Blown To Bits

Archive for November, 2008

Microsoft’s Windows 7 Will Make Location Tracking Easy

Monday, November 10th, 2008 by Harry Lewis
People generic remeron with extreme reactions to light should adopt strategies to reduce flovent no prescription sudden exposure to bright light. A person with higher levels allopurinol overnight shipping of EI may be better at interacting appropriately with others buy cheap erythromycin online than a person with low levels of EI. Morning akinesia buy cheap quinine online occurs first thing in the morning when a person has cheapest glyburide had a treatment-free night and levels of dopamine have become low price betnovate low. Pain that occurs due to a nerve injury may buy cialis internet have a different intensity or pattern than what a person get cheap viagra online effects experienced before the procedure. This can make it possible for discount nasonex them to accomplish more and decrease the impact of the buy griseofulvin in canada condition on daily life. The authors urge early intervention to cheap 60 from usa enhance treatment outcomes, along with educating people in ways to canada cream minimize the development of associated physical conditions. For more severe prednisolone prescription cases, doctors may prescribe steroids such as prednisone that can find viagra without prescription target the swelling behind the eyes. On the day of the.

In a blog post entitled “Windows 7 knows where you are,” Ina Fried goes through the location-tracking capabilities of Microsoft’s next-generation operating system. It will have API’s — hooks for application programmers to grab onto — that will return device’s spatial location, whether revealed through a GPS, triangulation of cell phone towers, or other technologies. That will make it easy to write location-sensitive search engines, for example — so that if you search for “pizza,” you get links, sponsored or not, to pizza parlors near where you actually are, rather than to the world’s most popular pizza chain.

Of course, there are huge privacy issues here — might Microsoft, or the search engine, keep tab on your movements, for analysis or marketing purposes having nothing to do with your searches? Microsoft acknowledges the problem, and has built in some switches the user can turn off. But it sounds to me like the convenience of good searches and the entertainment value of letting your friends know when you are near them will lead most young people, at a minimum, to leave all the switches on all the time. And the controls that are supplied aren’t exactly what you’d probably want — you might like to leave the location-tracking on for an app that gives driving directions, but off for a social networking app. Can’t be done — it’s all or nothing — due to intrinsic limitations of Windows.

Microsoft does give a range of control options, such as turning off location services by default, as well as the ability to limit such services only to specific users or only to applications, as opposed to services that run in the background. However, the operating system doesn’t allow users the option of letting only certain applications access your location. So, for example, if you turn it on for a mapping program, any other Windows application running could also access that information.

The reason, Microsoft officials say, is that Windows doesn’t have a reliable means of determining that an application is what it says it is, so any attempt to limit the location to a specific application would be easily spoofable ‚Ķ.

As we’ve written before (here and here), geolocation is the new cultural frontier.

Obama’s Technology Plan

Thursday, November 6th, 2008 by Harry Lewis

The change.gov site lays out the science and technology agenda of the new administration. Sounds good for the most part, but let me parse it.

