Saturday, January 30, 2010

Rock Throwers in the West Bank

I just saw a short video clip on NY times, which made me come back to this blog research which was done in 2007. At that time, my interest in the research was to propose wireless mesh network system which can be operated anonymously - to encourage the engagement of the people of Palestine to overcome their geographical segration due to the Israeli check points.

A group of Palestinian throws rocks (more like a pebble stone) to the Israeli armies every Friday at the Israeli check point - the video clip did not specified which check point.. To maximize their exposure on the media, they deliberately position themselves in front of groups of reporters. Activity of rock throwing seems to me as a representation of anti suicide bombing - but not quite silent protest either. It is quite witty yet makes strong statement. Although the intention is to not hurt anyone, the counter attack from Israeli army using smoke renegade and rubber bullets sometimes causes minor casualties.

Sunday, November 18, 2007

The exponential growth


After talking about the swarming of the tagging system, and interconnection of network - the strategy of the system growth need to be exponential.

Let's say two like minded individual - either me and you or somebody else who would start off from the instruction manual, make this device and attach it to the urban fabric of Jerusalem. There should be some way to make the system spread further than two people - either the function of system fits into cultural political or economical context and fulfills the needs and the system increase because of it is needed, or the device itself actually has duplicate function like virus.. like RepRap Project.

Saturday, November 17, 2007

Graffiti Ressearch Lab - A case study


Here's a group of people using the idea of graffiti + anonymity in digital context onto the urban fabric. The bottom image is a letter formed by array of LED lights attached to a border.

Friday, November 16, 2007

Hierarchy and Protocol

Protocol is a totalizing control apparatus that guides both the technical and political formation of computer networks, biological systems and other media. Put simply, protocols are all the conventional rules and standards that govern relationships within networks. Each nodes in the network act based upon the protocols embedded onto themselves. Once the protocol is ignored, it is impossible to maintain the network since the network is formed by nodes and connecting edges and the behavior of connection and communication is based upon the promised protocols.

In this way, the idea of hierarchy is replaced by the protocol. Instead of obeying one directional command, the organizational behavior of network is decided based upon the negotiated protocols. In that sense, the network as a system is more adaptable to the rapid change, since the behavior inside of the network is always negotiable. At the same time, it can be more effective, because the protocol is universal value and had to be followed to maintain the life of the network. Meanwhile, the idea of hierarchy is being challenged.

Protocol, the rule set of the network is either top down or bottom up organizational power. Yet, protocol and power are strongly related in a sense that the greater the network is, the stronger or the greater the number of control.

Then what would resistance in the network would look like? If there's control, there should be resistance, and the distributed networking system does not prevent the resistance. In the example of internet, the computer viruses or hacker communities can be viewed as a resistance for the status quo or continuation of the network.

However, if networks is not only technical, but also real-time, dynamic and living, then it would make sense to think that the resistance is also living, means that the intention or force of resistance can be adaptable as much as how network is.

The mixing between live control and resistance, the protocol and counter protocol mutate to achieve the state of bigger "hypertropic" state. The protocol itself, therefore, has to be flexible and robust, and need to be restarted often. In the end, the protocoligical control will substitute the idea of hierarchical control, and what matters is not only the protocol itself, but the effect created by the protocols.

Reference: Protocol, Control and Networks by Galloway and Thacker.

Thursday, November 15, 2007

Technology as a shared value


At this point, I think it is important to point out what it means to bring networking system into the Jerusalem area as a new layer of value set. One thing came to my mind was the movie 2001: Space Odyssey. The appearance of the stone tower - whatever you call it, created new sets of behavior, which can eventually viewed as a step of evolution. The tower, even though it does not have any function, somewhat refers to the technology assuming from the following sequence of tools and floating spaceship - and since we all know that this represent the technological evolution, i won't go into the details.

What I am trying to point out is that, by imposing the value that has nothing to do with current situation will be able to solve the problem and even create the foot step to go beyond the reality. It can be random system that drags the random attention and make them self organize. Or it can be some well designed system. The benefit of imposing networking system is that it can be both way - the well designed networking system will help people self organize.

Wednesday, November 14, 2007

Anonymous Network - requirements

1. Target

The main target of the network is starting from East Jerusalem area to create the connection between East Jerusalem and West Bank. Bir Nabala Enclave or No Man's Land is one of the prospect starting point because it is so obvious that they are segregated or forbidden from the rest, and it will be obvious if they get the adversary attack.

2. Infrastructure

There are two different ideas.

