Internet-Draft                                       Alexander Bogdanov
draft-bogdanov-cage-00.txt                                    June 2002
Expires: December 2002

                                  CAGE
Status of this Memo

   This document is an Internet-Draft and is in full conformance with
   all provisions of Section 10 of RFC2026 [1].

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

Abstract

   This document focuses attention on some aspects of network
   technologies development. It does not contain any technical
   decisions. Nevertheless, it brings up questions, immediately
   connected with IETF activity.

Introduction

   In this document the following new technologies are viewed:

      o  Unification of the distributed computer resources on a standard
         basis.
      o  Interaction of various devices through Internet , from simple
         sensing elements up to robotized compound complexes.
      o  Creation of an infrastructure for self-organizing systems.

   Undoubtedly, that the majority of people developing these
   technologies, purposes the good aims. The list of using may be very
   long and interesting. Many of them are necessary, and will be really
   used. Positive aspects of it are obvious. Therefore, the backside is
   viewed only in this document.

   The given technologies in aggregate will change Internet face.
   Probably, it is not necessary to give examples from Isaac Asimov's
   books. It is obvious, that computers and a plenty of devices, which
   do not associates now with computers, will have some intellect and a
   possibility of the remote control in the near future. These devices
   will surround us everywhere - at home, in the street, at the work, in
   pockets and details of clothes. It might seem, that it is the right

Bogdanov                                                       [Page 1]


Internet-Draft                    CAGE                        June 2002

   time to fulfill the main task - changing an infrastructure, which
   would correspond to new requirements of safety and allowed to keep
   inviolability of individual life.

   It is possible to specify here two directions. The first provides
   creation of the private protected network infrastructure with rigid
   standards of the equipment, the software and mechanisms of keys
   distribution. Such structure has the good protection against
   malefactors and the controllable limited access for law-enforcement
   bodies. The second direction provides a transparent infrastructure,
   with the full and uncontrollable access for law-enforcement bodies
   and the limited access for malefactors. At that, law-enforcement
   bodies have advantage before attacking and may carry out preventive
   measures or operative actions immediately. From the safety point of
   view, the advantage of one method over another is not obvious. The
   specified directions are mutually exclusive and have no the balanced
   intermediate decisions. The biometric identification, which does not
   change the essence of a problem, may be applied in a combination with
   both of them.

   The second direction is chosen today. It is specified by the similar
   tendencies, which are traced during the last some years in the
   different countries with different political and economic systems,
   different traditions, living standards and levels of Internet
   development. Probably on a question - whether we may afford a private
   global network - the negative response is given. Probably, there is
   no other way to provide safety today, except shadowing.

   Certainly, the technical decisions, which allow bypassing these
   tendencies, exist. However, they will not define the basic network
   infrastructure. The business of the Internet providers completely
   depends on the state, and they will not introduce the popular
   protected decisions. The means of information gathering and storage
   will be improved. A quantity of video cameras will be established,
   the network traffic, the mobile phones, the computerized automobiles,
   the various devices of personal identification will be supervised.
   The intellectual distributed systems for the analysis of the
   collected information will be developed.

   Today, the internal shadowing is considered an obligatory condition
   of a corporations survival, and it is the justified measure
   frequently. Tomorrow we'll hear that the total shadowing is a
   necessary condition of surviving of the state and its citizens. And
   there are no attributes that it will be otherwise.

   Maybe the new generation, which is accustomed to video cameras in a
   children's room from the cradle, will not pay attention to shadowing.
   It simply will become the norm of life. Maybe will be less people
   through some tens of years, which concern to intervention in their
   private life and to restriction of their freedom with indignation and
   hostility. Or there will be no such people wholly :-((. May be, it is
   all insignificantly in comparison with the advantages, that the
   technical progress promises to us. However, the gold cage remains a
   cage in any case. Therefore, the time has come to change the NET name.

Bogdanov                                                       [Page 2]


Internet-Draft                    CAGE                        June 2002

References

   [1]  Bradner, S., "The Internet Standards Process -- Revision 3", BCP
        9, RFC 2026, October 1996.

Author's Address

   Alexander Bogdanov

   Email: a_bogdanov@iname.ru
          www.umsp.net

Full Copyright Statement

   Copyright (C) The Internet Society (2001). All Rights Reserved.
   This document and translations of it may be copied and furnished to
   others, and derivative works that comment on or otherwise explain it
   or assist in its implementation may be prepared, copied, published
   and distributed, in whole or in part, without restriction of any
   kind, provided that the above copyright notice and this paragraph are
   included on all such copies and derivative works. However, this
   document itself may not be modified in any way, such as by removing
   the copyright notice or references to the Internet Society or other
   Internet organizations, except as needed for the purpose of
   developing Internet standards in which case the procedures for
   copyrights defined in the Internet Standards process must be
   followed, or as required to translate it into languages other than
   English.

   The limited permissions granted above are perpetual and will not be
   revoked by the Internet Society or its successors or assigns.
   This document and the information contained herein is provided on an
   "AS IS" basis and THE INTERNET SOCIETY AND THE INTERNET ENGINEERING
   TASK FORCE DISCLAIMS ALL WARRANTIES, EXPRESS OR IMPLIED, INCLUDING
   BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE INFORMATION
   HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED WARRANTIES OF
   MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.




















Bogdanov                                                       [Page 3]