An old discussion on the good and bad of profiling

Is profiling such a bad thing? “Don’t judge a book by its cover,” and all that. Is it wrong to judge based on appearances?

In same cases, actually, it makes sense. Bruce Schneier wrote an article last year discussing some of the good and bad of profiling. It’s still a valuable read. In the end, if profiles are based on good indicators, it can be an effective security tool. Profiles based on bad indicators are not only not effective security tools, but can lead to security problems in retaliation for bad profiling.

On 14 December 1999, Ahmed Ressam tried to enter the U.S. by ferryboat from Victoria Island, British Columbia. In the trunk of his car, he had a suitcase bomb. His plan was to drive to Los Angeles International Airport, put his suitcase on a luggage cart in the terminal, set the timer, and then leave. The plan would have worked had someone not been vigilant.

Ressam had to clear customs before boarding the ferry. He had fake ID, in the name of Benni Antoine Noris, and the computer cleared him based on this ID. He was allowed to go through after a routine check of his car’s trunk, even though he was wanted by the Canadian police. On the other side of the Strait of Juan de Fuca, at Port Angeles, Washington, Ressam was approached by U.S. customs agent Diana Dean, who asked some routine questions and then decided that he looked suspicious. He was fidgeting, sweaty, and jittery. He avoided eye contact. In Dean’s own words, he was acting “hinky.”

. . .

There’s a dirty word for what Dean did that chilly afternoon in December, and it’s profiling. Everyone does it all the time. When you see someone lurking in a dark alley and change your direction to avoid him, you’re profiling. When a storeowner sees someone furtively looking around as she fiddles inside her jacket, that storeowner is profiling. People profile based on someone’s dress, mannerisms, tone of voice … and yes, also on their race and ethnicity. When you see someone running toward you on the street with a bloody ax, you don’t know for sure that he’s a crazed ax murderer. Perhaps he’s a butcher who’s actually running after the person next to you to give her the change she forgot. But you’re going to make a guess one way or another. That guess is an example of profiling.

Yes, “hinky” there is the indication of Ms. Dean’s profiling of the suspect. And it’s a case of good profiling – she didn’t pick this person because of his clothers or his accent or his skin tone, or any of hundreds of other little things I’m sure someone somewhere thinks would be a sure way to tell. She picked him out because he acted in an abnormal way. Killing all the arabs won’t solve terrorism problems, as much as my brother and some folks I’ve worked with might think it will. Stopping all arabs from boarding planes won’t prevent hijackings. That’s bad profiling based on bad indicators. And that doesn’t do anything but generate animosity between ethnic groups (which, by the way is a good way to heighten hostilities, if that’s what you are going for).

Despite what many people think, terrorism is not confined to young Arab males. Shoe-bomber Richard Reid was British. Germaine Lindsay, one of the 7/7 London bombers, was Afro-Caribbean. Here are some more examples:

  • In 1986, a 32-year-old Irish woman, pregnant at the time, was about to board an El Al flight from London to Tel Aviv when El Al security agents discovered an explosive device hidden in the false bottom of her bag. The woman’s boyfriend–the father of her unborn child–had hidden the bomb.
  • In 1987, a 70-year-old man and a 25-year-old woman–neither of whom were Middle Eastern–posed as father and daughter and brought a bomb aboard a Korean Air flight from Baghdad to Thailand. En route to Bangkok, the bomb exploded, killing all on board.
  • In 1999, men dressed as businessmen (and one dressed as a Catholic priest) turned out to be terrorist hijackers, who forced an Avianca flight to divert to an airstrip in Colombia, where some passengers were held as hostages for more than a year-and-half.

The 2002 Bali terrorists were Indonesian. The Chechnyan terrorists who downed the Russian planes were women. Timothy McVeigh and the Unibomber were Americans. The Basque terrorists are Basque, and Irish terrorists are Irish. Tha Tamil Tigers are Sri Lankan.

And many Muslims are not Arabs. Even worse, almost everyone who is Arab is not a terrorist — many people who look Arab are not even Muslims. So not only are there an large number of false negatives — terrorists who don’t meet the profile — but there an enormous number of false positives: innocents that do meet the profile.

Don’t give in to bad profiling. Look for more than just skin color or style of dress.

