The Supreme Court of the United States (SCOTUS) has become a corrupt body. It is dismembering the most fundamental principles of our Constitution and Declaration of Independence. SCOTUS appears to be fixed upon a course to transform the United States into a monarchy of kings and courtiers, under a national evangelical church.
SCOTUS' five conservative members range from merely being disconnected from reality (Roberts) to anti-regulatory/pro-corporate hacks (Gorsuch) to evangelical warriors (Barrett) to the suspect corrupt (Kavanaugh) to right wing nationalists (Alito) to the outright corrupt (Thomas).
Recent decisions of SCOTUS risk displacing Dred Scott v. Sandford (60 US 393 (1857)) as the worst decision in US history:
In addition substantial questions have been raised regarding significant ethical lapses, under- (or non-) reported gifts (that have every appearance of lightly veiled bribes) from interested parties with present or future cases before the court, and conflicts of interest through spouses who have direct interests in cases presently or likely to come before the court.
SCOTUS has declared itself as primus inter pares - first among equals - of the three formerly equal branches of our Federal government. In the recent Fischer v. United States (603 US _ (2024)) SCOTUS declared the judicial branch, with SCOTUS at its head, as having the power to discard and reinterpret decisions of the legislative and executive branches. (This new power to reinterpret is a massive extension of the well accepted power of our courts to determine whether legislative and executive acts are within the Constitution.)
It is clear that the Supreme Court of the United States has run off the rails ideologically and ethically. SCOTUS has ejected our Presidential and Congressional pilots, locked the citizens of the United States out of the cockpit, and is flying our country straight into national catastrophe.
So what can we do about it?
This note suggests a radical, revolutionary answer to what is a radical, revolutionary problem.
That answer is to partially neuter SCOTUS.
The proposals made here require no changes to the existing Constitution. This proposal is entirely within the existing powers of Congress and the President.
I am a human, I am not an AI.
I wrote this piece to reflect on the testing of Internet protocols, in
particular through the use of devices that tickle the flow of packets
going back and forth between devices that speak those protocols.
The term “network emulator” is ambiguous.
Does it refer to a device that affects actual packet traffic or is it
a mathematical model about what would happen to real traffic?
If real packet traffic, where do those packets come from, the user’s
own network or a synthetic traffic generator?
Can traffic be classifed into related streams and subjected to
different kinds of effects?
Is the purpose of the emulator to test protocol implementations for
robust and correct operation, or is the purpose to push devices under
extreme loads?
I tend to work with actual, running network protocol code.
My intent is to test whether devices that contain that code
perform acceptably when presented with the kinds of network conditions that can occur
on real networks but which are rarely present on the pristine networks used by
code developers and QA teams.
As a consequence, I am more attuned to network emulation tools that allow
the controlled manipulation of actual traffic streams emitted by real devices
than with mathematical simulations of hypothetical or synthetic,
perfect protocol interactions.
I live far from Washington DC, and my practice in law has never
required me to bring a matter before SCOTUS. So, for me, membership
in the SCOTUS bar would be a bauble, a nice certificate to add to my
office wall.
I used to consider the Supreme Court of the United States (SCOTUS) to
be an institution with honor and integrity.
I no longer hold that opinion.
I used to believe that a case before SCOTUS would be decided using
clear logic, established precedent, and prudence.
I no longer hold that opinion.
Every now and then I ask myself “Should I petition to become a member
of the United States Supreme Court Bar?”
But now I add a second question: “Do I want to debase myself by asking
for admission to an institution that is no longer worthy of respect?”
The Internet has become a lifeline grade utility.[1]
Our health, safety, and financial security depend on reliable and consistent availability of Internet services.
Yet over the years we have given relatively little consideration to actually having a reliable and consistently available Internet.
We are to a large extent flying the Internet on good luck and the efforts of unheralded people often working with tools from the 1980s.
As we wrap the Internet with security walls and protective thorns, maintenance and repair work is becoming increasingly difficult to accomplish in a reasonable period of time, or even at all.
With the increasing inter-dependency between the Internet and our other lifeline grade utilities — such as power, water, telephone, and transportation — outages or degradations of any one of these systems can easily propagate and cause problems in other systems. Recovery can be difficult and of long duration; significant human and economic harm may ensue.
Although we can hope that things will improve as the Internet matures, outages, degradations, and attacks can, and will occur. And no matter how much we prepare and no matter how many redundant backup systems we have, equipment failures, configuration errors, software flaws, and security penetrations will still happen.
The oft quoted line, “the Internet will route around failure”, is largely a fantasy.
