The Revolution May Not Be Digitised

Over the last year or so, we’ve seen a string of articles and papers about the small but sudden growth of the internet throughout the Pacific region. Ranging in tone between cautious optimism and untempered –and often uncritical– enthusiasm, few capture the essence of the struggle that Pacific island states face even keeping pace with the rate of change in the world of telecommunications and the internet.

The internet is putting down tenuous roots in the Pacific – but do we really understand how to foster its growth?

Over the last year or so, we’ve seen a string of articles and papers about the small but sudden growth of the internet throughout the Pacific region. Ranging in tone between cautious optimism and untempered –and often uncritical– enthusiasm, few capture the essence of the struggle that Pacific island states face even keeping pace with the rate of change in the world of telecommunications and the internet.

When I first arrived in Vanuatu the better part of a decade ago, the entire country was sharing only slightly more bandwidth than I’d had at my personal disposal back in Canada. To add insult to injury, the cost was roughly ten times greater even for the paltry amounts on sale. Getting access to what would be considered even a nominal connection in the developed world involved expenditures equivalent to thousands of dollars a month.

Now, following years of consistent and determined effort, Vanuatu has widely available commercial internet in its urban areas. But prices remain high. As this piece is being written, the cost of a 2 megabit connection (the lowest tier of what is considered broadband in many developed nations) starts at about AUD800 per month, and rises quickly once usage fees are factored in.

In spite of this, internet service providers have found inventive ways to get people started, offering small (cynics might say paltry) connection speeds and bandwidth limits. Comparisons aside, such packages are at least sufficient to move the uptake indicator from effectively zero to… something slightly more than zero.

Make no mistake; that first step is a doozy. It’s allowed tens of thousands of people who never had any access at all to begin using the internet on a regular basis. As many a breathless commentator (including myself, on occasion) has noted, this has led to a vast increase in public dialogue online. This has led in turn to equally breathless speculation about the likelihood of a coming revolution in political awareness and activism, social justice, education and countless other shibboleths of progressive idealism.

With a few notable exceptions, commentators ignore key details about this incipient social revolution:

First, this ‘revolution’ resembles Iran’s Green movement more than Egypt’s uprising. In the vast majority of Pacific countries, price and availability limit access to all but a tiny proportion of the population. And these people are almost exclusively urban, affluent and educated. In short, they are already the best informed and most engaged. Simple arithmetic leads to the conclusion that limited access to internet limits the scope of its impact as well.

The internet is a ‘force multiplier’, in the sense that it renders many kinds of labour-intensive tasks vastly more efficient. While the impact on the minority who have recently begun to access it daily is immense, how much greater it could be if the other number in the equation (the sum of the population using it) were to rise even higher.

Second, the results of public dialogue, awareness and coordination on politics are measurable, but decidedly mixed. In Papua New Guinea, we saw a number of new faces in Parliament whose election can at least in part be attributed to the profile they garnered by participating in online fora such as Facebook’s Sharp Talk group. But we also saw many familiar faces returned, some of whom were widely reviled online. The same can be said of Vanuatu, where populist MP Ralph Regenvanu repeated his record-setting electoral performance, successfully expanded his base and managed to elect three other MPs under his Graon Mo Jastis (Land and Justice) banner. Regenvanu is the first politician since Independence to run an entirely issues-oriented campaign, and his appeal has only been amplified by his consistent presence online.

But popularity didn’t help Regenvanu on the tactical level. He won enough votes individually that, due to the vagaries of Vanuatu’s Single Non-Transferable Vote system (which elects multiple MPs in each constituency), he could have got three MPs past the post. Failures in messaging and on-the-ground organising, however, meant that his party’s second candidate in the capital constituency missed capturing the necessary votes to number him among the winners.

More to the point, Vanuatu too saw many familiar faces returned to Parliament. While its future seems uncertain, the current cabinet is nearly identical to the one that led the country to the polls only weeks ago. Even if it is ousted in the coming days, the champions and heroes of the small but growing online community can hope for a minority voice at best in any new government.

