Fear of a Google planet

“It’s the season of cyber-panic,” says The Guardian‘s John Harris, and then proceeds to add some more cyber-panic to the mix. After all, we’re well overdue for a reboot of the “Google is a dangerous monopoly” meme, aren’t we?

We seem to accept it as something as inarguable as the weather, but Google now has a terrifying dominance of the world’s internet use. In Europe, it controls around 90% of the online search market.

I’m not going to dispute the figures, but it’s not like there aren’t dozens of other search engines people could use. Even if you put forward ignorance of alternatives and userbase inertia as components of that dominance, I’m still failing to see how Google is the bad guy here.

As is Google’s apparent appetite for any technology business it can get its hands on: in the first 10 months of 2010 alone, it spent $1.6bn on new acquisitions. If you have ever raged against the stranglehold practised by Rupert Murdoch, bear one thing in mind: Google’s power now threatens to make him look like a village newsagent.

On the contrary; Google is more like a newsagent than Murdoch, because it’s primarily in the business of locating and supplying media and providing platforms for people to create their own; Murdoch is a top-down content creator and peddler of dubious ideological flim-flam. Or, to put it another way: Google owns pipelines, Murdoch sells sewage.

Google has a shot not at control of the means to access information, but the information itself. Potentially all information, which is something worth panicking about.

Google has no “shot at controlling all information” whatsoever. If it starts censoring or massaging its results – which would get spotted pretty quickly, thanks to legions of competitors looking for a handful of mud to sling – Josephine Average can simply use an alternative search engine, blogging platform, online video hosting service, whatever. Google is not a telco; it has no way of controlling what comes into your house via that bit of optical fibre unless you choose to use it as a gateway. Mister Harris’ concern should perhaps be directed toward the telcos themselves, whose resistance to net neutrality is far more suspect and manipulative than Google’s dominant market share in search.

In one of those turnabouts that defy satire, Microsoft is pursuing Google via the European commission, claiming that it unfairly promotes its own services via web searches.

Y’know what? When I look at the BT website, they don’t tell me about the offerings from other telcos. When I look at Microsoft’s website, I don’t see a message saying “or, of course, you could always get a Mac”. When I go to Burger King, there are no ads for Kentucky Fried Chicken. Microsoft’s lawsuit is petulant tit-for-tat obstructionism, nothing more.

In Texas, antitrust investigations by the attorney general’s office are ongoing, triggered by websites’ complaints about their lowly Google rankings.

Google makes it very clear how to make your site rank well, and what actions will count against you. Their algos aren’t perfect, of course… but they fix them regularly and are fairly transparent about how and why they do so. If you don’t like Google’s rules, don’t optimise for their search engine. Google doesn’t owe your business a living.

Yesterday, Bloomberg ran a story with the headline “Google Antitrust Probe by US Could Take Years”, and paraphrased a renowned technology lawyer: “The agency is likely to examine whether Google is using its position in internet search to subdue rivals in adjacent markets with threats and jacked-up advertising rates.” It would certainly be a start.

Sounds more like a fishing expedition than an effort to fix a clear and observable problem to me… one that will tie up the company’s resources and energies in proving its innocence. Given the source of said lawsuit – oh, look, Microsoft again! – it’s not exactly hard to assume that someone is more interested in throwing caltrops into Google’s path than working out ways of competing in the marketplace in which Google dominates. Shorter version: if you can’t beat ’em, use the legal system to slow ’em down while you try to get a jump on ’em.

In the meantime, some advice, not least for employees of the US government. Don’t feed the tiger. Think back to the frontier days of dial-up, when pluralism reigned. Have a look around for alternative email providers, search engines and video-sharing sites.

This is pretty much the only sensible paragraph in the whole damned piece: the US government is indeed extremely unwise to rely on outsourced services if secrecy is of great importance (though they’re not exactly great at internal security when they do keep things local, either), and – if you really do fear Google’s dominance – you should put your money where your mouth is and use someone else’s services.

Cue accusations of Google fanboyism in 5… 4… 3… Look, I don’t care for Google any more than I care for any other company that provides me with useful services, I fully understand that they’re a profit-orientated business and that “don’t be evil” is very open to intrpretation as a coprporate slogan, and I’m happy to rag on them when their stuff doesn’t work (which is why I’m an unstinting Blogger hater, f’rinstance). Show me evidence that Google are spiking the competition’s wheels, and I’ll gladly hear your case. But if all you can do is bitch about the fact that 90% of people think they deliver the best results and use them as a result, I’m going to file you under “probable axe to grind”, or possibly “journalist in search of nebulous bogey-man”.

