Radical media, politics and culture.

hydrarchist's blog

Run your own radical peer to peer radio station using Peercast.

I thought people might be interested in the article from today's Guardian Online about peer to peer pirate radio. It is now possible for anyone with a PC to run a radical pirate radio station peercasting protest songs, anti-war songs, etc and even interviews with interesting radical people. The music is broadcats or, more accurately, "peercast" over the Gnutella network that the Recording and Movie industries have been trying to shut down, but cannot.

http://www.guardian.co.uk/online/story/0,3605,762410,00.html

Here's is how to become a radical pirate radio station step by step:

Streaming music to peercast is easy:

1) Download the latest Peercast.exe file from www.peercast.org

2) Download Winamp from: www.winamp.com

3) Download and install the SHOUTcast DSP Plug-In for Winamp from:

http://www.shoutcast.com/download/broadcast.phtml#plugdownload

4) Start Peercast. It should connect automatically to the peercast network and after a while some channels should appear

5) Start winamp (make sure you have the latest version)

6) Select the shoutcast dsp plugin and click configure (right click on the top of the winamp interface and select options --> prefernces -->plugins

7) Configure it. In the output tab use localhost as the server. The portnumber is the portnumber listed in the peercast window minus 1. Leave the password field blank (you may set one later if you like). Click on the yellow pages button and give your stream a name. Select the encoder tab and choose a bitrate (your connection must be able to handle the bitstream).

The shoutcast window stays open. Load some mp3 files in the playlist and hit play.

In the shoutcast window's output tab click on the connect button. It should now be streaming music to the peercast program. In the peercastwindow, your stream should be visible in the 'available channels' with the label broadcasting

Congratulations, you are now streaming music. The presence of the channel will automatically propagate through the peercast network and due to the nature of the peercast network the network load on your side will never get higher than whatever bitrate you selected, even if thousands are listening to your music. Isn't that cool :-)

add your own comments

Radio and Peer to Peer / file share linksby Space Bunny6:14pm Thu Jul 25 '02

Radio / Audio links at:

http://j12.org/news/iradio.htm

as ever a page in progress.

For files and stream sharing info / debate can be found at:

http://www.infoanarchy.org

j12.org/p2p/

Return to the Same City

In the city, silence has replaced the tanks, but to the same effect. Paco Ignacio Tibo

Despite misgivings I succumbed to the temptation to return to Genoa last weekend for the anniversary of Carlo Giuliani's death and the actions against the G8.

1. Context In the midst, and aftermath, of last year's events a deep fissure emerged between the majority of groups around the Genoa Social Forum and anarchist and autonomist groups. Ostensibly there were multiple reasons for the rupture: relations with the institutions, the use of violence, attitudes towards the police. In many ways however thse tensions are simply reflective of the difficulties inherent in the attempt to reorganise the political topography - collaboration between groups defining themselves in terms of direct action and those who seem uncertain as to whether to cultivate some sort of 'respectability' by keeping their distance or to attempt to exert hegemony over it.

The attempt to instrumentalise the Social Forums as a new political form hit a serious obstace in May when they received crappy results in the local elections. The increasing involvement of mainstream parties in the social forum process - as evidenced by the presence of three of the candidates for thids years presidential election in France in Porto Allegre - has intensified this sense of unease amongst the more determinedly extraparliamentary faction.

2. Piazza Alimonda The train arrived in Genova Brignole station shortly before four and we made our way to Piazza Alimonda, walking the street from Piazza Verdi where a year before the riots had raged. A huge crowd thronged the route and the Piazza was packed with people. Diversion was provided by some crap poetry and a band playing a classical take of the U2 dirge 'Sunday Bloody Sunday.' Someone had forgotten that the scumbag Bono had been inside embracing mass murderers and crooks like Pushkin and Berlusconi during the events being commemorated.

People sat around the spot where Carlo Giulianin was shot, and deposited momentoes. The fence nearby had been transformed into a sort of shrine, and generally there was a sense of secular ritual about the place. His father spoke, as did the leftist priest from Campagnia, Don Vitaliano. All over the square hung banners, from Carlo's frineds, from the Social centre Pinelli in Genoa, from all over Italy. At 5.27 the sirens of the port sounded to mark the moment of the shotting and dozens of balloons were released from the square

Two demonstrations were scheduled. Autonomists from the social centre Inmensa organised one, supported by some social centres and a few anarchist groups. Departing from nearby Brignole station they made their way to Marassi Prison, evoking the symbolic power of last years assault on sam by the 'black block'. Meanwhile the GSF-promoted route parted from Piazza Verdi in front of Brignole Station to wind its way through last year's red zone to Porto Anticho.

3. GSF, Disobeddienti and (most of the) Anarchists The main corteo was organised by the GSF, regrouping also the Disobeddienti, Rifondazione Communista and a gamut of other leftist goups. Seperate actions and corteges converged with this demo, including a large anarchist presence (numbering several thousand) and the various grassroots trade unions: COBAS, Cub, Slai-Cobas - about a hundred thousand people in total, far exceeding the numbers anticipated. With the exception of a small incident outside a far-right bookshop protected by a squad of forty or so cops from the Polizia di Stato who were egged and insulted (the Carabinieri kept a low profile and were concealed in streets away from the demo-route out of apprehension that their presence would trigger confrontations), the demonstration was pedestrian in every sense, and underlined the operational limitations implicit in collaboration with old leftist groups and mainstream NGOs, many of whose adherents behave like zombies. But to see the old town of Genoa at last was a pleasure, as it had been barricaded off behind the fences of the red zone last year. The city is a warren of extermely narrow alleys ('carruggi' in Italian) built on a hill, with six or seven floors to each building. At Porto Anticho, the demo was met by Sergio Cofferati, leader of the huge CGIL trade union and principal protagnist in the battle to retain the workers rights known as Article 18.

This year the Disobeddienti paraded without shields or body-protection, preferring to dance instead behind a large sound system which agthered several thousand in its wake.

4. Social Centre Inmensa and the Autonomi From the beginning Inmensa had severely criticised the Genoa Social Forum and after the demonstrations refused to co-operate on any further political actions. This largely derived from the GSFs complaints that the Police had failed to prevent violent demonstartors from entering the country from overseas, and their general attempts to recuperate political legitimacy by scapegoating more radical groups.

Their demo mustered just less than a thousand participants (according to the Secolo XIX, the local Genoa paper trusworthy for its estimates). In recent weeks the media fingered this group as posing the threat of renewed street disturbances, in contraposition to the GSF/Disobeddienti who were characterised as 'goodies'. Thus they were hemmed in by riot police all along their route. With some difficulty, and indirect negotiation they were able to reach the prison, where detainees had made a banner in memory of Carlo Giuliani, and chanted slogans. On route there were various incidents where stones and bottles were thrown leading to some scenes of discord between anarchists and communists. There were also some brief charges by the police at the end, but nothing serious.

5.Direct Actions As already noted there was a paucity of direct action during the demonstrations although two symbolic actions were carried out by the Disobeddienti and the Anarchist Coordination of Liguria respectively. The former occupied the Diaz school - scene of last years search and destroyraid by the cops which left 62 injured of the 91 inside- on thursday evening. Meanwhile, the anarchists took the headquarters of the Mediterranean Water and Gas Company offices on saturday morning in protest against the privatisation of natural resources and particularly the role of the IMF/World Bank in this regard. Both occupations finished without conflict with the authorities.

Returning from Genoa, I found myself overcome by a certain dejection despite the large mobilisation. Perhaps because of the absence of a sense of unbounded potential that characterised the experience last year. Perhaps because the politcal landscape has changed substantially in the meantime and the only response appears to be to take shelter beneath leftist shibboleths. Perhaps because the memory of the extreme vilolence and terror of those days needs catharsis. Currently ninety police officers and four hundred protesters remian under judicial investigation, but Italian justice is shambolic and slow-moving. Further isclosures about abuses in the lager Bolzanetto continue to leak out through the press, specifically in relation to the complicity and active involvement of some of the prison medical staff. New concerns have arisen about the long-term effects that the CS gas will have not only on those against whom it was employed, but also on the residents of the city. This year howver Genoa seemd more the scene for ideological slight of hand and posturing rather than ensuring an adequate substantive response on the level of the social movement.

With the polarisation of the debate between violence and non-violence the space for imaginative direct action appears to have been shut down.In addition both radical and moderate wings have opted for closure vis a vis one another as opposed to seeking innovative routes out of the impasse. My own guess is any further progress will be determined by the ongoing external social reconfiguration more generally rather than through internal movement dialogue.

----------------------

There follows a statement from the Social Centre Pinelli whom many will remeber for the organisational role and pot-demonstration prisoner support they carried out last year. Pinelli was in fact badly damaged in a fascist arson attack last september (on the same night as the memorial to Carlo Giuliani on Piazza Alimonda was vandalised). The good news is that they have been able to repair the damage and reopened to the public last month.

-------------------

The Disgust we Feel

We spent the day of Saturday the 20th in Piazza Alimonda not in a mood of festivity but of rage; we decided to move towards the city, seeing as we hadn't signed up to any of the initiatives (which isn't to say that we don't have a position). Thus we arrived in Piazza Verdi where we found lots of people dancing to the music blasted out of scores of trucks, smiley people, happy, in short a party, and so we asked one another "What the hell have they to celebrate?" Then a voice from a microphone shouted about victory, recalling last july and Carlo Giuliani, at which point our disgust reached a new dimension. We tried to understand what victory they were talking about and the answer given was:"......but can't you see how many we are, all together, all united, look around you"... so we took the advice and looked around us but what we saw transforemd our disgust into vomit: flags of the Italian Communists, Communist Refoundation, CGIL, Greens and Deomcratic Left.

Fucking hell they were shouting about victory and marching with Salvi and Violante (1), yep, those of the camps for immigrants, of the war in Kosovo, of the Global Forum in Naples, friends of the Americans, those that organised the G8 and then oppose it, those that wanted to take Article 18 from others first, those of the short term labour contracts, those who make agreements with Fini and Berlusconi, those who are accomplices in the murder of Carlo. We cannot march with these people because they are our enemies, they are the ones that we oppose, they're the ones that take away the air we breathe. So why shout about victory, perhaps because these individuals are a minority amongst the 100,000? Fine then, we want to know where are these 100,000 when comrades are arrested and tortured, where are these 100,000 when the social centres are evicted or burnt by fascists (2), where are these 100,000 when immigrants are beaten up, discriminated against, locked up i camps, where were the 100,000 when the neo-nazis of Forza Nuova turned up to annul the 30 June 1960 (3) or when they make meetings all over Italy, we could go on forever...?