Third, and perhaps most importantly, commentators and researchers often underestimate the fragility of this flowering in the digital sphere and overstate its importance relative to other uses of digital communications. Despite the occasional public bun fight over self-censorship and media standards, it’s becoming increasingly clear that the Fiji government has been quite successful in its efforts to, in its words, ‘raise standards’ across the spectrum of media, both online and off, and to introduce ‘balance’. The stifling effects of official disapproval on certain kinds of commentary and content in Fiji are making themselves felt throughout the online community. They reach so far that it’s becoming harder to engage writers to perform any kind of independent analysis of government policy, ironically, even to praise it.

But to express unmitigated dismay at this outcome would be naïve, to say the least. Given that Fiji has the most highly developed telecommunications infrastructure in the region, and that the current regime has presided over its significant growth and improvement, why should we be surprised if they prove adept at making sure it serves their purposes? There is a very real chilling effect generated by the imposition of state views on the public dialogue, that’s true. But simply to write off the region-leading gains that have been made in telecommunications pricing and availability –as a recent Lowy paper did– is a textbook case of throwing the baby out with the bathwater.

In last week’s budget speech, Voreqe Bainimarama committed his government to building ten new telecentres in the coming year, and to removing duties entirely from smart phones in order to encourage uptake across the board. Informal reports indicate as well that there are plans afoot to provide broadband access to ‘almost 100%’ of the nation’s schools within the next four years.

The plain fact is that Fiji is a regional leader in understanding and embracing the importance of broad and deep investment in telecommunications capacity. They see their role in the coming years as that of a ‘knowledge hub’ for the Pacific.

Improved communications capacity, therefore, does not necessarily equate to increased freedom of speech, nor indeed the flowering of a diverse and broad-based social dialogue. This should not be news to us.

Melanesian and Polynesian societies all feature tight familial bonds and a preference for dialogue over confrontation. It’s not at all surprising, then, to see online groups arise whose membership comprises the majority of the online community. Hunger for change is generally evident, but it’s not overwhelming. There are in fact deeply conservative aspects to Pacific societies that can counterbalance and often quash an individual’s ability to enact change. Wantok-ism and a long tradition of respect for the so-called Big Man can overwhelm the desire to challenge the status quo.

If only to view the development of internet in the Pacific more clearly, it’s useful to look at online discourse and the networks that make it possible as separate, but linked endeavours. Building out infrastructure widely and deeply are necessary preconditions to achieving the progressive ends we most commonly associate with social media. But in and of themselves, they are not sufficient.

When we look at the landscape through this split prism, we can learn important lessons about how to achieve the former. The same paper that was so quick to toss aside Fiji’s recent gains ascribed the massive expansion of mobile services in the region to ‘deregulation’. Actually, the opposite is true. Virtually every successful step taken in this sector has been the result of increased government engagement in telecommunications: by negotiating (sometimes foisting) competition on incumbent monopolies, intervening when players tried to ignore or alter the rules, by closing the door to the back room and by giving their regulatory authorities the ability to bite back.

This may discomfit some, but in the Pacific it seems that more government, not less, is the recipe for success in terms of making the internet a part of their peoples’ lives. While Digicel’s example may have shown that even small markets can be profitable, the relatively large investments required to build out international fibre-optic links and robust nationwide networks carrying more than token bandwidth to the entire country are enough to make even the most risk-loving enterprise blanch. Simply put, no matter how much demand ensues, the capital investment costs per customer are astronomical.

It’s been argued that the only way a commercial entity can countenance such an investment is through a monopoly arrangement –the very thing that Pacific countries have spent the better part of a decade getting out from under. But even when other approaches are tried, the numbers are daunting. Tonga’s undersea cable connection to Fiji is heavily subsidised by the World Bank, and it’s being developed on a consortium basis, but the government the largest shareholder by a wide margin. Even with all of these interventions, prices promise to remain extremely high.

Simply put, it’s nearly impossible to make a profit-based business case for the kind of connectivity that will be required to provide affordable, widely accessible internet services in the Pacific. And those voice and data companies who do invest in the region will go to great lengths to protect their investment, up to and including interfering in the political process. The Pacific’s success (or failure) in embracing information technologies, therefore, will be determined by the level of commitment and firmness of will shown by government.

