business

From P2P to social sharing

From Clay Shirky’s “File-sharing Goes Social“:

The RIAA has taken us on a tour of networking strategies in the last few years, by constantly changing the environment file-sharing systems operate in. In hostile environments, organisms often adapt to become less energetic but harder to kill, and so it is now. With the RIAA’s waves of legal attacks driving experimentation with decentralized file-sharing tools, file-sharing networks have progressively traded efficiency for resistance to legal attack. …

There are several activities that are both illegal and popular, and these suffer from what economists call high transaction costs. Buying marijuana involves considerably more work than buying roses, in part because every transaction involves risk for both parties, and in part because neither party can rely on the courts for redress from unfair transactions. As a result, the market for marijuana today (or NYC tattoo artists in the 1980s, or gin in the 1920s, etc) involves trusted intermediaries who broker introductions.

These intermediaries act as a kind of social Visa system; in the same way a credit card issuer has a relationship with both buyer and seller, and an incentive to see that transactions go well, an introducer in an illegal transaction has an incentive to make sure that neither side defects from the transaction. And all parties, of course, have an incentive to avoid detection. …

There are many ways to move to such membrane-bounded systems, of course, including retrofitting existing networks to allow sub-groups with controlled membership (possibly using email white-list or IM buddy-list tools); adopting any of the current peer-to-peer tools designed for secure collaboration (e.g. Groove, Shinkuro, WASTE etc); or even going to physical distribution. As Andrew Odlyzko has pointed out, sending disks through the mail can move enough bits in a 24 hour period to qualify as broadband, and there are now file-sharing networks whose members simply snail mail one another mountable drives of music. …

The disadvantage of social sharing is simple — limited membership means fewer files. The advantage is equally simple — a socially bounded system is more effective than nothing, and safer than Kazaa. …

From P2P to social sharing Read More »

Good description of Fair Use & 1st Sale

From Scott Kleper’s “An Introduction to Copyfighting“:

I think a lot of people incorrectly assume that Copyfighters are people who believe that copyright should be abolished and that everything should be free. Copyfighters aren’t saying that all media should be freely distributed. We are saying that as consumers of media (film, television, software, literature, etc.) we have certain rights that we would like to protect. One of these rights is Fair Use. Fair Use means that you can reuse copyrighted work without permission as long as you are commenting on it, or copying/parodying the original. Fair Use is what allows you to quote song lyrics when writing a review of a new CD. Another right is First Sale. First Sale means that when you buy something, you own it and are thus entitled to sell it to someone else. First Sale is what allows you to buy a book, read it, then sell it on half.com for someone else to enjoy.

Most of all, we simply want the right to use the products we buy in the way that we see fit. We don’t want to be sued by a manufacturer for opening up a product to see how it works or sued by a media company for moving a file from one device to another. We believe that when we buy a CD, we should be able to convert it to another format to play on another device. We shouldn’t have to pay again to turn it into a ring tone. …

Songs bought on the Apple iTunes music store can be played only on a fixed number of devices that you have unlocked with your iTunes ID. Sounds reasonable, but after a few system reinstalls, maybe a replaced motherboard, a change of jobs, etc., all of a sudden, you no longer have access to any of your “authorized computers” and you have to get Apple to remove them all so you can start again. You can’t play iTunes purchased music on your non-Apple portable music player and you can’t play Windows DRM files on your iPod. Consumers are supposed to understand and care about this?

The worst part is that these schemes end up only hurting the people who are trying to be good. If you use a commercial downloading service, like iTunes Music Store, it means that you have rejected the dubious legality and poor user experience of the “illegal” services. You have paid your 99 cents and been handed something that is less valuable than what you could have gotten for free. You get a file with complex and arbitrary restrictions in a proprietary format. Meanwhile, the people who decided to keep on infringing aren’t suffering — they get unrestricted files.

Good description of Fair Use & 1st Sale Read More »

Copyright stupidity: arguments & numbers

From Financial Times” “James Boyle: Deconstructing stupidity“:

Thomas Macaulay told us copyright law is a tax on readers for the benefit of writers, a tax that shouldn’t last a day longer than necessary. …

Since only about 4 per cent of copyrighted works more than 20 years old are commercially available, this locks up 96 per cent of 20th century culture to benefit 4 per cent. The harm to the public is huge, the benefit to authors, tiny. …

We need to deconstruct the culture of IP stupidity, to understand it so we can change it. But this is a rich and complex stupidity, like a fine Margaux. I can only review a few flavours.

Maximalism: The first thing to realize is that many decisions are driven by honest delusion, not corporate corruption. The delusion is maximalism: the more intellectual property rights we create, the more innovation. This is clearly wrong; rights raise the cost of innovation inputs (lines of code, gene sequences, data.) Do their monopolistic and anti-competitive effects outweigh their incentive effects? That’s the central question, but many of our decision makers seem never to have thought of it.