At a certain point arrived news (which later turned out to be false) that the cops were charging the demo under the jail, yes that of "horrible and nasty" to be isolated and kept far away from the festivities, so we spoke with a few people to get together a group and go there but the answer was:"that's their problem as they were looking for it." No, this we really can't accept, we can never legitimate the fascist and repressive actions of the state by the hand of the police. So we moved on our own, but before reaching the demo we met some lads at Brignole who weren't able to get through to join the demo by the Disobeddienti, the cops and carabinieri had created an imaginary line, a red zone around the demo of 100,000 and they didn't let anyone through, not even the genovese who had to go home, how disgusting, last year the red zone was used to defend eight pieces of shit and this year it defended the demo of the social forum, of the disobeddienti, of the political parties and all their lot while they danced, protecting them from infiltration by the 'violent', for fear that some mayhem might break out, the same logic that was used to legitimise the red zone of last July. Meanwhile the multicoloured dancing demo of 100,000 consented to this shit. We stopped to help people who needed to get through, we began to insult the military who were impeding us from walking, who illegally deprived us of our rights, but they continued to repeat no one not from here can pass, a girl from Pinelli then showed her identity card and demonstrated that to go home she necessarily had to go by here - 'not home, go there later' (maybe this year you ned a pass to access the red zone where a 100,000 parade happily), a girl sick with aids wasn't allowed through to get home, so she took a syringe from her purse and went to stick it in her veins, quickly the carabinieri moved their asses and let her through. The cops were afraid of the sick. The verbal conflict went on another while and as demonstrators continued to arrive who needed to get through, the tension grew, that was what they wanted. A woman from Pinelli took a cellphone and made as if to call the lawyer, there you have the magic word, as soon as they heard lawyer the cordon opened and they let us pass and all while the 100,000 were dancing protected by hundreds of cops in riot uniform. At last we could go towards the demo (at Marassi), it was all calm at the prison where the detainees were demonstrating with the demonstrators. The demo turned back to go towrds the station at Brignole for the comrades who needed to take the train to return home, but in Piazza Gusti they were stopped by the cops again, 'you can't get by here', same logic as before, negotiations began which unfolded in great calm, after a while they let us through, surrounded naturally on every side, but in front of the station something absurd happened, a police cordon posted on one side of the demo began to run towards twenty demonstrators who in turn escaped by taking Via San Vicenzo, police and cc began an absurd pursuit, charging the void, marking someone who had done nothing, absolutely nothing, and who is today identified in the newspapers as one of the 'violent ones', merely becasue they escaped from the madeness of Cops & Co., two lads were stoppped and identified and no-one knows why, and while all this was happening these 100,000 danced happily at Porto Antico.

The headlines in the newspapers today descibed a lovely day, a peaceful demo defended by the police to prevent its being ruined by the 'violent ones.' The police chief of Genboa Oscar Fiorolli praises the stewards of the demo because, in his words, it was perfect and helped them to isolate the violent, what crap. Fiorelli is practically described as a mythical figure, but no-one says that in order to accomplish this he stripped the right to walk freely, to live freely, to hundreds of Genovese and others. Our observation is on alone, we cannot accept all this, thus so long as the movement remains like this, we will walk alone, as we did on saturday. Because we do not want a world that is better than this, but rather one which is totally different. We do not want to fall into the distinction between violence and non-violence, for us the only vilolence is that of the murderous and exploitative state, and its servants be they in uniform or double breasted suits.

The lads and lasses of CSOA Pinelli, Genova.

Notes (added by translator)

(1) Violante is Parliamentary leader of the Democrats of the Left in the Italian Parliament(DS). Salvi is a former minister for Labour in the D'Alema DS government.

(2) In September 2001 CSOA Pineòlli was attacked with Molotov Cocktails presumably as a result of their high-profile activity during the demonstartions against the G8.

(3) On 30 June 1960 Genoa erupted into riots as workers -including the city's politically notorious dockers - and former partisans took to the street to prevent a rally by Mussolini's old political movement the MSI. Anti-fascist forces fought the police and successfully impeded the meeting.For a little more info read this from the Guardian.

The following is extracted from a post to Indymedia UK on the CS gas and legal developments.

..........the city of Genoa admits that 9000 cs gas canisters were launced at the public durin the three days. This stuff burns the lungs and skin and my provke ashma like symptoms in people, it is not tear gas. CS gas is internationaly banned by convention for use in war by soldiers but it was used in Genoa on the G8 marchers. The stuff may even cause genetic dammage.

In the book "non lavate questo sangue" by Concita De Gregorio, published by Editori Laterz(in Italian)Dr. Massimo Costantini, of the Center of Epidemiology of Genoa and the National Institute for the Reasearch on cancer is quoted:"This tear gas have something inside them. An asid, something that swells up the throat and closes it, one cannot breath and spasms start. They have something that makes one vomit. They don't make you cry, this tear gas: it blinds and makes the stomac empty itsself. It is a cloud that berns and smells like sulfer. They throw them from the helicopters, in clusters. Or they shoot them, and you hear the report like that of a gun, but more mutted. Thud. They arrive in barrages:fifteen or twenty at a time, then the asid clowd arrives".

Also, 93 people inside the Diaz school were arresed, and 93 filed chareges of assault. 60 did go straight to the hospital. In the Italian newspapers recently the asistant prosecutor got a confession that the two molotov coctails that were the only clear weapons "found" and upon witch charges were brought, these two molotovs were planted by Police. This is public knoledge. There was and still is no justification for the two hours of beating on those young people sleeping in side the Diaz school. Among the injuries reported a punctured lung from broken ribs and bleeding spleens and broken teeth and limbs. The city of Genoa had given the school to the propestors. They were and are responsable for the safety and well being of these guests of the city and not just the heads of state, in my opinion.

We spent the day of Saturday the 20th in Piazza Alimonda not in a mood of festivity but of rage; we decided to move towards the city, seeing as we hadn't signed up to any of the initiatives (which isn't to say that we don't have a position). Thus we arrived in Piazza Verdi where we found lots of people dancing to the music blasted out of scores of trucks, smiley people, happy, in short a party, and so we asked one another "What the hell have they to celebrate?" Then a voice from a microphone shouted about victory, recalling last july and Carlo Giuliani, at which point our disgust reached a new dimension. We tried to understand what victory they were talking about and the answer given was:"......but can't you see how many we are, all together, all united, look around you"... so we took the advice and looked around us but what we saw transforemd our disgust into vomit: flags of the Italian Communists, Communist Refoundation, CGIL, Greens and Deomcratic Left.

Fucking hell they were shouting about victory and marching with Salvi and Violante (1), yep, those of the camps for immigrants, of the war in Kosovo, of the Global Forum in Naples, friends of the Americans, those that organised the G8 and then oppose it, those that wanted to take Article 18 from others first, those of the short term labour contracts, those who make agreements with Fini and Berlusconi, those who are accomplices in the murder of Carlo. We cannot march with these people because they are our enemies, they are the ones that we oppose, they're the ones that take away the air we breathe. So why shout about victory, perhaps because these individuals are a minority amongst the 100,000? Fine then, we want to know where are these 100,000 when comrades are arrested and tortured, where are these 100,000 when the social centres are evicted or burnt by fascists (2) , where are these 100,000 when immigrants are beaten up, discriminated against, locked up i camps, where were the 100,000 when the neo-nazis of Forza Nuova turned up to annul the 30 June 1960 (3) or when they make meetings all over Italy, we could go on forever...? At a certain point arrived news (which later turned out to be false) that the cops were charging the demo under the jail, yes that of "horrible and nasty" to be isolated and kept far away from the festivities, so we spoke with a few people to get together a group and go there but the answer was:"that's their problem as they were looking for it." No, this we really can't accept, we can never legitimate the fascist and repressive actions of the state by the hand of the police. So we moved on our own, but before reaching the demo we met some lads at Brignole who weren't able to get through to join the demo by the Disobeddienti, the cops and carabinieri had created an imaginary line, a red zone around the demo of 100,000 and they didn't let anyone through, not even the genovese who had to go home, how disgusting, last year the red zone was used to defend eight pieces of shit and this year it defended the demo of the social forum, of the disobeddienti, of the political parties and all their lot while they danced, protecting them from infiltration by the 'violent', for fear that some mayhem might break out, the same logic that was used to legitimise the red zone of last July. Meanwhile the multicoloured dancing demo of 100,000 consented to this shit. We stopped to help people who needed to get through, we began to insult the military who were impeding us from walking, who illegally deprived us of our rights, but they continued to repeat no one not from here can pass, a girl from Pinelli then showed her identity card and demonstrated that to go home she necessarily had to go by here - 'not home, go there later' (maybe this year you ned a pass to access the red zone where the 100,000 are happily parading), a girl sick with aids wasn't allowed through to get home, so she took a syringe from her purse and went to stick it in her veins, quickly the carabinieri moved their asses and let her through. The cops were afraid of the sick. The verbal conflict went on another while and as demonstrators continued to arrive who needed to get through, the tension grew, that was what they wanted. A woman from Pinelli took a cellphone and made as if to call the lawyer, there you have the magic word, as soon as they heard lawyer the cordon opened and they let us pass and all while the 100,000 were dancing protected by hundreds of cops in riot uniform. At last we could go towards the demo (at Marassi), it was all calm at the prison where the detainees were demonstrating with the demonstrators. The demo turned back to go towrds the station at Brignole for the comrades who needed to take the train to return home, but in Piazza Gusti they were stopped by the cops again, 'you can't get by here', same logic as before, negotiations began which unfolded in great calm, after a while they let us through, surrounded naturally on every side, but in front of the station something absurd happened, a police cordon posted on one side of the demo began to run towards twenty demonstrators who in turn escaped by taking Via San Vicenzo, police and cc began an absurd pursuit, charging the void, marking someone who had done nothing, absolutely nothing, and who is today identified in the newspapers as one of the 'violent ones', merely becasue they escaped from the madeness of Cops & Co., two lads were stoppped and identified and no-one knows why, and while all this was happening these 100,000 danced happily at Porto Antico. The headlines in the newspapers today descibed a lovely day, a peaceful demo defended by the police to prevent its being ruined by the 'violent ones.' The police chief of Genboa Oscar Fiorolli praises the stewards of the demo because, in his words, it was perfect and helped them to isolate the violent, what crap. Fiorelli is practically described as a mythical figure, but no-one says that in order to accomplish this he stripped the right to walk freely, to live freely, to hundreds of Genovese and others. Our observation is on alone, we cannot accept all this, thus so long as the movement remains like this, we will walk alone, as we did on saturday. Because we do not want a world that is better than this, but rather one which is totally different. We do not want to fall into the distinction between violence and non-violence, for us the only vilolence is that of the murderous and exploitative state, and its servants be they in uniform or double breasted suits.

The lads and lasses of CSOA Pinelli, Genova.

