The Digital Utopian Vision of Marshall McLuhan and Stewart Brand Is Cracking

It appears to me that the original vision and promise of the Internet, referred to by many as Digital Utopianism, is at severe risk of deteriorating into a “balkanized” World Wide Web.

National and political Internet barriers, censorship and ubiquitous surveillance seem to be the emerging new reality. Notable digital luminaries the likes of Vin Cerf and Bill Gates have been questioned on this point, and both have expressed no major concern about deterioration of the freedom of the Internet or with the original Utopian vision. The argument is that the World Wide Web cannot be effectively blocked or censored. As a long time Silicon Valley high tech executive, I understand this optimistic view, but the facts on the ground are now providing serious evidence that the Internet is under attack, and may not survive unless there is a significant shift in these new trends.


It appears to me that the original vision and promise of the Internet, referred to by many as Digital Utopianism, is at severe risk of deteriorating into a “balkanized”  and severely impaired World Wide Web.

mcluhanWEC-1971-cover

Internet barriers, censorship, protectionist Internet policy, and ubiquitous surveillance seem to be the emerging new reality.  Notable digital luminaries the likes of Vin Cerf and Bill Gates have been questioned on this point, and both have expressed no major concern about deterioration of the freedom of the Internet or with the original Utopian vision.  The argument is that the World Wide Web cannot be effectively blocked or censored.  Google would probably respond that their “loon balloons” could simply be launched to counter censorship. As a long time Silicon Valley high tech executive, I understand this optimistic view, but the facts on the ground are now providing serious evidence that the Internet is under attack, and may not survive unless there is a significant shift in these new trends.

This week alone, Turkey’s Erdogan has tried to block both Twitter and YouTube to prevent Turks from viewing evidence of his corrupt government. This morning’s New York Times reports Edward Snowden’s latest revelation.  While the U.S. government and media were investigating and publicly reporting on Chinese government Internet espionage and Chinese network equipment manufacturer Huawei, the NSA, the British GCHQ and Canada’s  Security Intelligence Service (CSIS) ,  were all collaborating, doing exactly the same thing. The hypocrisy and irony of this is not lost on either the Chinese or the Internet community. CBS 60 Minutes reported on the Chinese espionage, but has been essentially silent on NSA’s own transgressions. 60 Minutes even broadcast a report that NSA metadata was essentially harmless, which has now been shown to be false. The 60 Minutes objective reporting problem is the canary in the coal mine of the corporate takeover of media and the Web.  Protectionist policies in various countries targeted against Google, Microsoft and others are emerging. One of the many negative effects of the NSA revelations was the announcement this week that the United States was giving up control of the International Committee for Assigned Names and Numbers (ICANN), which essentially sets Internet traffic policy. Finally, this week, Netflix spoke out forcefully against the “peering agreement” it was blackmailed into signing with Comcast to insure “quality of service” (QOS) for Netflix programming to the edges of the Web.

Read more: NSA breached Chinese servers

Read more: Netflix Thinks Peering Should Be A Net Neutrality Issue

I recently came across Professor Fred Turner, Professor of Communication at Stanford. It has been a revelation for me.  His book, “From Counterculture to Cyberculture’ is an acclaimed milestone work. Turner has articulated the World I lived in the counterculture of the 1960’s and in the early Silicon Valley. His work explaining the evolution from the “counterculture” of the 1960’s to the emerging new “cyberculture” of the late 1980’s and 1990’s is an excellent record of that time in northern California.  This was the World of Steve Jobs at that time and his personal evolvement to a digital Utopian.  It is detailed in Jobs biography, and in Jobs wonderful Stanford University 2005 commencement speech, in which he also acknowledged the importance of Stewart Brand and the Whole Earth Catalog.  This was also my countercultural World as a Communications student at San Jose State at that time, in the heart of the Silicon Valley, and subsequent high tech career, beginning at Intel Corporation.  But even Professor Turner has expressed his own ambivalence about the future direction of the Web, though only from the standpoint of less worrying lack of diversity of Web communities. My concern is much more deeply based on current evidence and much more ominous.