The point was made by an exchange inside the Committee that shaped Europe’s ill-starred Database Directive. It was observed that the US, with no significant property rights over unoriginal compilations of data, had a much larger database industry than Europe which already had significant “sweat of the brow” protection in some countries. Europe has strong rights, the US weak. The US is winning.

Did this lead the committee to wonder for a moment whether Europe should weaken its rights? No. Their response was that this showed we had to make the European rights much stronger. …

Authorial Romance: Part of the delusion depends on the idea that inventors and artists create from nothing. Who needs a public domain of accessible material if one can create out of thin air? But in most cases this simply isn’t true; artists, scientists and technologists build on the past. …

An Industry Contract: Who are the subjects of IP? They used to be companies. You needed a printing press or a factory to trigger the landmines of IP. The law was set up as a contract between industry groups. This was a cosy arrangement, but it is no longer viable. The citizen-publishers of cyberspace, the makers of free software, the scientists of distributed data-analysis are all now implicated in the IP world. The decision-making structure has yet to adjust. …

Fundamentally, though, the views I have criticised here are not merely stupidity. They constitute an ideology, a worldview, like flat earth-ism. …

Copyright stupidity: arguments & numbers Read More »

The 1st software patent

From Robert X. Cringely’s “Patently Absurd: Why Simply Making Spam Illegal Won’t Work“:

Software patents have become inordinately important for something that 25 years ago we didn’t even believe could exist. After several software patent cases had gone unsuccessfully as far as the U.S. Supreme Court, the general thinking when I got in this business was that software could not be patented, only copyrighted. Like the words of a book, the individual characters of code could be protected by a copyright, and even the specific commands could be protected, but what couldn’t be protected by a copyright was the literal function performed by the program. There is no way that a copyright could protect the idea of a spreadsheet. Protecting the idea would have required a patent.

Then on May 26, 1981, after seven years of legal struggle, S. Pal Asija, a programmer and patent lawyer, received the first software patent for SwiftAnswer, a data retrieval program that was never heard from again and whose only historical function was to prove that all of the experts were wrong — software could be patented. Asija showed that when the Supreme Court had ruled against previous software patent efforts, it wasn’t saying that software was unpatentable, but that those particular programs weren’t patentable.

The 1st software patent Read More »

Subway’s frequent-eater program killed because of fraud

From Bruce Schneier’s “Forging Low-Value Paper Certificates“:

Both Subway and Cold Stone Creamery have discontinued their frequent-purchaser programs because the paper documentation is too easy to forge. (The article says that forged Subway stamps are for sale on eBay.)

… Subway is implementing a system based on magnetic stripe cards instead.

Subway’s frequent-eater program killed because of fraud Read More »

The difficulty of recovering from identity theft

From TechWeb News’s “One In Four Identity-Theft Victims Never Fully Recover“:

Making things right after a stolen identity can take months and cost thousands, a survey of identity theft victims released Tuesday said. Worse, in more than one in four cases, victims haven’t been able to completely restore their good name.

The survey, conducted by Nationwide Mutual Insurance Co., found that 28 percent of identity thieves’ marks aren’t able to reconstruct their identities even after more than a year of work. On average, victims spent 81 hours trying to resolve their case.

According to the poll, the average amount of total charges made using a victim’s identity was $3,968. Fortunately, most were not held responsible for the fraudulent charges; 16 percent, however, reported that they had to pay for some or all of the bogus purchases.

Other results posted by the survey were just as dispiriting. More than half of the victims discovered the theft on their own by noticing unusual charges on credit cards or depleted bank accounts, but that took time: on average, five and a half months passed between when the theft occurred and when it was spotted.

Only 17 percent were notified by a creditor or financial institution of suspicious activity, a figure that’s certain to fuel federal lawmakers pondering legislation that would require public disclosure of large data breaches.

The difficulty of recovering from identity theft Read More »

Bruce Schneier on phishing

From Bruce Schneier’s “Phishing“:

Phishing, for those of you who have been away from the Internet for the past few years, is when an attacker sends you an e-mail falsely claiming to be a legitimate business in order to trick you into giving away your account info — passwords, mostly. When this is done by hacking DNS, it’s called pharming. …

In general, two Internet trends affect all forms of identity theft. The widespread availability of personal information has made it easier for a thief to get his hands on it. At the same time, the rise of electronic authentication and online transactions — you don’t have to walk into a bank, or even use a bank card, in order to withdraw money now — has made that personal information much more valuable. …

The newest variant, called “spear phishing,” involves individually targeted and personalized e-mail messages that are even harder to detect. …

It’s not that financial institutions suffer no losses. Because of something called Regulation E, they already pay most of the direct costs of identity theft. But the costs in time, stress, and hassle are entirely borne by the victims. And in one in four cases, the victims have not been able to completely restore their good name.