Boomtown Rats: Diamond SmilesBoomtown Rats: Rat Trap

genova 20 luglio: tutto lo schifo che proviamo csoapinelli

From: To: movimento@ecn.org Subject: genova 20 luglio: tutto lo schifo che proviamo Date: Mon, 22 Jul 2002 12:34:41 +0200 (CEST) Reply-to:

Sabato 20 dopo aver passato la giornata in piazza alimonda, in un ' atmosfera non di festa ma di rabbia, abbiamo deciso di muoverci per genova, visto che non avevamo aderito a nessuna delle iniziative (questo non vuol dire non avere una propria linea, anzi...). Così siamo arrivati in piazza verdi dove abbiamo trovato tanta gente che ballava la musica sparata da decine di camion, persone sorridenti, felici insomma una festa, allora ci siamo chiesti:"ma che cazzo hanno da festeggiare"?. Poi una voce da un microfono gridava alla vittoria, ricordando il luglio passato e carlo giuliani, a questo punto il nostro schifo raggiungeva dimensioni enormi. Abbiamo cercato di capire di quale vittoria parlassero e la risposta è stata:"ma non lo vedete quanti siamo, tutti insieme, tutti uniti, guardatevi intorno" sallora abbiamo accettato il cosiglio ci siamo guardati intorno ma quello che abbiamo visto ha trasformato il nostro schifo in vomito: bandiere dei comunisti italiani, rifondazione, cgil, verdi e democratici di sinistra. Porca troia gridavano alla vittoria e marciavano insieme a Violante e Salvi, si quelli dei lager per migranti, quelli della guerra in kosovo, delli del global forum di napoli, qualli amici degli americani, quelli che il g8 lo organizzano e poi lo contestano,quelli che l' articolo 18 volevano toglierlo prima di altri, quelli dei contratti a tempo determinato, quelli che con berlusconi e fini fanno gli accordi, quelli che sono coplici dell' omicidio di Carlo. Noi non possiamo marciare con queste persone perchè sono nostri nemici, sono quelli che contestiamo, sono quelli che ci levano l' aria da respirare. Ma allora perchè gridare alla vittoria, forse perchè questi personaggi fr5a 100000 persone sono una minoranza? bene allora vi chiediamo dove sono questi 100000 quando i compagni vengono arrestati e torturati, dove sono questi 100000 quando i centri sociali vengono sgomberati o bruciati dai fascisti, dove sono questi 100000 quando gli immigrati vengono picchiati, discriminati e chiusi in campi lager, dove erano i 100000 quando i neo nazisti di forza nuova si sono presentati a genova per cancellare il 30 giugno 60 o quando fanno i convegni in tutta italia, potremmo continuare all infinito quindi dove erano i 100000...? a un certo punto arriva la notizia( che poi si rivelata falsa) che gli sbirri stavano caricando il corte sotto al carcere, si quello dei "brutti e cattivi" quelolo dei compagni da isolare e da tenere lontano dalla festa, allora parliamo con qualcuno per organizzare un pò di persone e andare là ma la risposta è stata : " cazzi loro se la sono cercata". No questo non lo possiamo proprio accettare, non possiamo legittimare mai le azioni fasciste e repressive dello stato per mano della polizia. Così ci siamo mossi da soli, ma preima di raggiungere il corteo abbiamo incontrato a brignole dei ragazzi che non veniovano fatti passare per raggiungere il corteo dei disobbedienti, la polizia e i cc avevano creato una linea immaginaria, una zona rossa intorno al corteo dei 100000 e non facevano passare nessuno nemmeno i genovesi che dovevano andare a casa, che schifo l anno scorso la zona rossa serviva per difendere le 8 merde, quest anno difendeva il corteo di social forum, dei disobbedienti, dei partiti e loro nel mentre ballavano, li difendevano da infiltrazioni di violenti, per paura che scoppiasse qualche casino, la stessa logica che è stata usata per leggittimare la zona rossa del luglio scorso, e nel frattempo il corteo colorato e variopinto dei 100000 ballando acconsentiva a questo schifo. Ci siamo fermati li per aiutare la gente che doveva passare, abbiamo inziato a insultare i militari che ci impedivano di camminare, che illegalmente ci privavano dei nostri diritti, ma niente di qui non si passa continuavano a ripetere, una ragazza del pinelli allora mostra la carta d identità e fa vedere che per andare a casa lei deva passare per forza di lì, niente a casa ci andrà dopo (forse anche quest anno ci voleva un pass per accedere alla zona rossa dove i 100000 stavano sfilando felicemte), una ragazza malata di aids non viene fatta passare per andare a casa, allora prende una siringa dalla borsa e fa per piantarsela nella vene, velocemente i cc si spostano e la fanno passare, piccini avevano paura delle malattie. gli scontrio verbali sono andati avanti ancora un pò e intanto continuavano ad arrivare manifestanti che dovevano passare, la tensione aumentava, era quello che volevano.una ragazza del pinelli prende il telefonino e fa per chiamare l'avvocato, eccola la parola magica, appena sentono avvocato il cordone si apre e ci fa passare e intanto i 100000 ballavano difesi da centinaia di sbirri in assetto anti sommossa.Finalmente possiamo dirigerci verso il corteo, è tutto tranquillo dal il carcere i detenuti manifestano insieme ai manifestanti. Il corteo torna indietro per dirigersi verso brignole per i compagni che devono prendere i treni per tornare a casa, ma in piazza giusti viene fermato dalle guerdi, di qua non si passa, stessa logica di prima, iniziano le trattative che si svolgono in tutta tranquillità, dopo un pò ci fanno passare naturalmente blindati da ogni lato, ma a davanti alla stazione succede qualcosa di assurdo, un cordone di polizia posto sul lato del corteo inizia a correre verso una ventina di manifestanti che a loro volta scappano via infilandosi in via san vincenzo, polizia e cc iniziano un inseguimento assurdo, caricando il vuoto, riccorrendo qualcuno che non aveva fatto niente assolutamente niente e che oggi sui giornali vengono identificati come violenti soltanto perchè sono scappati dalla follia degli sbirri e soci, due ragazzio vengono fermati e identificati e non si capisce perchè, e mentre accadeva tutto questo i 100000 ballavano felici al porto antico. I titoli dei giornali oggi descrivo una giornata bella, un corteo pacifico difeso dalla polizia pèer impedire che venisse rovinato dai "violenti". Il questore di genova Oscar Fioriolli si complimente con il servio d ordine dei 100000 perchè, parole sue, è stato perfetto e li ha aiutati ad isolare i "violenti" che schifo. Fioriolli è quasi descritto come un mito, ma nessuno dice che per fare ciò ha negato il diritto di camminare liberi, di vivere liberi a centinaia di genovesi e non. La nostra considerazione è una sola , non non possiamo accettare tutto questo, quindi fino a che il movimnto rimmarrà questo noi cammineremo da soli, come abbiamo fatto sabato.

Le ragazze e i ragazzi del c.s.o.a. "Pinelli" genova

'Civil government, so far as it is instituted for the security of property, is in reality instituted for the defence of the rich against the poor, or of those who have some property against those who have none at all.'

Adam Smith

How is it named, when the day rises, like today, and everything may be ruined and ravaged, but nonetheless one can breathe the air, whilst all may be lost and the city burns as the innocent kill one another, but in a corner the guilty agonise as the day rises.

- That has a very beautiful name. It is called aurora - the new dawn.

Jean Giraudoux. Electre (1937)

"These are the last things. A house is there one day, and the next day it is gone. A street you walked down yesterday is no longer there today. Even the weather is in constant flux..... When you live in the city, you learn to take nothing for granted. Close your eyes for a moment, turn around to look at something else, and the thing that was before you is suddenly gone. Nothing lasts, you see, not even the thoughts inside you. And you mustn't waste your time looking for them. Once a thing is gone, that is the end of it."

Paul Auster In the country of Last Things.

"ogni uomo ha un motivo per svegliarsi il mattino e mettersi in cammino. Mi muovo nella notte piena in faccia al cielo e cresce il desiderio e il veleno davanti alle vetrine dell'impero"

every man has a reason, to get himself up in the morning, and set himself in step

I move in deep night face to the sky. and grow my desire and hate, before the windows of the empire

Assalti Frontali, Banditi, 1999

"Noi fuori dal greggio, Noi, Fuorilegge!"

"Out of the flock, Outside the law!"

anonymous grafitti, Corso Torino, Genoa, 20.7.2001

"Adorno Oi!" anonymous grafitti, Via Montevideo, Genoa, 20.7.2001

"Tabhair dom casur no tua go mbrisfead is go millfead an teach seo, go ndeanfad tairseach den fhardoras 'gus urlair de na ballai, go tiocfaidh scraith agus dion agus simleir anuas le neart mo chuid allais...

Sin chugam anois na clair is na tairni go dtoigfead an teach eile seo...

Ach, a Dhia, taim tuirseach!"

"Give me a hammer or a pick to break and to destroy this house, To take the lintel from the door and make floors from the walls, To take the thatch the roof and the chimney down with the strength of my sweat...

Give me now the planks and the nails to build this new house...

But, God, I'm tired!"

Caitlin Maude (1941-81)

In Flagrant Delicto

Four days have passed since the longest night of my life. At last I can stand in the shower without the constant accompaniment of helicopter blades in my head. At last I can lie down to sleep without the fear that every ambulance siren is in fact the carabinieri. At last my dreams are bot filled with faces torn with agony and anguish as their eyes and mouths burn with tear gas. In the presence of friends, fear retreats, paranoia is quelled, food heals our spent bodies, once again we can laugh honestly instaed of as a talisman against sorrow, distress and rage. Rage. As I become calm, the anger returns, amplified and directed.

Our fury was born around 6.00 on firday evening when it was confirmed that Carlo Giuliani, 23 years of age, had been shot dead on Piazza Ducal, at a spot where we had been only a brief time before.

On Friday morning we were awakened in the Stadio Carlini at 8.00 by a cheesy synthesizer rendition of the Charge of the Light Brigade, the irony would be fleshed out in the hours ahead. The stated plan had been that the Tutte Bianche would depart from the Stadium at 10.00. In fact it was not until 1.30 that the crowd of around 12,000 snaked down the Corso Torino, with the train lines and Brignole Station on the right hand side.

What were we doing there? Since our arrival at the Stadium on Wednesday morning at 5.00 am disenchantment at the Tutte Bianche, and we had not been so enthusiastic to begin with, had steadily intensified. Arriving in Genoa the previous night, we had made our way directly to a bar near Porto Pricipe train station to meet Irish friends and comrades. The sympathetic barman had generously locked us into the premises after closing time to allow us to drink our fill and enjoy the company. At 5.00 we eventually left the bar to take a taxi to the Stadio Carlini, which was the only facility with the resources to cater for those without tents. The closure of the red zone in the centre of the city had already been underway for 4 hours, police blockades held off traffic while construction teams installed metal fences attached to solid concrete bases. These obstacles obliged our driver to take a circuitous route snaking through the innumerable hills and valleys of Genoa city. On arrival we found the gates of the Stadio shut but manned, with a group of young people registering new arrivals:

What Group are You From? We're not from any group, we are cani sciolti. This is a camp for the disobbedienti, are you going to participate in our action? We have still to meet with our other friends to discuss what action to take, so I cannot answer that, but we are certainly 'disobedient'.

Can we have a number to contact you? No, we don't have any means of communication (a white lie).

Th reality of Stadio Carlini was justb starting to be revelaed. Controlled by Ya Basta and the Tutte Bianche, there had been a concerted effort to marginalise the other currents from the camp; it transpired that they had expelled anarchists the previous day, others had left voluntarily after observing the centralised organisational structure of the encampment.

Anyway, we were too tired at that point to care or contemplate an analysis, besides, we were drunk and they had hot water! Nirvana! We found a space inside the massive marquee erected on the pitch and threw down our sleeping bags to have a nap, arguing against a minority to refuse to get up until afternoon! Alas, our intentions were nullified by a sudden announcement on the loud speaker fifteen minutes later: riot police at the fron door. Without further ado we threw on our hoods and bandanas and ascended the steps of the Kop to check the situation while the loudspeaker continued its reprititious message to arouse the others freom their slumber.

Sixty or seventy people were laready in fromt of the entrance, whose barred gate sepearated us from a corp pf about a hundred riot police in full kit, they were accompnaied by a couple of civvies and were demanding entry to search the camp. Their realtively small numbers made it quickly apparent that this was merely an exercise in petty harassment. Given the topography of the stadium - the steep steps of the terrace began 15 metres from the entrance - and the presence of the six or seven hundred occupants, a physical force entry would have been possible only at the risk of serious injury to the police. The Tutte Bianche did not appear to take this in and instead busied themselves with contacting lawyers from the Genoa Social Forum who arrived rather promptly. They and the TB then proceeded to negotiate with the civilian leadership of this squalid show of force, without even the pretence of consulting with the camp's residents, and in short order came to an agreement to allow four cops in, to walk around the grounds accompanied by a large group of 'comrades'. We were annoyed. But given the fact that we hadf not slept and we had already understood that there were bosses who saw fit to make decisions for others, we retired to bed rather than kicking up a fuss. As we crashed we spotted the absurd procession on the running track which skirted the pitch where the tents were placed. The cops were indeed not interested in examining people's bags - i had secretly hoped they might be forced to make a close eaminatio of some poisonous socks in my possession - but were simply determined to make their presence felt and give us a gander of their big stick.