Even under the best possible circumstances, any gains will likely be tenuous. Renesys, the internet consulting group that broke the news of national internet blackouts in Iran, Egypt and more recently in Syria, recently used their international traffic monitoring tools to find out which countries were most vulnerable to disruptions in internet service. Needless to say, Pacific island countries were over-represented among those faced with ‘Severe’ or ‘Significant’ risk. Not even Fiji managed to find its way into the ‘Low’ risk category.

Renesys was worried mostly about the ease with which a government could turn off the internet tap on its own people. That may be a worry for some in the region, too, but those very same attributes that make national networks vulnerable to political interference also make them vulnerable to systemic threats. In 2004, the failure of a single satellite resulted in numerous nations going entirely dark, some for days. As the Renesys survey shows, little has changed in the interim.

If –and as we’ve seen, it’s a big if– Pacific nations do somehow succeed in integrating the internet into people’s daily lives, we still have no guarantee a flowering of awareness and online dialogue will necessarily follow. Once again, those in power will play an over-large role. No matter what decisions they make, there will be winners and losers at the top. Canny politicians and parties will follow the example set both by the insurgents in Vanuatu and PNG and by the incumbents in Fiji. Those who are adept at messaging and dialogue will likely flourish. Those who remain aloof, who ignore or refuse to take up these new social tools, will slowly (too slowly for some) but inevitably find themselves pushed to the sidelines. But they may succeed in slowing development for years before that happens.

The revolution, in other words, may not be digitised; there may not be any revolution at all. Every outcome, for better or for worse, will be determined by the will of governments to act.

 

The Internet ≠ the Network

Douglas Rushkoff just posted a piece with which I largely agree, but which indulges in some remarkably lazy language in the process:

“Some of us might like to believe that the genie is out of the bottle and that we all have access to an unstoppable decentralized network. In reality, the internet is entirely controlled by central authorities.”

Arrgh! This kind of thing drives me crazy. If we could stop conflating the Internet (which is a combination of networking protocols) and the physical network (which is a bunch of cables and antennas and switches), we might be able to have a useful dialogue about how to reduce the Internet’s vulnerability to coercive measures by changing the shape of the network.

In the end, that’s what Rushkoff advocates; I just wish he wouldn’t muddy the water so.

Stay with me, kids; I’m going to say this again slowly: The network is the wires and antennas and stuff. The Internet is the way information is organised to travel across it.

More to the point, the Internet is a very specific way for data to travel across it:

  • It doesn’t rely on a middle-man. I might choose to use Facebook for chat, but I don’t have to. I could connect straight to your computer or phone and chat away.
  • It doesn’t need a road map. In effect, the data packets just go hitch-hiking across the network with a sign saying ‘San José’ – or whatever.
  • It doesn’t see borders the same way some other network protocols do. In fact, that’s why it’s an Inter net: Because it routes traffic between different networks.

Once more:

  • Internet = you & me talking.
  • Network = the road system that allows you and me to get together to talk.

There. That wasn’t so hard, was it?

Oh, as long as I’m being pedantic: It’s Internet-with-a-capital-I. It’s a proper noun referring to a very specific thing. It’s like a country with all the geography taken out. It still has to have a capital.

Infowar – A Case Study

[This weekend’s Opinion column in the Daily Post]

The recent decision by the Mubarak regime in Egypt to cut off all Internet access for its citizens is a textbook example of using a silver bullet to shoot oneself in the foot.

The whys and wherefores of how they’ve gone about doing so provide a useful opportunity to understand the paradox of control over the Internet and the costs involved when governments and other actors indulge their desire to dam the torrent of information that flows across their networks.

In order to do that, we need to dispel a rather pesky myth.

Perhaps the most dangerous misconception of the Internet is its survivability. It’s true that, as one information activist put it, the Internet treats censorship as damage and routes around it. But that statement is predicated on the actual presence of an Internet in the first place.

That may sound like a silly statement, but the Internet might not be as enduring as many assume it to be.

While many of the software and communications protocols that define the Internet are, by design, remarkably resistant to outside control, the physical networks through which our data passes are not nearly so robust.

James Cowie, a network analyst from Renesys Corporation, has written excellent analyses of state intervention in national communications both during the post-election strife in Iran and more recently in Egypt. Using forensic evidence gathered in real time, he constructs a vivid scenario: In contrast to Iranian authorities, who elected to use physical choke-points in the communications infrastructure to reduce the flow of information to a trickle, Egyptian authorities appear to have instructed all national Internet Service Providers simply to cut all communications with the outside world.