In economics, this is known as an externality: It’s an effect of a business decision that is not borne by the person or organization making the decision. Financial institutions have no incentive to reduce those costs of identity theft because they don’t bear them. …

If there’s one general precept of security policy that is universally true, it is that security works best when the entity that is in the best position to mitigate the risk is responsible for that risk.

Bruce Schneier on phishing Read More »

The Creative Class & the health & growth of cities

From Richard Florida’s “The Rise of the Creative Class“:

[The key to economic growth lies not just in the ability to attract the creative class, but to translate that underlying advantage into creative economic outcomes in the form of new ideas, new high-tech businesses and regional growth. To better gauge these capabilities, I developed a new measure called the Creativity Index (column 1). The Creativity Index is a mix of four equally weighted factors: the creative class share of the workforce (column 2 shows the percentage; column 3 ranks cities accordingly); high-tech industry, using the Milken Institute’s widely accepted Tech Pole Index, which I refer to as the High-Tech Index (column 4); innovation, measured as patents per capita (column 5); and diversity, measured by the Gay Index, a reasonable proxy for an area’s openness to different kinds of people and ideas (column 6).]

This young man and his lifestyle proclivities represent a profound new force in the economy and life of America. He is a member of what I call the creative class: a fast-growing, highly educated, and well-paid segment of the workforce on whose efforts corporate profits and economic growth increasingly depend. Members of the creative class do a wide variety of work in a wide variety of industries—from technology to entertainment, journalism to finance, high-end manufacturing to the arts. They do not consciously think of themselves as a class. Yet they share a common ethos that values creativity, individuality, difference, and merit. …

Most civic leaders, however, have failed to understand that what is true for corporations is also true for cities and regions: Places that succeed in attracting and retaining creative class people prosper; those that fail don’t. …

The distinguishing characteristic of the creative class is that its members engage in work whose function is to “create meaningful new forms.” The super- creative core of this new class includes scientists and engineers, university professors, poets and novelists, artists, entertainers, actors, designers, and architects, as well as the “thought leadership” of modern society: nonfiction writers, editors, cultural figures, think-tank researchers, analysts, and other opinion-makers. Members of this super-creative core produce new forms or designs that are readily transferable and broadly useful—such as designing a product that can be widely made, sold and used; coming up with a theorem or strategy that can be applied in many cases; or composing music that can be performed again and again.

Beyond this core group, the creative class also includes “creative professionals” who work in a wide range of knowledge-intensive industries such as high-tech sectors, financial services, the legal and healthcare professions, and business management. These people engage in creative problem-solving, drawing on complex bodies of knowledge to solve specific problems. Doing so typically requires a high degree of formal education and thus a high level of human capital. People who do this kind of work may sometimes come up with methods or products that turn out to be widely useful, but it’s not part of the basic job description. What they are required to do regularly is think on their own. They apply or combine standard approaches in unique ways to fit the situation, exercise a great deal of judgment, perhaps try something radically new from time to time. …

The creative class now includes some 38.3 million Americans, roughly 30 percent of the entire U.S. workforce—up from just 10 percent at the turn of the 20th century and less than 20 percent as recently as 1980. The creative class has considerable economic power. In 1999, the average salary for a member of the creative class was nearly $50,000 ($48,752), compared to roughly $28,000 for a working-class member and $22,000 for a service-class worker. …

Chicago, a bastion of working-class people that still ranks among the top 20 large creative centers, is interesting because it shows how the creative class and the traditional working class can coexist. But Chicago has an advantage in that it is a big city, with more than a million members of the creative class. The University of Chicago sociologist Terry Clark likes to say Chicago developed an innovative political and cultural solution to this issue. Under the second Mayor Daley, the city integrated the members of the creative class into the city’s culture and politics by treating them essentially as just another “ethnic group” that needed sufficient space to express its identity. …

Why do some places become destinations for the creative while others don’t? Economists speak of the importance of industries having “low entry barriers,” so that new firms can easily enter and keep the industry vital. Similarly, I think it’s important for a place to have low entry barriers for people—that is, to be a place where newcomers are accepted quickly into all sorts of social and economic arrangements. All else being equal, they are likely to attract greater numbers of talented and creative people—the sort of people who power innovation and growth. …

Cities and regions that attract lots of creative talent are also those with greater diversity and higher levels of quality of place. That’s because location choices of the creative class are based to a large degree on their lifestyle interests, and these go well beyond the standard “quality-of-life” amenities that most experts think are important. …

When we compared these two lists with more statistical rigor, his Gay Index turned out to correlate very strongly to my own measures of high-tech growth. Other measures I came up with, like the Bohemian Index—a measure of artists, writers, and performers—produced similar results.