  1. Barack Obama strongly supports the principle of network neutrality. Excellent, especially as the very first bullet.
  2. Obama will encourage diversity in the ownership of broadcast media. Ugh. The right way to do this is to re-engineer spectrum use so the value of a broadcast station declines precipitously, and no one gets excluded. Somehow I’ll bet that isn’t what he has in mind, and we will have some kind of set-aside or affirmative action for minority ownership.
  3. Protect Our Children While Preserving the First Amendment. Fine to say, but there is a certain point beyond which these really are inconsistent objectives. There is too much lip service paid to the dangers to children here; there isn’t really any evidence that children are any more endangered in the Internet era than they ever were. So this bullet is favoring motherhood; no one could be opposed to either. The devil will be in the details.
  4. Barack Obama will strengthen privacy protections for the digital age. Again, a fine idea, but what does it mean? Will the feds still be able to seize and hold my laptop at the border without any suspicion that I’ve done anything wrong?
  5. Open Up Government to its Citizens. This bullet really goes right at Bush’s obfuscations. The promise of transparency is very welcome. It will require a major cultural change in the executive branch, but change is what we were promised!
  6. Obama will appoint the nation’s first Chief Technology Officer (CTO). Though I worry about symbolic gestures, on balance, I think this is a good idea — depending on who it is. (I hereby declare my availability.)
  7. Obama and Biden believe we can get true broadband to every community in America through a combination of reform of the Universal Service Fund, better use of the nation’s wireless spectrum, promotion of next-generation facilities, technologies and applications, and new tax and loan incentives. Exactly right.
  8. Barack Obama and Joe Biden support a trade policy that ensures our goods and services are treated fairly in foreign markets. Again, a bit of motherhood here, but that sounds protectionist to me, and anti-free-trade. But we shall see.
  9. Invest in the Sciences. Thank goodness. If there is one thing I hope for from Obama, it is a return of rational judgment after too many years of politically motivated decisions.
  10. Invest in University-Based Research. How could I be against that? But seriously, I hope for the sort of enlightened investments in fundamental research that gave us the Internet.
  11. Protect American Intellectual Property Abroad: The Motion Picture Association of America estimates that in 2005, more than nine of every 10 DVDs sold in China were illegal copies. The U.S. Trade Representative said 80 percent of all counterfeit products seized at U.S. borders still come from China. Barack Obama and Joe Biden will work to ensure intellectual property is protected in foreign markets, and promote greater cooperation on international standards that allow our technologies to compete everywhere. Any bullet that starts by quoting the MPAA is bad news. This is the same group that persuaded Congress that if the copyright on Mickey Mouse were not extended from 70 to 90 years, Disney would just fold up its tents and not make any more movies, because it couldn’t see the point if people would start making a profit on their creativity 71 years from now. Knowing that Biden has a bad history with technology regulation, I fear that “international standards” will be crippling hardware fixes, broadcast flags, etc., that will make digital devices less generative. Here is one where the explicit mention of Biden’s name makes me worry that Obama has been hanging around with the wrong people.
  12. Protect American Intellectual Property at Home: Intellectual property is to the digital age what physical goods were to the industrial age. Barack Obama believes we need to update and reform our copyright and patent systems to promote civic discourse, innovation and investment while ensuring that intellectual property owners are fairly treated. Actually, “fairness” is not the point. “Intellectual property” has many properties that make the metaphorical comparison with physical property very imperfect. The limited monopoly is not meant to be “fair” to creators, just to give them an economic incentive to create. “To promote the progress of science and the useful arts,” as the Constitution says, not “to be fair to inventors and artists.” I see this as another special-pleading by the entertainment industries.
  13. Restore Scientific Integrity to the White House. Amen, and good for them for coming right out and saying that they don’t plan to consult with church leaders on every scientific question.

The rest looks fine too. I am very hopeful.

“Long Distance” is Meaningless

Wednesday, November 5th, 2008 by Harry Lewis

In the same FCC meeting yesterday in which opening the “white spaces” was approved, there was supposed to be a discussion of changing the rate structure that the telephone companies use for passing calls to each other. This is an amazingly complex and highly regulated business, and what makes it even more complicated is the fact that some of the terminology on which the regulatory structure rests is meaningless in the context of new technology. In the end the FCC just decided to do nothing for the time being.

Saul Hansell of the New York Times does as good a job explaining some of the issues as is humanly possible, I think.

Internet Censorship

Wednesday, November 5th, 2008 by Harry Lewis

I have an op-ed in the Boston Globe today about Internet Censorship. The FCC proceeding to which the piece refers is Proceeding 07-195 (pdf). Here’s the beginning of the Globe piece:

SUPPOSE that government regulators proposed to read all postal mail in order to protect families from things they should not see. Anything not legally prohibited would be delivered. Any unlawful words, pictures, or videos would be thrown away.

White Spaces

Tuesday, November 4th, 2008 by Harry Lewis

Today is supposed to be the day for an FCC decision on allowing unlicensed use of the “white spaces” between television broadcast channels. The television industry and Broadway have lined up against it — television with predictions of screens going dark all across America because of interference, and Broadway (aligned, improbably, with churches) predicting that their wireless microphones won’t work any more. The FCC engineers have been studying this for six years and have concluded that these fears are exaggerated (cf. Chapter 8 of Blown to Bits). But the entertainment industries are powerful, and so are churches.

A good story in the New York Times on this today, and a good post last week by Susan Crawford. The Times has a good quote from the FCC chairman on this.

“We’re being very cautious about protecting the broadcasters, but at the same time making sure the technology allows us to make greater use of this invaluable resource,” Mr. Martin said.

He added that he thought some opponents, like the broadcasters, were fighting the proposal because they were unnerved by the rise of interactive tools that offered a less passive media experience. “The empowerment of consumers is threatening,” he said.

And it turns out that most of those wireless microphones that churches and Broadway are so concerned about being functional in the future were never operating within FCC regulations anyway. They are essentially arguing that their illegal use of the spectrum should be grandfathered.

“Mistakes Happen”

Monday, November 3rd, 2008 by Harry Lewis

So reassures the mother of Daniel Harrington, who apparently lost a memory stick in the parking lot of a pub in England. Harrington works for an IT firm that supplies services to the British government. The flash drive evidently contained not personal records, but source code and passwords that might enable someone to access those personal records. As a result, the “Government Gateway” system has been shut down.