Fred Turner, Stanford Professor of Communication – Counterculture to Cyberculture

Stewart Brand, the father of the Whole Earth Catalog and the original digital utopia visionary, has been rethinking its basic concepts. Brand has come around 180 degrees from environmental Utopianism based on “back to the land,” and is now embracing the future importance of urban enclaves. While this new urban view is now a widely held idea by many futurists, it can also be viewed as another facet of the end of digital utopia.  This TEDTalk by Brand lays out his new vision.  Where we go from here is anyone’s guess.

Quantum Computing Takes Center Stage In Wake of NSA Encryption Cracking

In the late 1990’s, I participated in the creation of the “point-to-point tunneling protocol” (PPTP) with engineers at Microsoft and Cisco Systems, now an Internet Engineering Task Force (IETF) industry standard. PPTP is the technical means for creating the “virtual private networks” we use at UBC, by encrypting “open” Internet packets with IPSEC 128 bit code, buried in public packets. It was an ingenious solution enabling private Internet traffic that we assumed would last for a very long time. It was not to be, as we now know. Most disturbing, in the 1990’s the US Congress debated giving the government the key to all encryption, which was resoundingly defeated. Now, the NSA appears to have illegally circumvented this prohibition and cracked encryption anyway. But this discussion is not about the political, legal and moral issues, which are significant. In this post I am more interested in “so now what do we do?” There may be an answer on the horizon, and Canada is already a significant participant in the potential solution.


In the late 1990’s while I was with Ascend Communications, I participated in the creation of the “point-to-point tunneling protocol” (PPTP) with engineers at Microsoft and Cisco Systems, now an Internet Engineering Task Force (IETF) industry standard.  PPTP is the technical means for creating the “virtual private networks” we use at UBC, by encrypting “open” Internet packets with IPSEC 128 bit code, buried in public packets. It was an ingenious solution, enabling private Internet traffic that we assumed would last for a very long time.  It was not to be, as we now know.  Most disturbing, in the 1990’s the US Congress debated giving the government the key to all encryption, which was resoundingly defeated. Now, the NSA appears to have illegally circumvented this prohibition and cracked encryption anyway. But this discussion is not about the political, legal and moral issues, which are significant.  In this post I am more interested in exploring the question: “So now what do we do?” There may be an answer on the horizon, and Canada is already a significant participant in the potential solution.

As it happens, Canada is already at the forefront of quantum computing, a critically important new area of research and development, that has significant future potential in both computing and cryptography.  I have previously written about Vancouver-based D-Wave, which has produced commercial systems that have been purchased by Google and Lockheed Martin Aerospace.  The Institute for Quantum Computing in Waterloo, Ontario is the other major center of quantum computing research in Canada. Without taking a major diversion to explain quantum mechanics and its applications in computing and cryptography, there is a great PBS Nova broadcast, available online, which provides a basic tutorial.  The Economist article below, also does an admirable job of making this area understandable, and the role that the Waterloo research centre is playing in advancing cryptography to an entirely new level.

We need to insure that Canada remains at the forefront of this critically important new technology.

Cryptography

The solace of quantum

Eavesdropping on secret communications is about to get harder

  • CRYPTOGRAPHY is an arms race between Alice and Bob, and Eve. These are the names cryptographers give to two people who are trying to communicate privily, and to a third who is trying to intercept and decrypt their conversation. Currently, Alice and Bob are ahead—just. But Eve is catching up. Alice and Bob are therefore looking for a whole new way of keeping things secret. And they may soon have one, courtesy of quantum mechanics.

At the moment cryptography concentrates on making the decrypting part as hard as possible. The industry standard, known as RSA (after its inventors, Ron Rivest, Adi Shamir and Leonard Adleman, of the Massachusetts Institute of Technology), relies on two keys, one public and one private. These keys are very big numbers, each of which is derived from the product of the same two prime numbers. Anyone can encrypt a message using the public key, but only someone with the private key can decrypt it. To find the private key, you have to work out what the primes are from the public key. Make the primes big enough—and hunting big primes is something of a sport among mathematicians—and the task of factorising the public key to reveal the primes, though possible in theory, would take too long in practice. (About 40 quadrillion years with the primes then available, when the system was introduced in 1977.)