Talented people seek an environment open to differences. Many highly creative people, regardless of ethnic background or sexual orientation, grew up feeling like outsiders, different in some way from most of their schoolmates. When they are sizing up a new company and community, acceptance of diversity and of gays in particular is a sign that reads “non-standard people welcome here.” …

They favor active, participatory recreation over passive, institutionalized forms. They prefer indigenous street-level culture—a teeming blend of cafes, sidewalk musicians, and small galleries and bistros, where it is hard to draw the line between performers and spectators. They crave stimulation, not escape. They want to pack their time full of dense, high-quality, multidimensional experiences. Seldom has one of my subjects expressed a desire to get away from it all. They want to get into it all, and do it with eyes wide open.

Creative class people value active outdoor recreation very highly. They are drawn to places and communities where many outdoor activities are prevalent—both because they enjoy these activities and because their presence is seen as a signal that the place is amenable to the broader creative lifestyle. …

Places are also valued for authenticity and uniqueness. Authenticity comes from several aspects of a community—historic buildings, established neighborhoods, a unique music scene, or specific cultural attributes. It comes from the mix—from urban grit alongside renovated buildings, from the commingling of young and old, long-time neighborhood characters and yuppies, fashion models and “bag ladies.” An authentic place also offers unique and original experiences. Thus a place full of chain stores, chain restaurants, and nightclubs is not authentic. You could have the same experience anywhere. …

Even as places like Austin and Seattle are thriving, much of the country is failing to adapt to the demands of the creative age. It is not that struggling cities like Pittsburgh do not want to grow or encourage high-tech industries. In most cases, their leaders are doing everything they think they can to spur innovation and high-tech growth. But most of the time, they are either unwilling or unable to do the things required to create an environment or habitat attractive to the creative class. They pay lip service to the need to “attract talent,” but continue to pour resources into recruiting call centers, underwriting big-box retailers, subsidizing downtown malls, and squandering precious taxpayer dollars on extravagant stadium complexes. Or they try to create facsimiles of neighborhoods or retail districts, replacing the old and authentic with the new and generic—and in doing so drive the creative class away.

It is a telling commentary on our age that at a time when political will seems difficult to muster for virtually anything, city after city can generate the political capital to underwrite hundreds of millions of dollars of investments in professional sports stadiums. And you know what? They don’t matter to the creative class. Not once during any of my focus groups and interviews did the members of the creative class mention professional sports as playing a role of any sort in their choice of where to live and work. What makes most cities unable to even imagine devoting those kinds of resources or political will to do the things that people say really matter to them?

The answer is simple. These cities are trapped by their past. Despite the lip service they might pay, they are unwilling or unable to do what it takes to attract the creative class. The late economist Mancur Olson long ago noted that the decline of nations and regions is a product of an organizational and cultural hardening of the arteries he called “institutional sclerosis.” Places that grow up and prosper in one era, Olson argued, find it difficult and often times impossible to adopt new organizational and cultural patterns, regardless of how beneficial they might be. Consequently, innovation and growth shift to new places, which can adapt to and harness these shifts for their benefit. …

Most experts and scholars have not even begun to think in terms of a creative community. Instead, they tend to try to emulate the Silicon Valley model which author Joel Kotkin has dubbed the “nerdistan.” But the nerdistan is a limited economic development model, which misunderstands the role played by creativity in generating innovation and economic growth. Nerdistans are bland, uninteresting places with acre upon acre of identical office complexes, row after row of asphalt parking lots, freeways clogged with cars, cookie-cutter housing developments, and strip-malls sprawling in every direction. Many of these places have fallen victim to the very kinds of problems they were supposed to avoid. …

Yet if you ask most community leaders what kinds of people they’d most want to attract, they’d likely say successful married couples in their 30s and 40s—people with good middle-to-upper-income jobs and stable family lives. I certainly think it is important for cities and communities to be good for children and families. But less than a quarter of all American households consist of traditional nuclear families, and focusing solely on their needs has been a losing strategy, one that neglects a critical engine of economic growth: young people.