When we designed the ARPAnet and similar nets in the 1970s we did have in mind that parts of the net would be vaporized and that packet routing protocols would attempt — notice that word “attempt” — to build a pathway around the freshly absent pieces.[2]
Today’s Internet is less dynamic than the old ARPAnet; today’s Internet is more “traffic engineered”, and subject to peering and transit agreements than the old ARPAnet. Although the possibility of dynamically routing around path problems remains, that possibility is constrained.
Today’s Internet is far more intricate than the ARPAnet. Today’s Internet services are often complicated aggregations of inter-dependent pieces. For example, web browsing depends upon more than mere packet routing; it depends upon a well operating domain name service, upon well operating servers for the many side-loads that form a modern web page, and upon compatible levels of cryptographic algorithms. Streaming video or music, and even more so interactive gaming or conversational voice, requires not only packet connectivity but also fast packet delivery with minimal latency, variation of latency (jitter), and packet loss.
As any one today can attest, today’s Internet service quality varies from day to day.
When the Internet was less ingrained into our lives, network service wobbles were tolerable. Today they are not.
Problems must be detected and contained; the causes ascertained and isolated; and proper working order restored.
Individually and as a society we need strong assurance that we have means to monitor the Internet to detect problems, to isolate those problems, and to deploy repairs. Someone is going to need adequate privileges to watch the net; to run diagnostic tests; and to make configuration, software, and hardware changes.
However, we do not have that strong assurance.
And the few assurances we do have are becoming weaker due to the deployment of ever thicker, stronger, and higher security barriers.
Simply put: Our ability to keep the net running is being compromised, impeded, and blocked by the deployment of ever stronger security measures.
This is a big problem. It is a problem that is going to get worse. And solutions are difficult because we can not simply relax security protections.
This paper describes this problem in greater detail, speculates what we might be able to do about it, and offers a few suggestions.[3]
It seems as if certain states of the USA and certain right-wing political “leaders” are trying to control what people can read, watch, or listen to.
This is often a practice of conservative elements, particularly those espousing fundamentalist or Puritan religious beliefs or advocating neo-apartheid goals.
This kind of thing has been attempted in the past. It has not succeeded.
So let’s look at one such attempt by one of the era’s most dominant and controlling institutions, the Catholic Church before the Reformation.
The Lateran Council was began in 1512 and continued through 1517.
Among its decisions was the following. Books had to be examined by a high officer (a Bishop) of the church before publication. Failure to obtain such permission could result in one of the most draconian of sanctions, ex-communication.
I gave one of the two keynote presentations at NANOG (North American Network Operators' Group) in the fall of 2019.
There were two parts to the talk.
The first part deals with the responsibilities, obligations, and
liabilities of being an operator of parts of an Internet that was
becoming a lifeline grade public utility.
The second part shifts to ways we design and implement the Internet to
improve its resiliance to errors, problems, and attacks. I suggest
that we look beyond traditional methods of designing and
implementing computer systems. In particular I urge that we take a look at
the methods used by living things to improve their ability to survive.
Below the break is the textual transcript of the talk.
In case the video does not start at the right place, my presentation begins at 7:43.
Joe Everyman, Mr. Corporate, and Ms. Lawfirm walk into a voting precinct. Each gets a ballot, each marks his/her choices, and each puts the marked ballot into the voting box.
Joe Everyman, believing in the principle of one-man, one-vote, leaves.
But Mr. Corporate and Ms. Lawfirm each walk outside, put a sock puppet onto each of their hands, re-enter the precinct and use ventriloquist voices to demand additional ballots, one for each puppet.
The precinct workers say, “you can’t vote a second and third time!”
But Mr. Corporate and Ms. Lawfirm answer on behalf of their respective sock puppets: “I am not voting again, I am merely accompanying a pair of stakeholders who now want to cast their own votes.”
Huh? You would be quite correct if you were to say “This is not democracy!”
But you would be quite wrong if you were to think that this kind of thing does not happen.
In fact it happens quite often.
It goes by then name “multi-stakeholder” or simply “stakeholders”. These are systems in which some people get to use sock-puppets to multiply their votes and influence.
Throughout our country people are talking about the United States Supreme Court (SCOTUS).
There are few alive today who have experienced a more conservative Supreme Court.
And there are few objective observers who would deny that on today’s court that legal principle is often subordinated to fundamentalist religious views, libertarian biases against the Federal government, or hazy notions of “natural law”.
Many of the conversation about SCOTUS ask whether we ought to expand the number of justices (pejoratively called “court packing”) or impose some sort of term or age limits on the justices (which would probably require a Constitutional amendment that would be a practical impossibility in today’s political climate.)
But there is another matter.
It is an important matter. It is overlooked. It is a matter that is fully within the power of Congress (with the President’s signature). And it is a matter that requires no Constitutional amendment.
Our Supreme Court is overworked.