Since the 1970s, though, the computers that do the factorisation have got bigger and faster. Some cryptographers therefore fear for the future of RSA. Hence the interest in quantum cryptography.

Alice, Bob and Werner, too?

The most developed form of quantum cryptography, known as quantum key distribution (QKD), relies on stopping interception, rather than preventing decryption. Once again, the key is a huge number—one with hundreds of digits, if expressed in the decimal system. Alice sends this to Bob as a series of photons (the particles of light) before she sends the encrypted message. For Eve to read this transmission, and thus obtain the key, she must destroy some photons. Since Bob will certainly notice the missing photons, Eve will need to create and send identical ones to Bob to avoid detection. But Alice and Bob (or, rather, the engineers who make their equipment) can stop that by using two different quantum properties, such as the polarities of the photons, to encode the ones and zeros of which the key is composed. According to Werner Heisenberg’s Uncertainty Principle, only one of these two properties can be measured, so Eve cannot reconstruct each photon without making errors. If Bob detects such errors he can tell Alice not to send the actual message until the line has been secured.

One exponent of this approach is ID Quantique, a Swiss firm. In collaboration with Battelle, an American one, it is building a 700km (440-mile) fibre-optic QKD link between Battelle’s headquarters in Columbus, Ohio, and the firm’s facilities in and around Washington, DC. Battelle will use this to protect its own information and the link will also be hired to other firms that want to move sensitive data around.

QuintessenceLabs, an Australian firm, has a different approach to encoding. Instead of tinkering with photons’ polarities, it changes their phases and amplitudes. The effect is the same, though: Eve will necessarily give herself away if she eavesdrops. Using this technology, QuintessenceLabs is building a 560km QKD link between the Jet Propulsion Laboratory in Pasadena, California, which organises many of NASA’s unmanned scientific missions, and the Ames Research Centre in Silicon Valley, where a lot of the agency’s scientific investigations are carried out.

A third project, organised by Jane Nordholt of Los Alamos National Laboratory, has just demonstrated how a pocket-sized QKD transmitter called the QKarD can secure signals sent over public data networks to control smart electricity grids. Smart grids balance demand and supply so that electricity can be distributed more efficiently. This requires constant monitoring of the voltage, current and frequency of the grid in lots of different places—and the rapid transmission of the results to control centres. That transmission, however, also needs to be secure in case someone malicious wants to bring the system down.

In their different ways, all these projects are ambitious. All, though, rely on local fixed lines to carry the photons. Other groups of researchers are thinking more globally. To do that means sending quantum-secured data to and from satellites.

At least three groups are working on this: Thomas Jennewein and his team at the Institute for Quantum Computing in Waterloo, Canada; a collaboration led by Anton Zeilinger at the University of Vienna and Jian-Wei Pan at the University of Science and Technology of China; and Alex Ling and Artur Ekert at the Centre for Quantum Technologies in Singapore.

Dr Jennewein’s proposal is for Alice to beam polarisation-encoded photons to a satellite. Once she has established a key, Bob, on another continent, will wait until the satellite passes over him so he can send some more photons to it to create a second key. The satellite will then mix the keys together and transmit the result to Bob, who can work out the first key because he has the second. Alice and Bob now possess a shared key, so they can communicate securely by normal (less intellectually exhausting) terrestrial networks. Dr Jennewein plans to test the idea, using an aircraft rather than a satellite, at some point during the next 12 months.

An alternative, but more involved, satellite method is to use entangled photon pairs. Both Dr Zeilinger’s and Dr Ling’s teams have been trying this.

Entanglement is a quantum effect that connects photons intimately, even when they are separated by a large distance. Measure one particle and you know the state of its partner. In this way Alice and Bob can share a key made of entangled photon pairs generated on a satellite. Dr Zeilinger hopes to try this with a QKD transmitter based on the International Space Station. He and his team have been experimenting with entanglement at ground level for several years. In 2007 they sent entangled photon pairs 144km through the air across the Canary Islands. Dr Ling’s device will test entanglement in orbit, but not send photons down to Earth.

If this sort of thing works at scale, it should keep Alice and Bob ahead for years. As for poor Eve, she will find herself entangled in an unbreakable quantum web.

From the print edition: Science and technology