Young workers have typically been thought of as transients who contribute little to a city’s bottom line. But in the creative age, they matter for two reasons. First, they are workhorses. They are able to work longer and harder, and are more prone to take risks, precisely because they are young and childless. In rapidly changing industries, it’s often the most recent graduates who have the most up-to-date skills. Second, people are staying single longer. The average age of marriage for both men and women has risen some five years over the past generation. College-educated people postpone marriage longer than the national averages. Among this group, one of the fastest growing categories is the never-been-married. To prosper in the creative age, regions have to offer a people climate that satisfies this group’s social interests and lifestyle needs, as well as address those of other groups. …

Richard Florida is a professor of regional economic development at Carnegie Mellon University and a columnist for Information Week. This article was adapted from his forthcoming book, The Rise of the Creative Class: and How Its Transforming Work

The Creative Class & the health & growth of cities Read More »

Our reasons for giving reasons

From Malcolm Gladwell’s “Here’s Why: A sociologist offers an anatomy of explanations“:

In “Why?”, the Columbia University scholar Charles Tilly sets out to make sense of our reasons for giving reasons. …

In Tilly’s view, we rely on four general categories of reasons. The first is what he calls conventions—conventionally accepted explanations. Tilly would call “Don’t be a tattletale” a convention. The second is stories, and what distinguishes a story (“I was playing with my truck, and then Geoffrey came in . . .”) is a very specific account of cause and effect. Tilly cites the sociologist Francesca Polletta’s interviews with people who were active in the civil-rights sit-ins of the nineteen-sixties. Polletta repeatedly heard stories that stressed the spontaneity of the protests, leaving out the role of civil-rights organizations, teachers, and churches. That’s what stories do. As Tilly writes, they circumscribe time and space, limit the number of actors and actions, situate all causes “in the consciousness of the actors,” and elevate the personal over the institutional.

Then there are codes, which are high-level conventions, formulas that invoke sometimes recondite procedural rules and categories. If a loan officer turns you down for a mortgage, the reason he gives has to do with your inability to conform to a prescribed standard of creditworthiness. Finally, there are technical accounts: stories informed by specialized knowledge and authority. An academic history of civil-rights sit-ins wouldn’t leave out the role of institutions, and it probably wouldn’t focus on a few actors and actions; it would aim at giving patient and expert attention to every sort of nuance and detail.

Tilly argues that we make two common errors when it comes to understanding reasons. The first is to assume that some kinds of reasons are always better than others—that there is a hierarchy of reasons, with conventions (the least sophisticated) at the bottom and technical accounts at the top. That’s wrong, Tilly says: each type of reason has its own role.

Tilly’s second point flows from the first, and it’s that the reasons people give aren’t a function of their character—that is, there aren’t people who always favor technical accounts and people who always favor stories. Rather, reasons arise out of situations and roles. …

Reason-giving, Tilly says, reflects, establishes, repairs, and negotiates relationships. The husband who uses a story to explain his unhappiness to his wife—“Ever since I got my new job, I feel like I’ve just been so busy that I haven’t had time for us”—is attempting to salvage the relationship. But when he wants out of the marriage, he’ll say, “It’s not you—it’s me.” He switches to a convention. As his wife realizes, it’s not the content of what he has said that matters. It’s his shift from the kind of reason-giving that signals commitment to the kind that signals disengagement. Marriages thrive on stories. They die on conventions. …

The fact that Timothy’s mother accepts tattling from his father but rejects it from Timothy is not evidence of capriciousness; it just means that a husband’s relationship to his wife gives him access to a reasongiving category that a son’s role does not. …

When we say that two parties in a conflict are “talking past each other,” this is what we mean: that both sides have a legitimate attachment to mutually exclusive reasons. Proponents of abortion often rely on a convention (choice) and a technical account (concerning the viability of a fetus in the first trimester). Opponents of abortion turn the fate of each individual fetus into a story: a life created and then abruptly terminated. Is it any surprise that the issue has proved to be so intractable? If you believe that stories are the most appropriate form of reason-giving, then those who use conventions and technical accounts will seem morally indifferent—regardless of whether you agree with them. And, if you believe that a problem is best adjudicated through conventions or technical accounts, it is hard not to look upon storytellers as sensationalistic and intellectually unserious. …

Tilly argues that these conflicts are endemic to the legal system. Laws are established in opposition to stories. In a criminal trial, we take a complicated narrative of cause and effect and match it to a simple, impersonal code: first-degree murder, or second-degree murder, or manslaughter. The impersonality of codes is what makes the law fair. But it is also what can make the legal system so painful for victims, who find no room for their voices and their anger and their experiences. Codes punish, but they cannot heal.

Our reasons for giving reasons Read More »

Users know how to create good passwords, but they don’t

From Usability News’ “Password Security: What Users Know and What They Actually Do“:

A total of 328 undergraduate and graduate level college students from Wichita State University volunteered to participate in the survey, and were regular users of the Internet with one or more password protected accounts. Ages of the participants ranged from 18 to 58 years (M = 25.34). Thirteen cases were deleted due to missing data, resulting in 315 participants in the final data analysis. …

When asked what practices should be used in the creation and usage of passwords, the majority of respondents, 50.8% (160), were able to identify most of the password practices that are recommended for creating secure passwords (Tufts University, 2005), although 62.9% (198) failed to identify a practice that would result in the most secure password; using numbers and special characters in place of letters.