[tags]The good and bad of profiling, Bruce Schneier on profiling[/tags]

Bush authorizes fence for U.S.-Mexico border

Guess what? I’m not going to gripe about this one. I’m not going to bad-mouth President Bush over this. I think if we are going to work on controlling illegal immigration, this is a necessary step, and I don’t see how this infringes on American citizens’ rights. Unless someone can show me good reason to oppose this, I’m buying in to the plan to build a fence between the U.S. and Mexico.

U.S. President George Bush has signed legislation that provides roughly $1.2 billion for fencing and other enhanced security measures along the border with Mexico.

. . .

U.S. President George Bush has signed legislation that provides roughly $1.2 billion for fencing and other enhanced security measures along the border with Mexico.

. . .

The White House had hoped for a wide-raging immigration reform bill. Instead, the U.S. Congress approved money to erect fencing in some of the most porous border areas and added it to legislation funding the Department of Homeland Security.

This is a good start. Of course, my fencing the most porous border areas, initially all we’re doing is pushing those who would enter illegally to find new places to come in. Eventually, for this to be of real value, it needs to be fence running the entire length of the border. Some people call me insensitive or a jerk for suggesting this, but I think we might want to consider getting the East Germans to help with this project.

Senator Kennedy said pushing money for the fence is only a campaign ploy and not a real solution to the problem.

Just in case you thought something good could be done without a Kennedy telling us what’s wrong. True, it’s not a real solution, but it is a start. And I’ll be optimistic (which I’ll grant is unusual for me) and say I expect more work to be done on limiting illegal immigration in the near future.

[tags]Bush authorizes fence for U.S.-Mexico border, Making a run for the border about to get more challenging[/tags]

Diebold touch screens on e-voting machines make devices fail

So what can you do when you make a product for electronic voting that security experts have shown to be bad for voting due to insecurity? Well, the best possible thing might not be to make sure the touch screens on those devices will cause them to fail poorly when touched, wouldn’t you think? Yet that’s what happens to the Diebold e-voting machines right now. Thankfully Diebold has a fix – don’t touch the touchscreen. And the company will provide a mouse for every machine.

After a daylong test of the state’s retrofitted voter check-in computers, it remained unclear yesterday whether the $18 million system works well enough for the state’s elections chief to deploy it in the November general election.

. . .

One reason for the relatively smooth test was the addition of a computer mouse to each of the touch-screen terminals, bypassing a software flaw first identified during the Sept. 12 primary and which remained unsolved throughout the day yesterday.

. . .

The e-poll books are supposed to be operated by tapping a small plastic stylus against the computer screens. The terminals are linked together and are used to register, among other things, whether a voter has shown up at the polls.

But during last month’s primary election, on occasion, one machine in a precinct would show voters as having cast ballots, while another would say they had not come to the polls.

To fix the problem, Diebold officials said yesterday the units could be operated with computer mouses and that they could provide the state with 5,500 of them in time for the general election. Or they could install new software and allow election judges to touch the screens.

Yes, you are reading that right. To use the touch-screen based e-voting machines, one has to use a mouse and not touch the touch-screen. If someone does use the touchscreen, well, the device could lose connectivity with the rest of the systems and require a reboot. After the reboot, the user might still be able to vote, but apparently their vote from before the reboot will still be kept in the system. Instant doubling of votes, just by touching the touchscreen after voting!

Lamone’s deputy, Ross Goldstein, said yesterday that elections officials would hear from their quality-assurance consultants and Diebold about whether the underlying software flaw causing the machines to lose sync could be fixed before a mid-October deadline to return the improved units to local election boards.

. . .

When the e-poll books fail to communicate with each other, or “lose sync,” the lists of who has voted in that precinct, which are stored on the e-poll books, don’t match. Should someone try to vote again, an out-of-sync system wouldn’t flag the double vote until the system had been corrected.

A spokesman for Diebold said yesterday that likelihood of such fraud would be low. If the system requires mouses, poll workers would be instructed repeatedly not to touch the screens and to check whether the system is communicating properly.

They also said that yesterday’s test proved that the system works smoothly and that the mouses would not interrupt an election.

OK, I’ll grant – the mouse probably won’t interrupt the election. But I bet all the people touching the touchscreens will. I wonder if anyone else worries about that?

County elections directors, many of whom came to the event, heaped praise on the machines, saying that they eliminated days of work updating voter histories after the election.

