Feed aggregator
Radio Hobbyists, Rejoice! Good News for LoRa & Mesh
A set of radio devices and technologies are opening the doorway to new and revolutionary forms of communication. These have the potential to break down the over-reliance on traditional network hierarchies, and present collaborative alternatives where resistance to censorship, control and surveillance are baked into the network topography itself. Here, we look at a few of these technologies and what they might mean for the future of networked communications.
The idea of what is broadly referred to as mesh networking isn’t new: the resilience and scalability of mesh technology has seen it adopted in router and IoT protocols for decades. What’s new is cheap devices that can be used without a radio license to communicate over (relatively) large distances, or LOng RAnge, thus the moniker LoRa.
Although using different operating frequencies in different countries, LoRa works in essentially the same way everywhere. It uses Chirp Spread Spectrum to broadcast digital communications across a physical landscape, with a range of several kilometers in the right environmental conditions. When other capable devices pick up a signal, they can then pass it along to other nodes until the message reaches its desitination—all without relying on a single centralized host.
These communications are of very low bit-rate—often less than a few KBps (kilobytes per second) at a distance—and use very little power. You won’t be browsing the web or streaming video over LoRa, but it is useful for sending messages in a wide range of situations where traditional infrastructure is lacking or intermittent, and communication with others over dispersed or changing physical terrain is essential. For instance, a growing body of research is showing how Search and Rescue (SAR) teams can greatly benefit from the use of LoRa, specifically when coupled with GPS sensors, and especially when complimented by line-of-sight LoRa repeaters.
MeshtasticThe most popular of these indie LoRa communication systems is Meshtastic by far. For hobbyists just getting started in the world of LoRa mesh communications, it is the easiest way to get up, running, and texting with others in your area that also happen to have a Meshtastic-enabled device. It also facilitates direct communication with other nodes using end-to-end encryption. And by default, a Meshtastic device will repeat messages to others if originating from 3 or fewer nodes (or “hops”) away. This means messages tend to propagate farther with the power of the mesh collaborating to make delivery possible. As a single-application use of LoRa, it is an exciting experiment to take part in.
ReticulumWhile Reticulum is often put into the same category as Meshtastic, and although both enable communication over LoRa, the comparison breaks down quickly after that. Reticulum is not a single application, but an entire network stack that can be arbitrarily configured to connect through existing TCP/IP, the anonymizing I2P network, directly through a local WiFi connection, or through LoRa radios. The Reticulum network’s LXMF transfer protocol allows arbitrary applications to be built on top of it, such as messaging, voice calls, file transfer, and light-weight, text-only browsing. And that’s only to name a few applications which have already been developed—the possibilities are endless.
Although there are a number of community hubs to join which are being run by Reticulum enthusiasts, you don’t have to join any of them, and can build your own Reticulum network with the devices and transports of you and your friends, locally over LoRa or remotely over traditional infrastructure, and bridge them as you please. Nodes themselves are universally addressed and sovereign, meaning they are free to connect anywhere and not lose the universally unique address which defines them. All communications between nodes are encrypted end-to-end, using a strong choice of cryptographic primitives. And although it’s been actively developed for over a decade, it recently reached the noteworthy milestone of a 1.0 release. It’s a very exciting ecosystem to be a part of, and we can’t wait to see the community develop it even further. A number of clients are available to start exploring.
Resilient InfrastructureOn a more somber note, let’s face it: we live in an uncertain world. With the frequency of environmental disasters, political polarization, and infrastructure attacks increasing, the stability of networks we have traditionally relied upon is far from assured.
Yet even with the world as it is, developers are creating new communications networks that have the potential to help in unexpected situations we might find ourselves in. Not only are these technologies built to be useful and resilient, they are also empowering individuals by circumventing censorship and platform control— allowing a way for people to empower each other through sharing resources.
In that way, it can be seen as a technological inheritor of the hopefulness and experimentation—and yes, fun!—that was so present in the early internet. These technologies offer a promising path forward for building our way out of tech dystopia.