The growth of our government, our regulatory agencies, and the ever ramifying complexity of our lives, economy, and technology have increased the work demanded of the court.
SCOTUS does not have the resources to do a proper job.
This article argues that we ought to reshape our Supreme Court so that it can better deal with the workload.
This article proposes nothing radical. Rather the proposal here builds upon long established practices of US courts, most particularly the United States courts of appeal.
I’ve known him since we met one morning at Hazeltine Elementary School in Van Nuys (California) waiting to get into the first day of Mr. Stone’s 4th grade class.
I doubt that any of us thought that our teacher, Mr. Stone, had a first name, much less knew it.
Jay went on to become a teacher and educator. I suspect that his students knew his first name.
Jay and I somehow managed to both win a Good Citizenship medal from the Daughters of the American Revolution. Had the DAR had any notion of what our political and social views would become they probably would have chosen differently.
Kronos was afraid being overthrown by his sons. So he eliminated them.
Many modern software developers seem hell bent on devouring the past. But they have less reason to do so than did Kronos.
Few of us remember mainframe computers (although they still exist). During their heyday from the 1950s through the 1990s the unbreakable rule was “backwards compatibility”. It was a great sin to change an API (Application Programming Interface) to an operating system or library in a way that could cause existing software to go awry or fail.
This honoring of the past worked: There are many mainframe financial applications, written (often in the 1959 language Cobol) between 1960 and 1990 that are still in heavy use today.
However, today the concept of backward compatibility is no longer universally respected. Today many software developers and providers do not bother to pause and think of the consequences before racing forward and breaking with the past.
We are forcing people to fix what is not broken. We are forcing people to rewrite working code or abandon working products simply because someone, somewhere has decided to cancel existing, working software foundations, often for no reason more substantial than that those foundations are older and perhaps less “elegant” in the eyes of some.
To: The Commissioners of the Santa Cruz County Regional Transportation Commission (RTC)
On May 6, 2021 the RTC Commissioners will once again be voting on the Transit Corridor Alternatives Analysis and Rail Network Integration Study (TCAA/RNIS) Business plan.
That Business Plan deserves your approval.
Santa Cruz County has a traffic problem, a large traffic problem.
Most residents and businesses in Santa Cruz County are concentrated in a long, narrow coastal plain between Watsonville at the south end and Santa Cruz at the north.
The principal arteries of transportation are two highways: Highways 1 and 17. Both are aging and designed for an era when Santa Cruz County was more rural. Both congest and clog daily.
Caltrans has widened parts of Highway 1 with almost no long-term benefit. And there’s little chance that the infamous “fishook” or the obsolete on/off ramps (such as Soquel near Dominican) will be remedied.
Today, even in the era of Covid-19 and work-at-home, there is a daily tide of commuter traffic. In the morning much of that tide flows north on Highway 1 from Watsonville to Santa Cruz. Much of that traffic continues over Highway 17 to Silicon Valley. In the evening that tide reverses. Long delays occur every day as thousands of automobiles stop, creep, and stop again.
We have a system of smaller roadways, such as Soquel Drive. But they are mere capillaries.
And yet, right in front of us is a golden resource – The “Santa Cruz Branch Rail Line” (SCBRL), an old rail line that runs from a junction with the Union Pacific (and future Caltrain) line in Watsonville, north through Santa Cruz and on to Davenport. These still functioning tracks run close to the Monterey Bay shoreline and roughly parallel to Highway 1.
Already, many are talking about adding new justices to the Supreme Court to overcome the political imbalance that is likely to occur when a new Justice is confirmed to fill her now vacant seat.
However, this article is not about the Supreme Court or the addition of new Justices.
Instead, I want to address two subordinate Federal courts — our system of District and Circuit (appellate) courts.
The judges on these courts are generally referred to as “Article III” judges to distinguish them from judges on Federal regulatory and administrative courts. Article III judges “hold their offices during good behaviour”. This effectively means they have lifetime appointments.
The membership of the Supreme Court gets most of our attention. Yet, during the 2017-2021 presidential term those lower courts have been packed with more than 200 questionable or highly biased appointees.
The District Courts handle all Federal trials. The Circuit courts handle all appeals aside from the tiny portion that is taken up by the Supreme Court.
The impact of the last four years of Federal judicial appointments is significant, amounting to 25% of all Article III judges.
And because those judges have lifetime appointments that impact could continue for years. Generations of new and existing voters could find their majority views and votes blocked and nullified by judicial decisions made by those judges.
How do we deal with this?
While the problem might seem hopeless, there are things we can do.
The Trump presidency has been a Constitutional disaster for the United States. Presidential power, which already had been growing at an alarming rate in prior administrations, has exploded to dictatorial levels under Trump.
