THE LIST of Booming City-Regions on the Corridoria Trail – April 21, 2014

Goederenstroom EU

Since 2008 we all are in an economic crisis. Fortunately, in certain cities and city area’s recently business and industry is suddenly picking up speed. Examples are Rotterdam, Eindhoven and Bavaria in Germany (“Laptops und Lederhosen”). On closer inspection city area’s are booming in a trail from the middle  of the UK, through the Netherlands, the German Ruhr area, Bavaria, Austria all the way to Istanbul. It roughly follows the beds of the rivers Rhine and Donau.

I call this trail “Corridoria”. In this blog I establish the list of cities on it that trail that are or can be expected to flourish. It runs from the Atlantic coast of Ireland all the way to the Pacific coast in China. Since it connects Europa and China faster than by ship and less expensive than by plane, it may be interesting to invest in the cities on this Corridoria list and establish trading posts there in cooperation with trusted merchants and well connected logistic service providers.

Connectivity is key to prosperity. It is not how good your city is, but how well it is connected. That is a lesson the worldwide trade routes of old told us. My Holland countrymen have have for centuries brought goods (and information) from A to B  on the seven sea’s. They where for many decades the only foreigners allowed to trade with Japan and they where invited to bring in medical, agricultural and biological knowledge.

This is the paper no. 7 in this blog about the new Corridoria route, a band of city regions similar to the chain of ‘Hanze’ (Hanse = sharing) harbours; established between Baltic, N-Germany, Denmark and The Netherlands from 1241 onwards, with the main axis the sea routes between Novogorod – Reval (Tallin) – Lübeck – Hamburg – Brugge – London. This anti piracy cooperative trade route was protected by the powerful knights of the ‘German Order’ and had Lübeck as northern ‘Gateway to the East’,  just like Venice in the south of Europe.

From Venice (and Genua) the merchants where very successful in establishing trade routes with China and exchanging goods both ways on the Silk Routes. Most famous are the travels that Marco Polo made between 1271 and 1295 and his visits to the court of Koebilai / Koeblai Khan. He was the  first Chinese Emperor and used chains of fast runners (message couriers) to be quickly informed about important matters in his vast empire.

Marco Polo route

Corridoria is similar to the ancient camel caravan trails on the ‘Silk Routes’, between the European Mediteranian Sea and the Chinese coast, through Central Asia.

Silk Route voor Corridoria

The objective of cooperation on the Corridoria Trail, just like the Hanze and Silk Routes, is to boost prosperity along this transit route by commerce and trade of goods, supported by logistic information flows and fast ICT services. Both road and rail links (where available) will be used, along with river transport and ferries. And it will be a good investment to dig in a number of optic fiber cables to set up low latency “light paths” for Flash Boys along the Corridoria Trail between the city’s.

Plastic buizen

My proposal is to establish free trade zones between cities on this Corridoria Trail by commercial entrepreneurs who trust each other and understand the mutual interest of TRANSIT of goods and information along a trail. Certain parts of Corridoria are already booming by looking outside their city territories also. ‘All boats on this channel’ will thus be raised, like it brought prosperity, culture and higher qualities of life along the ancient routes too.


* A. Galway harbour

* B. Athlone

* C. Dublin

* D. Holyhead harbour

* E. Bangor

* F. llangollen

* G. Shrewsbury

* H. Birmingham

* I. Coventry

* J. Cambridge

* K. Ipswich

* L. Harwich harbour

* M. Rotterdam harbour

* N. Tilburg

* O. Eindhoven

* P. Venlo

* Q. Duisburg

* R. Düsseldorf

* S. Koln

* T. Frankfort

* U. Darmstadt

* V. Heidelberg

* W. Karlsruhe

* X. Pforzheim

* Y. Stuttgart

* Z. Ulm

* 36. Augsburg

* 35. München

* 34. Salzburg

* 33. Linz

* 32. Wien (Vienna)

* 31. Budapest

* 30. Szeged

* 29. Beograd (Belgrado)

* 28. Nis

* 27. Sofija

* 26. Plovdiv

* 25. Istanbul – Turkey


* 24. Ankara – ,,

* 23. Sivas  - ,,

* 22. Tabriz – Iran

* 21. Tehran – ,,

* 20. Mashhad – ,,

* 19. Merw (Mary) – Turkmenistan

* 18. Bouchara (Buxoro) – Oezbekistan

* 17. Samarqand              -  ,,

* 16. Tasjkent                  - ,,

* 15. Dzjamboel (Taraz)- Kazakhstan

* 14. Frunze (Bishkek)- Kyrgyz Republic

* 13. Alma-Ata (Almaty) – Kazakhstan

* 12. Dostyk (Druzhba) – ,,

* 11. Alashankou (Altaw, Ala Tau) – China

* 10. Jinghe       – ,,

* 9. Urumqi    - ,,

* 8. Kumul       – ,,

* 7. Anxi/ Yumen      - ,,

* 6. Lanzhou   – ,,

* 5. Xi’an         – ,,

* 4. Zheng-Zhou – ,,

* 3.  Kuzhou     – ,,

* 2. Nanjing    - ,,

* 1. Shanghai (Changhai) harbour  - China

Is your city not on this LIST?  Then you better move your business to one of the cities mentioned. Or persuade me, accompanied with recent relevant growth statistics, to add your city to it here. I can be reached at vantill  on gmail .

And, please mail me if your city name is not spelled right and you want me to correct it.

This is version April 21, 2104.