Differences between password practices users reported and the passwords practices they believe they should use included:

  • 73% (230) of respondents reported that they should change their passwords for accounts every three to six months, but 52.7% (166) responded that they “Never” change their password when not required.
  • 50.8% (160) of respondents reported that they should use special characters in their passwords, but only 4.8% (12) reported doing so.
  • 63.5% (200) of respondents reported that they should use seven or more characters in their passwords, but only 35.5% (112) indicated that they use this number of characters with any regularity.
  • 70.5% (222) of respondents indicated that personally meaningful words should not be used, but 49.8% (156) reported that they use this practice.
  • 68.3% (215) of respondents report that personally meaningful numbers should not be used in passwords, but 54.9% (173) reported using this practice. …

The majority of participants in the current study most commonly reported password generation practices that are simplistic and hence very insecure. Particular practices reported include using lowercase letters, numbers or digits, personally meaningful words and numbers (e.g., dates). It is widely known that users typically use birthdates, anniversary dates, telephone numbers, license plate numbers, social security numbers, street addresses, apartment numbers, etc. Likewise, personally meaningful words are typically derived from predictable areas and interests in the person’s life and could be guessed through basic knowledge of his or her interests. …

It would seem to be a logical assumption that the practices and behaviors users engage in would be related to what they think they should do in order to create secure passwords. This does not seem to be the case as participants in the current study were able to identify many of the recommended practices, despite the fact that they did not use the practices themselves.

Users know how to create good passwords, but they don’t Read More »

The Sumitomo Mitsuibank bank heist

From Richard Stiennon’s “Lessons Learned from Biggest Bank Heist in History“:

Last year’s news that thieves had managed to break in to Sumitomo Mitsui Bank’s branch in London and attempt to transfer almost $440 million to accounts in other countries should give CIO’s cause for concern. …

First a recap. Last year it came to light that U.K. authorities had put the kibosh on what would have been the largest bank heist in history.

The story is still developing but this is what we know: Thieves masquerading as cleaning staff with the help of a security guard installed hardware keystroke loggers on computers within the London branch of Sumitomo Mitsui, a huge Japanese bank.

These computers evidently belonged to help desk personnel. The keystroke loggers captured everything typed into the computer including, of course, administrative passwords for remote access.

By installing software keystroke loggers on the PCs that belonged to the bank personnel responsible for wire transfers over the SWIFT (Society for Worldwide Interbank Financial Telecommunication) network, the thieves captured credentials that were then used to transfer 220 million pounds (call it half-a-billion dollars).

Luckily the police were involved by that time and were able to stymie the attack.

From Richard Stiennon’s “Super-Glue: Best practice for countering key stroke loggers“:

… it is reported that Sumitomo Bank’s best practice for avoiding a repeat attack is that they now super-glue the keyboard connections into the backs of their PCs.

The Sumitomo Mitsuibank bank heist Read More »

10 early choices that helped make the Internet successful

From Dan Gillmor’s “10 choices that were critical to the Net’s success“:

1) Make it all work on top of existing networks.

2) Use packets, not circuits.

3) Create a ‘routing’ function.

4) Split the Transmission Control Protocol (TCP) and Internet Protocol (IP) …

5) The National Science Foundation (NSF) funds the University of California-Berkeley, to put TCP/IP into the Unix operating system originally developed by AT&T.

6) CSNET, an early network used by universities, connects with the ARPANET … The connection was for e-mail only, but it led to much more university research on networks and a more general understanding among students, faculty and staff of the value of internetworking.

7) The NSF requires users of the NSFNET to use TCP/IP, not competing protocols.

8) International telecommunications standards bodies reject TCP/IP, then create a separate standard called OSI.

9) The NSF creates an “Acceptable Use Policy” restricting NSFNET use to noncommercial activities.

10) Once things start to build, government stays mostly out of the way.

10 early choices that helped make the Internet successful Read More »

Early attempts to control phone usage

From R. W. Kostal’s Law and English Railway Capitalism, 1825-1875 (quoted in Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“):

In Britain in 1889, postal officials reprimanded a Leicester subscriber for using his phone to notify the fire brigade of a nearby conflagration. The fire was not on his premises, and his contract directed him to confine his telephone “to his own business and private affairs.” The Leicester Town Council, Chamber of Commerce, and Trade Protection Society all appealed to the postmaster-general, who ruled that the use of the telephone to convey intelligence of fires and riots would be permitted thenceforth.