Starting at midnight (Egyptian time) on the 27th of January 2011, Egypt’s largest ISPs began disappearing from the Internet. Within a period of about 13 minutes, they simply stopped delivering data to and from their customers.

Cowie writes:

“[T]his sequencing looks like people getting phone calls, one at a time, telling them to take themselves off the air. Not an automated system that takes all providers down at once; instead, the incumbent leads and other providers follow meekly one by one until Egypt is silenced.”

How did this happen? Every large ISP participates in a cooperative system called the Border Gateway Protocol, or BGP. BGP allows them to discover how traffic destined to a remote network should be directed. Simply put, each ISP announces which address blocks it supports. These blocks can represent tens or even hundreds of thousands of individual machine addresses.

Designed for simpler times, BGP is a trust-based protocol. It relies implicitly of the good faith of all participants to continue working. This makes it remarkably vulnerable to the machinations of states or organisations whose interests don’t align with others’. Back in 2008, Pakistan Telecom caused a furore when, for a little over 2 hours, their bungled attempt to use BGP to block YouTube domestically resulted in the site disappearing from much of the Internet.

Just last year, a change to BGP traffic announcements resulted in about 15% of all Internet traffic being routed through networks in China for a brief period. This resulted in breathless speculation that the disruption was not accidental. Some claimed that it amounted to a reconnaissance in force, as it were, a probing of the global Internet to determine its resilience in the face of attack.

Intentional or not, these disruptions to the BGP apparatus make it abundantly clear that choke points exist on the Internet and that they are remarkably easy to subvert.

Debate continues to rage in technical circles about what can be done to mitigate BGP’s innate deficiencies. Changes will doubtless be necessary. But the liability wouldn’t be so grave if our physical communications networks weren’t so hopelessly centralised.

Egypt offers us a particularly vivid example of this. A country of over 80 million people, it has only a half a dozen or so large Internet providers. Only one of them, the Noor Group, initially resisted the demand to drop services. Some have speculated that its continued online presence was due to its extensive list of blue chip clients, including many banks and the Egyptian Stock Exchange.

Ultimately, though, it was a limited victory. Noor advertised only 83 of the roughly 3500 data routes in and out of Egypt. They were eventually forced off the air a week after their IT confrères.

In Iran, population 72 million, there are only 5 significant international links, all of which flow through a single Government-run office. Such centralisation makes it easy for the state to exert its influence.

(One European-owned company, Vodaphone, washed its hands of the decision to cut service to its Egyptian customers, claiming that the Mubarak regime had the legal right to issue the order. This rhetorical line apes the rationale provided by Nokia-Siemens when it was discovered that their equipment enabled Iranian authorities to block most traffic and eavesdrop on the rest.)

The Internet as a principle –that is, the idea of an open network allowing free communication regardless of source or sender– is not as popular as some might believe. It made its way into the commercial world more by stealth than by deliberation. Telcos didn’t really understand the Internet as a service; they just knew they had to offer it in order to compete.

One thing was clear to them: The sum of all services across a global network was clearly more valuable than those offered by a single provider. Equally attractive was the perception that these services came more or less for free with the connection.

But the seductive power of the Net hasn’t changed attitudes entirely.

Telecommunications companies, with a long legacy of market-controlling behaviour, still build and deploy their infrastructure using centralised models. Recently, some of them have begun lobbying for the right to exert control over the data that passes over their networks, potentially penalising services that compete with their own. Comcast, one of the largest ISPs in the US, recently got approval to acquire NBC Universal and its content-creation ecosystem, giving rise to fears that they might leverage their control over the information pipeline to dictate what passes through it.

Put simply, carriers would love nothing better than to go back to the telephone service model, where fees are based on where you are and who you talk to, with no conversation possible unless you’ve paid your toll.

The principle of an end-to-end network –that is, one that allows direct, unmediated connections between two parties– militates strongly in the opposite direction. Its appeal is remarkably seductive, leading most Internet users to view with displeasure the telcos’ (or governments’) desire to mediate communications.

Renesys quite rightly remarks that if cuts to Egypt’s Internet had lasted much longer, the reduction in commercial activity could have been catastrophic for the nation.

