Nodes of Resistance: Sampling the Haitian Diaspora via FM+Internet

17 years ago(!), I left a budding career in radio journalism out of disgust with the trajectory the industry was taking. The break-point came when the National Association of Broadcasters and National Public Radio teamed up in Congress to conduct a disinformation campaign designed to eviscerate the FCC’s then-newly proposed LPFM radio service.
However, A few months before I actually quit my job, I acquired all the components necessary to start an unlicensed microbroadcast station. “System P” was a 40-watt frequency-agile FM rig that used a portable military surplus antenna mast to conduct tactical broadcasts from a wide variety of locations. You could often hear the station in Madison, Wisconsin, primarily on evenings and weekends; but since the station was mobile much fun was had taking it to peoples’ homes and public events around the country to give the public a more substantive appreciation of the ease by which it could make “the public airwaves” very real.
Another key element of System P was to provide a last-mile node for what was then quite an experiemental webcast-activism scene (today commonly known as “livestreaming”). These often manifested in Independent Media Centers during times of protest, most notably against corporate global trade deals. Activists would converge on a city to fill the streets in order to disrupt the negotiation of these agreements, and the media coverage would invariably skew toward painting the activists as violent thugs and police/other security forces as the guardians of order. But when activists gained the ability to counteract this narrative – oftentimes by live reports from the streets directly – the discursive dynamic around these events changed. Continue reading “Nodes of Resistance: Sampling the Haitian Diaspora via FM+Internet”

DAB: A Hacking Vector?

U.S. news media went bonkers a couple of weeks ago when information security researchers, in conjunction with a journalist from Wired, demonstrated how they could remotely access a Jeep Cherokee and take control of various functions, including its engine, steering, and braking. The hack exploits the fact that many cars and trucks today interface with the Internet in some fashion, either directly or via other devices that connect to them (like a smartphone).
That hack targets vehicles on a one-to-one basis, and it is not the first of its kind. But what if you could broadcast an exploit to multiple vehicles at once? Turns out this is possible, too. Researchers in the U.K. say they can transmit code within a DAB digital radio signal that provides control of critical vehicle systems. Continue reading “DAB: A Hacking Vector?”

CBRS: A Foray Into Spectrum Sharing

Earlier this spring the FCC announced the creation of what it calls the Citizens Broadband Radio Service (CBRS) — a swath of spectrum between 3.5-3.7 GHz that will be opened to both licensed and unlicensed services. This spectrum has traditionally been reserved for military radar and satellite uplinks; now it may become a sandbox for dynamic use of the public airwaves.
This particular slice of spectrum falls between two established Wi-Fi allocations, so one obvious potential use is for the provision of last-mile (or last-foot) broadband access. Incumbent users (the Navy and satellite ground stations) will remain on the band, but they’re so geographically sparse that for all intents and purposes this spectrum has been fallow in the majority of the United States. Under CBRS, instead of licensing devices to work on a particular channel within a band, they will be effectively permitted to use the entire band. The devices themselves will be programmed to sniff the local airwaves to find and utilize non-congested channels in its immediate area. Google is developing a database of CBRS users and devices that will be updated in real-time based on operating feedback from the devices themselves — the Internet of Things coming to life. Continue reading “CBRS: A Foray Into Spectrum Sharing”