It is not reasonable to expect that future presidents will easily reject these powers. Even if not used by the next or subsequent presidents these powers will retain their potency and be available to be resurrected and used.
Many of these new claims to executive power exclude, in practical reality if not in academic theory, the authority of Congress, the Courts, or the people of the United States to step in to impose corrections or limitations.
Our system of Separation of Powers has been weakened. Madison’s notion, as expressed in the Federalist Papers (Number 51), that “Ambition must be made to counteract ambition”, is in need of life support.
Because the basic allocation of authority in the United States comes from our Constitution it is beyond the power of Congress, the courts, or the States either individually or in concert, to do more than apply cosmetic remedies.
As a consequence we are faced with an exigent need to update our US Constitution with one or more amendments that define the limits of executive authority and create and enhance the balancing powers vested in the other branches of government and the citizenry.
In the years just after the Civil War, Congress and the States created three new Constitutional amendments, along with a body of supporting legislation. These Amendments and laws reshaped our country in ways that remain important, more than 150 years later.
I’m working on this to send to my congress critters as a request for legislation. This is a first draft…
H. R. _
To ensure that United States Treasury funds are not expended for certain purposes of personal aggrandizement or self promotion.
IN THE HOUSE OF REPRESENTATIVES
November 8, 2018
A BILL
To ensure that United States Treasury funds are not expended for certain purposes of personal aggrandizement or self promotion.
Be it enacted by the Senate and House of Representatives of the United States of America in Congress assembled,
SECTION 1. Short title.
This Act may be cited as the “Challenge and Commemorative Coins Act of 2018”.
SECTION. 2. Limits on Challenge and Commemorative Coins.
(a) Any other provision of law notwithstanding, no elected official, appointed official, employee of the United States Government, or member of the United States armed forces may expend or commit any United States funds or assets for any purpose associated with the design, creation, or dissemination of any Challenge or Commemorative Coin bearing the likeness or name of any living person.
(b) Congress may enact specific exceptions to subsection (a).
(c) Definitions.—In this section:
(1) The term “Challenge of Commemorative Coin” means…
(2) The term “Likeness” means any photograph, video, movie, drawing, cartoon, sculpture, bas relief, or other visual representation.
Proposed Amendment to the United States Constitution To Redress the Increasing Distortion of Elections and Political Speech by Corporations and Other Aggregate Forms
Proposed Text
Corporate and other aggregate forms of organization are neither Persons nor Citizens under this
Constitution and shall have neither protections, rights, nor legal standing under this Constitution
This Amendment shall not be construed to deny or disparage the power of Congress or the Several
States to enact legislation that defines rights, powers, limitations,
liabilities, and standing of such corporate and other aggregate forms of organization
There is no doubt that many of our communities need safe, clean, accessible, and inexpensive housing.
This note does not dispute that need. Rather, this article, questions whether “Tiny Houses” are among the better answer or whether there are better approaches.
Many communities are under pressure by advocates for increased housing for the homeless to consider adopting policies that encourage tiny homes.
The argument made here is such policies may be a weak answer to the need to provide housing for the homeless.
The internet has changed and evolved ever since it’s ancestors first came to life in the late 1960’s. Some technology fades away and is forgotten; other aspects continue but are overlaid, like geological sediments, so that they are now longer visible but are still present under the surface.
The Domain Name System - both the technology of DNS and the deployed naming hierarchy we all use - are among those aspects of the internet that, although they feel solid and immutable, are slowly changing underneath our feet.
The PC-Engines APU2 is a very nice board when you need a lot more horsepower than a Raspberry Pi but still want low power, small form factor, and no moving parts.
Among the many features of the The APU2 are three LEDs and one mode button/switch.
I needed a device driver so that my code could control the LEDs and read whether the button is pushed.
I wrote one. It is up and available on the InterWorking Labs website: at https://iwl.com/.
Articles, blogs, and
meetings about the internet of the future are
filled with happy, positive words like "global", "uniform", and "open".
The future internet is described in ways that seem as if taken from a late 1960’s Utopian
sci-fi novel: the internet is seen as overcoming petty rivalries between countries,
dissolving social rank, equalizing wealth, and bringing universal justice.
If that future is to be believed, the only obstacle standing between us and an
Arcadian world of peace and harmony is that the internet does not yet reach everyone, or that
network carriers are unfairly giving different treatment to different kinds of traffic, or that
evil governments are erecting “Great Walls”, or that IPv6 is not yet everywhere, or that
big companies are acquiring top level domains, or that encryption is not ubiquitous …
The list goes on and on.
I do not agree.
I do not believe that the future internet will be a Utopia.
Nor do I believe that the future internet will be like some beautiful angel, bringing peace, virtue, equality, and justice.