To illustrate the degree to which this reflected the particular organisation of the TB and their leftist allies, a seperate campsite filled with anarchists, german autonomes and catholic-pacifists had an assembly where after debate they cponcluded that they would not consent to any police entry or search. In Carlini, the decision was made by self-appointed leaders. In the Valletta Cambiaso the decsison was made by discussion and debate amongst the residents.

We awoke in early afternoon and went for a wander, to get smoke and a couploe of hits of coffee to erase the effect of the drink and the hard ground which ahd been our bed. As we hadn't a breeze where we were going, local knowledge was sought and we soke to a few elderly genovese who were helpful and friendly. Plenty of small shops were open, and it became clear that the official wornings that the whole city would be shuttered up (blindata) and its occupants on involuntary holidays were just lies designed to instill a sense of isolation.

The Social Forum was installed in a series of bandstands and marquees by the sea and hundreds of people were taking part in simultaneous meetings on subjects such as third world debt and the Tobin Tax. Around its peripherary a multitude of different groups distributed literature. collected signatures or engaged in discussion with passers by and those who had come for the demonstrations.

In all honesty, we had not come to participate in this aspect of the events. Personally, my interest was to meet and speak with as many people as possible from anarchist and autonomist backgrounds.

We ambled along the coast to the Convergewnce centre at Piazzale Kennedy where there was an information point on the different accomoadation possibilities, food, bars, legal advice and innumerbale stalls erected by sundry political groups and single issue organisations, kinda old scool. We met friends and made for the bar. Manu Chao was playing that night and provisions had to be acquired. Thus a trip to the supermarket was in order, and a crate of beer and a bottle of crema di limoncello were acquired.

Empty bottles always replenished. Crema di Limoncello, warm to the Frenchies chagrin, was put away in a quick, clean and efficient manner nevertheless. Manu Choa came on and the place began to go bananas. We jumped and swayed, laughed and sang, smoked and hummed with 15,000 people, and felt happy. The concert went on for over two hours, and by its end our energy for dancing was spent. Further beers acquired and a free bus ride back to the Stadio Carlini, where words were slurred until an advanced hour. We found a stray Berliner on the steps, a pink partisan with whom to chew the fat, feel nostalgic and lament the dogmatism of the TB and BB aesthetics. He was an RTS- Kein Mensch ist Illegal spassguerilla. Notes were swapped analogising the TB to an old foe, the AAB Null (as old friends in Prezlauer Berg used to say): chronic attachment to the aesthetics of their own militancy. Pre-prepared scenarios presented as spontaneity. Mediation with roughed up veneer and an unpleasant attachment to uniformed garb. Attention was punctuated by moments of wonder at the sheer beauty of the Italian women, no need for bashfulness where that is concerned! By 5.30 in the morning, we was wasted............

8.00 AM Ideologist on the Loudspeaker Alert! TB brainwashing repulsed with blurred reflections of beautiful compagni, residua from the night before, accompanied by cranially inserted Manu Chao soundtrack.

8,30 Urgent and extreme Bongoloid Alert! Beating of unidentified objects in a pointless manner! Alert! Alert!

Hard ground, a skinful of drink swimming round the head, and musically challenged amadan: unpleasant recipe for kippage.

9.00 AM In desperation, Fergal begins eating the newspaper, mastication transforms bpourgeois lies into improvised slleping aid, ie pellets to plug the earhole. Difficulties are later encountered extracting same items of first aid. Earplug ordinanance are purchased without demur in the afternoon. Did someone say there were infiltrators in Genoa?

Unrelenting bongoloid aural assault finally makes the continued holding of foetal sleeping position intolerbale, only tobacco and caffeine can begin to address the nervous injuries inflicted.

Tutti Frutti, Wrong Routi Having spent the days from tuesday to 4.30 am sunday morning in the Stadio Carlini camp controlled by the Tutte Bianche, I find it extraordinary the manner in which they have managed to exculpate themselves from what happened in Genoa.

Three specific points.

At 6.00 AM on wednesday the 18th, the camp's residents receioved a wake-up call from a detachment of riot police demanding to search the premises. The operation was clearly intended as a probatory waving of the stick to see if the Tb would flinch, which they did. Despite the fact that the police were massively outnumbered, and that the topography of the stadium practically disallowed invasion without the risk of serious police casualties on the sheer terrace steps, the TB bottled it and allowed four copsto make an accompanied tour of the stadium. They did not actually effect a search, and obviously had no interest in doing so.

2. The 'civil disobedience' action on friday was the greates tactical farce I've witnessed in recent times. Twelve thousand particpants made their way by the train line to Brignole station, where massed lines of riot police awaited them. Protestors without shields and padding were told to get away from the front. Thankless for their solicitation about our health, we made our way past the objections of their stewards down a side street to the Piazza Alimeda..... and Abracadebra! what did we find but between 1000 and 15000 people fighting the police having spontaneously opened up another front beyond the site of the planned performance.

12,000 people. Two thirds of them marooned half a mile from the action, with only the repeated salvos of tear gas to keep them busy. Many of them wearing these ludicrous plastic bottles and other absurd regalia which the TB have popularised; full sartorial style, including gas masks and goggles which those actually doing something could have used.

Had any flexibility or tactical intelligence been given liberty, three bloccks would have been formed, new fronts opened and a new situation exponmentially more difficul for police management would have been created..

Instead they sent people back up the hill.

In the meantime TBistas spread rumours that 'anarchists' had trashed the Genoa Social Forum and the Stadio Carlini. Neither had been touched. The willingness to accept such calumn TB milieu. Curiously this was the only information I received about the innumerable other actions in the city that afternoon.

That night they told people that the G8 had been cancelled, when in fact there had only been a proposal, one never acted upon. They danced to Bandiera Rossa.

We didn't dance and we didn't laugh. Carlo Giuliani was dead. We had been chased back to the Stadio with our tails between our legs.

3. If the first incident can be put down to their cwntralised organisational structure and the second to the irrational dynamics of a street situation which often do not make for clear thinking, the last is basically unforgiveable.

On the friday there had been about 6,000 people in the Carlini stadium. During the chaos of saturday, the demonstartion was repeatedly fragmented, which meant that there was people all over the city in splintered groups. Their stuff was in the stadium, presumed to be sound if not necessarily safe. On the saturday night, the TB abandoned the camp. We got back to find a scene of devastation; everything was wrecked, people's bags had been looted and the drunk, high and insane had taken over the administration. Evidently not partisans of TB, there is a claim that they were junkies rounded up and directed by the police to a spot spot for plunder after the organisers of the 'multitudes' had decided to split the scene. I found several of my own possessions in the hands of one particularly smacked out character, and duely reappropriated them. The same cannot be said for many others who must have lost everything. Some, hearing what had happened and fearful of police arrest in the stadium simply abandoned everything.

"Victory has a hundred fathers, but defeat is always an orphan." Count Ciano

Sensationalised accounts of the black block and insurrectionalists dominated the media coverage from the friday afternoon. This suited basically everyone else; distracting attention from the TB' ill-prepared adventure; legitimising the police savagery in the eye of the public. Much has been made of the presence of police provacateurs dressed in black, smashing shops, firing shots over the demonstration etc. But the police can always do this, irrespective of the funereal dress sense of some of our anarchist comrades which I must admit I haven't for a long time myself. But obsessing about the black block has become an avatar for an unwillingness to confront the reality that the practices of democratic protest and TB civil disobedience simply had no ripost to the state's monopoly on force unleashed. Wu Ming's studied silence on the matter, after having defended the tactics and strategy of the TB in the strongest terms is notable. Quite right, easier to continue to continue yapping about the BB than face up to a responsibility which you share.

Furthermore whilst I belive that the events thoroughly discredited the politics and practice of the TB, I can state without doubt that many of its adherents are dedicated, unthinkably brave and are smart enough to work out themselves that a whole revision is imperative.

So, the invesctive delivered with appropriate weight and to the correct address, my summation of the anarchists will be brief. The whole reason for my unhappy experience with the TB derives from the incredibly poor level of organisation of the anarchist groups. On both wednesday and thursday evening we spoke with french and irish friends about the plan for action and received reports of the organisational meetings. The ingenious conclusion of the latter was to set a midday meeting at a campsite on the friday. Brilliant! Let's go to war in the morning, I'll see you in front of the shops dressed in black and carrying a cudgel!! In fairness this also resulted from the fact that the final meeting never happened; intended to take place outdoors, that night there was an torrent of rain of biblical proportions (The TB actually called the fire brigade to deal with the inundation! Smash the state!). The following morning a group of 3-400 anarchists based in the Pinelli social centre actuqally got shut in by the police, which shows that not only the 'best laid' of plans goes astray. No shopping. Our french friends were neither impressed nor amused, and we felt quite exasperated. We decided to go with the TB and see what would happen, the Gallic did their own thing .

We were not the only ones of a libertarian sensibility to make this choice. The shining star of the events for me was the beautiful if hellish scene on Piazza Alimeda and the roads below it on the friday afternoon where many TBers, anarchists and a world of freelancers combined in harmony. But that the site was where Carlo Giuliani exhaled his last breath encases it forever in tragedy. All those who made their way down Via Montivideo that afternoon away from the formailsed theatre of conflict know that it could as easily have been them, had they the courage to take up a fire extinguisher to try to stop a Carabiniere from shooting their companions.

The procession made its way down the Corso Torino, a broad four lane road, split in the middle bt ram lines. Today there were no trams. The huge crowd stetched back to the bend to Carlini for about half a mile, the sounds belting out of the organisers' truck must have been totaly inaudible back there, even if the vehicle was in fact located some hundred meters from the front. Excitement pulstaed through the crowd, ecstatic at its own size. The sun burned down upon us. I shook my head watching a slim young woman wearing a plumber's hat cradle a chillum in her hand, periodically drawing huge lungful's of marijuana into her lungs then disappearing in a swirling exhalation of smoke. Not how I choose to face the police, myself.

Advancing down the hill, we soon realised how easily we would lose each other, and thus chose a large inflatable carrot as a point of congregation. Some fifty meters from the police they loosed their first fusillade of tear gas into the throng, first at the shields in front, then deep into the ranks of the demonstrators. A convulsion siezed us as the panic commenced. Joined by hand we attempted to remain together and move towards the side to escape the blind surge backwards, but the chain became unshackled as the gas worked its way into our eyes and mouth, sending tears down the face and the chest spluttering, so that in a moment as I gathered myself I was alone.

After the initial salvoes, those left on or near the front lines calmed. Sapper withs gloves gathered the stemaing gas cannisters and flung them back to the police lines, or ove the irown fence which faced onto the railway yards. Bandanas were drenched in acids and used to filtrate the polluted air. T-shirts tied across the back by the arms, served both conceal identity and to keep the gas off most of the skin. The die was cast, notions of peaceful disobedience consigned to the wind, and a long streetbattle commenced.

