Data, WikiLeaks and War

By | November 22, 2011

I’m not going to get into the rights and wrongs of the WikiLeaks thing. Nor am I going to look at the bigger implications for the balance of power between governed and governing, and between the U.S. and its allies and foes. Others have written much better than I can on these topics.

I want to look at what the cables tell us about the sorting, sifting and accessing of this information. In short, what does this tell us about how the world’s most powerful nation organized some of its most prized data?

To start, with, I want to revisit a conversation I had sitting in the garden of a Kabul pub called the Gandermack a few weeks back when it struck me: the biggest problem facing NATO in winning the war in Afghanistan is data.

I was talking to a buff security guy—very buff, in fact, as my female companions kept remarking—who was what might have once been a rare breed, but are now in big demand in Afghanistan. He was a former marine (I think), but was also a computer guy with an anthropology or sociology degree under his black belt somewhere. This guy knew his stuff.

And he was telling the NATO forces where they were going wrong: data management.

The problem, he explained, is not that there isn’t enough of it. It’s that there’s too much of it, and it’s not being shared in a useful way. Connections are not being made. Soldiers are drowning in intelligence.

All the allied forces in Afghanistan have their own data systems. But, I was told, there’s no system to make sense of it. Nor is there one to share it. So data collected by a garrison from one country in one part of the country is not accessible by any of the other 48 nations.

On the surface it seems this problem was fixed. In the wake of 9/11 U.S. departments were told to stop being so secretive. Which is why we got to WikiLeaks–one guy apparently able to access millions of classified documents from pretty much every corner of the planet. If he could do then so could thousands of other people. And, one would have to assume, so could more than a few people who weren’t supposed to have access. To give you an idea of the trove unearthed, WikiLeaks has released about 1,000 so far, meaning it’s going to take them nearly seven years to get all the cables out. Cable fatigue, anyone?

So, it would seem that the solution to the problem of not having enough pooled information is to just let anyone have it. But that, it turns out, isn’t enough. That’s because what we see from the WikiLeaks material is how old it looks.

I spent much of the early 1980s trawling through this kind of thing as a history student. Of course, they were all declassified documents going back to the 1950s, but the language was remarkably similar, the structure, the tone, the topics, the look and feel. A diplomatic cable in 2010 looks a lot like a cable from 50 years ago. In the meantime communication has gone from the telegraph to the fax to email to blogs to the iphone to twitter to Facebook.

This, to me, is the problem. It’s not that we’ve suddenly glimpsed inside another world: We would have seen a lot of this stuff at some point anyway, though it’s useful to see it earlier. Actually we can take some succour from the fact that diplomats seem to be doing a pretty good job of reporting on the countries they’re posted to. Journalists shouldn’t be surprised; we’ve relied on diplomats for a while. (And they might rightly feel somewhat aggrieved we now do this to them.)

No, the problem that WikiLeaks unearths is that the most powerful nation on earth doesn’t seem to have any better way of working with all this information than anyone else. Each cable has some header material—who it’s intended for, who it’s by, and when it was written. Then there’s a line called TAGS, which, in true U.S. bureaucratic style doesn’t actually mean tags but “Traffic Analysis by Geography and Subject”—a state department system to organize and manage the cables. Many are two letter country or regional tags—US, AF, PK etc—while others are four letter subject tags—from AADP for Automated Data Processing to PREL for external political relations, or SMIG for immigration related terms.

Of course there’s nothing wrong with this—the tag list is updated regularly (that last one seems to be in January 2008). You can filter a search by, say, a combination of countries, a subject tag and then what’s called a program tag, which always begins with K, such as KPAO for Public Affairs Office.

This is all very well, but it’s very dark ages. The trouble is, as my buff friend in the Kabul garden points out, there’s not much out there that’s better. A CIA or State Department analyst may use a computer to sift through the tags and other metadata, but that seems to be the only real difference between him and his Mum or Dad 50 years before.