Instead I believe that there are strong,
probably irresistible, forces working to lock-down and partition the internet.
I believe that the future internet will be composed of “islands'.
These islands will tend to coincide with countries, cultures, or companies.
There will be barriers between these islands.
And to cross those barriers there will be explicit bridges between various islands.
Network traffic that moves over these bridges will be observed, monitored, regulated, limited, and taxed.
The future internet will be used as a tool for power, control, and wealth.
And to a large degree the users of this future internet will not care about this.
This paper describes this future - a future more likely than the halcyon world painted by others.
I have reworked the old, Joomla based, CaveBear website.
It took a lot of work.
A lot of URLs got changed, thus breaking external links.
And I am sure that a lot of small adjustments remain to be done.
The old one was not broken.
So why did I break a perfectly good website?
Well, I’ll tell you why.
It all begins with the idea that much of the content of today’s world-wide-web will disappear.
Proposed Amendment to the United States Constitution To Redress the Increasing Distortion of Elections and Political Speech by Corporations and Other Aggregate Forms
Karl Auerbach ─ October 14, 2011 ─ Version 1.04
Proposed Text:
Corporate and other aggregate forms of organization are neither Persons nor Citizens under this Constitution and shall have neither protections, rights, nor legal standing under this Constitution.
This Amendment shall not be construed to deny or disparage the power of Congress or the Several States to enact legislation that defines rights, powers, limitations, liabilities, and standing of such corporate and other aggregate forms of organization.
The Problem:
The conservative wing of the US Supreme Court has elevated several corporate rights to at least the same degree of Constitutional protection as the rights of natural (living) people.
There is little or no precedent for the creation of these rights in corporations. The idea of the modern corporation did not arise until nearly a century after the writing and adoption of the Constitution. And the 14th Amendment predates the rise of the modern corporation by at least a decade.
In other words, these corporate rights are the product of judicial legislation.
It used to be that people who drive with the windows open or the top down could identify two kinds of vehicles from their smell, even at long distances: Ford diesel pickups, both old and new, and old diesel Peugeots.
The ranks of the stinkers have been supplemented by biodiesel conversions of cars and trucks that should have been scrapped long ago.
And here in Santa Cruz, there are a lot of these things.
So far none of the candidates for president has answered some of the questions I would like to hear answered:
Will, and when, will the candidate initiate a review with the purpose of repudiating Bush’s excessive signing statements?
Will the candidate promise not to use signing statements except to identify ambiguities and difficulties so that Congress may provide clarifications?
Will, and when, will the candidate repudiate the concept of the “unitary executive”?
Will, and when, will the candidate recognize that the Constitution of the United States not only limits the powers of the United States Federal government, including the executive, within the geographic borders of the United States, but everywhere.
It’s pretty obvious that the Republican party is going to try to paint Democratic candidates for US Federal offices (President, Senate, and House) as wimps who are going to hand the country over to “terrorists”.
That, of course, is utter and vacuous nonsense.
The real issue for fall 2008 is this:
Are we Citizens or Subjects?
The Democrats allow us, you and me, to have opinions, to differ from one another, and to disagree with the government. In other words, we would be citizens.
The Republican position, on the other hand, tries to make you and me subordinate to the government position. The Republicans want us to be subjects. If we differ on any subject from their position - whether it be on a war, on use of taxes to support “faith”, or on whether the government hand is put down our wife’s throat or down our pants - then we will be labelled as unpatriotic and un-American.
I’m getting pretty disgusted with the way that Congress does the dance of the neutered wimps around the president’s increasingly egregious claims of executive power.
GWB is playing a game of chicken with Congress and Congress ought to call his bluff.
The House and Senate ought to begin by sanctioning those government contractors who refuse to turn over documents because the president told them not to. Perhaps the Senate ought to begin by holding some executives from Blackwater and AT&T in contempt and tossing ‘em into the clink until they recognize that Congress has at least as much authority in this country as does the president.
And Congress, even if it does not have the votes to pass veto proof legislation or to get past the Senate’s filibuster rules, most certainly has the power to refuse to pass legislation that the president needs.
Teddy Roosevelt once sent a fleet across the seas and said that it was Congress’ problem to pay to get it back home. Perhaps Congress ought turn the tables and refuse to pass the forthcoming budget, let the Federal government go into stasis, and tell the president that it’s his problem to pay for his war.
May you have a long life; may your mind remain lucid.
May you live to see the nation and history repudiate everything you have done and everything you stand for.
My you live to understand how you perverted your oath to preserve, protect, and defend the Constitution of the United States.
May you live to perceive how you polluted the words “freedom” and “democracy” and so dishonored the United States and its citizens that we are ashamed to say “We are Americans”.
