Less structure is more for telecoms?

There was so much to do today I almost did not have time to digest some of the important information in the news about security. Take the BBC report about Somali telecoms for example, which they gave the rather suggestive title “Telecoms thriving in lawless Somalia”.

Mr Abdullahi says the warlords realise that if they cause trouble for the phone companies, the phones will stop working again, which nobody wants.

“We need good relations with all the faction leaders. We don’t interfere with them and they don’t interfere with us. They want political power and we leave them alone,” he says.

There’s something beneath the surface of this story that I can’t quite put my finger on yet, but I find it disturbing. Communication and media control is almost always one of the main tenets related to seizing political power, and yet we are told that the “warlords” don’t want to interfere with phone companies? This conclusion defies logic, and so I feel like I’m searching for a better explanation or understanding of market/political forces going on there, and why the telecoms are so resiliant that they have no need for physical security.

“All the infrastructure of the country has collapsed – education, health and roads. We need to send our staff abroad for any training.”

Another problem for companies engaged in the global telecoms business is paying their foreign partners.

At present, they use Somalia’s traditional “Hawala” money transfer companies to get money to Dubai, the Middle East’s trading and financial hub.

With a government would come a central bank, which would make such transactions far easier.

The article goes on to say that the telecoms look forward to taxes, once a government exists again, but hope that the percentage of their revenues will remain low while all the infrastructure of the country is rebuilt. Wishful thinking.

Here is an alternative theory: Somalia is evolving into a new structure that we might benefit from evaluating without any preconception of what constitutes a “nation” with taxes and fair “representation”. For some reason this reminds me of the origins of the nation-state in Italy when small groups of “freemen” joined in a common purpose, expressly independent of a monarch but without much else defined. Perhaps Somalis are not only ready to revisit that problem, but come up with new answers based on a new market of information and technology.

The shockingly lower market costs of cell service are really not all that new, I guess. Cell phones have been wildly successful in many countries where infrastructure is seen/made to be prohibitive. Brazil, for example, had a waiting list of years and a slew of high fees for any kind of land-line, yet the introduction of cell service meant just about anyone could afford to have service in a week’s time or less.

Here’s another odd story along the same lines (ha ha), from the Register, called “Need cheap DSL? Go to Rwanda”:

Wyler arrived in Rwanda two years ago, looking for aid work as a teacher. While hunting down a job, he ran across a project to put computers in Rwandan schools and link them to the internet via satellite connections. The plan, which included the purchase of $2,300 PCs, appeared too expensive and inefficient to Wyler. Why purchase expensive computers and then deliver just 64kbps connections to the students?

“The thing is that money is not the problem,” Wyler said. “The problem is the way they spend it. You’ll find that a lot of money goes to consultants and to buy $2,300 computers when a $500 computer will do. So, I started a company to try and give them an idea of how to do this.”

Wyler zeroed in on building out the country’s networking infrastructure. If you’re going to buy computers, they may as well connect to the internet at a useful speed – 300kbps and up – and at an affordable price.
[…]
Over the next few years, Terracom will work with Sun Microsystems to put 20,000 thin client computers in hundreds of Rwandan schools. The thin clients do not have power hungry processors, disk drives or fans and require about 20W as compared to a 200W PC. The power savings should make it possible to run the thin clients on solar power, according to Wyler.

Fascinating project. The people with access to this infrastructure will undoubtedly benefit, as will the telecoms, but will their country? Note the irony in Wyler’s concern about pre-existing infrastructure:

“Everybody wants us to do this in their country,” Wyler said. “In order for us to even think about expanding, the country would need to have a political environment that is clean and forward thinking. If we can get the computing density up in Rwanda, then it’s a great model for these other countries.”

Ah, but what if you don’t start off with the presumption that stability of a nation is required, just the ability of all the warlords/politicians to agree to leave telecoms alone for the greater good? Here’s an analogy that might help make the point, although I admit it is a bit esoteric: In western/european music drummers are basically required to keep time in a rigid structure that presumes everything is a subdivision of a universal law/rule. If the tempo is 100, for example, then you can play at 50, 25, 10, etc. or sometimes even in thirds if you want to be a little crazy and try to bend the rules. African drumming, on the other hand, is based on a phrase (sample) played by someone that runs in a repeating sequence. The other beats are thus played in relation to an agreed-upon phrase, not really a subject of the phrase or defined by it, but more in a kind of agreement not to be too far off a common/shared goal (rhythm). It looks like chaos to the outsider who has been trained to dole out the Western tempos into legal parcels of time, but some might argue that the Africans actually end up with a simpler and more resiliant structure that produces a comparable, if not superior, output for consumption.

A whole new way of governance might someday emerge from the creative use of information technology to break down the sense of nationalism that we all now take for granted. If nothing else, radio transmissions will continue to seriously challenge anyone who hopes to secure information.