“Your instinct is to touch the screens,” said Sandra M. Logan, elections director in Caroline County, as she checked in a voter. “But I think my judges are used to using mouses and would like them.”

Nope. Or at least the elections director isn’t. Because people trained to not use the systems the wrong way after 2 test runs have mostly learned how to not use the systems the wrong way. Which I’m sure will translate into 100% non-misuse in a real election.

The likelihood for fraud if this problem stays in is high. Anyone saying otherwise is flat out lying to anyone that listens. There are groups of people who will do anything to tamper with an election (and no, I’m not talking about liberals). Once they know about a flaw this easily exploitable, they will take advantage of it. Saying the likelihood of fraud is low is akin to saying you trust the criminals will not try to take advantage of a flaw once they are made aware of it. And that would be laughable if it weren’t such a serious issue.

[tags]Diebold voter machines work great as long as not used in manner designed for,Easily exploitable flaw in Diebold e-voting systems no cause for concern according to Diebold[/tags]

Government wiretap program ruled illegal – allowed to continue

I often look at how things work in politics and in the judicial system and think that for the problems we see in these arenas, a large part of the operation involved goes well enough. Sure, there are occasional WTF? moments for some court rulings, and some zOMG thoughts come up when politicians do idiotic things. But mostly, things work well enough that there isn’t a pressing need to seek change in the processes. However, when rulings like this get passed down, I really wonder how these decisions can come about.

The Bush administration is allowed to continue its warrantless surveillance program while it appeals a judge’s ruling that the program is unconstitutional, a federal appeals court ruled Wednesday.

The president says the program is needed in the war on terrorism; opponents say it oversteps constitutional boundaries on free speech, privacy and executive powers.

“Yes it’s unconstitutional. Go right ahead with it until you get the answer you want from the court system.”

This is absurd, and leaves me wondering exactly who thought this was a good idea.

The 6th U.S. Circuit Court of Appeals’ ruling by a unanimous three-judge panel allows the program to continue during the appeal that could take months.

In their brief order, the judges said they balanced the likelihood of success of an appeal, the potential damage to either side and the public interest.

And I have to assume weighing in the public interest didn’t take citizens’ Constitutional rights into account, or the decision would not have been made. The Constitution should outweigh any judgement made based on likelihood of success of an appeal. But to the 6th U.S. Circuit Court, apparently it doesn’t.

Another annoying bit in this whole fiasco is this quote:

But the government says it can’t always wait for a court to take action. It says the NSA program is well within the president’s authority but proving that would require revealing state secrets.

Fortunately, the creators of the 1978 FISA (Foreign Intelligence Surveillance Act) understood that, and put in specific provisions to allow the President the power to initiate wiretaps without a warrant, provided a warrant is applied for within 48 hours of initiating the wiretap. Once the request is put in, the wiretap can continue until the request is approved or denied. If it is approved (which damn near always happens), the entire tap is legal. I don’t understand why the President feels requesting authorization from a court dedicated to authorizing these taps within 48 hours of initiating a wiretap is so difficult. But I think a lot of things are more difficult for the President than for most people.

[tags]Court – wiretapping unconstitutional; keep it up!, Current state of NSA wiretaps[/tags]

Wacko kills kids in Amish school building

I was taking a nap yesterday. I had asked my mother to call me at a certain time to wake me up so I wouldn’t be late for work. When she called, she told me about this nutjob who had taken over an Amish school in Pennsylvania. I didn’t have time to post about it before leaving for work, but I think it is important to point out when crazy people do crazy things. I can’t post about all of them, but this is so fucked up, I can’t *not* post about it.

A 32-year-old truck driver walked into a one-room Amish schoolhouse Monday, binding and shooting three girls execution-style before killing himself, police said.

Eight other girls were wounded in the attack, which police said appeared to be a revenge killing for an incident that occurred two decades ago.

. . .

The gunman, Charles Carl Roberts IV, was armed with three guns, a stun gun, two knives and a bag holding 600 rounds of ammunition, Miller said.

He was also carrying an assortment of tools and other items, including toilet paper, that led police to believe he was prepared for an extended standoff

. . .

The Bart, Pennsylvania, resident had three children, and left several notes for his family “along the lines of suicide notes,” Miller said.

The notes were “rambling” and “didn’t make much sense,” Miller said.