Plan Of The City: NYC architecture relocates itself to Mars, throws party

I get a fair few emails in the Futurismic mailbox saying “hey, I did this thing, maybe you’d check it out and blog about it?” Roughly 80% of them are either poorly disguised corporate pitches or stuff that’s just not very good, but every now and again I get something like this: Plan Of The City is an animation by regular reader Joshua Frankel, and it’s really rather wonderful. So consider this your Friday afternoon brain-break; take thirteen minutes to watch the architecture of New York fly itself to Mars, accompanied by some rather moving music. Go.

You can find out more about Plan Of The City and Joshua’s other works; give the guy a bit of attention, why not? Thanks for getting in touch, Mister Frankel. 🙂

A Silk Road from a sow’s ear

Beyond the more ardent libertarians, anarchists and cryptography wonks, responses to the Bitcoin story were largely indifferent – it’s a currency for nerds, so what? But give that currency a demonstrable use, and all of a sudden the “human interest” angle leaps right out: OMFG ANONYMOUS DRUG TRADING ON THE INTERTUBES!

Silk Road, a digital black market that sits just below most internet users’ purview, does resemble something from a cyberpunk novel. [[ Right, of course – and what *doesn’t* resemble a cyberpunk novel these days, Wired? ]] Through a combination of anonymity technology and a sophisticated user-feedback system, Silk Road makes buying and selling illegal drugs as easy as buying used electronics — and seemingly as safe. It’s Amazon — if Amazon sold mind-altering chemicals.

In a nutshell: obscure (and probably regularly-changed) URLs, access only permitted by users running the TOR anonymiser, all transactions made using the untraceable Bitcoins. The ultimate anonymised storefront, in other words, complete with an eBay-esque reputation system. Cue tabloid moral panic in 5… 4… 3…

Most interesting of all is watching the schisms open up in the strata of geek libertarianism, though:

… not all Bitcoin enthusiasts embrace Silk Road. Some think the association with drugs will tarnish the young technology, or might draw the attention of federal authorities. “The real story with Silk Road is the quantity of people anxious to escape a centralized currency and trade through trading bitcoin come funziona,” a longtime bitcoin user named Maiya told us in a chat. “Some of us view Bitcoin as a real currency, not drug barter tokens.”

Maiya’s right about the “true story” there, but that last sentence is priceless – the cognitive dissonance of being in favour of a decentralised and anonymous currency but wanting to restrict what people can trade with it is really rather spectacular.

Wired‘s coverage there is pretty measured, all things considered; watching this story plough into the mainstream media is going to be a textbook demo of escalating hysteria. *fetches popcorn*

Grasping around for a new enemy: Pentagon redefines hacking as act of warfare

So, with OBL offed and Al Qaida effectively beheaded (as if it hadn’t already been waning considerably in its ability to achieve anything of note), the defence budget of the US needs a new enemy to justify its continued expansion. But no one with sense would start an old-school land war these days (missions of liberation and the insurgencies they provoke are an entirely different category, of course), so what is there that merits a bit of saber-rattling?

“People we don’t like who also have nukes or are trying to get them” is a hardy perennial, but most of them have gathered enough friends (or mutual enemies-of-their-enemy) that it’s getting hard to make anyone care other than the lapdog allies over on Airstrip One. Something current, scary and poorly-understood would be ideal… something like the nebulous and poorly-defined notion of “cyberwarfare”, perhaps?

The Pentagon’s first formal cyber strategy, unclassified portions of which are expected to become public next month, represents an early attempt to grapple with a changing world in which a hacker could pose as significant a threat to U.S. nuclear reactors, subways or pipelines as a hostile country’s military.

In part, the Pentagon intends its plan as a warning to potential adversaries of the consequences of attacking the U.S. in this way. “If you shut down our power grid, maybe we will put a missile down one of your smokestacks,” said a military official.

Recent attacks on the Pentagon’s own systems—as well as the sabotaging of Iran’s nuclear program via the Stuxnet computer worm—have given new urgency to U.S. efforts to develop a more formalized approach to cyber attacks. A key moment occurred in 2008, when at least one U.S. military computer system was penetrated. This weekend Lockheed Martin, a major military contractor, acknowledged that it had been the victim of an infiltration, while playing down its impact.

The report will also spark a debate over a range of sensitive issues the Pentagon left unaddressed, including whether the U.S. can ever be certain about an attack’s origin, and how to define when computer sabotage is serious enough to constitute an act of war. These questions have already been a topic of dispute within the military.