My buff friend made a comparison with the political officer in today’s ISAF with a political officer (sometimes called an agent) back in the days of the British Raj. Back then the swashbuckling fella would ride a horse, sleep on the ground and know the Afghan hinterlands like the back of his hand, often riding alone, sipping tea with local chieftains to collect intelligence and use it to effect change (in this case meaning extend the already bulging British sphere of influence.) He would know the ins and outs of local tribal rivalries, who hated whom, etc. All of it stored in his head or in little notebooks.

His modern equivalent may actually have the same information, but it’ll be gleaned from the occasional photo opportunity, a squillion intelligence reports, all suitably tagged, and perhaps footage from a couple of drones. If the chieftain he’s interested in coopting straddles a regional command, chances are that he won’t be able to access anyone else’s information on him–assuming they have any.

In short, the problem in the military and diplomatic world is the same we’re facing in the open world. We have a lot more information than we can use—or keep track of—and it’s not necessarily making us any smarter. Computers haven’t helped us understand stuff better—they’ve just helped us collect, share, and lose more of it.

I must confess I’ve not made much progress on this myself. My main contribution is persuading a researcher friend to use a program called PersonalBrain, which helps you to join the dots between people, things, organisations, whatever you’re trying to figure out. It’s all manual though, which puts people off: What you mean I have to make the connections myself? Well, yes. Computers aren’t magic.

Yet. It’s clear to me that 10 years down the track, I hope, we’ll finally get that writing in prose, and then adding a hierarchy of labels to a document, is no longer the way to go. Instead, we’ll be writing into live forms that make connections as we write, annotate on the fly, draw spindly threads to other parts of our text, and make everything come to life. I will be able to pull into the document visuals, audio, other people, old records, chronologies, maps, and work with the data in three dimensions.

If this sounds familiar, it’s probably because it sounds like science fiction, something like Minority Report. But it’s not; it’s a glimpse inside the mind of our imperial political agent; how he would make those connections because they were all in his head—neurons firing transmitters, axons alive, binding synapses.

If I were the U.S. government, I would take Cablegate as a wake up call. Not at the affrontery of this humiliation, but as a chance to rethink how its data is being gathered and made use of. Cablegate tells us that the world of the cable is over.

Singapore Details ‘Waves’ of Cyberattacks

By | November 22, 2011

Officials and delegates from APEC economies were targeted ahead of last year’s Singapore meeting with malware-laden emails faked so they appeared to have been sent by Singapore government officials on the Organising Committee.

Singapore officials have said the attacks were not the first on the country. Although Singapore regularly highlights threats to national security—including Islamic terrorism—the admission that it has been the victim of cyber attacks is, according to the Straits Times, its most detailed account.

Although it’s hard to read too much into the statements made to judge who may have been behind the attacks, it’s interesting that Singapore is drawing attention to this—not least because there’s bound to be speculation about just this point. The current flood of WikiLeaks cables about this very issue is a coincidence. But the description of the attacks fits a pattern familiar to security experts:

Between September and November 2009 APEC officials, and delegates of several APEC economies were targeted with Trojan-laden emails “with the aim of infiltrating their computers and extracting privileged information.” There were at least seven waves of such attacks, focusing on members of the APEC organising committe and APEC delegates whose email addresses were published on websites or in APEC mailing lists. (APEC, Asia-Pacific Economic Cooperation, is a forum for 21 regional economies set up in 1989. Singapore hosted meetings throughout 2009 culminating in a leaders’ meeting in Singapore from November 14-15.) 

The attacks were first mentioned in a speech by Ho Peng Kee, Senior Minister Of State For Law & Home Affairs, who told a seminar on Sept 28 that “Singapore has its fair share of cyber attacks.” More details were  added in an internal but publicly accessible Ministry of Home Affairs magazine, the Home Team Journal, by Loh Phin Juay, head of the Singapore Infocomm Technology Security Authority and reported in the Straits Times on Saturday, December 4.  (The Straits Times called the perpetrators “cyberterrorists”.)