Furthermore, Cowie remarks, it wasn’t only Egypt’s pipelines that were at risk:

“[T]he majority of Internet connectivity between Europe and Asia actually passes through Egypt. The Gulf States, in particular, depend critically on the Egyptian fiber-optic corridor for their connectivity to world markets.

“Are the folks at Davos thinking about this? They should be.”

In a perfect world, consumer choice and basic business commonsense would always win. But the problem is that centralised networks not only cost a lot of money (placing their design and construction into the hands of the most powerful), they make a lot of money, too.

In monetary and political terms, the wealth of the network itself tends to pool rather than to flow.

A fundamental change has already overtaken the public’s perception about the value and nature of digital communications. Passive consumption of news through the television is considered passé, or at least diminished in relation to the sharing of photos, videos and words across the Internet.

As individual control over the flow of information rises, central control wanes. And this, obviously, is the crux of the dilemma facing businesses and governments across North Africa and throughout the world. They are belatedly coming to realise that they are fighting a many-headed hydra. As they cut off one avenue of communication, another rears its head.

But that hydra has a body, and the body is the network itself.

As this column goes to press, it appears that Egypt’s decision to cut off the Internet failed in every important regard. One protester is reported to have said, “F*** the internet! I have not seen it since Thursday and I am not missing it.… Go tell Mubarak that the people’s revolution does not need his damn internet!

I would be amazed, however, if this fact led other governments to act differently, should they find themselves in a similar situation. Indeed, the US Congress is currently considering legislation that would provide the President with an ‘Internet Kill Switch’ for use in case of emergency.

Likewise, I see no evidence that the ultimate futility of attempting to control the flow of information will change attitudes in the board rooms and offices where our increasingly centralised networks are planned. For telcos, the challenge is merely technical.

For the Internet –as it was originally intended– to become fully realised and fully resistant to coercion, the devices and infrastructure through which our data travels will need to reflect the same principle of decentralisation as the software and protocols we use today. That implies the construction of communications devices that are very different from the locked-in, network-centric phones, tablets and computers we’re familiar with. I can think of no short-term scenario in which the development of such products will take place in any significant way.

For some time to come, we will continue to live in a world in which the powerful continue to load silver bullets and take aim squarely at their own feet.

Open Source Diplomacy

The commoditisation of information proceeds apace, and although the stakes are perceived to be higher in this case, the effects will probably be similar in nature. A fractious dialectic is already emerging between those who truly believe in the benefits of information resources like those circulated to millions of US military and government staffers on SIPRNET, and those who seek to leverage proprietary knowledge for their country’s -and sometimes their own- gain.

All secrets are like kindling. Used at the right time, gossip can provide warmth, build allegiance and influence. Used rashly, well… you know where this is heading. In that sense, wikileaks may seem like a 10 year old boy with a stolen box of matches. But applied judiciously and with a sober sense of timing, the same principles of near-complete openness and sharing that are at the heart of free software development (and the Internet itself) could usefully animate international diplomacy.

[This column appeared in the Vanuatu Daily Post.]

Say what you like about wikileaks and their recent dump of over 250,000 US diplomatic cables, but there is probably not a single researcher in International Relations, History or Political Science without a tingle in their pants today. Never in modern history has so much information been made available in such a readily accessible format. This is, for researchers, a gift that will keep on giving for decades to come.

The thing that impressed me most from my brief perusal of the 200-odd documents released on the first day was not so much the content as the quality of the analysis. The cables were well-written and obviously well-researched. I suspect that there’s more than one junior foreign officer out there with a quiet smile on their face today, because finally the world will see just how good they are.

Yes, I’m ignoring completely the ethics and morality of the situation. That horse is out of the barn, and incidentally, what a barn it is….

These cables will provide more insight and understanding into American diplomacy than anything else ever has. Just as access to hitherto proprietary source code sometimes unearths dirty secrets of which even its author is ashamed, there is likely to be a lot of unpleasantness to be found in the cables.

I think the longer term result, however, will be that much of what’s good about the US diplomatic corps (and there’s a lot of that) will assist countless others to improve their own work. In fact I think it’s likely there might be more than one diplomat that might actually be relieved to see the unspeakable spoken aloud. This torrent of data just might break more logjams than it creates.