Periodically, the fear which had dissipated on our revival in Rome, returned as a choking paranoia. Memoryb of the ferocity of the police assault was easily reawakened. In Bologna - deisgnated some months previously as the anarchists home - we discovered that the owners of all the local cybercafe had been instructed to demand, and take note of, official identity papers of all foreign visitors. This was agood ten days after the events in Genoa and Bologna is always deadly quiet and sleepy at that time of year, as the humidity makes it uncomfortable and the students leave the town as the University is closed until October.

Whilst travelling on the train south from Chiavari, we had spent some time getting straight a story should we be interrogated by the police. Fortunately, we had not undergone an identity contgrol at any point during our stay in Genoa, leaving us free to lie as we pleased. Of course it was unnecessary and we were never stopped. But the daily news of fresh arrests, the continuing imprisonment of our friend in Pavia, accounts of police surveillance on thos einstrumental in porganising regional protests against the police violence, and the occasional hostile gaze kept us on our toes and was a constant suggestion thta we should think of ourselves as fugitives.

A flag in favour of world peace jettisoned as the riot squad piled into the demonstration on the waterfront, to be recovered by a young man from Sicily who used it as a cloak and had little sympathy with pacifism at all.

Given the circumstances, anarchist groups acquitted themselves rather well ( 34 banks and a prison!). But given the scale of the disturbances around the city that energy might have had more ambition. I suggest that Piazza Alimeda was the right target for that ambition. Anarchists shouldn't box themselves off, either by dress or in practice.

We returned on saturday. Rome was great, Anastasia and Marino were just the people to relax with... R. came down as well and enjoyed himself thoroughly. Of course I said hello to Alessanda for you; she's in great form, being on sick leave and about to leave for Costa Rica, it was lovely to see her and the other pals, I can even get on with her boyfriend now! Indeed I recall inviting them to Ireland! Blasphemy!

Despite all the great company though, it was difficult to feel that we were on holiday after all that had happened. News every day. Horror. Calling Joe Moffatt's girlfriend, lawyer, Aileen, trying to see if we could do anything for him. Apparently they're going to release him today, straight into the arms of a deportation order no doubt. Bastards. Fergal L.' s austrian theatre buddies are still locked up as well, framed. Ricka nd Rebecca were, as you may know, arrested trying to leave Genoa again on the Thursday; they were the last abducted and charged with being part of the 'black block'. If only they could see his craftsmanship with camera, they'd believe otherwise, but happily they'll never see his footage.more sorrow

Becky: the heart wants to forget but the eye will not allow it. I recognised her immediately as she came across the square with a guitar in her hand. One nightears before, when I had lived in Bologna, we had gone to a newly occupied palazzo for a concert. The interior of the building was magnificent, and the walls of the room where the band played was covered in frescoes. Lingering at the end of the gig, we found ourselves sitting in a group of ten or twelve in the cortyard, chugging wine and singing songs to accompany our friend Dylan on the guitar. At a certain point, all the racket raised the heckles of some of the occupants, who to be fair were in the midst of barricading the doors in anticipation of a dawn eviction raid. An argument commenced that proceeded quite calmly at first and degenrated quickly, particularly with the arrival of a rather tall and psychotic fellow who had evidently taken on the role of being the collective's fists. One of the more belligerent memeber sof our coterie was a yound english woman called becky, obviously hailing from the traveller universe, whowas pissed drunk and had a cat in tow that she showed great affection for. She ended up getting a kick from this looney-tunes which sent the 'gatto' into the air, at whicj poijnt she became enraged. Anxious to smother the situation before it escalated into a bloodbath, I remonstrated with our new acquanintance Norman Bates and settled things with hiscompanion and minder. We left shortly afterwards for Nicky's, and Beckky accompanied us, seeing as it was plain that she had nowhere to go.

Some women are slim, but Becky was thin. Her skin bore more than the occasional scar and scab. She was pretty somehow, despite her blemishes, and she was warm. Her story was that she had been living outside of Pisa in a truck withn her boyfriend, but had run away after he had beaten her up. Lots of english crusties lived in that area, a s the Mutoid waste Company had put Pisa on the map of the traveller scene through their involvement in the social center Machia Nera. Although young, she ahd already seen a lot of brutality.

As she made her away across the square where we sat drinking, the rumour of memory stirred and whispered. In a long white skirt, and wearing a hat, she must have looked the height of elegance one time. Now she was emaciated, with more resemblance to a ghost than the living. Difficult to describe how shocked we were. Her mind had suffered and she reatined a strange dispassionate distance in her speech. The damage inflicted to her physically and mentally suggested long term heroine addiction, but there was alertness to her which smack would have destryed. I reminded her of the previous occasion that we had met, and she obviously recalled it perfectly as there was no suprise in her eyes. We drank for a while. Eventually when we left, she said goodbye,and did not even ask us where we were going or if we could spot her any money, she didn't appear to have even the will to make that attempt to survive.

Byt just before our leaving, she became excited for a moment and demanded my attention. Reaching into her bag, she pulled out a series of printouts from a computer: the pages contained directions and advice for those who wanted to partcipate in demonstrations as a nurse, and involved a full breakdown of the tools in the police arsenal and the best means for treatments of each. Tears welled up somehwere in my chest. No need for another augury, it was time to leave Italy.

Anyway we thought it'd be better to get back home, seeing as lying on the beach wasn't really a viable fantasy.

I'm trying to write up an account of the days, both for myself and to try to reflect intelligently as to where it goes from here. Some say Brussels, I'm not sure. If you have the time you might be interested in the following article and the others listed at the bottom of the page. http://squat.net/eurodusnie/nieuws/stophoppen.htm http://www.ireland.com/newspaper/opinion/2001/0725/opt1.htm http://www.ireland.com/newspaper/opinion/2001/0801/opt1.htm http://squat.net/eurodusnie/nieuws/stophoppen.htm http://irlnet.com/aprn/current/news/26geno.html http://www.indymedia.org/front.php3?article_id=57967&group=webcast - nytimes art http://www.indymedia.org/front.php3?article_id=57921&group=webcast ger and It cops http://www.wumingfoundation.com/english/giap_en.htm

http://alternet.org/issues/index.html?IssueAreaID=21 http://www.observer.co.uk/international/story/0,69 03,529075,00.html http://indymedia.org/front.php3?article_id=57735 http://www.corpwatch.org/issues/grassroots/featured/2001/g8sgeorge.html

http://www.ainfos.ca/en/ainfos07166.html la republica

http://www.ainfos.ca/en/ainfos07143.html el paso

http://eurodusnie.nl http://www.ainfos.ca/en/ainfos07247.html john blair

Cork man charged with refugee escape

July 19, 2002

(09:47) An Irishman has been charged in Australia with helping 35 detainees escape from a remote refugee camp.

Jonathan O'Shea, a 22-year-old backpacker from County Cork, was refused bail at a court near the Woomera camp. He is due in court again next week.

The mass escape took place three weeks ago. Among the escapees were two brothers from Afghanistan, aged 14 and 12, who arrived at the British Consulate in Melbourne.

Alamdar and Muntazer Baktiari’s pleas were turned down and they have now been returned to Woomera, 600 miles away.

http://www.cl.cam.ac.uk/Research/SRG/opera/publications/Papers/network20....

Peer to Peer: peering into the future

Jon Crowcroft & Ian Pratt, University of Cambridge Computer Laboratory,

J J Thomson Avenue,

Cambridge CB3 0FD

Jon.Crowcroft@cl.cam.ac.uk, Ian.Pratt@cl.cam.ac.uk

May 23, 2002

Abstract In this paper, we survey recent work on peer-to-peer systems, and venture some opinions about future requirements for research.

The paper is a survey to support the tutorial at the Networks 2002 Conference and is therefore neither complete, nor likely to be up-to- date by the time you are reading this, since the topic was extremely fast-evolving at the time of writing.

Instead, we try to bring some historical perspective and structure to the area, and to shed light on where the novel contributions, and where it is likely that there are research questions to answer.

1 Introduction The topic of peer-to-peer networking has divided research circles in two: on the one hand there is the traditional distributed computing community, who tend to view the plethora of young technologies as upstarts with little regard for, or memory of the past - we will see that there is evidence to support this view in some cases. On the other hand, there is an emergent community of people who regard the interest as a opportunity to revisit the results from the past, with the chance of gaining widespread practical experience with very large scale distributed algorithms.

1

The term peer-to-peer (P2P) came to the fore very publicly with the rise and fall of Napster[1]. Although there are prior systems in this evolutionary phase of distributed computing (e.g. Eternity[45]), we choose to limit the scope of this survey to the period from "Napster 'til Now".

1.1 Background Peer-to-peer networking has come to refer to a family of technologies and techniques for organising distributed applications, that has emerged over the past four-to-five years.

The consensus seems to be that a peer-to-peer system can be contrasted with the traditional twenty-five or more year old client-server systems: client- server systems are asymmetric; the server is distinguished as running over some longer period of time and looking after storage and computational re- sources for some number of clients; the end system is therefore a single bottle- neck for performance and reliability. Server sites may make use of a number of techniques to increase reliability and performance, such as replication, load balancing and request routing; at some point along the evolution of this thinking, it is a natural step to include the client's resources in the system - the mutual benefits in a large system, especially given the spare resources of today's clients, are clear.

Thus peer-to-peer systems emerge out of client-server systems by removing the asymmetry in roles: a client is also a server, and allows access to its resources by other systems.

A claim sometimes made about peer-to-peer systems is that they no longer have any distinguished node, and thus are highly fault tolerant and have very good performance and scaling properties. We will see that this claim has some truth to it, although there are plenty of peer-to-peer systems that have some level of distinguished nodes, and also plenty of peer-to-peer systems that have performance limitations. In fact, the fault tolerance claims are hardly born out at all in the early instantiations of the peer-to-peer move- ment. Initial availability figures in Napster[1], Gnutella[2] and Freenet[3] do not compare favourably with even the most humble of web sites!

However, second and later generation systems do indeed provide the claimed functionality and performance gains, and we will see in Pastry[40], Chord[11] and CAN[12] very promising results, and even more recent work i.e.1998-2002 building applications and services over these systems shows great potential gains[16].

At the same time as peer-to-peer, a number of network researchers have been frustrated in their attempts to deliver new network services within the context of traditional telecommunications or Internet networks. Instead, researchers have built experimental infrastructures by constructing overlay systems. An overlay may be a simple as a collection of static IP in IP tunnels, or as complex as a full dynamic VPN ("virtual private network"). Some of these systems are in use in the Active Networks research community. Others are more straightforward in their motivation, such as the GRID communities' requirements for more robust Internet connectivity!

The classical distributed systems community would claim that many of these ideas were present in the early work on fault tolerant systems in the 1970s. For example the Xerox Network System's name service, Grapevine[43] included many of the same traits[44] as systems mentioned above and dis- cussed below. Other systems that could easily be construed as architecturally true peer-to-peer systems include Net News (NNTP is certainly not client- server) and the Web's Inter-cache protocol, ICP. The Domain Name System also includes Zone Transfers and other mechanisms which are not part of its normal client-server resolver behaviour.

Also, IP itself is built out of a set of autonomous routers running a peer- to-peer protocol (for example, the routing protocols OSPF and BGP are peer-to-peer, and certainly not client-server, and are designed that way for exactly the reasons given above for peer-to-peer); not only that, but IP was originally an overlay service , implemented above other layered communica- tions system: the PSTN, ARPANET and X.25 circuit switched networks. Indeed, this overlay model keeps re-emerging as network operators deploy faster switched infrastructures such as Frame Relay, ATM and WDM and PONS (Pure Optical Networked Systems) core networks. Most of the peer- to-peer work that we discuss in this document is positioned at the Application Layer, as illustrated in Figure 1.