May you live to comprehend that you cheapened religion, morality, and ethics by turning them into political tools of expediency rather than reflections of our highest aspirations.
May you live to feel shame for what you have done.
I’ve been rather busy of late; I’ve been writing a lot of code in pursuit of my long developing ideas about self-healing networks and network troubleshooting (these may seem disjoint, but they are two ends of a spectrum.)
I needed a break, so this last weekend I fired up Doda, dropped her top, and headed south for a trip over the Santa Lucia mountains, from King City to Big Sur via the Nacimiento-Ferguson Road.
The trip encompassed landscapes covered by two of California’s greatest writers - Wallace Stegner and John Steinbeck. (All married people ought to read Stegner’s Angle of Repose and Crossing To Safety.)
So, I bet the first thing you want to know is what I look like. The photo on the left is nearly a decade old, but I like it. The vicissitudes of Internet politics, life at startups, and life in general have left me with a bit more gray around the edges.
Some people have said "Karl is a crock".
And I’m here to say that they are right… sort of…
Yes! That that is me over there to the lower right.
I was understudy crocodile in a production of Peter Pan.
It is true that I hold some strong opinions. This website is full of materials that articulate and elaborate on those opinions so I won’t go into a lot of detail here except to say that I firmly believe that modern governance - political and of the internet - is in serious trouble unless we abandon the corrosive concept of stakeholderism and return to the principles of constrained government and separation of powers, as articulated by so many of the great thinkers of the 18th century.
Who or what is CaveBear? The "where" part is easy: 37° 00' 02 North by 122° 00' 59 West - which just so happens to be in the City of Santa Cruz in the State of California.
CaveBear was formed by me, (Karl Auerbach) in Mid 1994.
CaveBear is an organization for research, consulting, product development, and other matters related to the internet. CaveBear explores new ways of making the Internet a more useful place for people. Projects include:
Tools for network diagnosis and repair.
The homeostatic (self-healing) internet.
Lifeline grade internet services.
Capability computer architectures and operating systems.
Internet governance.
Internet law and policy.
Protocol interoperability analysis and testing.
Internet humor.
The History of the Internet Project (sponsored by InterWorking Labs).
Shakespeare said - "what’s past is prologue, what to come in yours and my discharge." If CaveBear is about anything, it is about new ideas and new things.
Mr. Auerbach is the Chief Technology Officer at InterWorking Labs (IWL) in Scotts Valley, California.
Mr. Auerbach was the first (and only) North American publicly elected member of the Board of Directors of ICANN, the Internet Corporation for Assigned Names and Numbers.
Karl Auerbach was formerly a senior researcher in the Advanced Internet Architecture group in the Office of the Chief Strategy Officer at Cisco Systems.
In addition to his technical work, Mr. Auerbach has been an attorney in California since 1978. He is a member of the Intellectual Property Section of he California State Bar.
In 2002 he received the Norbert Wiener Award from the Computer Professionals for Social Responsibility (CPSR).
Karl Auerbach has been creating and extending Internet and operating system technology since the early 1970s. He has worked at all levels, from hardware to protocols to applications to legal policy.
In addition to his technical work, Mr. Auerbach has been an attorney in California since 1978. He is a member of the Intellectual Property Section of he California State Bar.
Mr. Auerbach is the Chief Technology Officer at InterWorking Labs (IWL) in Scotts Valley, California.
Karl is a “Pioneer Member” of the Internet Society.
Recently, Karl has become concerned that our efforts to improve Internet and device security have overlooked our need to manage and repair the Internet. Security barriers have made it increasingly difficult to locate, isolate, and repair faults.
Scope
For more than five decades Karl has been involved in nearly every aspect of Internet technology and in much of the related national and international policy. There are few with Karl’s synoptic view of the Internet. Karl has worked with Internet technology from the electronic signaling layer all the way up through applications.
Karl was influenced by Dave Farber’s DCS network to think of networks as distributed systems with dynamic behavior and properties similar to that of a large scale industrial process.
Karl’s perspective on Internet policy is condensed into his “First Law of the Internet”:
Every person shall be free to use the Internet in any way that is privately beneficial without being publicly detrimental.
The burden of demonstrating public detriment shall be on those who wish to prevent the private use.
Such a demonstration shall require clear and convincing evidence of public detriment.
The public detriment must be of such degree and extent as to justify the suppression of the private activity.
Karl was among the first to bring together law and network technology, particularly with regard to privacy and domain name policy.
Karl has long strongly advocated that the Internet must be considered a lifeline grade utility. He has argued this point several times, such as in his 2003 presentation “From Barnstorming to Boeing – Transforming the Internet Into a Lifeline Utility”, his 2019 Keynote presentation at NANOG, and his long time position that the Internet should be managed less as individual, independently acting devices and more as a complex distributed process.