The rise of the Free Software movement in the 1990s increased access to the source code that runs our computers and caused fundamental changes in software development. Their echoes are still quite strong today. Code that was once hidden behind thick corporate walls was now being handed about in a vast open source bazaar. This discomfited many vendors who were dismayed to discover that their crown jewels could become valueless overnight as software became commoditised.

A lot of dirty laundry got aired in the process. Bug-reports, software update schedules, coding practices all became subjects of open discussion and, yes, dispute. Tolerance for second-rate code dwindled significantly. Emphasis began to fall more and more on results. As one acerbic commenter wrote: “A single line of running code trumps a thousand lines of argument.”

Companies who attempted to retain their secretive ways were simply bypassed and their flaws exposed for all to see. Sound familiar?

In the late 1990s, Microsoft identified Linux specifically and Free Software generally as the greatest strategic threat to their organisation. They were right. Microsoft’s stagnation is partly attributable to the advantage that FOSS has given several of its competitors. IBM, Apple and Google have all leveraged open source software to jump-start various endeavours that compete directly with Microsoft. Likewise, Microsoft’s need to increase the pace of development resulted directly in their death-march to Windows Vista.

Just as Microsoft was able to drive Netscape Communications out of the market by commoditising the web browser, others are commoditising vast swathes of the computing industry by leveraging FOSS.

The commoditisation of information proceeds apace, and although the stakes are perceived to be higher in this case, the effects will probably be similar in nature. A fractious dialectic is already emerging between those who truly believe in the benefits of information resources like those circulated to millions of US military and government staffers on SIPRNET, and those who seek to leverage proprietary knowledge for their country’s -and sometimes their own- gain.

All secrets are like kindling. Used at the right time, gossip can provide warmth, build allegiance and influence. Used rashly, well… you know where this is heading. In that sense, wikileaks may seem like a 10 year old boy with a stolen box of matches. But applied judiciously and with a sober sense of timing, the same principles of openness as a default stance and and a predilection toward sharing that are at the heart of free software development (and the Internet itself) could usefully animate international diplomacy.

To be perfectly clear: I’m not suggesting that there is no need for secrecy whatsoever in diplomacy. I’m suggest that, as we’ve discovered with programming processes, secrecy might prove to be less necessary -and effective- to security than it appears to be.

Disaster? What Disaster?

I’m afraid that Data Disasters don’t exist, because we don’t want to believe they exist. It seems that in the esoteric world of noughts and ones, belief matters far more than empirical truth, making a true Data Disaster literally inconceivable.

Neil McAllister seems to think we’re on the brink of an abyss. Digital Armageddon is just around the corner, because business’ increasing reliance on pure information makes them liable to meltdown should they sufficiently mismanage it.

But what I’d like to know -and what McAllister conveniently forgets to mention- is: What, exactly, constitutes a ‘True Data Disaster?’

Are we talking about a leak that effectively kills a company’s credibility dead? I don’t think so, because if incompetence or data mismanagement had any kind of real-world relationship with a company’s success, Yahoo!, Amazon, TJX and Heartland Payment Systems and dozens of others would at very least have suffered losses in stock value following their colossally poor management practices.

Are we talking criminal abuse of private information? If that were the case, then Microsoft, Yahoo! and all the nation’s telcos (save Qwest) should be facing imminent demise because of their complicity in the unconstitutional breach of their customers’ privacy in the US Government’s domestic spying programme.

Are we talking straight-up data loss? If so, then Microsoft (hmm, that name keeps coming up) should have taken a dive when they managed quite literally to lose all of Danger Networks’ data.

Or are we talking non-performance and generalised uselessness on a scale that beggars comprehension? If that were the case, then why do large consultancies still manage to win multi-million dollar contracts that suck up centuries of developer time and never actually deliver a thing? Think of the FBI’s famous foray into modernisation, the now-legendary death of the UK’s online medical database and any of a hundred other projects that ended up entirely written off (to the tune of 100s of millions each) without so much as a downward tick in the value of the contracting companies involved.

It seems that in the esoteric world of noughts and ones, belief matters far more than empirical truth, making a true Data Disaster literally inconceivable.

There can’t be a Data Disaster today, because we can’t imagine what one would look like. Likewise, there won’t be a Data Disaster until we become capable of realising that they’re all around us, happening every day.