EFF and 80 Organizations Call on EU Policymakers to Preserve Net Neutrality in the Digital Networks Act
As the European Commission prepares an upcoming proposal for a Digital Networks Act (DNA), a growing network of groups are raising serious concerns about the resurgence of “fair share” proposals from major telecom operators. The original idea was to introduce network usage fees on certain companies to pay ISPs. We have said it before and we’ll say it again: there is nothing fair about this “fair share” proposal, which could undermine net neutrality and hurt consumers by changing how content is delivered online. Now the EU Commission is toying with an alternative idea: the introduction of a dispute resolution mechanism to foster commercial agreements between tech firms and telecom operators.
EFF recently joined a broad group of more than 80 signatories, from civil society organizations to audio-visual companies in a joint statement aimed at preserving net neutrality in the DNA.
In the letter, we argue that the push to introduce a mandatory dispute resolution mechanism into EU law would pave the way for content and application providers (CAPs) to pay network fees for delivering traffic. These ideas, recycled from 2022, are being marketed as necessary for funding infrastructure, but the real cost would fall on the open internet, competition, and users themselves.
This isn't just about arcane telecom policy—it’s a battle over the future of the internet in Europe. If the DNA includes mechanisms that force payments from CAPs, we risk higher subscription costs, fewer services, and less innovation, particularly for European startups, creatives, and SMEs. Worse still, there’s no evidence of market failure to justify such regulatory intervention. Regulators like BEREC have consistently found that the interconnection market is functioning smoothly. What’s being proposed is nothing short of a power grab by legacy telecom operators looking to resurrect outdated, monopolistic business models. Europe has long championed an open, accessible internet—now’s the time to defend it.
🤕 A Surveillance Startup in Damage Control | EFFector 37.8
We're a little over halfway through the year! Which... could be good or bad depending on your outlook... but nevermind that—EFF is here to keep you updated on the latest digital rights news, and we've got you covered with an all-new EFFector!
With issue 37.8, we're covering a recent EFF investigation into AI-generated police reports, a secret deal to sell flight passenger data to the feds (thanks data brokers), and why mass surveillance cannot be fixed with a software patch.
Don't forget to also check out our audio companion to EFFector as well! We're interviewing staff about some of the important work that they're doing. This time, EFF's Associate Director of Activism Sarah Hamid explains the harms caused by ALPRs and what you can do to fight back. Listen now on YouTube or the Internet Archive.
EFFECTOR 37.8 - A Surveillance Startup In Damage Control
Since 1990 EFF has published EFFector to help keep readers on the bleeding edge of their digital rights. We know that the intersection of technology, civil liberties, human rights, and the law can be complicated, so EFFector is a great way to stay on top of things. The newsletter is chock full of links to updates, announcements, blog posts, and other stories to help keep readers—and listeners—up to date on the movement to protect online privacy and free expression.
Thank you to the supporters around the world who make our work possible! If you're not a member yet, join EFF today to help us fight for a brighter digital future.
Hacking Trains
Seems like an old system system that predates any care about security:
The flaw has to do with the protocol used in a train system known as the End-of-Train and Head-of-Train. A Flashing Rear End Device (FRED), also known as an End-of-Train (EOT) device, is attached to the back of a train and sends data via radio signals to a corresponding device in the locomotive called the Head-of-Train (HOT). Commands can also be sent to the FRED to apply the brakes at the rear of the train.
These devices were first installed in the 1980s as a replacement for caboose cars, and unfortunately, they lack encryption and authentication protocols. Instead, the current system uses data packets sent between the front and back of a train that include a simple BCH checksum to detect errors or interference. But now, the CISA is warning that someone using a software-defined radio could potentially send fake data packets and interfere with train operations...
The IRA was bearing fruit. Then Trump killed it.