Jaap van Till, Connectivist (and Count of Corridoria)


Posted in corridors, Fiber optic cables, Flash Boys, Optic Fiber Cables, Uncategorized, Wealth creation | Tagged , , , , , , , , , | 1 Comment

Angry protests of the Middle Classes


angry middele classes

This article by Jack Goldstone below explains the Root Cause of the present chaotic transitions in the world. Recommend you read it in combination with the must-read book “The End of Power’ by Moisés Naím. (@mosesnaim on Twitter)

This problem-issue is what Putin (and Obama) is afraid of and what makes him want to start war by attacking foreign countries, instead of facing his own people.

jaap van  till, connectivist

Originally posted on NewPopulationBomb:

Bosnia, Thailand, Ukraine, Venezuala: Troubled Transitions of the Angry Middle Class

“He’s run away himself, his guards have run away, his personnel have scattered. A sad end for a president.” – Tweet by Alexei Pushkov, head of the Russian Duma’s foreign relations committee, on former President Viktor Yanukovich of Ukraine.

Victor Yanukovich has joined such infamous fugitives as Ferdinand Marcos of the Philippines, Zine el Abadine ben Ali of Tunisia, Mohammad Reza Pahlavi of Iran, and Anastasio Somoza; all once-powerful rulers who abandoned their capital cities to escape the anger and tumultuous protests of their own people.

Yet the Revolution in Ukraine is just one among recent episodes of violent urban protest that have spread around the world. After confrontations between crowds and governments in late 2013 in Brazil and Turkey, 2014 has opened with eruptions of urban violence in four additional countries – in Bosnia, Thailand, Ukraine, and Venezuela.

View original 1,504 more words

Posted in Uncategorized | Leave a comment

Addressing Maslow’s Hierarchy of Needs with Technology


The crux is that the transition from supply of knowledge (teaching) to personal demand side of know-how (prosumers-students) is made.
The Maslow pyramid itsself is rather outdated. The Graves Value Model (GVM) is a much more adequate model of personal learning curves. I will write about that soon I hope. jaap van till

Originally posted on User Generated Education:

A major criticism I have of most educational institutions is that their primary focus is on students’ intellectual and cognitive development.  Too often individual learner’s needs do not enter into the equation of their educations.  Maslow’s Hierarchy of Needs is a useful model for educators to use to help insure that they are addressing more of the whole child.

Applying Abraham Maslow’s theory of a pyramid-shaped hierarchy — physiological needs, personal safety, social affiliation, self-esteem and self-actualization — to education is an ideal way to assess lesson plans, courses and educational programs. By asking themselves whether these needs are being met in their school or classroom, educators can assess how well they are applying Maslow’s hierarchy to their teaching practice (How to Apply Maslow’s Hierarchy of Needs to Education).

Some general strategies for addressing these needs in the classroom can be found at Addressing Our Needs: Maslow Comes…

View original 2,212 more words

Posted in Uncategorized | Leave a comment

Stop The DRAGON (Dragnet State)

11 feb 2014

WHY will people all over the world protest next monday: Febr. 11 online (see: ) against mass electronic surveillance on all phone conversations, Internet and mobile phones; by most nation states governments and their security services?

That surveillance and supervision is not only done on citizens, businesses and public servants in the USA, but all over the world. And not only by the NSA and GCHQ but by China, Russia, Sweden, France, Germany, The Netherlands, Iran, Egypt, Syria and most other nation states. This mass indiscriminate snooping is done because they can on internet and mobile networks. But it is not only violating privacy and human rights of billions of people each day, most of whom are unsuspected. But if we do not stop the mass surveillance it will not only ruin the Internet and telecom networks but far worse things will happen. In the following opinion article/ open letter to members of the NL ‘Parlement’ and the general public,  I have tried to explain what is at stake: police states destroying ‘civil society’ using networks.

NSA art JvT

Government: Stop Dragnet Surveillance

(This opinion article appeared earlier in the Dutch language on this blog and was published on 7 Febuary 2014 at

In August, the first revelations from whistleblower Edward Snowden where made public on the large scale electronic communication interception by NSA et al. The media attention is mainly focussed on the shocking and hitherto unimaginable scale and depth of invasion of privacy that the eavesdropping on citizens, businesses and governments around the world by NSA, GCHQ, FBI and CIA have implemented with the help of computer networks.

You can safely assume that Everything you do Anytime Anywhere (EAA ) is registered, if you cellphone is turned on or off. And whether you are online or not. For about 6 billion people, suspected or not, that the dragnet registered information is stored in several huge data centers since several years. And for the next decades it will be saved there and is analyzable by the security forces of the USA and  several EYE-x countries.

My technical friends and I, and the telecommunications companies and Internet service providers (who thought they did their duty by their legal requirement to provide security services with court ordered traffic data (metadata) having fulfilled obligations in the event of formal suspects), are shocked by the scale, technical intrusion by black hat hacking tricks in many cell phones, computers and network devices, and even in chips, are implanted in order to be able to get at all data NSA et al want. Without the security forces, military and police abiding by any law or constitution of any country.

NSA Dragon

So a lot of noise and anger of politicians, such as when the interception where revealed (and admitted) of government leaders like Frau Merkel, PM Schröder, EU negotiators, members of the U.S. Congress, etc. is a useless ceremony and ritual dance. EAA = All info of Everyone. Yes including you. Does this message sink in?