First, what if the storage is literally on the wall and people need to access to the wall to store and retrieve the information. In that case, it will be really obvious that who is accessing to the information, and based upon how the system is being used, it will be easier for the authorities to take action upon it. Yet, if the system is guaranteed that there's no surveillance, and initiated by the authorities from both side, the areas around the system will be somewhat neutralized public space - like library, or considering the idea of anonymity and expressing the idea, maybe shooting range? Again, what is the intention of the system and who is driving it is important to be defined.

Second, what if the storage is a hand held device distributed by some kind of joint grass-root movement started from both side? In this case, my proposal is wireless mesh network that can be accessed by the device. The device is refurbished / recycled hand held devices like PDA or black berry. Since those devices are used for the networking, it won't take too much resource to refurbish them. In this case, there should be a manufacturer of the device, distribution system, the interface for the device and the radio transmitter for the network is needed.

3. The Outcome

What will the anonymous networking system in Jerusalem look like? How will it function? Is the networking system will really work as a communication channel to help both side understand each other, and also connected the divided communities to function better? Or is this will be appropriated by informational dark forces that seek anonymity for their own good?

Segregated Road


This is an article from NY Times, several months ago.

"Israel is constructing a road through the West Bank, east of Jerusalem, that will allow both Israelis and Palestinians to travel along it — separately.

There are two pairs of lanes, one for each tribe, separated by a tall wall of concrete patterned to look like Jerusalem stones, an effort at beautification indicating that the road is meant to be permanent. The Israeli side has various exits; the Palestinian side has few....."

Even the attempt of creating connection is already divided.

Tuesday, November 13, 2007

Site


A 168KM long, concrete and wire section of the barrier separates the East Jerusalem from the rest of the West Bank. The Government of Israel states that the purpose of this barrier is to protect Israeli citizens from terrorists’ attacks, mostly in the form of suicide bombing. (Since 2000, there have been 18 suicide bombings in Jerusalem and a total of 158 people were killed as a result.)

It is still unclear that the building of the wall for the security reason can ever be justified since the borders drown by the existence of the wall is not based upon the agreement from two sides. The barrier only provides physical security for Israel by encircling their settlements to ensure the free, unimpeded access of Israeli settlers to Jerusalem. In the process of achieving the goal, the barrier sometimes cases or cut through Palestinian settlements – As a result, the Palestinian communities lost their access to the territories once closely related to their communities.

Asides from the violation of the international law, the existence of the wall creates very interesting effect between two different communities. Now, totally segregated from each other, Israelis have access to Jerusalem without any restriction, feeling safer than any other times. On the contrary, Palestinians lost direct access in between the rest of the West Bank and East Jerusalem.

These facts described above are the very reason of picking this area as the starting point for the Anonymous Networking System. By creating the anonymous communication channel on the wall, the divided communities find the way to reconnect to each other. People from West Bank can continue their education through the networking system. The commerce can be revitalize, and so on. The layer of the networking system imposed on top of the wall will blur the boundary and allow new possibilities in terms of communication and interaction in the area.

Wednesday, October 24, 2007

Justification - Why Anonymity?

Are the religious, cultural historical propaganda still valuable? Or are they stuck in the emotional remnants? Is the idea of right or wrong still valid? Or is the idea of right or wrong substituted into the idea of priority?

Perhaps, the reason for the conflict can be justified, but no one can agree to the solution that ends the conflict. At the same time, the historical or religious values are losing its point in the other side of the world due to the technological advances. Most of them are more exposed to the information infrastructure – they communicate faster – new ideas come up every other second – instead of the value judgment over the idea that weather it’s right or wrong, the agents on the net collectively organize the structure to create priority. The structure of organization is not vertical hierarchy, but horizontally connected.

The physical segregation by the extreme security measures in the area causes the pockets of information that can’t flow – which leads to the discrepancy of information over same area. The possession of more or less information creates clear controlling hierarchy structure. The profiling system makes it harder for the freedom of expression. The communication hardly occurs in this discontinuous environment.

At the same time, the strict profiling policy makes it harder to achieve individual freedom. Based upon religion and nationality, the residence of the West Bank area are already tagged and categorized to be treated in certain way. Not only that, but also the fact that each side is segregated, yet bonding together within their own group based upon the imposed strong propaganda makes it impossible to have freedom of communication and expression.

It is true that the level of emergency and insecurity of the region requires the transparency from its members. However, are they ready for it? Isn't total transparency will cause another controlling measure that becomes restriction? Plus, if the transparency is not imposed fairly, it will only creates another vertical hierarchy in the region.