Trump’s megalaw casts shadow over solar manufacturing
Massachusetts debates $3B bond for climate projects
Exiled Biden officials release carbon technology wish list
Australian judge warns of climate threat but says he can’t force government action
Greens challenge Trump’s $4.7B loan for Mozambique LNG project
EU to outline what tech can be used for permanent CO2 removal
New Zealand farmers slam proposed green finance rules
Australian rock art site near LNG hub gets World Heritage status
Jane Fonda warns climate and democracy are both in crisis
Podcast Episode: Finding the Joy in Digital Security
Many people approach digital security training with furrowed brows, as an obstacle to overcome. But what if learning to keep your tech safe and secure was consistently playful and fun? People react better to learning, and retain more knowledge, when they're having a good time. It doesn’t mean the topic isn’t serious – it’s just about intentionally approaching a serious topic with joy.
%3Ciframe%20height%3D%2252px%22%20width%3D%22100%25%22%20frameborder%3D%22no%22%20scrolling%3D%22no%22%20seamless%3D%22%22%20src%3D%22https%3A%2F%2Fplayer.simplecast.com%2F78eed2f8-094f-4ad7-980e-fb68168f32ba%3Fdark%3Dtrue%26amp%3Bcolor%3D000000%22%20allow%3D%22autoplay%22%3E%3C%2Fiframe%3E
Privacy info.
This embed will serve content from simplecast.com
(You can also find this episode on the Internet Archive and on YouTube.)
That’s how Helen Andromedon approaches her work as a digital security trainer in East Africa. She teaches human rights defenders how to protect themselves online, creating open and welcoming spaces for activists, journalists, and others at risk to ask hard questions and learn how to protect themselves against online threats. She joins EFF’s Cindy Cohn and Jason Kelley to discuss making digital security less complicated, more relevant, and more joyful to real users, and encouraging all women and girls to take online safety into their own hands so that they can feel fully present and invested in the digital world.
In this episode you’ll learn about:
- How the Trump Administration’s shuttering of the United States Agency for International Development (USAID) has led to funding cuts for digital security programs in Africa and around the world, and why she’s still optimistic about the work
- The importance of helping women feel safe and confident about using online platforms to create positive change in their communities and countries
- Cultivating a mentorship model in digital security training and other training environments
- Why diverse input creates training models that are accessible to a wider audience
- How one size never fits all in digital security solutions, and how Dungeons & Dragons offers lessons to help people retain what they learn
Helen Andromedon – a moniker she uses to protect her own security – is a digital security trainer in East Africa who helps human rights defenders learn how to protect themselves and their data online and on their devices. She played a key role in developing the Safe Sisters project, which is a digital security training program for women. She’s also a UX researcher and educator who has worked as a consultant for many organizations across Africa, including the Association for Progressive Communications and the African Women’s Development Fund.
Resources:
- The Guardian: “Internet shutdowns at record high in Africa as access ‘weaponised’” (March 9, 2025)
- Atlantic Council AfricaSource: “Effective cybersecurity in Africa must start with the basics“ (Oct. 7, 2024)
- Just Security: “The Next Step for USAID’s New Digital Policy: Account for Conflict Risks and Include Peacebuilding” (Sept. 27, 2024)
- Collaboration on International ICT Policy for East and Southern Africa: “How African States Are Undermining the Use of Encryption“ (Oct. 21, 2021)
- Security Education Companion
What do you think of “How to Fix the Internet?” Share your feedback here.
TranscriptHELEN ANDROMEDON: I'll say it bluntly. Learning should be fun. Even if I'm learning about your tool, maybe you design a tutorial that is fun for me to read through, to look at. It seems like that helps with knowledge retention.
I've seen people responding to activities and trainings that are playful. And yet we are working on a serious issue. You know, we are developing an advocacy campaign, it's a serious issue, but we are also having fun.
CINDY COHN: That's Helen Andromedan talking about the importance of joy and play in all things, but especially when it comes to digital security training. I'm Cindy Cohn, the executive director of the Electronic Frontier Foundation.
JASON KELLEY: And I'm Jason Kelley, EFF's activism director. This is our podcast, How to Fix the Internet.
CINDY COHN: This show is all about envisioning a better digital world for everyone. Here at EFF, we often specialize in thinking about worst case scenarios and of course, jumping in to help when bad things happen. But the conversations we have here are an opportunity to envision the better world we can build if we start to get things right online.
JASON KELLEY: Our guest today is someone who takes a very active role in helping people take control of their digital lives and experiences.