Karl’s technical work has contributed to the expansion, security, and reliability of the Internet.
His work on Internet policy and privacy have contributed to the development of Internet Governance and protections for users.
Karls work on tools and testing have led to an internet that is more robust and interoperable. And through Karl’s tools and testing people everywhere have increased assurance that their Internet devices will actually work.
His work with network security, although largely confined to the military sphere, advanced the art of both network and operating system security.
Karl’s work with John Romkey’s PC/IP, Packet Drivers, the ULANA effort, and Interop helped publicize and deploy interoperable TCP/IP code in an era when networking was largely for larger computers.
Karl’s leadership in articulating the technical goals and reasoning for design decisions in IETF meetings and on IETF mailing lists for 50 years has had major influence on two generations of technologists.
Karl, an attorney and member of the California Bar, has formed or led policy discussion groups and bridged the gap between Internet technology and government representatives, policy makers, lawyers, and academic researchers.
His work with voting contributed significant advances to trustworthy open source, inspectable testable voting machines and software.
Significant Achievements
During the 1970s Karl designed and implemented some of the first operating systems and networks based on formal security models. In this work Karl created the first encrypted VLANs, Virtual Private Networks, cryptographic key management protocols, message digests, access controllers, and multi-level secure networks.
During the 1980s and later Karl worked with several others to bring small computers into the nascent Internet.
His testing tools and his lead roles at “bakeoff” events, the ULANA project, and the Interop show net greatly increased the probability that network devices from different vendors would actually work with one another.
Karl created the first Internet “butt set”, a highly portable device that could be brought into the field by network repair teams to rapidly analyze problems.
In the mid 1990s Karl architected and implemented IP/TV, a pioneering product for internet distribution of entertainment grade video over the internet.
Karl’s efforts building tools, developing interoperability tests, and designing, deploying, and running the Interop show networks have facilitated Internet growth and the quality of Internet devices.
Karl has been a long-time member of the Internet Engineering Task Force (IETF). During that time Karl participated in, or chaired, working groups that led to the creation of widely used, full Internet Standards.
Mr. Auerbach served as a publicly elected member of the Board of Directors of ICANN, the Internet Corporation for Assigned Names and Numbers.
Karl is a co-founder of the Boston Working Group and has been involved in the issue of Internet governance for several years.
Karl has long been interested in questions related to Internet reliability, particularly as the Internet evolves into a critical element of our infrastructure.
Karl has a strong interest in network diagnostic tools
Karl was a principal in the creation of open voting systems. He was formerly on the Board of Directors of the Open Voting Consortium.
I learned about Pickapeppa sauce from the old Hippo restaurant on Van Ness in San Francisco. And I picked up the idea for the thyme in the spice blend from the movie “The Best Years of Our Lives”.
The cooking time will, of course, vary depending on your preferences as well as the heat of the BBQ. Take care, however, not to overcook the beef. The cook time below (8 minutes total on the grill) leads to roughly medium (or perhaps a bit more) cooked. If you like it more rare, remove a minute, perhaps two, from the total cooking time.
Boregs are from Armenia. All are made by wrapping phyllo (or pastry) dough around a filling.
The filling in this recipe is a combination of cheeses and herbs. Some recipes use filings that contain meat, typically lamb.
I also came up with a lemon-honey glaze that resembles a glaze from the old, and now long gone, Max and Son restaurant in Daly City, California - a rather unique place that was half New York deli and half Chinese.
I often adorn these with some bittersweet or semisweet chocolate that I’ve melted in a double boiler with some corn syrup, and then, before the chocolate hardens, I push some mint leaves onto the still-liquid chocolate.
A true bagel can be hard to find — they are not to be found in most supermarkets. Many restaurant “bagels” are simply round bread — boring. And real bagels are boiled — that is not something that is up for debate.
This recipe can be easily be modified to make plain (water), sesame, garlic, or other flavored bagels: just change-out the onion. Note, however, that after being boiled the bagels are not sticky and onions, seeds, or what-have-you will tend to slide off.
After ICANN rejected my Request for Reconsideration of ICANN great giveaway to Network Solutions (now Verisign) as being in violation of ICANN’s procedures, I submitted this Request for Independent Review.
I spoke on the weakness of ICANN’s legal and technical foundations, and the potential collapse of ICANN as a result, at Signifiers in Cyberspace: Domain Names and Online Trademarks at the Center for Law, Technology, and the Arts at Case Western Reserve University School of Law, November 12-13, 2009.
King Louis XIV of France, a man who treasured control over chaos, would have loved the Internet. This is a presentation I gave at Cal Tech and Loyola Law when I was named a Fellow of Law and Technology in 2001.