Loh wrote in the magazine article that “between 2004 and 2005, the Singapore government saw waves of Trojan email attacks which were commonly referred to as the Trojan Riler attacks.” The attacks came in four waves over a span of two years, he said, in the form of more than 900 emails targeting officials in several ministries.  

Loh Phin Juay said that the first two waves in the 2009 attacks used PowerPoint and PDF attachments to emails puportedly warning about possible terrorist attacks on the meeting. A subsequent wave included “legitimate information relevant to the APEC 2009 meetings”—in this case an invitation to an actual APEC symposium.

Some of the malicious emails “contained details of actual APEC events (date, time, venue) not known to the general public.” This suggests to me that either the first wave was successful in gaining access to some sensitive information, or, less likely, that those perpetrating the attack were already privy to it (raising the question why they didn’t use that information in the first wave.) Both officials said no significant disruption was caused by the APEC attack.

Singapore last year set up a special body, the Singapore Infocomm Technology Security Authority (SITSA), “to safeguard Singapore against infocomm technology (IT) security threats. SITSA will be the national specialist authority overseeing operational IT security. SITSA’s mission is to secure Singapore’s IT environment, especially vis-à-vis external threats to national security such as cyber-terrorism and cyber-espionage.”

Neither official speculates about the origin of the attacks. In his speech Ho Peng Kee referred separately to Operation Aurora, a cyber attack from mid 2009 to December 2009 on dozens of Western companies including Google, which alleged the attacks began in China. Loh Phin Juay referred in his article to GhostNet, a cyber espionage network which had its command and control network based in China and which penetrated government and embassy computers in a number of countries, including some in Southeast Asia. (Singapore was not mentioned in reports of the compromised computers.)

But he writes that “to date, the perpetrators of GhostNet remain unknown,” and neither man links the Singapore attacks to either event. The Trojan Riler was, according to Symantec, first discovered on September 8, 2004; It has been associated with corporate espionage but also the GhostNet attacks.

Social Media and Politics: Truthiness and Astroturfing

By | November 22, 2011

(This is a longer version of my syndicated newspaper column)

By Jeremy Wagstaff

Just how social is social media? By which I mean: Can we trust it as a measure of what people think, what they may buy, how they may vote? Or is it as easy a place to manipulate as the real world?

The answers to these questions aren’t of academic interest only. They go right to the heart of what may be our future. More and more of our world is online. And more and more of our online world is social media: A quarter of web pages viewed in the U.S. are on Facebook. So it’s not been lost on those who care about such things that a) what we say online may add up to be a useful predictor of what we may do at the shops, the movies, at the polling booth. And b) that social media is a worthwhile place to try to manipulate what we think, and what we do at the shops, the movies—and at the ballot box.

There is plenty of evidence supporting the former. Counting the number of followers a candidate has on Facebook, for example, is apparently a pretty good indicator of whether they’ll do well at the ballot box. The Daily Beast set up something called the Oracle which scanned 40,000 websites—including Twitter—to measure whether comments on candidates in the recent U.S. elections were positive, negative, neutral or mixed. It predicted 36 out of 37 Senate races and 29 out of 30 Governors’ races and nearly 98% of the House races. That’s pretty good.

Dan Zarrella, a self-styled social media scientist, counted the followers of the twitter feeds of 30 senate, house and governor races and found that in 71% of the races, the candidate with the most Twitter followers was ahead in the polls. And Facebook found that candidates with more Facebook fans than their opponents won 74% of House races, and 81% of Senate races. More than 12 million people used the “I Voted” button this year, more than double that in 2008.

Why is this interesting? Well, social media, it turns out, is quite a different beast to even recent phenomena such as blogs. Social media, it turns out, really is social, in that more than previous Internet methods of communication, it reflects the views of the people using it. It is, one might say, democratic.