CINDY COHN: Helen Andromedon - that's a pseudonym by the way, and a great one at that – is a digital security trainer in East Africa. She trains human rights defenders in how to protect themselves digitally. She's also a UX researcher and educator, and she's worked as a consultant for many organizations across Africa, including the Association for Progressive Communications and the African Women's Development Fund.
She also played a key role in developing the Safe Sisters project, which is a digital security training, especially designed for women. Welcome Helen. Thank you so much for joining us.
HELEN ANDROMEDON: Thanks for having me. I've been a huge fan of the tools that came out of EFF and working with Ford Foundation. So yeah, it's such a blast to be here.
CINDY COHN: Wonderful. So we're in a time when a lot of people around the world are thinking more seriously than ever about how to protect their privacy and security. and that's, you know, from companies, but increasingly from governments and many, many other potential bad actors.
You know, there's no one size fits all training, as we know. And the process of determining what you need to protect and from whom you need to protect it is different for everybody. But we're particularly excited to talk to you, Helen, because you know that's what you've been doing for a very long time. And we want to hear how you think about, you know, how to make the resources available to people and make sure that the trainings really fit them. So can you start by explaining what the Safe Sisters project is?
HELEN ANDROMEDON: It's a program that came out of a collaboration amongst friends, but friends who were also working in different organizations and also were doing trainings. In the past, what would have it would be, we would send out an application, Hey, there's a training going on. But there was a different number of women that would actually apply to this fellowship.
It would always be very unequal. So what we decided to do is really kind of like experimenting is say, what if we do a training but only invite, women and people who are activists, people who are journalists, people who are really high risk, and give them a space to ask those hard questions because there are so many different things that come out of suffering online harassment and going through that in your life, you, when you need to share it, sometimes you do need a space where you don't feel judged, where you can kind of feel free to engage in really, really traumatic topics. So this fellowship was created, it had this unique percentage of people that would apply and we started in East Africa.
I think now because of what has happened in the last I, I guess three months, it has halted our ability to run the program in as many. Regions that need it. Um, but Safe Sister, I think what I see, it is a tech community of people who are able to train others or help others solve a problem.
So what problems do, I mean, so for example, I, I think I left my, my phone in the taxi. So what do I do? Um, how do I find my phone? What happens to all my data? Or maybe it could be a case of online harassment where there's some sort of revenge from the other side, from the perpetrator, trying to make the life of the victim really, really difficult at the moment.
So we needed people to be able to have solutions available to talk about and not just say, okay, you are a victim of harassment. What should I do? There's nothing to do, just go offline. No, we need to respond, but many of us don't have the background in ICT, uh, for example, in my region. I think that it is possible now to get a, a good background in IT or ICT related courses, um, up to, um, you know, up to PhD level even.
But sometimes I've, in working with Safe Sister, I've noticed that even such people might not be aware of the dangers that they are facing. Even when they know OPSEC and they're very good at it. They might not necessarily understand the risks. So we decided to keep working on the content each year, every time we can run the program, work on the content: what are the issues, currently, that people are facing? How can we address them through an educational fellowship, which is very, very heavy on mentorship. So mentorship is also a thing that we put a lot of stress on because again, we know that people don't necessarily have the time to take a course or maybe learn about encryption, but they are interested in it. So we want to be able to serve all the different communities and the different threat models that we are seeing.
CINDY COHN: I think that's really great and I, I wanna, um, drill in a couple of things. So first thing you, uh, ICT, internet Communications Technologies. Um, but what I, uh, what I think is really interesting about your approach is the way the fellowship works. You know, you're kind of each one teach one, right?
You're bringing in different people from communities. And if you know, most of us, I think as a, as a model, you know, finding a trusted person who can give you good information is a lot easier than going online and finding information all by yourself. So by kind of seeding these different communities with people who've had your advanced training, you're really kind of able to grow who gets the information. Is that part of the strategy to try to have that?
HELEN ANDROMEDON: It's kind of like two ways. So there is the way where we, we want people to have the information, but also we want people to have the correct information.