The Rule of Law in theory and in practice

Probably not, because the soothing messages of most governing legal and political institutions – in denial- do project the image everything in Geheimdiensten and courts still goes through ‘due processes’, as was done with paper files for hundreds of years. Snooping with spies and informers; classic detective processes of information gathering;  the according to our laws suspicious show patterns and suspect people are filtered out;  arrest orders transfered by warrant to investigative services  and police, detain suspects, public presentation of the case by DA office & defense lawyers and then judgement by jury & the judge. Lawmakers are our government and parliament. Everything according to the separation of the three mentioned powers. Plus a process of updating laws and adaptation to technology use, changing social standards and moral values. ” Yes, of course there are mistakes made by officials under great pressure, but if for example we broaden their powers or legitimize ‘de facto’ modes-operandi through legislation, then identifying and capturing criminals and terrorists will be a lot more efficient and processes will run much better.” That is the image that the institutions still project.

Unfortunately, the legally trained, but not technically skilled, digibete justice people do not know that there is a totally different security and law -enforcement system, bypassing many formal steps with ICT systems, working the world over, which they can not even imagine. That new surveillance and law enforcement system collapses the Trias Politica and is illegal.

Example is the Weltfremd  bill under preparation by the NL Ministies of Justice , Interior and Defense, that will allow our gov’t secret service (AIVD) and miltary secret service (MIVD) to tap (now explicitly prohibited by law) fixed wire Internet and mobile data, unfocused (i.e. by dragnets). And to follow people and save data.  As GCHQ (UK ) and NSA (USA ) are already doing in cooperation with the FBI , and their subcontractors . Adoption of that NL law would be in my eyes a historic and disastrous mistake and just the opposite of what the public want to stop in the USA : mass unwarranted surveillance.

The general public is not interested yet at what has happened behind the screens and computer screens

Reaction in the general public is rather stoic. I.e. most of my baby boom age group, shrug their shoulders at the news about the disclosed files from Snowden in the NL press (newspaper NRC-Handelsblad). They say: ” Was already known ?” and: “Quite useless, because the real criminals and terrorists probably already know that they are being monitored electronically, and will therefore use clever other communication and coordination channels. And people who do nothing wrong according to the law have nothing to hide, right?” Moreover, most people do not care much for the tiny amount of privacy that is still left after the many cameras in operation, bonus cards and everything companies have been collecting about us in exchange for discounts (without any protest from consumers) or “because they are better able to serve us”. It is amazing how much information about our life is gathered by companies for commercial purposes, without any way to correct or clean faulty /outdated data. The nation state or corporations, there seems to be no stopping to their hunger to know all about us.

Yes all people, even those innocent in their own eyes, HAVE something to hide. Indeed , what happened , without us knowing or wanting it , is very threatening for everyone . The frightening threat of NSA et. al. is not in the scale and depth of the privacy invading eavesdropping, but in what happens or can happen next with the gathered and stored information. And by whom, for what purpose.

The ‘wrong turn’ which was taken by the Security-Industrial Complex (SIC) after 9/11

Based on public sources and conversations I had with a number of American and British whistleblowers, we can conclude the NSA and their collegues directly after 9/11 have taken a wrong turn in their zeal to catch terrorists, criminal conspirators with suicidal zealots and drug traffickers.

Binney and Drake explained that initially the interception of telephone calls and after the NSA understood the power of the Internet, also the interception of social media and email, took place rather focussed on the basis of suspicions or extracted patterns of associations between selected groups of people. There was quite a lot of tapping, with permission by the FISA Court, and by data handed over by operators and service providers after tapping orders. But then ‘ movement patterns ‘ of groups of people from these data were filtered and extracted for more close zooming into (‘targeting’ ). And the rest of the meta – data was cleared from the files. Especially those of the private U.S. citizens if they were not connected with foreign suspects. And then the due legal processes were taken step by step as I described above .

I understood that by this method long before 9/11 the group led by Bin Laden was spotted. But the generals showed no interest in them. The top brass reaction of the generals of the NSA was: “a couple of bearded men in tents in the desert can not threaten the USA”. The leadership of those same generals took the decision shortly after 9/11 took the turn to tap everything & everyone (EAA), instead of filtering, extracting and then throwing away the rest. And because the computer systems did not exist yet to analyze all data, they decided to save and store the collected info of all citizens, businesses and governments on the planet. Such bureaucratic control reaction (registrate all) has happened several times before in history without saving the respective empires from decline and collapse.

Bogota mural

The assignment of guilt (NL: schuldvraag)  has changed 

In the cellars of the Escorial palace in Spain you can be visit the archive that the king of Spain had ordered to collect by priests on almost all Dutchmen who ‘might’ be disobedient to his empire. Similarly, the STASI had kept track of what almost all of the East German citizens did in a miles long archive, by records kept by…their own friends and neighbors. It did not save the Habsburg Empire and the German fear-based regime. If you can see all, it does not mean that you can interpret and understand all (*). Similarly, the NSA system appears to still not working. All kinds of recent attacks in the USA were not noticed. Innovative completely unexpected actions can not be searched by computers. The global SIC system of the x-Eyes countries is very very expensive and does not deliver what was promised .

What has this wrong turn to mass surveillance of EAA , e.g. 6 billion mobile phone calls a day, delivered then ? Power to the security – industrial complex SIC).

Prof. Eben Moglen explains in more detail how that happened in his must-see historic lectures:  It are 4 lectures, visible and written down at etc.

( 1 ) Not us, but they decide whether you are innocent or not. We now are all suspects and target, whatever we do and wherever we are. Fear of ‘the knock on the door’ and purges are going to get a grip on us, so that we remain obedient.  Also for the innocent, or perhaps just them in particular, because humiliating them is easy and creates fear! Mace the students, beat those who are already down. The metadata files are fairly easy to manipulate by the services .