A study by researchers from the Technical University of Munich of the 2009 federal parliamentary elections in Germany, for example, revealed that, in contrast to the bulletin boards and blogs of the past, Twitter was reflective of the way Germans voted. Unlike bulletin boards and blogs, they wrote, “heavy users were unable to impose their political sentiment on the discussion.” The large number of participants, they found, “make the information stream as a whole more representative of the electorate.”

In other words, social media is as much a battleground for hearts and minds as the rest of the world. Even more so, perhaps, because it’s easier to reach people. Forget knocking on doors or holding rallies: Just build a Facebook page or tweet.

And, maybe, hire some political operators to build a fake movement, aka astroturfing?

Astroturfing, for those not familiar with the term, is the opposite of grassroots. If you lack the support of ordinary people, or don’t have time to get it, you can still fake it. Just make it look like you’ve got grassroots support. Since the term was coined in the mid 1980s it’s become popular activity by marketers, political operators and governments (think Chinese 50-cent blogging army). Astroturfing, in short, allows a politician to seem a lot more popular than he really is by paying folk to say how great he is.

Whether social media is ripe for astroturfing isn’t clear. On one hand, we know that the Internet is full of fakery and flummery: Just because your inbox is no longer full of spam doesn’t mean the Internet isn’t full of it—87%, according to the latest figures from MessageLabs. You don’t see it because the filters are getting better at keeping it away from you. Twitter, by contrast, is much less spammy: the latest figures from Twitter suggest that after some tweaks earlier this year the percentage of unwanted messages on the service is about 1%.

So Twitter isn’t spammy, and it broadly reflects the electorate. But can it be gamed?

We already know that Twitter can spread an idea, or meme, rapidly—only four hops are needed before more or less everyone on Twitter sees it. In late 2009 Google unveiled a new product: Real time search. This meant that, atop the usual results to a search, Google would throw in the latest matches from the real time web—in other words, Twitter and its ilk. So getting your tweets up there would be valuable if, say, you were a political operator and you wanted people to hear good things about your candidate, or bad things about your rival. But were people doing this? Two researchers from Wellesley College in Massachusetts wondered.

Panagiotis Takis Metaxas and Eni Mustafaraj studied the local senate race and found that they were. They looked at 185,000 Twitter messages which mentioned the two competing candidates and found that there was plenty of astroturfing going on—where political supporters were creating fake accounts and repeating each other’s messages, and sending them to likely sympathizers, in the hope of their messages hitting the mainstream.

The researchers found one group, apparently linked to an Iowa Republican group, was sending out one tweet a second linking to websites “exposing” their rival’s missteps and misstatements. Overall, the message they sent reached more than 60,000 users. The researchers concluded that “the fact that a few minutes of work, using automated scripts and exploiting the open architecture of social networks such as twitter, makes possible reaching a large audience for free…raises concerns about the deliberate exploitation of the medium.”

The point here is not merely that you’re propagating a point of view. That’s just spam. But by setting up fake Twitter accounts and tweeting  and then repeating these messages, you’re creating the illusion that these views are widespread. We may ignore the first Twitter message we see exposing these views and linking to a website, but will we ignore the second or the third?

This discovery of Twitter astroturfing in one race has prompted researchers at Indiana University to set up a tool they call Truthy—after comedian Stephen Colbert’s term to describe something that someone knows intuitively from the gut—irrespective of evidence, logic or the facts. Their tool has exposed other similar attacks which, while not explosive in terms of growth, are, they wrote in an accompanying paper,  “nevertheless clear examples of coordinated attempts to deceive Twitter users.” And, they point out, the danger with these Twitter messages is that unless they’re caught early, “once one of these attempts is successful at gaining the attention of the community, it will quickly become indistinguishable from an organic meme.”