Plus ca change…

There are people in Seoul – and countless other places in the world – who have more bandwidth at their personal disposal than a quarter of a million people here in the Pacific.

When I arrived in Vanuatu about 7 years ago, uptake on Internet was limited to a small minority. Prices were about 10 times what I’d been paying at home, and the total amount of available bandwidth nationally was only slightly more than I’d had on my own personal DSL line.

Now, in 2010, we’ve spent the better part of a decade helping people get online, getting people in front of computers and teaching them to make the most of the learning and social opportunities that the Internet provides.

The recent release of Ookla’s Household Download Index allows us to measure how far we, as a nation, have come.

Uptake on Internet is still limited to a tiny minority. The pool of Internet users has risen substantially in real numbers, but as a percentage of population, the numbers are still so small that, in a recent national telecoms survey, the researchers declined even to ask about Internet. The data set was too small to be relevant.

Prices today have effectively risen, megabit for megabit, relative to developed markets. Oh, they’ve dropped from the stratospheric levels they used to inhabit (US $1000/month for 128 Kbps and a 100 MB download limit). But you still pay over US $500/month for a single megabit which, occasionally, actually delivers a megabit of bandwidth. When it works.

Most depressing of all, the total amount of bandwidth available for the entire country is only slightly more than the average bandwidth capacity of a single household in Seoul, Korea.

Let me say that again: There are people in Seoul – and countless other cities in the world – who have more bandwidth at their personal disposal than a quarter of a million people here in the Pacific.

Pent-up demand for Internet is easily on the same scale as we’ve witnessed for mobile telephony services these last two years. Informal markers (like the average number of facebook friends among ni-Vanuatu Internet users) show that people love the potential of the Internet and will go to lengths to access it.

But nobody is willing to actually invest in it.

Even Digicel Vanuatu, who over a year ago imported a new CTO with extensive wireless Internet experience, have yet to provide an offering viable for day-to-day use even for the average expat customer.

Frankly, I find it depressing that, in spite of years of advocacy, lobbying and awareness-raising, the movers and shakers here in Vanuatu don’t appear to have learned a thing about the importance of either communications or technology.

Google, China and Anti-Features

Yet again, people are seeking technological solutions to problems that are social in nature.
So far, Internet activist Perry Barlow’s affirmation that ‘the Internet treats censorship as damage and routes around it’ remains true. But with the increasingly evident willingness of corporate and government agents to create and use what MIT researcher Benjamin Hill terms ‘anti-features’, we may soon find that there’s nowhere else to route to.

[Originally published in the Vanuatu Daily Post.]

On the 12th of January, David Drummond, Google’s Chief Legal Officer, made a startling announcement: Google – and dozens of other companies operating in China – had been the target of concerted online attacks originating from China. Google also claimed that the attackers, targeting human rights activists inside China and around the world, used the activists’ own PCs to take over numerous GMail accounts.

These attacks used ‘0-day’ exploits, hitherto-unknown vulnerabilities in common software applications. In a Wired Magazine interview, security analyst Ryan Olson stated that the code itself was unremarkable, but that ‘the sophistication here is all about the fact they were able to target the right people using a previously unknown vulnerability.

Businesses and governments face online acts of vandalism and attempts at corporate espionage all the time. Even this attack, which exploited flaws in Microsoft’s Internet Explorer and Adobe’s Acrobat reader software, was ‘not ground-breaking’, according to security expert Mikko Hypponen.

We see this fairly regularly,’ he told the BBC, but ‘most companies just never go public.

Running against tide of companies flooding into China, Google has retaliated against these intrusions by stating that they will no longer censor google.cn, their Chinese search site. If that can’t be done within Chinese law, wrote Drummond, it ‘may well mean having to shut down google.cn, and potentially our offices in China.

Read more “Google, China and Anti-Features”

Good Neighbours

As Internet services become more common in Vanuatu, local businesses have been using it to supplement their normal advertising and communications channels. In their enthusiasm – and, it must be said, naivete – they’ve overlooked a few fundamental rules of good online behaviour.

Businesses and individuals (there’s no need to name and shame; they know who they are and, if you have an email account, so do you) have more and more often taken to sending unsolicited promotional and editorial emails to hundreds of Vanuatu addresses.