( 2 ) Is there any reason, mistaken or not, to zoomed in on you, then it is up to them to let you picked up , tried and punished . Without anything you can do about it. NOW this is already the case in our country. I understood from people in the NL judiciary , that if the prosecution brings a suspect to court at the instigation of the NL secret service, the defense lawyer receives a highly filtered extract from the surveillance data. That is in order not to disclose the sources inside and via the secret services and not to make them traceable. But the filtering also is that the defense of the accused can not prove “innocent” from the data provided. A ‘dilemma for the judge’ this is called. I call that bypassing ‘making the defense and the judge superfluous’. And therefore you are now in fact outlawed by the SIC digital information. defense against them is fruitless.

( 3 ) In the USA they already have gone in practice one step further. To prevent this type of ‘dilemma’ lawsuits are ‘fabricated’ with hard to rebut evidence, driven by confirmation bias,  that does not refer in any way to the NSA , FBI or CIA. The Anti-Narcotics DEA , which by the way is also active in our country, has recently confessed to handle such “parallel constructions” (cases with evidence fabrication) and “taint teams” (reputation destruction teams) are employed.

( 4 ) Businesses profile you are already in great detail, about your buying behavior and all the things that leave digital traces. But the SIC dragnet file contains so incredibly much more about your personal activities and relationships with others, that your life is completely “sucked” out of you. Yes , not only your porn preferences. Everything. Parking, bus tickets, with whom you talked & where. Books you read, websites you are browsing. Video camera’s in the train, pictures you take and show to others. And all these things are interconnected and correlated to make risk profiles to anticipate your possible actions. To distinguish between possible dangerous individuals and those who need no second look. Many of you will have experienced that if you behave a tiny bit different from the average sheeple, you get ‘special attention’.

5. IMHO the next steps are even more awful. They can ruin and kill many people, tribes and communities. Command & control hierarchies in fascism and many other -ism’s (that believe that they have a closed, total and finished view on the world and how it should behave) have difficulty imagining and coping with complexity, non-linear and dynamic uncertainty and diversity. The worldview they have can not absorb the huge complexity of Reality. Instead of adapting and extending their models, they start to simplify Reality to be able to control it (Ashby’s Law of requisite variety). This is charmingly called “bringing order”, “cleansing” or “purification”. They will then start to isolate and destroy (kill): unpredictables (risky), imperfection, incompleteness, sources of unexpectedness.

Moreover, ‘psychological profiling’ estimates are made about your ideas and the motives inside your head. Which can be assessed by governments around the world as ‘good’ or ‘evil’.  Journalists, demonstrators and activists have recently been confronted with governments that do not tolerate contradiction. That means “Think Police” that judge people by their conformance to the views of the leadership of a country. This certainly is not the way democracies are expected to work. What we had in mind in the development of the Internet, that cyberspace is between the ears of men, where governments have no jurisdiction, now no longer applies.

Please understand that I am not on the side of destructive activists and criminals. No, but even those should be allowed to defend themselves, how annoying the police and prosecutors sometimes find this. Invest then at least on the quality of detectives and police officers in the field,  rather than cutting their numbers and budgets. If at least three political parties in the Netherlands have the word ‘ democracy ‘ in their name, I’m expecting that they will not allow democracy to vanish.

What I describe in ( 1. 2. 3. 4. 5.) is a ‘police state with a centrally guided dictatorship, struggling with new information technology’. With oppression that is morally, politically, economically and socially. We do not want that!

Or will we roll into that it via smartphone App’s, Internet and social media simply digibetically naive as we are? Civilization is only a thin layer of veneer . It takes hundreds of years to bring it on. Democratic states have even not been established in many countries. But that layer of veneer is gone in a moment.

Stop the SIC dragon !

So: government stop mass information dragnets. Keep the three powers of the Trias Politica separated. And MPs in the NL: reject the proposed law to extend current eavesdropping powers of AIVD an MIVD to fixed line telephony, Internet and mobile data. And if they already do that, make them stop it.

Also, it can not hurt to expand the NL secret service & security inspection board with computer- and telecommunications experts who can that verify what he secret services report down to the data record level of their databases. And who can check on unwarranted and ‘indiscriminate mass surveillance’ activities. Tapping electronic communication flows indeed did grow into grotesque scales without lawmakers and judges having been aware of that. Because it is technically possible they’ve done it,  without being visible. Now it is time we cut back on that with the help of people who really know how the communication systems and digital infratructures work.

Liberty Ladies

Emergent behaviour of networked people as an unstoppable life form

Fortunately I see many initiatives worldwide by creative and technically skilled young people who have begun to smartuse networks together, to learn quickly and to create value by P2P sharing networks and jobs in an open way, in freedom. Yes they express and discuss ideals and beliefs for the future. They have started reconstruction of the Civil Society, independent businesses and national governments, by Internet Freedom. They do not want to live in fear and submission, but to build sustainable networked systems used by local clusters of people with very diverse skills and knowledge connected.

These young Digerati have started in local context communities to work on constructive processes of improvement helped  by long distance internet and mobile peer-to-peer (P2P) communication. They make things that are imperfect and incomplete but learn so fast that those that do copying can not  keep up with them. They connect and combine to produce synergy (the Soul of Internet), often unexpected like lifeforms do :-) And maybe even the magical Sampo evolves !

What can we DO ?!

1. Join the online demonstration and activities on Tuesday February 11 2014. has described the why and how. The website to look at is

2. I hope and pray that all these action are non-violent, although the media (news memes get attention) and the state security forces (shows their function) love violent and even better: bloody, action. Do not be provoked.