This is all interesting, for several reasons. First off, it’s only in the past few months that we’ve woken up to what political operators seem to be doing on Twitter. Secondly, while none of these cases achieves viral levels, the relative ease with which these campaigns can be launched suggests that a lot more people will try them out. Thirdly, what does this tell us about the future of political manipulation in social media?

I don’t know, but it’s naïve to think that this is just an American thing. Or a ‘what do you expect in a thriving democracy?’ thing. Less democratically minded organizations and governments are becoming increasingly sophisticated about the way they use the Internet to control and influence public opinion. Evgeny Morozov points to the Lebanon’s Hezbollah, “whose suave manipulation of cyberspace was on display during the 2006 war with Israel”; my journalist friends in Afghanistan say the Taliban are more sophisticated about using the Internet than the Karzai government or NATO.

The good news is that researchers are pushing Twitter to improve their spam catching tools to stop this kind of thing from getting out of hand. But I guess the bigger lesson is this: While social media is an unprecedented window on, and reflection of, the populace, it is also an unprecedented opportunity for shysters, snake oil salesmen and political operators to manipulate what we think we know.

It may be a great channel for the truth, but truthiness may also be one step behind.

Podcast: Miscall, The Decade’s Zeitgeist

By | November 22, 2011

The BBC World Service Business Daily version of my column on the miscall.  (The Business Daily podcast is here.)  

Loose Wireless 101117

 To listen to Business Daily on the radio, tune into BBC World Service at the following times, or click here.

Australasia: Mon-Fri 0141*, 0741 
East Asia: Mon-Fri 0041, 1441 
South Asia: Tue-Fri 0141*, Mon-Fri 0741 
East Africa: Mon-Fri 1941 
West Africa: Mon-Fri 1541* 
Middle East: Mon-Fri 0141*, 1141* 
Europe: Mon-Fri 0741, 2132 
Americas: Tue-Fri 0141*, Mon-Fri 0741, 1041, 2132

Thanks to the BBC for allowing me to reproduce it as a podcast.

The Missed Call: The Decade’s Zeitgeist?

By | November 22, 2011

By Jeremy Wagstaff

(this is a longer version of an upcoming syndicated column.)

When people look back at the last decade for a technology zeitgeist they may choose SMS, or the iPod, or maybe even Facebook. Me? I’d choose the cellphone call that rings, briefly, and then is silent.

It’s one of those social phenomena that has so embedded itself in the culture that we don’t even notice it. It developed its own syntax, its own meaning, and even shifted the boundaries of cultural mores and social intercourse. Even I didn’t realise it was so widespread until I started researching this article. And yet, at least in the middle of the decade, it spanned all continents and was accounting for more than half of cellphone traffic in many developing countries.

So what is the miscall and why is it—was it–so big? The miscall is simple: I call your cellphone but hang up before you pick up. Instead of you thinking there’s a mistake, you know exactly why I called, and either call me back, or don’t, depending on how we’ve agreed on what the miscall means. It’s a form of communication that requires no words, no speech, and, most importantly, no expense. At least for you and me. Not, sadly, for the cellphone operator.

But initially cellphone operators weren’t too bothered.

There’s a temptation, after all, to regard the miscall as a poverty thing, done by poor people. I don’t have any money; you have money, so you call me. Indeed, in Ethiopia it’s called miskin—Amharic, deriving from the Arabic for “poorest of the poor”, with a distinct connotation of being worthy of pity. And among youth the lure of the cellphone is matched only by the limits on a budget. So, someone somewhere is going to call back, so money will be spent on a call, somehow.

But two researchers for Norway-based Telenor Hanne Geirbo and Per Helmersen found that was only part of the picture, even in a place like Bangladesh. Combing the data from a single day of Grameenphone’s traffic, they concluded that “the charged traffic generated from an initial missed call is minimal compared o the missed call activity.” In short, a missed call didn’t result in a real call.