Roberts did not respond when police at the scene attempted to communicate with him, and troopers were preparing to storm the schoolhouse before the shooting began, Miller said.

Roberts’ wife tried to call him when she found the notes, Miller said. He returned the call on his cell phone, told her he wouldn’t be coming home and “that he was acting out to achieve revenge for something that happened 20 years ago.”

The article goes on, detailing the storming of the school by police, the shootings that happened during the stand-off, some information on the apparent plans for a lengthy stand-off, and a little of what the police know about the attacker.

Finding out what happened 20 years ago that made this person feel sufficiently slighted to shoot execution style several young girls won’t bring them back to life, but it will be interesting to hear, I’m sure. Unfortunately, what we will hear from this incident is more politicians spewing forth the need for gun control. The trouble with that viewpoint is this person could have done this attack just fine without the guns. The real problem in this attack is the attacker, not the weapon of choice. Find out why the attacks occurred – taking away the guns wouldn’t stop them, just changed his attack method.

[tags]Nutjob attacks Amish shool – kills girls, Crazy in PA[/tags]

Hysterics over H.R. 6166 – Military Commissions Act of 2006

While catching up on much of my geek reading for the day, I stumbled on this boingboing article about the newly enacted bill H.R. 6166 – what many are calling the US torture law or something to that effect. In it, the person who sent boingboing the article tries to induce hysteria by claiming that because of the bill, non-allegiance to the President makes one a terrorist. Given my newfound interest in knowing the difference between reality and the state of existence each major US political party tries to present as reality, I figured this was something worth learning about. So I follow the link to bill H.R. 6166, print out the version as passed through the House (hint:it prints out soooo much nicer if you copy the entire text, paste is into Word, and print out that verion), and start reading.

I don’t find anywhere in the bill that people who don’t ally themselves with the President are defined as terrorist. I don’t ally myself with our current President, so this is a point that really matters to me. There is a Sec. 950v. Crimes triable by military commissions section where article (26) WRONGFULLY AIDING THE ENEMY *might* be something which one could consider as somehow tangential to seeming like what Eris Siva (the submitter of the article to boingboing) is saying, but not really. That article says any person subject to that chapter of the bill who knowingly and intentionally aids a US enemy in breach of allegiance or duty to the US is subject to the bill. But that ‘any person subject to’ the chapter qualifier matters. In a preceeding section, it is made clear that these articles only apply to “Any alien unlawful enemy combatant” throughout the bill.

So I go back to the boingboing article, hoping to find comments from other readers which would help me understand how I am being labelled a terrorist for not showing allegiance to the President, and I find that Josh Larios has seen and written about the same problems I saw:

HR 6166 is bad enough for what it actually _does_ say. There’s really no need to make up new things to be alarmed about. Specifically, the bill does _not_ define non-allegiance to Bush (or to the office of the President) as terrorism.

The text of the bill says: “Any person subject to this chapter who, in breach of an allegiance or duty to the United States, knowingly and intentionally aids an enemy of the United States, or one of the co-belligerents of the enemy, shall be punished as a military commission under this chapter may direct.”

The important bit is “subject to this chapter”. Section 948c of the bill defines who is subject to this chapter as “[a]ny alien unlawful enemy combatant”. Previously, in section 948a, it defines “alien” as “a person who is not a citizen of the United States”. The authors of the article you’ve linked to have taken the “breach of allegiance” snippet as proof that the bill is aimed at US citizens, when the text of the bill clearly indicates otherwise.

Section 948d of the bill lays out the jurisdiction as follows: “A military commission under this chapter shall have jurisdiction to try any offense made punishable by this chapter or the law of war when committed by an alien unlawful enemy combatant before, on, or after September 11, 2001.”

The “breach of allegiance” excerpt is as meaningful as “before, on, or after September 11, 2001”. That is to say, not at all. I cannot see any reasonable interpretation of the text of the bill that includes non-allegiance to the president (by a US citizen — who else would have any allegiance to the president?) equating to terrorism.

Folks, there are problems with this bill. There are things I don’t like in it. I believe this bill will be found unconstitutional due to it’s explicit denial of the judicial branch’s rights to speak on matters of law. I don’t like that through this law, anyone accused of anything covered by the bill can be held without information necessary to form a defense. I think the bill as passed explicitly defines as an unlawful enemy comtatant (and therefore subject to the rules in the bill) everyone which the White House has labelled an unlawful enemy combatant prior to passage of the bill.