3. What dictatorships and the now outdated hierarchies hate and fear is DISOBEYING people. Civilians, workers in companies and civil servants (even in the police and military) have the RIGHT to disobey Wicked Orders. That is the core idea of Gene Sharp his non-violent FDTD handbook for activists used the world over. Read it and use it widely to stop & fight the Dagon and then to create a living connected and cooperating world.

Jaap van Till, Connectivist

Dedicated to my friend Hans van Ispelen, who died last week. May he RIP.

Posted in European Telcos, NSA, privacy, Uncategorized | Tagged , | Leave a comment

Overheid: Stop Sleepnet Afluisteren (NL language)

Oog in AL

Overheid: Stop Sleepnet Afluisteren

In augustus kwamen de eerste onthullingen via klokkenluider Edward Snowden over het grootschalig afluisteren door NSA c.s. naar buiten.  De aandacht in de media is bijna voornamelijk gevestigd geweest op de tot dan toe onvoorstelbare omvang en diepgang van de inbreuk op privacy die dat afluisteren bij burgers, bedrijven en overheden in de wereld maakt.

Ga er maar van uit dat Alles wat u Waar ook doet op Elk moment  (AWE) geregistreerd wordt of uw mobieltje nu aan heeft staan of niet. En of nu wel of niet  online bent. En van zo’n 6 miljard mensen, verdacht of niet, wordt die sleepnet registratie in datacentra sinds jaren en voor de komende vele tientallen jaren opgeslagen en is analyseerbaar door de veiligheidsdiensten van de USA en enkele andere landen.  Mijn technische vrienden en ik en ook de telecombedrijven en internetdienstverleners (die dachten netjes aan hun wettelijke vereiste taplast verplichtingen te hebben voldaan, in geval van verdenkingen) zijn geschokt door de omvang, technische inbraak foefjes die in vele mobieltjes, computers en netwerkapparaten, en zelfs in chips, zijn geimplanteerd om bij alle data waar dan ook te kunnen komen. Zonder dat die veiligheidsdiensten zich aan welke wet van welk land dan ook houden. Dus veel van de ophef en boosheid van politici, zoals over het afluisteren van regeringsleiders zoals Frau Merkel en indertijd Schröder, leden van het Amerikaanse Congress, etc. is ceremonieel en een nutteloos ritueel. AWE = Alles van Iedereen. Ja ook van u.  Dringt het tot u door? Waarschijnlijk niet want veel van de rustgevende berichten van allerlei instanties –in denial- doen het voorkomen of alles nog steeds gaat via: klassieke recherche proces van informatie-inwinnen, de volgens onze wetten verdachte patronen en -personen uitfilteren, overdracht naar opsporingsdiensten, aanhouden van verdachte,  behandeling van de zaak door OM, verdediging en vervolgens uitspraak van de Rechter.  De wetgevers zijn onze regering en parlement. Alles volgens de scheiding der machten plus een proces van vernieuwing en aanpassing aan technologie gebruik, veranderlijke algemene normen en waarden. “Ja natuurlijk worden er ook fouten gemaakt door mensen onder grote werkdruk, maar als we bijvoorbeeld wat bevoegdheden verruimen of de-facto modi-operandi via wet legitimeren dan gaat opsporing en aanhouding weer veel efficienter en beter verlopen”.

Helaas weten die juridisch maar niet technisch geschoolde mensen niet dat er een totaal ander veiligheids en law-enforcement stelsel in de wereld werkzaam is dan waarmee zij denken te doen te hebben.

Voorbeeld is het wereldvreemde wetsvoorstel van Justitie, BZK en Defensie dat AIVD en MIVD moet gaan toestaan om ook (nu bij wet expliciet verboden) draadgebonden internetverkeer en mobiele data ongericht (dus via sleepnetten) te gaan volgen en opslaan, net zoals GCHQ (UK) en NSA (USA) al doen in samenwerking met FBI, en hun onderaannemers.  Aannemen van die wet zou in mijn ogen een historische & desastreuze fout zijn en precies tegenovergesteld aan wat men in de USA wil gaan stoppen: mass unwarranted surveillance.

Toch reageren de meeste van mijn leeftijdsgenoten schouderophalend op de berichtgeving over de vrijgegeven bestanden van Snowden  in o.a. de NRC. “Was toch al bekend!?” “Nogal nutteloos allemaal, want de echte boeven en terroristen weten vast al dat ze elektronisch worden gevolgd en zullen dus wel andere communicatiewegen hebben gevonden. En mensen die niks mis doen volgens de wet hebben niks te verbergen, toch?”. Bovendien geven mensen weinig om het beetje privacy wat nog over is door camera’s, bonuskaarten en alles wat we zonder slag of stoot al bij bedrijven over ons laten verzamelen voor kortingen of ‘omdat ze ons dan beter van dienst te kunnen zijn’.

Ja in hun eigen ogen onschuldige mensen hebben wel wat te verbergen. Sterker nog, wat er, zonder dat we het wisten of wilden, is gebeurd is erg bedreigend voor iedereen. De angstig makende dreiging zit namelijk niet in schaal en diepte van het afluisteren, maar in wat er daarna met die gegevens gebeurt of nog kan gaan gebeuren. En door wie met welk doel.