This was communication in itself, not just a plea for communication.

Not only that: making the missed call was so easy—hit the green button, wait for a ring and then hit red—that it was stopping other services, like SMS, from getting any traction. And we’re not talking small potatoes here: Missed calls constituted upwards of 70% of Grameenphone’s total network traffic in any hour. Some people were sending miss call after miss call, one after the other—100, or even several hundred, miscalls in a short period. This, in the words of the researchers, was “a major cause of congestion at peak periods,” leading to calls disconnected, or not being connected in the first place. In 2005 one Kenyan cellular network estimated that four million miscalls were being made daily on its network.

A miscall, then, is a lot more than a call me back thing. It’s a fast way to communicate a key piece of information to someone who is already expecting it around that time, and only needs to be activated:  “I’m home, throw the gate keys down.” The timing is the context that gives the unspoken, unwritten message meaning: A miscall at 6 pm may mean I just left work.

And, if there isn’t any specific time context it may just mean: “I’m missing you.”

Then there’s the another parameter: how many missed calls are made can vary the message. Two missed calls means “I’m running late” or “I’m at home, where are you?” depending, it would seem, on what part of Bangladesh you’re in. In Syria five missed calls in rapid succession means “I’m online, let’s chat.” There are business uses too: Farmers in Bhutan, according to UNCTAD’s annual Information Economy Report published in October, know how much milk their customers want by the number of miscalls. They then miscall the customer back within 15 minutes; no miscall means no stock. Researchers in India, where miscalls accounted for about 40% of all calls, found that the miscall was used by print and ticketing shops to let their customers know their orders were ready.

Missed calls can be fun if you don’t have much else going on in your life. Try to irritate your friends by miscalling them; if someone is doing it to you, try to pick up before they hang up, losing them credit and the game. This may sound inane, but these calls are likely to be serious network congesters. If the power goes off, the researchers found, Bangladeshis would entertain themselves by miscalling friends, relatives, and even complete strangers. The researchers found one young woman met her boyfriend that way. If you call communicating only by cellphone a relationship. Who said blackouts couldn’t be fun?

Talking of flirting, missed calls can create a private space between two people who couldn’t otherwise connect without fear of exposure or ridicule. One 44-year old Bangladeshi admitted to expressing his love by sending the object of his affections hundreds of miscalls. In Damascus it’s no different: One young man proudly explained to a journalist from Syria’s Forward Magazine last year that he sometimes gets 250 miscalls from his girlfriend.  Young couples in a relationship miscall each other to check the line is free or to keep the line busy—either way ensuring their paramour is not otherwise engaged, so to speak. Starting to feel sorry for the network operator yet?

Husbands expect calls from spouses at fixed times as signals that the house is running smoothly. Children check in with their parents. Newly married women get their mothers to call without incurring the wrath of their mothers-in-law. Friends miscall a member of their circle who couldn’t make their evening out, as if to say: we’re missing you.

There are rules, of course, about who one can and cannot miscall. No one below you in the hierarchy, either in the family, the office, or the community (one man is quoted as specifying “driver and electricians…it’s a matter of prestige.” And don’t miscall your teacher or your boss. At least in Bangladesh. in Africa, where it’s called variously “flashing” and “biper”,  there are complex rules about who can be flashed. Among friends, one commenter on a Nigerian blog said, it’s about exclusion: with miscalls “there is complete communication beyond the scope of outsiders.”

In other words, the missed call is not some reflection of not having enough credit. It’s a medium of exchange of complex messages that has become surprisingly refined in a short period. Much of it is not communication at all, at least in terms of actual information. It’s what the researchers identify as phatic communication: where the interaction is the motivation not the content of the message itself. Or, as a Filipino professor, Adrian Remodo put it to a language conference in Manila in 2007 at which they votedfto make miscall, or miskol in Tagalog, the word of the year: A miskol is often used as “an alternative way to make someone’s presence felt.”