Regardless of their good intentions, these companies and individuals are spamming. In other countries, it would be illegal. Here, it’s a nuisance for virtually all involved.

[Originally published in the Vanuatu Independent newspaper.]

As Internet services become more common in Vanuatu, local businesses have been using it to supplement their normal advertising and communications channels. In their enthusiasm – and, it must be said, naivete – they’ve overlooked a few fundamental rules of good online behaviour.

Businesses and individuals (there’s no need to name and shame; they know who they are and, if you have an email account, so do you) have more and more often taken to sending unsolicited promotional and editorial emails to hundreds of Vanuatu addresses.

Regardless of their good intentions, these companies and individuals are spamming. In other countries, it would be illegal. Here, it’s a nuisance for virtually all involved.

Read more “Good Neighbours”

ACTA Without an Audience

News has leaked out in dribs and drabs over the last several months about a US-led drive to negotiate an international treaty called the Anti-Counterfeiting Trade Agreement, or ACTA. Conducted under a veil of secrecy, these negotiations have been the source of considerable speculation and not a little alarm among advocates of online freedom.

Part of the reason for the alarm is the utter lack of publicly verifiable information concerning the content of the treaty. When US organisations attempted to gain access to a copy of the draft, their government withheld them, citing national security, of all things.

Intellectual Property expert professor Michael Geist writes, “The United States has drafted the chapter under enormous secrecy, with selected groups granted access under strict non-disclosure agreements and other countries (including Canada) given physical, watermarked copies designed to guard against leaks.”

In spite of their best efforts, however, details of the online enforcement aspects of the treaty leaked out last week, following a negotiating round in Seoul, South Korea.

The details don’t look good.

[Originally published in the Vanuatu Daily Post’s Weekender Edition.]

News has leaked out in dribs and drabs over the last several months about a US-led drive to negotiate an international treaty called the Anti-Counterfeiting Trade Agreement, or ACTA. Conducted under a veil of secrecy, these negotiations have been the source of considerable speculation and not a little alarm among advocates of online freedom.

Part of the reason for the alarm is the utter lack of publicly verifiable information concerning the content of the treaty. When US organisations attempted to gain access to a copy of the draft, their government withheld them, citing national security, of all things.

Intellectual Property expert professor Michael Geist writes, “The United States has drafted the chapter under enormous secrecy, with selected groups granted access under strict non-disclosure agreements and other countries (including Canada) given physical, watermarked copies designed to guard against leaks.”

In spite of their best efforts, however, details of the online enforcement aspects of the treaty leaked out last week, following a negotiating round in Seoul, South Korea.

The details don’t look good.

Read more “ACTA Without an Audience”

From Small Things…

George Tasso and his colleagues are now actively supporting IT volunteers at four Port Vila schools, with another in the works. While there are no lack of young volunteers ready to assist the schools – one colleague has organised no less than twenty of them in the Freswota neighbourhood alone – Tasso is beginning to worry that he might be reaching the limit of his own ability to provide a supportive mentoring role to them all.

The question now is how to continue. What has to date been an entirely organic venture, expanding and changing to fit the needs of individual schools and their staff, is soon going to have to transform itself into something more organised.

[Originally published in the Vanuatu Independent newspaper.]

A number of Port Vila schools have recently begun to take the Internet seriously. Assisted by veteran and novice IT volunteers, they’ve invested their meagre computing resources in an undertaking designed to help teachers create a richer and more open learning environment.

As with all things, it started small. Circumstance threw a few IT professionals together and led them to collaborate to improve their own children’s education. One thing led to another, and now we’re beginning to see the first fruits of integration of technology with teaching in Vanuatu.

The story begins five months ago when four parents, all of them seasoned IT professionals, began to chat about how to improve conditions at Central School, where their children were enrolled. Before very long they were at the core of a group of over 30 parents and teachers, all devoted to taking advantage of computers and the Internet in order to improve the quality of education.

This may sound familiar. It’s not the first time in Vanuatu that parents have moved mountains one pebble at a time to supplement their school’s limited resources. Nor is it the first time that teachers have been able to indulge their personal and professional enthusiasm for their vocation by working with the community at large.

But there are a few unique aspects to this story.

Read more “From Small Things…”