Instead of transparency, I want to propose anonymous network channel within the region that can go beyond the wall. The anonymous network channel will be designed to contribute to achieve equivalency of the information to the West Bank area. By not requiring individual profile data, it guarantees the freedom of expression and exchange of the information. At the same time, by storing the data from both side, the anonymous network somehow gains a role inside of the community as a new monument that does not carry any specific propaganda.

Friday, October 19, 2007

Invisible power and control


The cause of the conflict in Jerusalem is obvious, yet very complex – it is total mixture of the accumulated historical, religious and cultural conflict caused by different point of view. Because of the duration of the conflict and the historical contents of the cause of conflict, it is hard to trace back and make decision over who’s right and who’s wrong. Knowing that, the decision making or proposal of the solution is being avoided.

Between two polemic groups of Jerusalem and especially West Bank, the hierarchy of the power structure is pretty clear - One side has total control over the other. Yet, to avoid the responsibility of making smart decision over the problem, the controlling power decided to be invisible to the one they are controlling - to make sure that they guarantee the right to have separate political party and religious / cultural views. At the same time, to make clear that they have the control, layers of security policy are imposed over the social, cultural and infra - structure. The examples are the followings - barriers, checkpoints, ID.


As I posted below, at the terminal checkpoint, Israeli decided to hide behind the one-sided mirror. By being invisible, they are anonymous, but the power structure is clear. Barriers are another example of the effort being made to be invisible to the other side. The construction of the barriers are progressed rapidly in last two years, and almost near completion. The physical separation between east Jerusalem and West Bank, and Israeli vs. Palestinian area is now clear. However, the layout of the barrier is somewhat funny - the literal effort of creating the division between Israeli and Palestinian created the isolation of the city.


The different types of ID are another imposed security layer on top of the physical structure. The West Bank residents, Jerusalem Palestinians and Israeli have possess different types of ID that clarifies different types of personal profile, which eventually entitles them into different categories - means more or less control based upon who you are.


The checkpoints are the physical location where these control measures are enforced. The checkpoints are not necessarily high tech - they are haphazardly made physical structure, but the social impact of them are well designed. Checkpoints are the one that stops the movement inside of the West Bank area by forbidding the access to the Israeli reserved road that divides the towns from each other.

Saturday, October 13, 2007

Allenby Bridge Terminal - Anonynous Surveillence

The power structure of surveillance in the Israeli controlled territory of West Bank is reflecting the current situation between Israeli and Palestinians. To avoid the conflict yet to make the borderline between the one controls and the one being controlled, Israeli security force would be invisible to the Palestinians during their action.

According to the description in the Article X, Israeli security agents would be separated from travelers by one-way mirrors even though they are all over the terminal building. The travel documents of Palestinians were to be checked by an Israeli officer who also checks their identity indirectly in an invisible manner. (Eyal Weizman, Hollow Land)

Within the terminal, the Palestinian officers guide several security checks, but the overall provision is done by the Israeli securities behind the mirror. This is due to the Oslo Accords - Palestinians are still under Israeli security domination, but encouraged to believe their own political authority.

The one-way mirror represents the political gesture of Israeli security control in the west bank territory. To make sure that they are encouraging or not enforcing the political authority, but not to lose the territorial control, they choose to be invisible. Yet, they are still looking over what is happening inside, either to maintain overall control or protect themselves from the possibilities of the uprising terrorism / attack.

Palestinians are being observed by anonymous force. They are required to provide their personal profile to the anonymous security personnel. Are they even sure that the one who goes over their travel documents are human or monkey? With the one-way mirror, it is impossible.

Tuesday, October 9, 2007

Anonymity and mass crowd


To stop the Israeli attack in Gaza area, one of the interesting tactics from the Palestinian is building a human shield: gather together as a bigger crowd when the attack is about to happen. The crowd is a mixture of the militant leaders to school girls. The action of gathering as a mass crowd deterred several Israeli air force attack since it can cause civilian casualty. (BBC News)

For me, this is one of the example of the idea of anonymity in the context of Israel - Palestine conflict. By gathering as a one big crowd, individual profiles blend into a bigger entity, the Palestinians. It gets hard to recognize who is causing the trouble and who is innocent. The individual anonymity is achieved by this action, and eventually prevents the adversary attack.

In anonymous networking system, the nodes are grouped together to lower the possibility to find clear target. If the group is bigger, it is better. It is hard to find who is doing illegal activities in the group even though the activity is coming out of the group. It is also unfair to accuse whole group as guilty because innocent individuals are involved and it is not fair. Mostly, the effort to find the target goes back to zero. The Palestinian movement of gathering together as a mass crowd to stop the Israeli attack is the physical representation of this idea in different context.