Early attempts to control phone usage Read More »

Flat local calling rates in US helped grow the Net

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

Moreover, flat rates for local calling played a key role in the rise of the Internet, by promoting much faster spread of this technology in the U.S. than in other countries. (This, as well as the FCC decisions about keeping Internet calls free from access charges, should surely be added to the list of “the 10 key choices that were critical to the Net’s success,” that were compiled by Scott Bradner [28].)

Flat local calling rates in US helped grow the Net Read More »

Monopolies & Internet innovation

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

The power to price discriminate, especially for a monopolist, is like the power of taxation, something that can be used to destroy. There are many governments that are interested in controlling Internet traffic for political or other reasons, and are interfering (with various degrees of success) with the end-to-end principle. However, in most democratic societies, the pressure to change the architecture of the Internet is coming primarily from economic concerns, trying to extract more revenues from users. This does not necessarily threaten political liberty, but it does impede innovation. If some new protocol or service is invented, gains from its use could be appropriated by the carriers if they could impose special charges for it.

The power of price discrimination was well understood in ancient times, even if the economic concept was not defined. As the many historical vignettes presented before show, differential pricing was frequently allowed, but only to a controlled degree. The main con- cern in the early days was about general fairness and about service providers leveraging their control of a key facility into control over other businesses. Personal discrimination was particularly hated, and preference was given to general rules applying to broad classes (such as student or senior citizen discounts today). Very often bounds on charges were imposed to limit price discrimination. …

Openness, non-discrimination, and the end-to-end principle have contributed greatly to the success of the Internet, by allowing innovation to flourish. Service providers have traditionally been very poor in introducing services that mattered and even in forecasting where their profits would come from. Sometimes this was because of ignorance, as in the failure of WAP and success of SMS, both of which came as great surprises to the wireless industry, even though this should have been the easiest thing to predict [55]. Sometimes it was because the industry tried to control usage excessively. For example, services such as Minitel have turned out to be disappointments for their proponents largely because of the built-in limitations. We can also recall the attempts by the local telephone monopolies in the mid-to late-1990s to impose special fees on Internet access calls. Various studies were trotted out about the harm that long Internet calls were causing to the network. In retrospect, though, Internet access was a key source of the increased revenues and profits at the local telcos in the late 1990s. Since the main value of the phone was its accessibility at any time, long Internet calls led to installation of second lines that were highly profitable for service providers. (The average length of time that a phone line was in use remained remarkably constant during that period [49].)

Much of the progress in telecommunications over the last couple of decades was due to innovations by users. The “killer apps” on the Internet, email, Web, browser, search engines, and Napster, were all invented by end users, not by carriers. (Even email was specifically not designed into the ARPANET, the progenitor of the Internet, and its dominance came as a surprise [55].)

Monopolies & Internet innovation Read More »

Railroads & tolls

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

Railroads were the dominant industry of the 19th century. … Early railroad charters, in both England and the U.S., were modeled after canal and turnpike charters, and almost uniformly envisaged that railroad companies would not be carriers themselves. Instead, they were expected to offer their facilities for use by carriers that would carry goods and passengers in their own wagons over the rails. Still, these charters specified tolls that varied greatly depending on the nature of the cargo. … For example, the very first parliamentary act for a railway was enacted in 1801. (Previous railways had been on private property, but in this case, as in subsequent ones, promoters were asking for the right of eminent domain to acquire the necessary land.) Between the endpoints of the railway, “chalk, lime and other manures were charged at the rate of three-pence per ton per mile; coals, corn, potatoes, iron and other metals, fourpence; and all goods not specified, sixpence” (p. 45 of [13]). …

Although some railroads did operate with other companies’ equipment on their rails for decades (and modern ones do so extensively), there was a relatively quick shift in the 1830s and 1840s towards railroads being exclusive carriers. There were technical reasons promot- ing such a shift (safety was jeopardized with multiple operators and primitive technology), but there is evidence that desire for greater control over pricing by railroads was also a major consideration [64]. Once railroads became carriers, they could engage in much more extensive price discrimination than allowed by the toll structure in their charters. And, propelled by the economics of their industry, with high fixed costs, railroads did engage in massive price discrimination, including personal discrimination. The result was massive political movements leading to government regulation [62,65].