But let’s focus on what is actually wrong with the bill, and not make up crap in an attempt to induce hysteria. As with every other far-reaching law ever passed by Congress, this will be used in ways it shouldn’t be. And there will be abuses of the law due to lack of clarity on some points. But nowhere in the bill does it state anything that would allow one to be labelled a terrorist for non-allegiance to the President. So let’s just deal with what is wrong with the bill, try to keep the things in the bill that are good, and stop with the spreading of falsehoods, OK?

[tags]Military Commissions Act of 2006, Bill H.R. 6166, Author claims US torture bill makes non-allegiance to President a terrorist act[/tags]

Hurd (HP’s new CEO) plays the “I don’t remember” Reaganesque card

I like Reagan and think he was a fine President – don’t take that headline the wrong way. However, much like Reagan during the whole Iran Contra debacle, Hurd played the “I don’t remember” and “I didn’t know about that” game in a completely unconvincing manner. In a press conference (in which, oddly enough, the press were not allowed to do anything but listen, kinda making is a press-listening event, which in its own right is unusual I suppose) Hurd said he authorized a fake email to help track down the source of a news leak at HP, but that he didn’t recall if he had authorized sending spyware with the email.

He acknowledged approving a plot earlier this year to trick a CNet reporter into revealing her sources by having an investigator e-mail her, posing as a disgruntled HP employee. But he said he didn’t recall approving another gambit: e-mailing the reporter a purported HP document containing hidden spyware to trace her sources.

And he admitted he was given a report in March detailing the methods used by investigators, as well as the results. “I understand there is also a written report of the investigation addressed to me and others, but I did not read it. I could have, and I should have,” he said.

Ahhhhh, the whole ignorance is bliss defense. Of course, we all know that lack of knowledge does not excuse one from a crime – just ask my wife about the ticket she got for turning right at a no-right-turn intersection where the sign was completely covered by a tree (we had pictures at the time – the sign was indeed not visible but the judge still made her pay because “you should have known” about the sign). He had the necessary information to know what was being done. And seeing how important the high level executives seemed to believe this matter was, I would expect he should have read the report to know what was going on.

Hurd said the “trigger for me” that something was wrong came in the form of an e-mail he received after a May board meeting. At that point, he retained the law firm Morgan, Lewis & Bockius to do “a more comprehensive investigation,” he said.

I’m just curious on this – if he retained a law firm in May (or June, if it took a while to react or the board meeting was late in the month), why did we not find out about HP’s illegal activities until August? I mean, if this was really important to handle properly, which Hurd seems to claim in his statements if you read the full article, why wasn’t it important to let people know of HP’s illegal activities before that information escaped somehow last month?

Elsewhere in the article is this quote from former HP chairwoman Dunn:

Dunn issued a statement saying she was resigning “in the best interests” of HP and blaming the fiasco on the investigators the company used, saying she didn’t select them. She said she “followed the proper processes” but that the investigators “let me and the company down.”

Again – “It’s not my fault. I played by the rules. Someone else screwed up.” In other words, she’s really an innocent victim of someone else’s mistake. I almost shed a tear for her. (via Dan Gillmor’s blog)

[tags]More on the HP illegal spying case, HP execs play “Pass the buck” on blame for spy fiasco[/tags]

Checked baggage security – take your gun

What’s the best way to be certain your checked baggage won’t be tampered with? Apparently, the answer is to travel with a gun in your checked baggage. Matt Brandon tells his unfortunate tale of losing some expensive camera equipment while traveling, due to the camera being in checked baggage instead of hand carried. The interesting part comes in the comments to his post.

One note on using TSA rules to your advantage.

Weapons that travel MUST be in a hard case, must be declared upon check-in, and MUST BE LOCKED by a TSA official.

A “weapons” is defined as a rifle, shotgun, pistol, airgun, and STARTER PISTOL. Yes, starter pistols – those little guns that fire blanks at track and swim meets – are considered weapons…and do NOT have to be registered in any state in the United States.

I have a starter pistol for all my cases. All I have to do upon check-in is tell the airline ticket agent that I have a weapon to declare…I’m given a little card to sign, the card is put in the case, the case is given to a TSA official who takes my key and locks the case, and gives my key back to me.

That’s the procedure. The case is extra-tracked…TSA does not want to lose a weapons case. This reduces the chance of the case being lost to virtually zero.