Op basis van openbare bronnen en gesprekken die ik had met een aantal Amerikaanse en Engelse klokkenluiders kunnen we constateren dat de NSA en hun collega’s na 9/11 een ‘foute afslag’ hebben genomen in hun ijver om terroristen en drugshandelaren in hun kraag te vatten. Binney en Drake hebben uitgelegd dat oorspronkelijk het afluisteren van telefoongesprekken en nadat het gebruik van Internet tot ze doordrong, vrij gericht op basis van verdenkingen of associaties tussen mensen plaatsvond. Er werd wel vrij veel getapt na toestemming, door o.a  het FISA Court, maar vervolgens werden ‘bewegings patronen’ van groepen mensen uit deze gegevensstroom gefilterd en de rest van de meta-data werd gewist.  Zeker die van de eigen Amerikaanse burgers als ze niet in verbinding stonden met buitenlandse suspects. En vervolgens werden de processen doorlopen zoals ik hierboven beschreef.  Ik begreep dat deze werkwijze al lang voor 9/11 de groep onder leiding van Bin Laden opviste. Maar daar bleek bij de generaals geen enkele belangstelling voor te zijn. “Een paar baardmannen in tentjes in de woestijn kunnen toch de USA niet bedreigen!”.  Onder leiding van de generaals aan het hoofd van NSA nam men kort na 9/11 het besluit om alles van iedereen te gaan tappen en omdat de computersystemen nog niet bestonden om alles te analyseren  de gegevens van alle burgers, bedrijven en overheden op individue te gaan opslaan.  In de kelders van het Escorial in Spanje is het archief te bezichtigen wat de koning van Hispanje die wij zo hebben geeerd liet aanleggen over bijna alle Hollanders die wel eens ongehoorzaam zouden kunnen zijn. Evenzo de STASI die bijna alles van de Oost-Duitse burgers in een kilometers lang archief bijhielden, verzameld door hun vrienden en buren. Het baatte het Habsburgse Rijk en het Duitse op angst gebaseerde regime niet. Evenzo blijkt het NSA systeem ook nog steeds niet te werken. Allerlei recente aanslagen in de USA werden er niet door opgemerkt. Op innovatieve totaal onverwachtse acties kan je computers niet laten zoeken. Het is zeer kostbaar en levert helemaal niet op wat beloofd was.

Wat heeft deze verkeerde afslag naar AWE mass surveillance van bijv 6 miljard mobiele telefoonsgeprekken per dag  dan wel opgeleverd? Macht van het security-industrieel complex.

(1) Niet wij, maar zij bepalen of u onschuldig bent of niet. We zijn nu allemaal verdacht en target, wat we ook doen en waar we ook zijn.  Angst voor de klop op de deur en zuiveringen gaat zijn greep op ons krijgen zodat we gehoorzaam blijven. Ook de onschuldigen of misschien wel juist die. De bestanden met metadata zijn vrij eenvoudig te manipuleren door de diensten.

(2) Wordt er om een of andere reden, fout of niet, op u ingezoomd, dan is het aan hen om u te laten oppakken, berechten en straffen. Zonder dat u daar ook maar iets tegen kan doen. Het is NU al zo in ons land, begreep ik van mensen uit de rechtelijke macht, dat als het OM een verdachte op instigatie van de AIVD voor de rechter brengt, de verdediger een sterk gefilterd uittreksel uit de tapgegevens krijgt. Om de bronnen binnen en van de geheime diensten niet traceerbaar te maken en te onthullen. Maar ook om de verdediging geen gegevens in handen te geven die de verdachte zouden kunnen vrijpleiten. Een ‘dilemma’ voor de rechter noemt men dat. Ik noem dat het overbodig maken van de verdediging en de rechter.  En ook u bent dus nu vogelvrij.

(3) In de USA is men al aantoonbaar een stap verder gegaan. Om dit soort dilemma’s te voorkomen worden rechtzaken ‘gefabriceerd’ met moeilijk weerlegbaar bewijsmateriaal wat totaal niet verwijst naar NSA, FBI of CIA. De anti-narcotica brigade DEA, die trouwens ook in ons land werkzaam is, heeft recent ook opgebiecht dergelijke ‘parallel constructions’ (evidence fabrictation) te hanteren en ‘taint teams’ (reputatie beschadigers) in dienst te hebben.

(4) Bedrijven profileren u al in groot detail over uw koopgedrag maar het dossier over u bevat zo onvoorstelbaar veel over uw persoonlijke activiteiten en relaties met anderen dat uw leven als het waren geheel door hen geheel is “opgezogen”.  Ja niet alleen uw porno voorkeuren. Alles. Parkeren, buskaartjes, met wie u waar heeft gepraat. Boeken die u leest, websites die u bekijkt. Filmpjes van u in de trein, foto’s die u maakt en aan anderen laat zien.

Via ‘psychologische profilering’ worden bovendien inschattingen gemaakt over uw denkbeelden en motieven. Die kunnen door overheden in de wereld als ‘goed’ of ‘kwaad’ worden beoordeeld. Journalisten, demonstranten en activisten hebben recent al kennis gemaakt met overheden die niet ven tegenspraak gediend zijn. ‘Denkpolitie’ dus die mensen toetst aan de visie van de leiding van een land. Wat ons voor ogen stond bij de ontwikkeling van internet, namelijk dat cyberspace zich tussen de oren van mensen bevindt, waar overheden geen jurisdictie hebben, geldt dus niet meer.

Begrijp goed dat ik niet aan de kant van destructieve opstandelingen en misdadigers sta. Neen maar ook die behoren zich te kunnen verdedigen, hoe vervelend OM en politie dat soms ook vinden. Werk dan tenminste aan de kwaliteit van rechercheurs en politiemensen in het veld in plaats daar steeds maar op te bezuinigen.  Als minimaal drie politieke partijen in NL het woord ‘Democratie’ in hun naam hebben verwacht ik toch wel dat ze niet zullen toestaan dat die nu plotseling verloren gaat.

