further to “Istanbul Conflicts From Afar:” Kudos, Mentions, and “Great Expectorations”, which cites this post as well.

The title of this post, Rebuilding the Future, is one I came up with back when I read Steve’s Taksim Underpass piece, and I wanted to post thoughts about the ironies that always surround the civic graces — especially infrastructure — that we choose to keep using (often for new purposes), or just to preserve, for generations to come. I didn’t go there, because I’ve already said enough and I’d rather that readers get into what Steve is writing and sharing. But I still kinda like the headline, so I’m letting it stand.

Los Angeles at nightFirst, time.

Earth became habitable for primitive life forms some 3.X billion years ago. It will cease to be habitable in another 1 billion years or less, given the rate at which the Sun continues to get hotter, which it has been doing for the duration.

Species last, on average, a couple million years. Depending on where you mark our own species start, we are either early or late in that time span.

If you mark our start from the dawn of the Anthropocene — now being vetted as a name for the geological epoch in which human agency is as obvious as that of other natural agents in Earth’s story, such as asteroid collisions, volcanic outpourings and radical weather changes — we’re about ten thousand years into this thing. We’ve done a lot in not very long.

From a pained perspective, the Anthropocene is a time of pestilence by a single species — one with an insatiable hunger for what that species calls “natural resources.” To test that pain, give a listen to “When the music’s over,” on the Strange Days album by The Doors. In it Jim Morrison sings,

What have they done to the Earth?
What have they done to our fair sister?
Ravaged and plundered and
Ripped her and bit her.
Stuck her with knives in the side of the dawn and
Tied her with fences and
Dragged
Her
Down.

From a disinterested perspective, dig Robinson JeffersThe Eye, written during World War II from Tor House, his home in Carmel overlooking the Pacific:

The Atlantic is a stormy moat; and the Mediterranean,
The blue pool in the old garden,
More than five thousand years has drunk sacrifice
Of ships and blood, and shines in the sun; but here the Pacific–
Our ships, planes, wars are perfectly irrelevant.
Neither our present blood-feud with the brave dwarfs
Nor any future world-quarrel of westering
And eastering man, the bloody migrations, greed of power, clash of
faiths–
Is a speck of dust on the great scale-pan.
Here from this mountain shore, headland beyond stormy headland
plunging like dolphins through the blue sea-smoke
Into pale sea–look west at the hill of water: it is half the
planet:
this dome, this half-globe, this bulging
Eyeball of water, arched over to Asia,
Australia and white Antartica: those are the eyelids that never
close;
this is the staring unsleeping
Eye of the earth; and what it watches is not our wars.

There is also this, from Jeffers’ “The Bloody Sire” :

Stark violence is still the sire of all the world’s values.

What but the wolf’s tooth whittled so fine
The fleet limbs of the antelope?
What but fear winged the birds, and hunger
Jewelled with such eyes the great goshawk’s head?

Our teeth, right now, wing limbs and jewell eyes we will never see.

And the life here will end, perhaps in less time than has passed since the planet made half the rocks in the Grand Canyon‘s layer cake.

Now, space.

Astronauts speak of the “Overview_effect” that leaves them changed by seeing Earth from space.

I’ve made do with what I can see from the stratosphere while flying in commercial aircraft. It was from that perspective, for example, that I’ve documented effects of strip mining in the Anthropocene.

Ironies abound. My photo series on coal mining in the Powder River basin has been used both for pro-environmental causes and to promote business in Wyoming.

I’ve got more on this, but neither time nor space for it now.

Bonus link.

And more on the Anthropocene:

Enhanced by Zemanta

I’m in Boston right now, and bummed that I can’t attend Start-up City: An Entrepreneurial Economy for Middle Class New York, which is happening today at New York Law School today.