The device was found a couple of weeks ago, and yesterday was turned over to the Daily Mail, which is having a lot of fun with the story. A sample of the reactions:

Shami Chakrabarti, director of Liberty, said the civil rights group had conducted an audit which showed that the Government had lost 30million pieces of data in the past year.

‘That’s one data bungle for every two people in the country,’ she said. ‘Still they plough on with their Big Brother ambitions; ID cards and the scary central communications database: disasters waiting to happen at our expense.’

Lib Dem MP Norman Baker said the Government were asking for data from taxpayers that they could not protect.

‘The Government cannot be trusted with all this information but they collect more and more,’ he said.

I’ll bet these data breaches are no more common in the UK than in the US, but they certainly have had a bad run of them lately, and you can see why the MP is worried about the government’s plans.

Viacom and Myspace Cut a Deal

Monday, November 3rd, 2008 by Harry Lewis

In a development that bears a family resemblance to the deal Google cut with the book publishing industry, Myspace has reached an agreement with one big part of the entertainment industry. Its users will be allowed to continue posting video clips from the Colbert Report and other TV shows without anyone getting hassled with DMCA takedown demands.

When the user posts a video, third-party software will identify it automatically, and place a visual tag on the clip, at the bottom of the screen. Advertising will be posted and the viewer will be given the opportunity to buy the whole episode. The revenue from the advertising and episode purchases will be split up among Viacom, Myspace, and the company that makes the software that identifies the videos. Everybody makes a little money (except, of course, the people who are doing the posting and the people who are doing the viewing!).

This deal is narrow — it affects only MySpace and Viacom. Google’s deal is broader — it is a deal with the group that represents publishers and authors — but the court hasn’t approved it yet. And of course, it covers only Google, not anyone else who might like to create a book search service. Do these deals show the outline of a more encompassing, public solution to the problems with DMCA and the Internet?

Is Computing a Hash a Search Under the Constitution?

Sunday, November 2nd, 2008 by Harry Lewis

Talk about cases the Founding Fathers could not have anticipated. A federal court has ruled that computing the hash of a data file (a picture, for example) is a search, and is therefore subject to Fourth Amendment restrictions (that is, the police are supposed to get a search warrant before doing it).

What’s a hash? Hashing is a way of squeezing a lot of data down into a few bits. The same input will always give you the same output (which is called the hash, or the hash value). But because some information is inevitably thrown away in the squeezing process, it’s possible (in general) for two different inputs to give you the same output. The trick in the design of hashing algorithms is to make that unlikely.

Let’s take an example. Suppose we want to check to see if the photograph we have is one of a list of bad photographs (known child pornography, for example). Just storing all the photos on the bad list would take a huge amount of space. But we could hash each of them and just store the hash values. Then we could check our suspect photo against the list of bad photos by computing its hash and seeing if that value was in the list of hash values of bad photos. That check would be quick. Of course, if we got a match, before we arrested anyone, we’d want to compare the photos themselves just to make sure we hadn’t gotten an accidental “collision” where two photos happened to have the same hash.

A simple example of a hashing algorithm would be to treat the image as a sequence of 24-bit numbers and just add them all up, throwing away any numerical overflows. (Like doing arithmetic and just hanging onto the rightmost digits.)

Here’s how Arstechnica reports the relation of all this to the situation of one Robert Crist.

Crist had fallen behind on his rent, and his landlord hired a father-and-son pair to move the delinquent tenant’s belongings out to the curb, where a friend of one of the movers, Seth Hipple, picked up Crist’s computer. When Crist returned home, he began freaking out over his vanished machine‚Äîwhile Hipple was freaking out over what he’d found in a folder on the hard drive: Videos appearing to depict underage sex, which he promptly deleted.

Hipple called the East Pennsboro Township Police Department, and though the computer had been reported stolen, it soon found its way to the Pennsylvania Attorney General’s Office, where special agent David Buckwash made an image of the hard drive and began sifting through its contents using a specialized forensics program called¬†EnCase. Rather than directly examining the contents of the hard drive, Buckwash initially ran the imaged files through an MD5 hash algorithm, producing a unique (for practical purposes) digital fingerprint, or hash value, for each one. He then compared these smaller hash values with a database of the hash values of known and suspected child porn, maintained by the¬†National Center for Missing and Exploited Children. He came up with five definite hits and 171 videos containing “suspected” child porn. He then moved to gallery view, inspecting all the photos on the drive, and ultimately finding nearly 1,600 images that appeared to be child pornography.

No warrant had been sought to do any of this, however, and the judge threw out the evidence gathered from Crist’s computer as a result.

The government is likely to appeal, and a lot rides on the case. If, for example, the ruling is overturned and hashing isn’t a search, then the government would not need a warrant to go to your service provider’s central servers and hash every file, looking for illegal materials.