Wat ik met (1.2.3) beschrijf is een politiestaat met een centraal geleidde diktatuur, die worstelt met nieuwe technologie.  Met onderdrukking die moreel, politiek economisch en sociaal is. Dat willen we dacht ik  niet.  Of rollen we daar via smartphone App’s, Internet en sociale media gewoon digibeet naïef als we zijn binnen? Beschaving is maar en dun laagje vernis. Het kost honderden jaren om het aan te brengen. Een democratische rechtstaat is in vele landen nog niet eens gelukt om op posten te zetten. Maar dat laagje vernis is zo verdwenen. Dus: overheid stop met massa informatie sleepnetten. Houdt de drie machten gescheiden. En Kamerleden verwerp die wet tot uitbreiding van huidige afluister bevoegdheden.

Ook kan het geen kwaad om de commissie van toezicht op de veiligheidsdiensten uit te breiden met enkele computer- en telecommunicatie deskundigen die beweringen van die diensten op bestandsniveau van de computers kunnen verifieeren. En die toetsen op ‘indiscriminate mass surveillance’. Aftappen heeft immers groteske vormen vormen aangenomen zonder dat wetgevers zich dat bewust zijn geweest. Omdat het technisch kan,  hebben ze het gedaan zonder dat het zichtbaar was.

Gelukkig zie ik veel initiatieven wereldwijd van creatieve en technisch vakkundige jongelui die al lang bezig zijn gegaan om netwerken op een open vrije manier te kunnen gebruiken om samen snel te leren en waarde en banen te creeren. De wederopbouw van de Civil Society, onafhankelijk van bedrijven en nationale overheden, via Internet Freedom is begonnen. Zij willen niet in angst en onderdanigheid leven,  maar bouwen aan duurzame netwerksystemen, bruikbaar door decentrale clusters van zeer diverse verbonden mensen.

Liberty Ladies


Ir. Jaap van Till (69) is telecommunicatie- en

internetinfrastructuur deskundige en voormalig

netwerkarchitect, hoogleraar en lector.


PS 1. Dit verhaal stelt het gedoe over de verklaringen, over de 1,8 telefoon metadata in een maand, van minister Plasterk in een heel ander duister daglicht.

PS 2. Een versie is vrijdag 7 febr 2014 gepubliceerd op

Posted in flocking, NSA, privacy | Tagged , | Leave a comment

The WeRebuild Manifesto

Bitcoin Cookie stand

(Bitcoin cookie stand- source: Forbes)

(Hats-off to @Asher_Wolf on Twitter for providing the link)

  • Svara | Följ  <— This is the 2009 source that I have reblogged. JvT.

    Dear internauts,

    We want to be copied because we believe that there is no limit to how many activist clusters there can be in the world. Below are some instructions on how we did it. Of course, there is a multitude of other ways to do it. We want to share our experiences. Thus, we publish this document. Copy!


    1. Throw a party with friends who share similar interests. Cook some food if you like, or buy some beer, it is up to what you prefer. Make sure you have internet connectivity and encourage people to bring laptops. Play music. Or, if you do not have a place to entertain, find a pub or internet café that you can meet in and bring your laptops too.

    2. Start an IRC-channel and spread all over the internet that this is the place where stuff happens. Use a cool network such as Freequest or Anonnet. Get an IRC shell and dive in. “Your home is where your shell is” (who said that?).

    3. Gather friends with various skills. You will need coders as well as philosophers, people who know politics and people who know Photoshop. Make sure your friends know also how to have fun, since otherwise you won’t get anything done. Activism is not rocket science, so just spread out skills. Think multiplicity rather than expertise!

    4. Register sites with cool names, like and Make sure people can find you easily. Write with slogans.

    5. Become friends with important people. Contact politicians, bureaucrats, presidents, corporations, other activists, hackers, artists, etc. Do not have principles for selecting beforehand whom you speak to. Flirt a lot, but never do anything you would regret. Build trust, and make sure you work together. Politicians will need your votes, corporations will need your consumption. Understand that you are important, but do not become too self-important. Do things like watch movies together to keep your feet on the ground.

    6. Install Mediawiki, WordPress and use Etherpad. Also, fill your IRC-channel with bots. Share all data. Do not respect copyright! Do copy all floppies!

    7. Throw more parties. Invent vocabularies. Speak like lolcats. Make music together, even if it sounds strange.

    8. If you run into Internet trolls, troll back or make sure you kick them off your side of the internets. Or, be cooler than them, and make them join you (see, Troll them back). Do not let them make you sad.

    9. Start new political campaigns often. Call them raids, operations, projects or any word of choice. Write instructions and tutorials. Make sure a total newbie can understand what you are going to do. Synchronize your work. Countdown just like a space shuttle takeoff.

    10. Get together a list of clear and simple talking points, in the event that you have to “present” on the fly. Make sure that you have a few easy-to-remember facts to back up your statements. Make t-shirts to spur conversations with random people on the streets. Rent an airplane with a banner behind it to get an entire city asking “Who/what was that?” Then station people on street corners to explain. Send people to the moon and spraypaint your URL on the surface. <3.

    11. Install an artificial intelligence bot. Ours is called Cameron. Ask her lots of things. Quote Cameron in your conversations.

    12. Translate stuff to other languages. Remember that the Internet does not care about nation states. You never know who will join you if you go interNETional. Stamp your internet visa [1] in your passport.

    13. Statements are not only for stating things. Statements also makes things harder to forget. By sending out messages of events, activities and other tips you make them unforgettable and eternal. For instance, by making public reminders to people with power, you can change their agenda.