Monday, October 8, 2007

More Anonymities

Terrorism
By not claiming their responsibility over the event of terror, the terrorist group can create the sense of horror to their target group, and avoid counter attack. 22.8 percent of Israeli - Palestinian terrorism occurred between 1994 to 1999 time period are anonymous.

Underground Economy
Most of the underground economy chooses to be anonymous to avoid taxation from the government. The market not only includes illegal commerce (i.g. drugs, prostitutions, firearms, copyrighted media, etc.) but also legal service because of the benefit of not paying tax. Cash is preferred in underground economy because it is not easy to track.

Suicide group
Anonymous suicide is recent social phenomenon in developed Asian countries. Mostly formed over the internet, the victims exchange their information while staying anonymous. By belonging to the crowd, the individual victims are less recognizable and gains more confidence for suicide. The anonymity prevents them to be found by authority before the occurrence of suicide, but also protect the privacy of the members and their social life while they stay alive.

Homeless
Homeless are the one that are out of existing system. By being invisible to the system, they become anonymous to the society either voluntarily or involuntarily. By being out of system, homeless get out of the social responsibilities that are required from the location they reside.

Most Wanted
Most wanted fugitives from certain societies can be seen as physically anonymous because of their invisibility to the authority. By staying invisible and physically anonymous, they can delay the accusation from the authority while accomplishing their interests.

Pasquinade
Pasquinade is an anonymous lampoon. It obtained double meaning when people started to post anonymous satire to criticize their unhappiness over pope or the government.

Graffiti
If formal art is the one that has clear profile, graffiti is a type of art that stays anonymous in a way. The observer of the graffiti does not get the formal presentation of the artist or art. The artist like Bansky or Invader are anonymous but created their presence by repeating the similar style of art and getting recognized.

First federalist paper
Federalist paper is one of the iconic example of anonymity. The paper was published anonymously to avoid political oppression. The influence of the federalist paper to the constitution made the anonymity to be guaranteed as citizen’s right.

Anonymous Voting
In democracy, the degree of being anonymous in the voting system is important to achieve the fairness.

Bansky and Invader | Cultural Anonymity


Unlike formal art, the street art scenes including graffiti is anonymous. While blended in the urban fabric, the street art approaches observer by being itself, only with its content without letting people know who is the artist. In case of Bansky and Invader, the repetition of the similar style created the strong identity for the art itself, again, without the emphasis on the author.

Profile Experiment | Tor


I downloaded and installed Tor, the anonymous networking program. Unlike other programs, Tor asks the minimum amount of personal information, since it is not important and necessary. The website says the individual usage of Tor is to avoid tracking system from the websites. It is quite different from my understanding of Freehaven, the precedent of Tor - According to my research, Freehaven requires to contribute storage space as a server to store the information. Maybe it is different when I run my own server.


One of the interesting feature in the software bundle is 'Tor Network Map', which shows the physical location of the servers on the global map. Again, I am not really sure how much of anonymity is achieved when the information of location is released, especially aided by graphics.

What I need to do to hide myself in the network is to figure out Hidden Service. Without that, even though Tor is running, I am not really using or participating inside of the network. This is the message I got.


I am still getting used to the interface. One of my concern is whether I can run a server from school network or not, since they are tracking my daily use of network.

Sunday, October 7, 2007

Some new thoughts

It is definitely getting harder and harder to get out of the system (i mean, mostly authoritarian system like politics and economics) because the survival of self is getting challenged. The movie code 46 shows the obvious comparison between being inside and outside of the system. Since it is more technology dominated society than even now, most of the individual profiles are kept in the record, and their traces are tracked. When an individual deny to provide the information to the system, he or she is losing the right to participate inside of the system.
The living outside of the system requires a person give up lots of things that a civilization offers. There is no production going on outside, means that there's no job. There's no protection or law. Most of the rule is based upon survival of each individual, but the self organization is not successful since most of them are pretty emotional. It can get tired and dangerous outside of the system.

What is the benefit of being outside, or invisible to the system? The control from the system requires its members to give up certain part of their freedom. Achieving pure freedom and free will is impossible. Here's the question then. What is priority of the value? The ability to achieve pure freedom under the challenged environment, or compromise some of the freedom to acquire the full access to the benefit from the system? Is anarchy a model that can substitute the idea of system?

The benefit of being out of system is though, than the system can be reanalyzed in a different perspective. If that perspective comes back to the existing system, it will recontextualize itself inside of the system....