Railroads & tolls Read More »

Turnpikes, roads, & tolls

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

British turnpikes were a controversial response to a serious problem. Traditionally, the King’s Highway was open to all. The problem was how to keep it in good condition. As commerce grew, the need to maintain roads became acute. At first, in Elizabethan times, laws were enacted compelling all able-bodied commoner males to devote several days a year to labor on the highways. (See [1,66,80] for references for the background information as well as other items below that are not attributed otherwise.) The inequitable distribution of the burden this imposed and the lack of effective control mechanisms by the central government led to many complaints. As a result, in 1663, the first turnpike was authorized. A local group was authorized to create a turnpike trust that would borrow money to improve a section of a road, and then collect tolls from travelers for passage over that section of the road. This venture was set up (as were all subsequent turnpikes) as an ostensibly non-profit trust. (There were opportunities for profits there, for example in payment of above-market fees and other abuses, but those were illicit, and in any case were not the high profits that other, more private, enterprises, such as lighthouses and canals, offered.) The reason for the non-profit nature of turnpikes was presumably to allay concerns about a violation of the ancient principle that the King’s Highway was open to all. Still, this turnpike was very controversial (as were many later ones). Apparently largely for that reason, it took until 1695 before the next turnpike was set up [2].

In the early 18th century, the turnpike movement took off in earnest. Although there were frequent protests (sometimes violent, as in the burning of the toll gates around Bristol in 1727 and 1735), by mid-1830s there were over 20,000 miles of turnpikes in England. …

Tolls were usually doubled on Sundays for ordinary commercial traffic, but were eliminated for travel to or from church. They also “were never levied on foot passengers, and were thus unfelt by the labouring poor” (p. 124 of [80]). There were also options in many cases for a flat fee for annual access. Still, there were countless controversies about the toll, “the collection of which led to endless evasions, inequalities and favouritisms of all kinds, arbitrary exactions, and systematic petty embezzlements” (p. 136 of [80]). …

… road tolls are coming back as a result of growing congestion and improved technology. Unlike telecommunications, where technology is increasing capacity of fiber, coax, and radio transmissions, building new roads is increasingly difficult, and making existing ones carry more traffic can only be done to a limited extent. At the same time, electronic means for monitoring traffic and collecting tolls are improving, and we see central business districts in Norway, Singapore, and London imposing tolls. Most of these systems do raise privacy issues, too, since they are centralized ones with information about users, or at least cars. Still, there is a strong tendency to introduce ever more detailed monitoring of traffic, often with the explicit goal of charging users according to their level of activity (whether by governments or by insurance companies).

Turnpikes, roads, & tolls Read More »

Canals & tolls

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

The modern canal era can be said to start with the Duke of Bridgewater’s Canal in England. Originally it was just a means of connecting the Duke’s colliery to Manchester. The parliamentary charter (which enabled him to take over private property, with appropriate compensation) obliged the Duke to carry cargo to Manchester at a maximum charge of 30 pence a ton, and to sell his own coal in Manchester for no more than 80 pence a ton, about half the price that had prevailed before [38,68]. Parliament was determined to obtain substantial benefits for the public from the grant of government powers to the Duke. …

The great financial success of the Duke of Bridgewater’s Canal led to widespread attempts to emulate it. In the early 1790s, there was a canal mania, with a burst of construction that was never to be replicated in Britain. (The U.S. had its canal mania some decades later, following on the great success of the Erie Canal.) The charters of those canals show a general trend towards greater price discrimination. …

Similar toll schedules depending on cargo were also common in the United States. As an example, when parts of the still incomplete Erie Canal were opened in 1820, there was a long list of tolls, concluding with “All articles not enumerated, one cent, per ton, per mile” (Chapter 2 of [81]). The enumerated articles (among those that were measured by the ton) were charged tolls ranging from salt and gypsum at 0.5 cents per ton per mile, to 1 cent for flour, to 2 cents for merchandise, and nothing for fuel to be used in the manufacture of salt (so that it was necessary not only to know the nature of the cargo, but its ultimate use). …

While canal operators were trying to squeeze carriers (who were trying to squeeze merchants, in ways similar to those described below for turnpikes), carriers often attempted to evade tolls. They bribed toll-collectors, misrepresented what the cargo was, or how much there was of it, and in some cases even hid cargo with high toll charges under commodities such as sand for which the fees were low. The countermeasures, just as they are today, and would likely be in the future with electronic communications, were based on both technology and law. Measurements were taken (in many cases there were books available to canal operators, listing canal boats, and the weight of cargo aboard as a function of how deeply in the water they lay), and there were punitive penalties for evasion.

Canals & tolls Read More »

Big companies & their blind spots

From Paul Graham’s “Are Software Patents Evil?“:

Fortunately for startups, big companies are extremely good at denial. If you take the trouble to attack them from an oblique angle, they’ll meet you half-way and maneuver to keep you in their blind spot. To sue a startup would mean admitting it was dangerous, and that often means seeing something the big company doesn’t want to see. IBM used to sue its mainframe competitors regularly, but they didn’t bother much about the microcomputer industry because they didn’t want to see the threat it posed. Companies building web based apps are similarly protected from Microsoft, which even now doesn’t want to imagine a world in which Windows is irrelevant. …

Big companies & their blind spots Read More »