    14. Even if you are fighting against horrible laws, even if your mission seems impossible to accomplish – do not be sad! Lulz are as important as change. Your goal can be serious even if you do it for the lulz. Remember to smile when you are in the middle of a stormy campaign.

    15. Just, never be sad in general. It’s not very lolcat-like.

    16. Create a GIANT Twitter network. Whenever you tweet something, have people retweet it, and ask their friends to retweet it as well….tweets multiply like bunnies. Always strive for “deep tweets”, i.e. make people retweet your message all over the world. Get in the habit of making your tweets very descriptive but concise, so people do not have to click a link to know if they are interested or not, they will be able to tell by what your tweet says.

    17. Don’t be obsessed with doing things “right”. Instead of thinking too much, tinker instead. Proceed by way of experimentation, try things out. If they fail, make sure to laugh a little, then try a different way. Collect experiences in your wiki, learn from the mistakes. Share all knowledge freely with others.

    18. Totally go for it fearlessly, while boldly sparking and nurturing collective bursts of supercharged play, inspired creative inventions and spontaneous depths of strategic fun. Do not be afraid to appear temporarily foolish. (!) Inspire the body-politic to incarnate creatively via totemized teleportation-flows of datalove.

    19. Make logos and have them look cool. Remix the logos of old government agencies. Use fractal patterns. In general, be a cyber hippie. Create symbols to dive in the channels. Be esoteric about botnet raids. If the channel splits, stay in the other side for a little while.

    20. Organize without a clear leadership or membership status. Have anyone joining your discussions be a part of your cluster. If they don’t agree, they will leave soon anyway. Organize like a gang or a pack. Don’t use pyramidal structures or formalized positions. Be nomadic in thought and associate yourself with many others.

    21. If it is within your means, travel a lot. Talk to people where ever you go, and tell them about what you are doing. Tell them to join you if they like the idea, thus creating a network within your country/region of the world, perhaps even internationally.

    22. Be open with everything you do, but affirm opennes to the extent that you will spread esoteric rumors about your group.

    23. Participate in mixed-reality video-streaming real-time of social-formations interconnected-at-a-distance-with netbound kinspersons. Visualize datalove formations and replications.

    24. Make sure your overall goal is world domination. Just do not invade Russia during the winter.

    25.Use Linux. Take Windows and Mac OS install CDs and use them as drink coasters. Or glue them to your ceiling shiney-side down, just to be cool.

    26. Start your own news agency. Make news, provide it to everyone and make sure they spread virally on the internet.

    27. Make communiques and fax them. Acknowledge that the telefax is the strongest communication media. Fax for lulz. Fax everything to everyone. Twice. When not faxing, make fax noises, just to seem like you are faxing. Consider the morse code too. Start typing up all your documents on type-writers, then scanning them and putting the images online. Use antiquated forms of technology whenever you can, to be retro and ironic.

    27b. ctrl + c

    28. Join other activist groups. Invite them over and throw even more nice parties. Hospitality is imperative – your place is your friend’s place! And there is always a sofa to sleep on, where ever you go. Cluster!

    29. When invited to parliaments and governments, be self-confident. Remember, you are Internet, they are merely politicians and bureaucrats. Talk to them about tubes, trucks, jellyfishes and faxes, they will not understand anyway. You are from the future. Make sure you tell them that.

    30. Don’t forget Kopimi. [2]

    31. When hanging out offline, keep using IRC-nicknames.

    32. Love your friends. Without them, everything fails. Make sure to send a lot of data love in between you.

    33. Feel and articulate imagined methodologies of planetary-oceanic-network-mind as telepathic-love connectivities enabling dramatic positive social change in the everyday world. Dream with move to AT&Atlantis, the Telcel World or just to become a jellyfish, that you are anyways.

    34. Learn new languages through twitter translation, translation bots in irc channels and by visiting activists in other countries. Say natti/buenas noches hallo/hej indistinctively.

    35. Intertwine your projects and actions into the blogosphere. Find articles you do not like, then you write a critical reply and watch the comments accumulate. These comments will hopefully render more people writing about the issue at hand and it will be a good way to force concerned parties to create press releases or take back their statements. Do not underestimate the blogosphere.

    36. Become friends with people in mainstream media. Invite them to your IRC-channel. They will be hooked in no time at all. If you manage to get governments and corporations into your everyday work, make sure you treat them nicely and work together with them. Get heads of state to join your etherpad editing sessions/IRC channels. Remind them you’re the voters. However, if they betray you, make sure they know that the internet never forgets.

    37. Listen to your Artificial Intelligence bot: “This is the dance floor; love is the structure of the overall agreement in the agreed text.”

    This document is was originally developed in our wiki. Feel free to add more instructions as we go along. Also, this document must be copied. You have already, by reading it, copied it to your computer’s RAM. Do not hesitate to copy it once more by sending it to your local government, political party, social club, whatever…


    And Thanks to @Asher_Wolf here is the French version :) …

    Jaap van Till, Connectivist

Posted in flocking, Internet success, Jobs, ReBuild, Uncategorized, Wealth creation | Tagged , | Leave a comment

German TV (NDR) interview with Edward Snowden (in English)

Schermafbeelding 2014-02-03 om 17.14.15

Very impressive and X-tal clear on-the-spot interview in Moskou by German Television: Nord Deutsche Rundfunk (NDR). This is the first Edward Snowden Interview 

He is a hero. For the general interest of the public.

Jaap van Till, Connectivist for HR Art. 19

PS.  The USA Privacy and Civil Liberties Oversight Board has released their report concerning Section 215 of the USPatriot Act. It makes for interesting reading: “Mass surveillance of calls is illegal and useless”

Posted in Uncategorized | Leave a comment