It’s a great way to travel with camera gear…I’ve been doing this since Dec 2001 and have had no problems whatsoever.

Hope it works for you…
John

(via Bruce Schneier’s security blog via boingboing)

US travelers will be allowed to carry liquids on planes again

This is a small step forward away from security theater ploys that don’t do anything to actually make us safer. I’ve already written a lot about how improbable the original liquids on a plane attack was, but many people don’t believe what I’ve written or what I’ve linked to that others have written. Apparently someone in the government has taken some time to find out the feasability of actually bringing down an airplane via liquid explosives and found it’s probably not that easy and that even if it were attempted, it would take a bit more liquid than people typically carry on board.

Because of these findings, the government has relaxed the no-liquids ban to instead be a limited liquids rule with the allowance of small amounts of brought-from-home liquids as well as beverages purchased inside airport screening from “trusted” shops.

The new rules were announced during a late-morning news conference at Reagan National Airport. The previous, stricter ban was instituted last month after a plot to bomb jets flying into the United States was foiled.

Continue reading “US travelers will be allowed to carry liquids on planes again”

Authorize the NSA to spy on you

(via 27B Stroke 6)

Do you feel that the NSA violating the civil rights of Americans under illegal authorization from President Bush isn’t quite enough protection of your rights and privileges as an citizen of the US? If that isn’t enough for you, then you might find yourself interested in filling out this consent form for NSA surveillance (in pdf format).

Executive Order 12333
Consent Agreement
Signals Intelligence Coverage

I _____________ (full name) _________________________ title ________________, hereby consent to the National Security Agency undertaking to seek and disseminate communications to or from or referencing me in foreign communications for the purpose of ___________________.

This consent applies to administrative messages alerting elements of the United States Signals Intelligence System to this consent as well as to any signals intelligence reports which may relate to the purpose stated above.

Except as otherwise provided by Executive Order 12333 procedures, this consent covers only information which relates to the purpose stated above and is effective for the period: _______________.

Signals intelligence reports containing information derived from communication to or from me may only be disseminated to me and to __________________. Signals intelligence reports containing information derived from communication referencing me may only be disseminated to me and to [names of departments and agencies, e.g., DoD. CIA. etc] except as otherwise permitted by procedures under Executive Order 12333.

(SIGNATURE)
(TITLE)
(UNCLASSIFIED until completed. Classify
completed form based on information added,
but not lower than CONFIDENTIAL.)

Feel free to use this to let your government legally spy on you while we wait for updates to the law so the President is instead just given authorization to ignore the 1978 FISA.

[tags]NSA surveillance authorization, Give the NSA legal clearance to listen to your phone[/tags]

Diebold voting machine insecurity

Dr. Dobbs Journal put up a story last week about several security researchers who showed how insecure Diebold voting machines are. This is one of the most important things affecting the current political realm, in my not so humble opinion. I’m putting the rest of the story below the following link, but please read all this and don’t just skip ahead. This really matters, and shows the need for voter verified paper print-outs to go along with the electronic vote entry for auditing purposes.

Continue reading “Diebold voting machine insecurity”

Great – now we all have to check out real estate in Franklin, TN

(via Engadget)

We all want fatter digital pipes for a lower cost, right? I mean, all the normal people. I know there are people who think it is acceptable to live mostly off-line, but I like to think of them as moderately to significantly insane. So ignoring those wackos, can we all agree that Franklin, TN is starting to look more interesting than we would have every guessed?

A few weeks ago, Brent Ware took his teenage son on a trip around the world to meet with international clients.

Ware, CEO of Tenvera Inc., said his son was shocked at the technological advantages other parts of the world – especially the Far East – have over the United States. Ware wants to cut that advantage down for Americans with a fiber-optic home networking system that could change the way people all over the world live, entertain and work in their homes.

Tenvera is a Franklin-based company beginning production this month of System 5 technology. Also known as Fiber in the Home (FITH), it takes fiber-optic networking to its final destination: the home.

And Tenvera is working with builders in its hometown to get more fiber in more houses. And I want some of that. Guess I need to find work in the Nashville area, get the wife to find work there, sell the house, move, and enjoy big fat bandwidth numbers.

[tags]Fiber to the home in Franklin TN, Tenvera testing fiber to the home[/tags]