Tiger Kidnapping

No, it’s not what you think. Tigers are not in any danger. The British media is reporting all kinds of odd news tid-bits in the wake of the recent Kent banknote robbery, and someone must have thought a “law of the jungle” reference would be fitting. Bruce Schneier did a nice job highlighting a dramatic piece in the Times:

It did not take gelignite to blow open the vaults; it took fear, in the hostage technique known as “tiger kidnapping”, so called because of the predatory stalking that precedes it.

Now what do we call it when some kidnaps a tiger? Or maybe that doesn’t happen very often, so there’s little chance of confusion. Personally, I’m glad the topic of tigers came up since it has been a while since I had a chance to read about their predatory practices. The Chris Brunskill photography site has a nice three-part review of a tiger stalking as it unfolds in real life, but the best part is where he shows the target narrowly escaping:

Suffice to say, those 15-20 seconds are imprinted on my memory forever and it stands out as the single most exhilaring encounter I have ever had with wild tigers – No matter what you do, never give up.

Now how’s that for a reverse lesson in how to deal with terrorists and/or robbers?

The Tiger
by William Blake

Tiger! Tiger! burning bright
In the forests of the night,
What immortal hand or eye
Could frame thy fearful symmetry?

In what distant deeps or skies
Burnt the fire of thine eyes?
On what wings dare he aspire?
What the hand dare seize the fire?

And what shoulder, and what art,
Could twist the sinews of thy heart?
And when thy heart began to beat,
What dread hand? and what dread feet?

What the hammer? what the chain?
In what furnace was thy brain?
What the anvil? what dread grasp
Dare its deadly terrors clasp?

When the stars threw down their spears,
And watered heaven with their tears,
Did he smile his work to see?
Did he who made the Lamb make thee?

Tiger! Tiger! burning bright
In the forests of the night,
What immortal hand or eye
Dare frame thy fearful symmetry?

Google’s latest double-standard

InformationWeek published an interesting review of Google’s desktop search tool:

By using Search Across Computers, employees are transmitting confidential company documents outside existing security systems. The means of transmission and storage (for the limited time documents are on its servers) aren’t understood, because Google hasn’t explained them. Additionally, the Google Desktop software provides no mechanism for indicating when data is uploaded to a server, when it’s accessed by your second computer and when it’s deleted from Google’s servers. We just don’t know.

If Google is going to play in the software market, it needs to take responsibility for communicating what its software does and does not do, in conjunction with the software release. It needs to be more respectful of the burden on security/IT professionals and enable features that help them protect their data. We all know that Google will do no evil, but they need to help make sure that they don’t enable it either.

Ouch. One would think they might be headed more in the direction of greater privacy, not less, given a brewing backlash from consumers and the gov’t. In fact, I’ve been working diligently with some folks to scan and uncover Google code on enterprise systems in order to cleanly remove it from afar. It surprises me how many admins are starting to categorize the Googley software in the same context as Kazaa, Gator, and other infamous and rather misleading “helper” applications. As the value of privacy goes up will the value of Google, which seems to rely on others’ openness, go down?

The Cult of the Dead Cow “Goolag” t-shirt campaign is quite harsh:
Goolag

Rumsfeld, 9/11 and Saddam Hussein

Thad Anderson, a law school grad student who runs outragedmoderates.org, has posted some interesting documents that show the Bush administration immediately started looking for ways to link Saddam Hussein to the attack on September 11th, 2001:

On July 23, 2005, I submitted an electronic Freedom of Information Act request to the Department of Defense seeking DoD staffer Stephen Cambone’s notes from meetings with Defense Secretary Donald Rumsfeld on the afternoon of September 11, 2001. Cambone’s notes were cited heavily in the 9/11 Commission Report’s reconstruction of the day’s events. On February 10, 2006, I received a response from the DoD which includes partially-redacted copies of Cambone’s notes. The documents can be viewed as a photo set on Flickr.

The released notes document Donald Rumsfeld’s 2:40 PM instructions to General Myers to find the “[b]est info fast . . . judge whether good enough [to] hit S.H. [Saddam Hussein] at same time – not only UBL [Usama Bin Laden]” (as discussed on p. 334-335 of the 9/11 Commission Report and in Bob Woodward’s Plan of Attack).

Sometimes, in an investigation, it is handy to start off with a hypothesis and look for supporting evidence. On the other hand, in most situations it is usually best to keep an open mind and let the facts speak for themselves, in order to avoid hasty or false conclusions or wrongful associations. It is always hard in a crisis to move quickly and yet practice caution. According to these notes Rumsfeld not only started with a hypothesis, but he seems to actually have ordered his staff to work under a foregone conclusion and find facts to support it/him.

Finally, these documents unveil a previously undisclosed part of the 2:40 PM discussion. Several lines below the “judge whether good enough [to] hit S.H. at same time” line, Cambone’s notes from the conversation read: “Hard to get a good case.”

The Guardian has picked up the story here, with the obvious conclusion:

…these notes confirm that Baghdad was in the Pentagon’s sights almost as soon as the hijackers struck.