Indeed, the fact that the message itself has no content is part of its beauty. Just as the SMS is confined to 160 characters—meaning it can either be pithy or ambiguous, depending on the effect you’re looking for—so can the missed call be open to all kinds of interpretation. A lover receiving a missed call can fill her evening contemplating what was meant by those few unanswered rings.

The Telenor researchers speak of how this “practice contains valuable information about the communication needs and preferences of our customers.” Very true. But one gets the feeling that their call for more research to “provide the telecom industry with a much-needed window into the socio-cultural life space of our customers , and suggest new service offerings that better match their needs and circumstances” may have fallen on deaf ears.

I’ve not found much evidence of this, and that was written back in 2008. Some African cell providers gave away five free “Please call me” text messages to each subscriber. A Swiss company called Sicap has had some success in Africa with a service called Pay4Me, which is a sort of reverse charge call for mobile phones. The only difference I can see between this and the miscall is that the callee doesn’t have to make the call, so to speak. That, and the fact that most prepaid services nowadays don’t let you make a call if you have a zero balance—which accounts for 30% of African users, and 20% of Indian cellphone users, according to Telenity, one company hoping to offer the callback service.

Telcos in Afghanistan offer polling services where respondents, instead of texting back their answers, miscall a number depending on their choice of answer. More creatively, some socially minded organisations have used the miscall as a cheap way to communicate: Happypill, for example reminds you to take medication if you fail to miscall them at an appointed time each day.

The point is that while usage may vary it’s common in many countries—and has been for much of the past decade. As soon as mobile phones came with prepaid vouchers, and operators included the name and number of the caller on the handset display, so did the opportunity arise for someone to pay for your call.  In France and in French-speaking Africa it’s called “un bip”, I’m told, and one commenter said that it’s included in some prepaid packages. In Iran it’s called “tak”; in Australia “prank” and in the U.S. “drop call”. In Italy, apparently, it’s called “squillo” and in Oman a “ranah” (where there’s even a pop song based on the practice).

And it goes further back than that: “Call me and hang up when you arrive,” my mum used to say to her impoverished student son.

Of course, there are reasons to be concerned about this. One Indian columnist wrote:

What, then, will happen to the human voice? If two rings on the mobile are sufficient to say “I miss you”, what will become of the impassioned verses that poets have so far written to appease their beloved? I wonder how a dialogue will sound in a world where voices have become ringtones.

It may be that the miss call culture is in decline. Jonathan Donner, a Microsoft researcher who has looked into this phenomenon more than most, noted back in 2007 a “beep fatigue”, leading some to turn off their caller ID function and ditch phone numbers that clearly indicate they are on a postpaid package. And in some places where the costs of a call and an SMS have fallen to pretty much nothing, the appeal of the miscall has waned in some places.

An SMS would work, but requires typing, and in a place like Bangladesh, where more than half the population is illiterate that’s not a popular option. And text messages sometimes take a couple of minutes to arrive: a call is immediate—something that’s apparently important to my Filipino friends.

Then there’s the fact that the missed call can be discreet in a way that a phone call, or an SMS, can’t be. You could make a miscall from inside one’s bag or pocket (and I frequently do, though that’s by accident.)  Which may explain why, a student  in Pakistan wrote earlier this year:

what amazes me the most is unlike other fads such as texting obsessively etc have gone away pretty quick ,this ‘miss call’ culture still reigns supreme in most of our society.

My tupennies’ worth? As the SMS, which created its own culture out of the limitations of what was not supposed to be a commercial service, so has the miscall created its own norms. Whether these survive the next decade is unlikely. But we should watch these things carefully, not because they represent commercial opportunities—we’re bound to mess that up—but because they speak volumes about the inventiveness of the human spirit, and its ability to squeeze rich new forms of communication out of something that, on the surface, seems to be nothing—a briefly ringing, and unanswered phone.