One can look at differences and similarities between classical client-server and modern peer-to-peer systems on another axis: statefulness. Despite successes with stateless servers, many Web servers use cookies and other mech-anisms (Web Services) to keep state over various transactions with a client. Peer-to-peer systems may keep track of each other although the implications of the privacy/anonymity models we discuss below mitigate this.

New Internet network level services such as IP QoS in the form of integrated services, and differentiated services, as well as novel service models such as multicast and mobility have proved notoriously hard to build and deploy in their native forms.

Figure 1: Peer-to-peer architectural situation

Yet another viewpoint from which one can dissect these systems is that of the use of intermediaries. In the Web (and client-server file systems such as NFS and AFS) we use caches to improve average latency and to reduce networking load. Peer-to-peer systems (particularly Freenet[3]) offer intermediary services very naturally, although again, anonymity (and locality) may not necessarily be preserved.

As an aside, we would say that since this topic seems to recur every few years, there appears to be something compelling and unavoidable about peer-to-peer and overlays.

In the next section we take a further look at both this recent, and longer term history in a little more detail.

1.2 History While we could talk about the 1970s and 1980s work on autonomous distributed systems, or the use of ideas from those in other areas such as IP routing, here we choose mainly to look at the recent peer-to-peer work.

Lest readers think we are not aware of the longer history of peer-to-peer protocols, we cite the work of 1215[46].

Peer-to-peer "year zero" can effectively be set to Napster[1]. Napster was used heavily to share music content. This is a political hot-potato - the music industry was (and still is at the time of writing) very slow to make content available through the Internet, perhaps due to lack of perception of the market, perhaps due to lack of efficient rights management, and content tracking and protection mechanisms. This seems commercially naive, given that a large part of the customer base were early network adopters with low tolerance to profiteering. Indeed, the media industry as a whole has preferred to pursue legal mechanisms to protect its legacy hard copy business than to pursue a lower cost (but not necessarily lower margin or profit) soft copy distribution business - the fear of copying would be plausible if it were not for the fact that this risk already exists, so the lack of availability of online music services until fairly recently is all the more remarkable.

Napster was not just a system architecture. It also became a company which provided a central directory. This directory is where file listings are uploaded by peers, and where lookups go to. The true behaviour is that of alternating client-server roles. This is illustrated in Figures 2, 3, 4 and 5.

The central directory server exhibits problems which are not just reliability and performance bottlenecks, but are also a single point of security, political, legal and economic attacks.

To work around all these problems, there has been an evolutionary sequence of research and development of next generation peer-to-peer systems, largely improving on the lookup mechanism, but then moving on to better and better content availability.

The first of these was Gnutella, which dispensed with the central directory and replaced it with a flood based search [2] [35]. While this averts the problems above, it has rather pathological network load effects. The next steps were Freenet[3] and Morpheus[5] which add mechanisms to route requests to an appropriate node where the content is likely to be. The techniques involve two separate mechanisms: the first makes use of hashing on content keys to derive a node number. This is routed to nodes which are where content keys are stored; the second part of the mechanism is to carry out demand caching. The last phase of Freenet that is particularly interesting in that content is encrypted so that servers (oops, sorry, peers) do not even know what content they store. This is similar to the Eternity[45] file system which predates most peer-to-peer systems by a few years.

A web based service that has many of the same characteristics as Eternity is the Publius system[24], which we mention for interest.

The commonality of the use of Java in some research projects, combined with the observation that there are enough common components in peer-to- peer development activities, has led to some common toolkits for future work - one such is JXTA[4] from Sun.

3

It has been remarked, we believe by Roger Needham, that the World Wide Web has created a form of amnesia amongst researchers who find it almost too easy to find recent work online, and forget to check the large body of older literature offline in traditional print in libraries. Luckily, this is being rectified through concerted programs at various publishers, notably the ACM and IEEE to scan and make available online entire back catalogs. However, one can see several instances of the lack of historical perspective today in papers which cite nothing before WWW year zero, submitted to recent conferences in which the authors have been involved.

4

One might observe that the best way to ensure that kids do something is to ban it!

5

Figure 2: Napster Central Directory Use, Directory Upload

Figure 3: Napster Central Directory Use, Item Lookup

6

Figure 4: Napster Peer-to-Peer phase, Peer Selection Figure 5: Napster Peer-to-Peer phase, Content Retrieval

7

Figure 6: RON

1.2.1 Overlays As the ease of development and deployment of peer-to-peer became clearer to the network research community, the use of what one might call "multi-hop" applications, or more normally overlays, has started to take off in a big way.

Balakrishnan et. al. at MIT have developed the Resilient Overlay Network system[6, 33]. This idea is illustrated in Figure 6, where a number of sites collaborate to find a longer path at the IP "level", which has better properties (such as throughput or loss) at the application level, by dynamically routing via a set of dynamically created tunnels. In parallel, Turner et. al. at Washington developed a similar approach for multicast[30].

The difficulties in deployment of native IP multicast have led several groups, most notably the CMU group have developed an "End System only Multicast" system which constructs distribution trees for applications by running a routing algorithm for a degree-constrained multicast tree without including any intermediate IP routers, but with fairly limited negative impact on the efficiency of the distribution tree [7, 8]. Further work used this to implement multimedia conferencing systems and demonstrated the work- ability and usability of the scheme [9]. A group at Stanford also used this approach for streaming media [28].

Other researchers have used the approach for anycast [14], and server selection [15].

1.2.2 Next Generation Dissatisfied with the poor resilience and network load caused by super-nodes and flooding, respectively, a number of researchers have been working on distributing the directory for peer-to-peer storage systems.

The main approach is to implement a distributed hash table. There are then a number of design choices as to how the keys are distributed amongst nodes, and how requests are routed to the appropriate node(s).

The principle schemes are Pastry[40], Chord[11], CAN[12] and Tapestry[10]. Chord uses a clever fingertable to reduce the size and failure probability of the directory. Pastry uses a similar scheme but with network locality hints. CAN uses several hashes, to map into a multi-dimensional node id space. Tapestry creates an inverted index of nodes.

The success of Pastry has led to its use in Scribe for multicast above the level of a peer-to-peer service (overlay on P2P!)[22]. In turn, the creators of CAN have also investigated its use for application layer multicast[13].

1.2.3 Next Generation Applications As the scalability of peer-to-peer became apparent, and the resources that could be made available on the large number of systems on Intranets and the public Internet, novel versions of applications on P2P have been developed.

These include object/file stores, such as ASF[16], Oceanstore[18], PAST[29], and databases[31], and even novel VOIP (Voice Over IP) routing systems such as Bazooka[32].

1.2.4 Measurement and Security There is an interesting tension in measurement work in peer-to-peer systems. Due to their open nature, one can introduce instrumented nodes very easily. Due to the anonymity of some of the systems, it can be hard to ascertain the real behaviour of the whole system at a higher level[19].

Some of the more interesting work has centred on the combined behaviour of users and the peer-to-peer system itself. The seminal paper "Free riding on Gnutella"[20] shows that even mutual benefits do not stop people behaving selfishly.

Other aspects of peer-to-peer that have garnered study are security and collective behaviour [23, 25].

1.2.5 Modelling Work Alongside measurement, we usually find modelling, and peer-to-peer networking is no different from telecommunications or the Internet in this regard.

Examples of interesting models include papers on the power law of organisation of the system and the small world model of user, content and peer connectivity [21, 26, 27, 34, 36].

1.2.6 Industry and other interest Peer-to-peer has attracted a lot of industry interest [37, 38, 39].

Possibly the most interesting work to date is the Microsoft Farsite project[42]. Building a massive, highly available, distributed file system out of (massively) unreliable components obviously has its attractions for this organisation.

2 P2P Taxonomy In this section, we form a rough taxonomy of peer-to-peer systems. Following that, we take a slightly more detailed look at each aspect of peer-to-peer through some examples.

Examples of peer-to-peer system claimed properties include:

Server-less As stated above, true peer-to-peer systems auto-configure with a minimum of initial state, and then run without any distinguished node. Having said that, many systems build a structure which may include tuning the peering relationships to improve locality [41] and possibly adding hierarchy to improve the performance of directory lookup (size and robustness) and searching. However, this structure is usually maintained through soft-state, and is largely in place in most peer- to-peer systems to improve performance rather than to add specific functionality.

Arbitrary Scaling Peer-to-peer systems often add resources as they add customers. Thus they should scale (at least at the computing and storage resource level, if not networking) linearly, or better, with number of peers. Of course, many networks are designed assuming client-server traffic, and so it is entirely possible that this performance scaling properties many not be achieved transparently. There are some claims that the "small world" models of human behaviour and interaction, combined with the preferential way in which people link to known locations, lead to power law structures in connectivity. This in turn leads potentially to even better than linear scaling in the system in terms of potential locality (in Freenet for example, however this claim is disputed by some researchers). This means that the study of peer-to-peer systems is partly a sociological, partly an ecological, and partly an economic one.

Symmetry Software for peer-to-peer systems is symmetric. Such software systems are harder to write than client-server systems at the moment as there are few toolkits (although JXTA[4] is one such system). The peer-to-peer programmer needs to build event driven systems, which in general have proved harder to write correctly than client/server. One risk in such systems is that one has to pay attention to synchronisation effects. Another problem is that the programmer must cope with the type of erroneous requests that only server (rather than client) appli- cation programmers have to deal with. This makes peer-to-peer pro- gramming currently an expert systems programmer task, rather than the separation of concerns that client-server architecture achieves.

File Sharing To a large degree, peer-to-peer is used to share content. Napster and its descendants, have been used for media distribution. Gnutella is also being used by the Genome project for distributing the database.

Processor Cycle Sharing There are few peer-to-peer CPU sharing systems. SETI@Home is one of the few, although (like Napster) it has a super-node. Xenoservers[17] are a system attempting to fill this gap in the true peer-to-peer portfolio. SETI@Home is also in use for other applications such as genome database searching and cryptographic cracking.

Anonymity and Resistance to Censorship Some peer-to-peer systems offer privacy at the level that users' identities are masked. Some go further and mask content so that neither peer exchanging data knows who delivered or stores which content. True anonymity is typically two layer, requiring some form of anonymized IP routing system (e.g. onion routing) as well as application layer mechanisms to protect privacy.

High Availability Eternity provides a high degree of availability by stripping and replicating objects using FEC like codes over multiple nodes. This provides some level of assurance that single (or some level of multiple) node outages, do not lead to object non-availability.

Directories and Super-nodes and Searching A number of peer-to-peer systems are not strictly peering, but depend on some designated node or server (or cluster of nodes and servers), to head-up the system. Some systems volunteer peers to perform this function. This appears to be hard to avoid if one wants to provide a scalable search or browse capability.

Application Layer Routing Peer-to-peer routing is application layer. It can be used to overlay IP network layer routing to offer more services such as multi-path, multi-metric, multi-cast, mobile optimisation, and other techniques.

12

Interestingly, it is hard to find any successful decentralised P2P networks. These are the ones we would say have been most successful so far:

ffl Napster - centralised ffl Gnutella - started out decentralised, but then evolved into a centralised system[37].

ffl KaZaA/Morpheus/FastTrack - centralised (only super-nodes route queries, central registration/authentication/index server)

ffl DirectConnect - centralised (pretty similar to FastTrack, except the more you share, the more nodes you get to share with)

ffl EDonkey - same as FastTrack and DirectConnect (why do people spend time doing the same things as everyone else?)

ffl Freenet - not successful yet, perhaps because it is decentralised

ffl MojoNation - also not successful yet, perhaps because it is decentralised

It is interesting to ask what is the problem? Is it lack of bandwidth? Or is it because people don't like to share? Later we look at failure to share[20].