I'd like to look into what it takes to be anonymous in the contemporary system, and what kind of surveillance is being developed. The idea of electronic transaction in the economic system, or machine tracking system in the process of productions are types of surveillance. On the other hand, people in different class of society, like most wanted from FBI or homeless people are voluntarily or involuntarily out of system, means that they are anonymous and invisible to the system. Is this idea can be represented in some way? Is this research going somewhere that actually requires design decision? I am not sure now but hopefully it works out. :)

Friday, October 5, 2007

Anonymous Network Casestudy 3 | Havenco.


Havenco is both physically and virtually off shore network. By locating its server in the Sealand, the self claimed sovereign state, the service can officially avoid physical adversary attack to the server, because the location itself does not comply with international law. The result of the service was however unsuccessful due to the failure of providing required infrastructure server for the service. At the same time, the service failed to gather enough clients. The idea of Havenco is one of the most close model of Crytonomicon, the famous novel by Neil Stephenson.

It is hard to say that Havenco is anonymous networking service, even though the spectrum of service guarantees the anonymity. Instead, Havenco made their presence invisible by placing themselves into a location that is out of the global system.

Anonymous Network Casestudy 2 | Freenet

The Freenet project is designed based upon the idea of adaptive network. The idea of adaptive network is inspired by the prehistoric navigation. Without locational information from the central authority, people in prehistoric era were geographically able to navigate by gathering information from what they encounter. Assuming the clarity of the information is relative to the proximity of the location, one can reach to the destination by gathering bits and bits of information as he or she gets closer to the destination. The same logic applies to the network, except we are getting closer to the piece of information.

In the adaptive network system, servers not only contain the information itself, but also contains information about other nodes. When a node gets a request for certain information it doesn't have, it will forward the request to the node that actually have that information. The whereabout of the information is then fed back to the system, so the whole system gets update. Moreover, the information itself gets stored in the node that received first request, so it doesn't have to forward the request to other node. This method eventually groups the node based upon similarity of the information.

When a node receive a request, it generates a data reply message contains desired data. If node does not have the data then it should forward the data request on to another node. A node also stores data ID, data replied and request failed history. If a data request is received from the ID that has been seen before, then a backtracking request failed message should be returned to the sender.

The information are removed based upon their usability. The least requested materials are the one that get removed first.

Anonymous Network Casestudy 1 | Free Haven

Free Haven consists of two different system - Publication system and communication channel. The publication system is a back end of communication channel. There are 3 agents in the publication system: author, publisher and reader. These agents are layered over the communication channel and communication with each other via addresses which are implemented as remailer reply blocks (remailer reply blocks: collection of encrypted routing instruction which serve as an address for a pseudonym on the network.)

Free Haven is based upon communities of servers called servnet. The servnet is formed based upon trust among the servers. Each server hosts data from the other server in exchange for the opportunity to store its own data in the network. The servers transfer data by trading storage space in its own. To store a data in the servnet, a server also need to contribute storage space for others.

Each server has a public key and one reply blocks. The documents are indexed by the hash of the public key from the key pair which was used to sign the shares of the document. To locate a server that contains certain document, readers need to generate their own key pair and remail reply block. The server broadcasts a request along with the readers' public key and the reply block.

The servers that receive the broadcast checks to see if it has any shares of the request. If it does, it encrypts each share using the public key posted by the reader enclosed in the request, then send the encrypted share through the remailer to the enclosed address.

The data are split into shares and stored on different servers. Publishers assign an expiration date to document when they are published; servers make a promise to keep their shares of a given document until its expiration date has reached. If a server drops data early, the trust level of the server decrease.

When storing the data, each server agrees to store data for the other servers without considering legal or moral issues.

Free Haven is precedent of Tor. The Tor system is well explained in its website. Click Here.

Most of this information is from the paper "The Free Haven Project: Distributed Anonymous Storage Service." The PDF file can be found here.

Wednesday, October 3, 2007

Anonymous network operation _ General

Here's the basic idea of anonymous network operation. Let's say, A wants to deliver the information to B. To stay anonymous, A let a delivery service X to deliver the information to B. X receives the information from A and delivers to B. However, X is not a simple trusted third party. X provides specific set of services that can protect anonymity. The anonymous networking system is equal to X.

In late 90s and early 2000, there were lots of research and effort to set up anonymous network. Some of them still exists and operate, and some of them are forced to stop their service. In this research, I looked into how these services operated to protect the leak of information. Even though the basic idea of operation is same, each networks are designed in different way.


I am also trying to find out who are using these network, and who are their adversary in more global scale. I am not sure how much of this information can be extracted.