I expect that open-endedness is a feature rather than a bug, because it offers a great opportunity to put the great economic enemy in the frame: if China’s consolidating the stranglehold on your economy which your own foreign and fiscal policies practically begged them to begin, it’s time to puff up your chest and get stern with them commies! Don’t take it from me, though – here’s Thomas P M Barnett with a plainly-titled post at TIME: “According to new Pentagon cyber strategy, state-of-war conditions now exist between the US and China“. Ouch.

In other words, if you, Country C, take down or just plain attack what we consider a crucial cyber network, we reserve the right to interpret that as an act of war justifying an immediately “equivalent” kinetic response (along with any cyber response, naturally). If this new strategy frightens you, then you just might be a rational actor.

Theoretically, this means if you, Country C, hack and disable the net of crucial US installation X, America can fire missiles at your equivalent civilian or military installation (C)X. Of course, by responding to your “act of war,” we are initiating our own war response, meaning we’d need presidential approval to start the fireworks. But the key point is, by hacking something that we consider to be national security-sensitive, you leave yourself open to a state-of-war response from the United States at the time of its choosing, so be forewarned.

Which facilities fall into this “eye for an eye (or ear or . . .)” category? Naturally, America shouldn’t say, so as to keep Country C in the dark (the essence of deterrence), but putting us in the dark (take-down of an electric grid) is an obvious one cited in the WSJ piece. Again, theoretically, almost anything can be described as crucial on some national security scale (e.g., hack Monsanto in just the right way and maybe you put US food security at risk), because the small damage that you, Country C, choose to create in our nets might easily cascade into something far larger, so virtually any hack emanating from your networks puts you at risk for a US war response.

(I wonder what the reaction would be to an equivalent policy elsewhere? Let’s say – strictly hypothetically, of course – that Big Nation-state A is revealed to have funded and built some sort of infrastructural sabotage virus with the strict intent of targetting the facilities of Nation-state B; will the US fully understand Nation-state B declaring war on A, or will that be considered a disproportionate act by a rogue state? Guess it’ll depend on which of the two the Pentagon is more interested in keeping on-side.)

Seriously, though: when a pro-intervention pro-globalisation type like Barnett thinks this is a bad play, it’s got to be a real dick move:

This is an destabilizing step sideways in our security relationship with China: Beijing is being warned that its current and ongoing behavior can – at any time – be loosely interpreted as an act of war. Whatever situations or crises ensue, that handy rationale is now always sitting in the Pentagon’s back pocket, because I guarantee you, whenever big-war enthusiasts want to play that card, the Defense Department will be able to muster – at a moment’s notice – a long list of Chinese hacking attacks over the previous X hours/days/weeks/months. So when the President asks, “Do we have evidence that the Chinese are targeting us at this time for cyber-sabotage?” The answer will always be yes.

[…]

Bottom line? Strangelove has re-entered the Building.

That last line implies Strangelove ever left the building; I suspect he’s been stored in boardroom cupboards against the appropriate moment.

Deliberate or otherwise, the daftest thing here is that the Pentagon can grok that “cyberwarfare” is a threat, but doesn’t seem to entirely grok the fact that cyberwarfare doesn’t need to be a function of nation-state level decision-making. Indeed, the real threat is from non-nation-state actors, wherever they may be based. NATO seems wise to this, though, with the General Rapporteur issuing dire warnings to Anonymous, Wikileaks and their ilk:

Describing the rise of the group from its beginnings on internet picture message board 4chan, via campaigns against the Church of Scientology and, more recently, in support of whistle-blowing website Wikileaks, the report continues: “Today, the ad hoc international group of hackers and activists is said to have thousands of operatives and has no set rules or membership.”

The report goes on to lay out a stark warning to the group’s nameless participants:

“It remains to be seen how much time Anonymous has for pursuing such paths. The longer these attacks persist the more likely countermeasures will be developed, implemented, the groups will be infiltrated and perpetrators persecuted.”

Well, good luck with that, folks. If you thought trying to tame countries full of warring factions whose only common ground was a desire to get shot of the meddling infidels was no picnic, declaring war on the fluid alliances and ad-hocracies of the intertubes is going to be a long and frustrating game of whack-a-mole which, I fully suspect, you have no chance of winning. After all, Anonymous doesn’t have anything you can aim a missile at, does it?

Presenting the fact and fiction of tomorrow since 2001