I learned about it via Dana Spiegel of NYC Wireless, who will be on a panel titled “Breakout Session III: Infrastructure for the 21st Century—How Fast, Reliable Internet Access Can Boost Business Throughout the Five Boroughs.” In an email Dana wrote, The question for the panel participants is how fast, reliable internet access can boost business throughout NYC.” The mail was to a list. I responded, and since then I’ve been asked if that response might be shared outside the list as well. So I decided to blog it. Here goes:

Fast and reliable infrastructure of any kind is good for business. That it’s debatable for the Internet shows we still don’t understand what the Internet is — or how, compared to what it costs to build and maintain other forms of infrastructure, it’s damned cheap, with economic and social leverage in the extreme.

Here’s a thought exercise for the audience: Imagine no Internet: no data on phones, no ethernet or wi-fi connections at home — or anywhere. No email, no Google, no Facebook, no Skype.

That’s what we would have if designing the Internet had been left up to phone and cable companies, and not to geeks whose names most people don’t know, and who made something no business or government would ever contemplate: a thing nobody owns, everybody can use and anybody can improve — and for all three reasons supports positive economic externalities beyond calculation.

The only reason we have the carriers in the Net’s picture is that we needed their wires. They got into the Internet service business only because demand for Internet access was huge, and they couldn’t avoid it.

Yet, because we still rely on their wires, and we get billed for their services every month, we think and talk inside their conceptual boxes.

Try this: cities are networks, and networks are cities. Every business, every person, every government agency and employee, every institution, is a node in a network whose value increases as a high multiple of all the opportunities there are for nodes to  connect — and to do anything. This is why the city should care about pure connectivity, and not just about “service” as a grace of phone and cable companies.

Building a network infrastructure as neutral to purpose as water, electricity, roads and sewage treatment should be a top priority for the city. It can’t do that if it’s wearing blinders supplied by Verizon, Time Warner and AT&T.

Re-base the questions on the founding protocols of the Net itself, and its city-like possibilities. Not on what we think the carriers can do for us, or what we can do that’s carrier-like.

I came to the realization that networks are cities, and vice versa, via Geoffrey West — first in Jonah Lehrer’s “A Physicist Solves The City,” in the New York Times, and then in West’s TED talk, “The Surprising Math of Cities and Corporations.” West is the physicist in Lehrer’s piece. Both are highly recommended.

Bonus link.

In How podcasting got its name, Dave nicely outlines the derivation of the terms podcast and podcasting.

That last link goes to the Wikipedia page, because pretty much any other link I put in there has a greater risk of breaking. And that’s what’s at issue here.

Dave was able to date usage in part because others, including yours truly, knew that history was being made, live, at the time. My contribution was DIY Radio with PODcasting, on a Linux Journal blog called IT Garage, on 28 September 2004. In it I wrote this linky passage:

But now most of my radio listening is to what Adam Curry and others are starting to call podcasts. That last link currently brings up 24 results on Google. A year from now, it will pull up hundreds of thousands, or perhaps even millions.

Which it did, and still does.

But what matters here is that Linux Journal has kept IT Garage up on the Web, even though it has long since run its course.

In The Web We Lost and How We Lost the Web, Anil Dash describes the slope down which we have collectively slid over the last decade or so, as more and more of our documents and activities online have become streams instead of pages, and locked up in what Bruce Schneier calls a feudal world of walled POPS: Privately Owned Public Spaces.

I saw the streamed world emerging when my son Allen predicted the “Live Web” in 2003. I thought that was an amazing insight, especially since the Web of pages we had known since 1995 was fundamentally a static one. My first substantive piece about the Live Web was probably this one in 2005. My last was this one in 2011. More recently Phil Windley has run with it, which I like because he’s a real developer and not just a writer/instigator like me.

We can find these historic details because links have at least a provisional permanence to them. They are, literally, paths to locations. Thanks to those, we can document the history we make, and learn from it as well.

Links also, as David Weinberger has always put it so well, subvert hierarchy. There is something about the loose joining of our small pieces that keeps the big centralizers from turning everything we do into snow on the water.

« Older entries § Newer entries »