Request and Content Routing Peer-to-peer systems still have actual users who make requests. These requests (for a resource) have to be routed to a node that can provide that resource (storage, object, CPU etc). Request routing has evolved from super-node indexes[1], and flooding[2], through to sophisticated content-key hash based routing[40, 12].

Overlays As we have observed, peer-to-peer systems carry out application layer routing. One parsimonious use of peer-to-peer techniques is only to provide an overlay for IP routing to make up for lack of an IP layer built-in service.

3 P2P Detailed Examples 3.1 File Sharing File sharing was one of the first great successes of client-server distributed systems. Sun RPC and NFS were ubiquitous in the mid 1980s in research and education labs. Nowadays, we can add Samba and other systems. However, the brittleness of such systems has been remarked on, most famously by Lamport - the failure of a so-called stateless server causes systems to "hang" all around a network. Automounting mitigates against this somewhat but without completely eliminate the problem.

Solutions through server replication are typically expensive. Peer-to-peer file sharing starts out as simply offering directories of files on my system to any and all other systems on a network. There are no guarantees that I will keep these files, or that I will serve them to anyone, or what resources I will give to serving a file to someone. Nor, typically, is there a way in early peer-to-peer file sharing applications, to upload a file, only a directory.

Later systems have rectified these shortcomings, but still struggle with notions of performance, availability and persistence.

3.2 Process Cycle Sharing Processor cycle sharing is familiar through remote shell and earlier in RJE systems. Since Moore's "law" appears still to describe the growth in new CPU speed over time, we have several hundred million personal computing and workstation machines now on the public internet which have hundreds of MIPs going free all the time.

Attempts to exploit this vast processing resource have been limited since the unit of computation is still quite small, but more importantly, since the latency and bandwidth for code and data distribution to these nodes is typically very poor. This means that the class of computation for which it makes sense to use this huge distributed parallel, unreliable computer is rather restricted to jobs of the type that can be broken in to many relatively small pieces which have quite long individual processing time and perform little communication (i.e. the ratio of CPU step to job cycle step is large). Nevertheless problems in large scale signal processing (SETI@Home, Genome searching, Astrogrid, code cracking) have all been successfully tried, and continue to thrive

SETI is the Search for Extra Terrestrial Intelligence, which takes the signal from many radio telescopes around the world, and attempts to find low entropy strings in it which may or may not represent artificial signals from remote intelligent life. Anecdotally, when applied to RF signals sourced from planet Earth, the system failed to find anything remotely intelligent!

Recent moves towards finding locality in peer-to-peer systems might lead to the use of clustering, allowing computations of a less constrained style (e.g. in the Computational Fluid Dynamics area, for example in turbine design, atmospheric and oceanographic modelling).

3.3 Anonymity and Censor-proofness One of the main novel characteristics of Eternity and subsequent peer-to-peer file systems has been the ability to withstand censorship. This is achieved by several means:

Partition By splitting a file into component parts we make sure that no single site carries the whole file, and a denial of service attack has to run over multiple sites. Later systems made clever use of techniques such as Rabin fingerprinting or other techniques for finding common elements of objects can also ensure that overlapping content between multiple files is exploited to reduce storage costs.

Replication By replicating blocks of a file over multiple sites, we also provide higher availability. Combined with locality information, this can be tuned to reduce latency and increase file sharing throughput, at some cost in terms of consistency in update.

Encryption By encrypting blocks of the file, we make sure that disclosure is unlikely, but also that a node can deny knowledge of the actual content it carries - again, P2P exploits mutual benefit: the argument is that "I might not approve of this content, but I approve of the ability to hide my content in a set of peers, so I will live with what I do not know here!". This is often termed "plausible deniability" and is used by Service Providers to align themselves with the "common carrier" defense against legal liability for content, as with telephony and postal providers can do.

Anonymization By masking the identity of sources and sinks of requests, we can also protect users from the potential censor or unsavoury agency. However we need to mask location information as well as identifiers, as otherwise a traffic analysis may effectively reveal identities, so some form of onion routing is also usually required.

3.4 Directories and Super-nodes As has been mentioned, there is a trend for users to wish for searching facilities, including underspecified queries that return a mass of partial matches. To provide this there has been a move to create super-nodes which contin- ually scan peers and construct indexes. Of course these distinguished nodes are now highly visible, and this rather reduces the idea of anonymity for themselves, and possibly partly for the set of peers too.

3.5 Overlays Overlays are a good technique for implementing services that might otherwise belong in a lower layer. Certainly, at one extreme one could imagine that an idealised anycast service should be able to do almost all of the things that peer-to-peer storage systems do. However, the burden of putting this sort of information, even at the level of hints, into the network level addressing and routing infrastructure is clearly too high. Instead, an overlay is created. In some cases, the overlay may in fact serve the purpose of using additional information merely to route packets (i.e. the basic network service, but controlled using more complex application layer hints).

3.6 Request and Content Routing The notion of a "middle box"[47] or proxy pre-dates peer-to-peer by a few years. Proxies use meta-data and state information to decide on routing queries to an appropriate one out of many possible (and hopefully, though not always) identical servers. Many of the query routing systems in peer-to- peer architectures take this idea to a logical extreme.

4 Shortcomings and Future Work In this section, we look at seven areas where we believe additional research questions can be identified based on problems and shortcomings in peer-to- peer systems today. No doubt other researchers have other topics that they can add to this list, and may also feel that some items on this list are perhaps less important, but these are our current favourites:

Measuring and Modelling P2P Systems It seems that there is a great opportunity to build interesting systems for the end user with peer- to-peer technology. However, users then have the opportunity to offer traffic from multiple sources simultaneously. This might start to make normal user traffic look a lot like Distributed Denial of Service ("DDoS") attacks!

Update and Persistence in P2P Storage Systems Most of the classic peer-to-peer storage systems are actually ways to share files, and do not easily permit scalable update, and certainly do not offer Service Level Agreements on persistence.

Computation We really only have very early experience with sharing CPU resources. The economic motives are not the same: the mutual benefit arguments which work for file (music/film) sharing are not so obvious. Even with Digital Rights Management properly in place, file sharing makes efficient use of link bandwidth (upload while I download can take place on most networks since links are usually roughly symmetric in capacity provisioning).

The economic incentives are not so clear with CPU resource sharing, although the Xenoserver[17] project is one attempt to rectify this with accountability and fine-grained charging.

QoS and Accounting Peer-to-peer systems do not typically offer QoS (latency or throughput) guarantees. Even if they did, the accounting system could possibly undermine anonymity. Again, the Xenoserver work attempts to tackle this problem.

Locality versus Anonymity Peer-to-peer systems struggle with the apparently inherent contradiction between offering anonymous sharing of resources, and localisation of service offers. Without a substrate of anonymous packet level routing such as onion routing, it is hard to see how to reconcile this. Having said that, an approach such as recursive use of peer-to-peer, first to build an overlay that achieves anonymized request and response routing, and secondly to do content distribution might be worth exploring.

Evolution of P2P into Lower Layers As peer-to-peer approaches become better understood, we might see the techniques migrate into the infrastructure, as IP has migrated from overlay into native services.

P2P and Ad-hoc Wireless Network Duality Peer-to-peer systems incorporate many techniques for self organisation in an ad-hoc scenario without any pre-built infrastructure. It has been observed by quite a few people informally that these characteristics are shared with ad hoc wireless networks. There is perhaps some mileage in exploring this commonality.

4.1 Measuring and Modelling P2P Systems Large scale Internet measurement has been recommended/proposed by the US National Academy of Science in their report on "looking over the fence at networking research"[48]. In fact they also recommended looking at overlay systems as a general approach to building research infrastructures.

4.2 Update and Persistence in P2P storage systems The Eternity file-system incorporated file block striping and replication in a peer-to-peer system some time ago. This surely needs revisiting, especially in the light of recent advances in the design of redundancy coding algorithms such as those used in layered multicast schemes.

4.3 Computation The critical difference between file objects and computations is that the former have a simple partition function. Computations are notoriously hard to distribute. There are some interesting cases which are well understood. The various world wide GRID research programmes have a number of such problems which entail very long timescale and large computations, which have some resemblance to the SETI@Home problem.

4.4 Congestion Control versus QoS and accounting Recent peer-to-peer systems have a stage during the phase of setting up peering relationships when they use some simple tool such as the ubiquitous "ping" program, to select preferred peers by proximity.

However, such an approach is error prone, and more importantly, leads to a succession of local optimisations, rather than a solution optimised for global performance.

It is clear that regardless of whether we want an adaptive system that responds to congestion (e.g. via Explicit Congestion Notification or pricing) or an engineered solution based on some type of signaling, there is a long way to go in providing performance guarantees into P2P. Certainly, a market driven approach would fit the spirit of P2P best. However, as measurement projects produce more results to characterise the behaviour of peer-to-peer sources, it may be possible to develop traffic engineering, and even admission control and scheduling algorithms for the nodes.

4.5 Locality versus Anonymity As mentioned before, there are a number of driving factors that are reducing the anonymity characteristic of peer-to-peer systems, at the very least, their immunity to traffic analysis is being lost.

However, developing an onion routing system as a peer-to-peer application, and overlaying this with any other peer-to-peer application seems like an elegant, but as yet untried solution to this tension.

4.6 Evolution of P2P into Lower Layers We observed that successful overlay systems sometimes migrate over time into the infrastructure. However, many peer-to-peer systems are complex, and devising a minimal service enhancement in the lower levels that would support their algorithms is an interesting challenge. The IETF FORCES working group has been working on remote IP router control (separating out forwarding and routing). However, we would need more than this if very general P2P intermediary functions are to be carried out at wire or fibre (or lambda!) speed. Filtering and processing of content keys would be needed. Such a system is a long way from our current capabilities or understanding.

4.7 P2P and ad hoc wireless network duality Peer to peer systems are a highly attractive way to build disintermediate content services. However, resilient mechanisms that have emerged in the P2P community from Freenet and Eternity, and via Content Addressable Networks have weird effects on network utilisation and are prohibitive for wireless ad hoc networks. We propose to select some of these mechanisms, such as CAN, Chord, Pastry, and Mixnet, Publius, Xenoservers, and MojoNation and mitigate these effects. This could be achieved by:

1. making them "load aware"; 2. distributing load information and implementing a distributed congestion control scheme; 3. adding a topographical metric based on location specification and using anycast.

Most current second generation peer-to-peer overlay systems use content request routing schemes that relay on arbitrary hash functions to map from some attribute (content) to node identifier - in the case of CAN there are as many hash functions as there are dimensions on the hyperspace.

None of these takes account of actual location. These functions are largely aimed at providing robust and anonymous content location, and a high degree of cooperative, distributed indexing. There have been some attempts to modify schemes to take account of actual node proximity to the clients/requesting nodes. Freenet and other systems migrate copies in a manner similar to de- mand caching, as often used in the World Wide Web.

It is likely that next generation systems will use actual location and scope information to influence routing functions so that content is initially placed and requests are routed to copies that have proximity on a number of QoS axes - these would be delay, as well as potentially throughput and loss-based, but could also include battery budget considerations for wireless users. Thus the distribution of replicas in the service infrastructure would evolve to meet the user demand distribution, optimising use of the scarce wireless resources to better match user concerns.