My comments on NTIA’s “The Continued Transition of the Technical Coordination and Management of the Internet’s Domain Name and Addressing System: Midterm Review of the Joint Project Agreement”
This is a note written not long after ICANN got started - and it reflects on how poor a start it was and how it established the pattern for the ICANN we have today. May 1, 1999
This is a presentation that I gave at the American Bar Association (ABA) National Institute on “Computing and the Law: From Steps to Strides into the New Age”. San Francisco, June 2007.
As my last act as a director of ICANN and during the course of a public meeting I tendered this report to ICANN’s Board of Directors. ICANN has never acknowledged this document; nor does it appear in any ICANN document collection or website. Adobe Acrobat format, 13 pages. June 2003
During my term on the ICANN board of directors I kept a written, public diary of my decisions. This is that diary. It spans the entire duration of my term, November 2000 through July 2003.
This is a chapter from Charles Dickens' book Little Dorrit (1857) The chapter describes the Circumlocution Office. It may, and should, call to mind a certain existing institution of internet governance.
This is my campaign platform for the year 2000 election for the North American seat on the ICANN board of directors. There is a fair amount of material here, much of it is still relevant today. November 10, 2000.
This is one of several papers that describes a way to structure bodies of internet governance, such as ICANN, into tightly constrained units that are less likely to go astray or suffer from mission bloat. April 2002
My “Concurrence” (Appendix 3) contains my arguments why ICANN needs a much broader base of public representation on its controlling body, the Board of Directors. My portion begins on page 32.
Internet Governance / ITU meeting on IG (Feb 2004)
Materials presented at the ITU meeting on Internet Governance in Geneva, February 2004
This is a Google Books scan of a paper we wrote at System Development Corporation (SDC) in 1978 on the topic of network security. The actual content begins on page 6. My name is misspelled in the list of contributors. 1978
This is a letter I wrote to CACM after which they claimed I had revealed classified material even though 100% of the sources were open and unclassified.
This is a thought piece I wrote describing where I wanted to take my company, Empirical Tools & Technologies. These ideas remain valuable but largely undeveloped. March 1993
This is a paper written by Chris Wellens and myself regarding ways to better manage networks. Several of these ideas remain valuable but largely undeveloped. July 1996
This is a paper I wrote in 2010 about issues that arise when naming things that exist in a cloud network. Most particularly this note deals with issues concerning persistent network relationships between entities that exist within a cloud-net.
The Domain Name System is often touted as a kind of global, uniform name space for the internet. It is not. This note describes various ways in which DNS lacks those properties that people and bodies of internet governance assume that it has. (Powerpoint format), July 2001
I do not believe that the future internet will be a Utopia. Nor do I believe that the future internet will be like some beautiful angel, bringing peace, virtue, equality, and justice. Instead I believe that there are strong, probably irresistible, forces working to lock-down and partition the internet. 2016
The Domain Name System - both the technology of DNS and the deployed naming hierarchy we all use - are among those aspects of the internet that, although they feel solid and immutable, are slowly changing underneath our feet. 2017
I gave one of the two keynote presentations at NANOG (North American Network Operators' Group) in the fall of 2019.
The first part deals with the responsibilities, obligations, and liabilities of being an operator of parts of an Internet that was becoming a lifeline grade public utility.
The second part shifts to ways we design and implement the Internet to improve its resilience to errors, problems, and attacks. I suggest that we look beyond traditional methods of designing and implementing computer systems. In particular I urge that we take a look at the methods used by living things to improve their ability to survive.
During my term as a Director of ICANN ICANN’s staff (and several members of the board) obstructed me when I tried to perform my duties as a director. It became necessary to obtain a court order to compel ICANN to cease its unlawful behaviour. This link leads to the case file.
They have a robust flavor - not at all your wimpy, just lie-there-on-the-plate, kind of tomatoes. I’ve found these to go well with lamb, beef, and strong fish (like salmon.)
I have found momotaro tomatoes to be by far the best variety for this. The momotaro is a solid tomato that has good flavor, can be carved into thick "steaks", and stands up to marinating and grilling. I usually use the largest ones I can find.
I find that one tomato "steak" per person is about right.
Recently I’ve been adding a layer of shredded parmasean cheese so that it melts to form a cap when grilling.
When I do this I don’t flip the tomotoes when they are on the BBQ.
I bake these for Thanksgiving and holiday dinners. These rolls and butter seem to to particularly well with turkey. And given the long preparation time, these are best done when one is expecting a long day in the kitchen.
These are not "light and flaky" rolls; these are solid stock.
Don’t expect these rolls to keep for very long; and the butter will go sour within a few hours.