Note that some of the resulting algorithms and heuristics serve a dual purpose: they can be used for the actual packet routing decisions too! The duality between self-organisation in P2P content location and routing, and ad-hoc wireless routing has been commented on in the past, but not directly exploited to our knowledge.

5 Acknowledgements The authors gratefully acknowledge discussion with Jim Kurose and Don Towsley, and the use of materials generated by their class on peer-to-peer from last year in the Computer Science department at the University of Massachusetts at Amherst. Thanks are also due to Ian Brown, Ken Carlberg, Tim Deegan, Austin Donnelly and Richard Mortier for extensive proof reading.

References

[1] Napster. "The Technology Behind Napster", copy of this is cached at:

http://gaia.cs.umass.edu/cs591/hwpa/napster.htm

[2] The Gnutella Protocol, version 0.4, http://www.clip2.com/GnutellaProtocol04.pdf [3] "Freenet: A Distributed Anonymous Information Storage and Re-

trieval System", I. Clarke, B. Wiley, O. Sanberg, T. Hong, in Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag LNCS 2009, ed. by H. Federrat, Springer: New York (2001). http://freenet.sourceforge.net/index.php?page=icsi-revised

[4] "Sun's Project JXTA: A Technology Overview", L. Gong,

http://www.jxta.org/project/www/docs/TechOverview.pdf

[5] "Morpheus out of the Underworld", K. Truelove, A. Chasin,

http://www.openp2p.com/pub/a/p2p/2001/07/02/morpheus.html?page=1

[6] "The Case for Reslient Overlay Networks", D. Anderson, H. Bal-

akrishnan, F. Kaashoek, R. Morris, Proc. HotOS VIII, May 2001, http://nms.lcs.mit.edu/papers/ron-hotos2001.html

[7] "A Case For End System Multicast", Y. Chu, S. Rao, H. Zhang, Pro-

ceedings of ACM SIGMETRICS , Santa Clara,CA, June 2000, pp 1-12. http://www.cs.cmu.edu/afs/cs/project/cmcl-yhchu/www/Sigmetrics2000/sigme...

[8] "Enabling Conferencing Applications on the Internet Using an Overlay

Multicast Architecture", Y. Chu, S. Rao, S. Seshan, H. Zhang, Proc. ACM Sigcomm 2001, http://www.acm.org/sigs/sigcomm/sigcomm2001/p5-chu.pdf

21

[9] "Overcast: Reliable Multicasting with an Overlay Network", J. Jan-

notti, D. K. Gifford, K. L. Johnson, M. F. Kaashoek, and J. W. O'Toole, Jr., Proceedings of OSDI'00. http://gaia.cs.umass.edu/cs791n/Jannotti00.pdf

[10] "Tapestry: A Fault Tolerant Wide Area Network Infrastruc-

ture", B. Zhou, D. A. Joseph, J. Kubiatowicz, Sigcomm 2001 poster and UC Berkeley Tech. Report UCB/CSD-01-1141. http://www.cs.berkeley.edu/ ravenben/publications/CSD-01-1141.pdf

[11] "Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applica-

tions", I. Stoica, R. Morris, D. Karger, F. Kaashoek, H. Balakrishnan, ACM Sigcomm 2001, http://www.acm.org/sigcomm/sigcomm2001/p12.html

[12] "A Scalable Content-Addressable Network", S. Ratnasamy, P. Fran-

cis, M. Handley, R. Karp, S. Shenker, ACM Sigcomm 2001, http://www.acm.org/sigcomm/sigcomm2001/p13.html

[13] "Application-level Multicast using Content-Addressable Networks",

Sylvia Ratnasamy, Mark Handley, Richard Karp, Scott Shenker In Pro- ceedings of NGC 2001 http://www.icir.org/sylvia/can-mcast.ps

[14] "Application-Level Anycasting: a Server Selection Architecture and Use

in a Replicated Web Service", E. Zegura, M. Ammar, Z. Fei, and S. Bhattacharjee. IEEE/ACM Transactions on Networking, Aug. 2000. ftp://ftp.cs.umd.edu/pub/bobby/publications/anycast-ToN-2000.ps.gz

[15] "Evaluation of a Novel Two-Step Server Selection Metric", K. M.

Hanna, N. Natarajan, and B.N. Levine, in IEEE ICNP 2001. http://www.cs.umass.edu/

~ hanna/papers/icnp01.ps

[16] "Fault Tolerant Replication Management in Large Scale Distributed

Storage Systems", R. Golding, E. Borowski, 1999 Symposuium on Reli- able Distributed Systems, http://gaia.cs.umass.edu/cs791n/peters paper.pdf

[17] "Xenoservers: Accounted Execution of Untrusted Code", D. Reed,

I. Pratt, P. Menage, S. Early, N. Stratford, Proceedings, 7th Workshop on Hot Topics in Operating Systems HotOS 1999 http://www.cl.cam.ac.uk/Research/SRG/netos/xeno/

22

[18] "OceanStore: An Architecture for Global-Scale Persistent Stor-

age", J. Kubiatowicz, et al., in Proceedings of the Ninth interna- tional Conference on Architectural Support for Programming Lan- guages and Operating Systems (ASPLOS 2000), November 2000. http://oceanstore.cs.berkeley.edu/publications/papers/pdf/asplos00.pdf

[19] "A Measurement Study of Napster and Gnutella as Examples of Peer-

Peer File Sharing Systems", P. Gummagi, S Sariou, S. Gribble, ACM Sigcomm 2001 poster.

[20] "Free Riding on Gnutella", E. Adar, and B. Huberman, First Monday,

Vol. 5, No. 10, http://www.firstmonday.dk/issues/issue5 10/adar/

[21] "Search in Power-Law Networks", L. Adamic, A. Lukose, R. Lukose,

and B. Huberman, http://www.hpl.hp.com/shl/papers/plsearch/

[22] "SCRIBE: The Design of a Large-scale Event Notification Infrastruc-

ture", A. Rowstron, A-M. Kermarrec, P. Druschel and M. Castro, Sub- mitted June 2001. http://www.research.microsoft.com/~antr/PAST/scribe.pdf

[23] "Security Aspects of Napster and Gnutella", S. Bellovin, Dis-

tinguished lecture at Polytechnic U., Real-Audio presentation (1 hour). http://media.poly.edu/RealMedia/electrical/eesem10 26.ram. Slides available at http://www.research.att.com/~smb/talks/NapsterGnutella.

[24] "Publius: A Robust, Tamper-evident, Censorship-resistant, Web Pub-

lishing System", Marc Waldman, Aviel D. Rubin and Lorrie Faith Cra- nor, Proc. 9th USENIX Security Symposium, pp 59-72, August 2000. http://publius.cdt.org/publius.pdf

[25] "Crowds: Anonymity for Web Transactions", M. Reiter and A. Rubin,

ACM Transactions on Information and System Security, November 1998

[26] "Responder Anonymity and Anonymous Peer-to-Peer file shar-

ing", V. Scarlata, B.N. Levine, and C. Sheilds, ICNP 2001. http://signl.cs.umass.edu/pubs/scarlata.apfs.ps.gz

[27] "The Small-World Phenomenon: An Algorithmic Perspective", Jon

Kleinberg, http://www.cs.cornell.edu/home/kleinber/swn.ps

23

[28] "Streaming Live Media over a Peer-to-Peer Network", H. Deshpande,

M. Bawa, H. Garcia-Molina, http://dbpubs.stanford.edu:8090/pub/2001-31

[29] "Storage Management and Caching in PAST, A Large-scale, Persistent

Peer-to-peer Storage Utility", A. Rowstron, P. Druschel, SOSP 2001. http://www-cse.ucsd.edu/sosp01/papers/rowstron.pdf

[30] "Routing in Overlay Multicast Networks", S. Shi and J.

Turner, Technical Report, TR 01-19, Washington University, http://www.arl.wustl.edu/arl/Publications/2000-04/wucs0119.pdf

[31] "What Can Peer-to-Peer Do for Databases, and Vice Versa?", S.

Gribble, A. Halevy, Z. Ives, M. Rodrig, D. Suciu, in the Fourth In- ternational Workshop on the Web and Databases (WebDB '2001). http://www.cs.washington.edu/homes/gribble/papers/p2p.ps.gz

[32] "A peer-to-peer VOIP network", http://phonebazooka.com/ [33] "Resilient Overlay Networks", D. Anderson, H. Balakrishnan, F.

Kaashoek, R. Morris, Proc. 18th ACM SOSP, Banff, Canada, October 2001. http://nms.lcs.mit.edu/papers/ron-sosp2001.html

[34] "Using the Small World Model to Improve Freenet Performance", H.

Zhang, A. Goel, R. Givindran, Proceedings of IEEE Infocom, June 2002.

[35] "Peer-to-Peer Architecture Case Study: Gnutella", M. Ripeanu,

in proceedings of 2001 International conference on P2P computing http://people.cs.uchicago.edu/~matei/PAPERS/P2P2001.pdf

[36] "Determining Characteristics of the Gnutella Network", B. Gedik,

http://www.cs.gatech.edu/people/home/bgedik/mini-projects/mini-project1/...

[37] Limewire tech papers, http://www.limewire.com/index.jsp/tech papers [38] Industry viewpoint: http://www.openp2p.com/ and

http://conferences.oreilly.com/p2p/

[39] " Peer-to-peer, Harnessing the Power of Disruptive Technologies",

Edited by Andy Oram, pub. O'Reilly, Mar 2001, ISBN 0-596-00110

24

[40] "Pastry: Scalable, Distributed Object Location and Routing for Large-

scale Peer-to-Peer Systems" A. Rowstron and P. Druschel, IFIP/ACM International Conference on Distributed Systems Platforms (Middle- ware), Heidelberg, Germany, pages 329-350, November, 2001.

[41] "Exploiting Network Proximity in Peer-to-Peer Overlay Net-

works", M. Castro, P. Druschel, Y. C. Hu, A. Rowstron, http://www.research.microsoft.com/~antr/Pastry/pubs.htm, submitted for publi- cation.

[42] "Feasibility of a Serverless Distributed File System Deployed on an Ex-

isting Set of Desktop PCs", William J. Bolosky, John R. Douceur, David Ely, and Marvin Theimer http://research.microsoft.com/sn/farsite/ ACM SIG- METRICS 2000.

[43] "Grapevine: An Exercise in Distributed Computing", Andrew D. Bir-

rell, Roy Levin, Roger M. Needham and Michael D. Schroeder, Commu- nications ACM, vol. 25, no. 4, pp. 260-274, Apr. 1982.

[44] "Experience with Grapevine: The Growth of a Distributed System",

Michael D. Schroeder, Andrew D. Birrell and Roger M. Needham, ACM Transactions on Computer Systems, vol. 2, no. 1, pp. 3-23, Feb. 1984.

[45] "The Eternity Service", R. J. Anderson. In Proceedings of Pragocrypt

96, 1996,

[46] "The Magna Carta" http://www.nara.gov/exhall/charters/magnacarta/magmain.html [47] "Middle Box Taxonomy" Brian Carpenter, and Scott Brim, April 2001.

Work in progress.

[48] "Looking Over the Fence at Networks: A Neighbor's View of Networking Research" Committee on Research Horizons in Networking, Com- puter Science and Telecommunications Board, National Research Coun- cil, USA http://www.nap.edu/books/0309076137/html/

Pages

Subscribe to RSS - hydrarchist's blog