Because there is so much available, you can just type in, you know, into your URL and say, is this VPN trusted? And maybe you'll, you'll find a result that isn't necessarily the best one.
We want people to be able to find the resources that are guaranteed by, you know, EFF or by an organization that really cares about digital rights.
CINDY COHN: I mean, that is one of the problems of the current internet. When I started out in the nineties, there just wasn't information. And now really the role of organizations like yours is sifting through the misinformation, the disinformation, just the bad information to really lift up, things that are more trustworthy. It sounds like that's a lot of what you're doing.
HELEN ANDROMEDON: Yeah, absolutely. How I think it's going, I think you, I mean, you mentioned that it's kind of this cascading wave of, you know, knowledge, you know, trickling down into the communities. I do hope that's where it's heading.
I do see people reaching out to me who have been at Safe Sisters, um, asking me, yo Helen, which training should I do? You know, I need content for this. And you can see that they're actively engaging still, even though they went through the fellowship like say four years ago. So that I think is like evidence that maybe it's kind of sustainable, yeah.
CINDY COHN: Yeah. I think so. I wanted to drill down on one other thing you said, which is of course, you mentioned the, what I think of as the funding cuts, right, the Trump administration cutting off money for a lot of the programs like Safe Sisters, around the world. and I know there are other countries in Europe that are also cutting, support for these kind of programs.
Is that what you mean in terms of what's happened in the last few months?
HELEN ANDROMEDON: Yeah. Um, it's really turned around what our expectations for the next couple of years say, yeah, it's really done so, but also there's an opportunity for growth to recreate how, you know, what kind of proposals to develop. It's, yeah, it's always, you know, these things. Sometimes it's always just a way to change.
CINDY COHN: I wanna ask one more question. I really will let Jason ask some at some point, but, um, so what does the world look like if we get it right? Like if your work is successful, and more broadly, the internet is really supporting these kind of communities right now, what does it look like for the kind of women and human rights activists who you work with?
HELEN ANDROMEDON: I think that most of them would feel more confident to use those platforms for their work. So that gives it an extra boost because then they can be creative about their actions. Maybe it's something, maybe they want, you know, uh, they are, they are demonstrating against, uh, an illegal and inhumane act that has passed through parliament.
So online platforms. If they could, if it could be our right and if we could feel like the way we feel, you know, in the real world. So there's a virtual and a real world, you're walking on the road and you know you can touch things.
If we felt ownership of our online spaces so that you feel confident to create something that maybe can change. So in, in that ideal world, it would be that the women can use online spaces to really, really boost change in their communities and have others do so as well because you can teach others and you inspire others to do so. So it's, like, pops up everywhere and really makes things go and change.
I think also for my context, because I've worked with people in very repressive regimes where it is, the internet can be taken away from you. So it's things like the shutdowns, it's just ripped away from you. Uh, you can no longer search, oh, I have this, you know, funny thing on my dog. What should I do? Can I search for the information? Oh, you don't have the internet. What? It's taken away from you. So if we could have a way where the infrastructure of the internet was no longer something that was, like, in the hands of just a few people, then I think – So there's a way to do that, which I've recently learned from speaking to people who work on these things. It's maybe a way of connecting to the internet to go on the main highway, which doesn't require the government, um, the roadblocks and maybe it could be a kind of technology that we could use that could make that possible. So there is a way, and in that ideal world, it would be that, so that you can always find out, uh, what that color is and find out very important things for your life. Because the internet is for that, it's for information.
Online harassment, that one. I, I, yeah, I really would love to see the end of that. Um, just because, so also acknowledging that it's also something that has shown us. As human beings also something that we do, which is not be very kind to others. So it's a difficult thing. What I would like to see is that this future, we have researched it, we have very good data, we know how to avoid it completely. And then we also draw the parameters, so that everybody, when something happens to you, doesn't make you feel good, which is like somebody harassing you that also you are heard, because in some contexts, uh, even when you go to report to the police and you say, look, this happened to me. Sometimes they don't take it seriously, but because of what happens to you after and the trauma, yes, it is important. It is important and we need to recognize that. So it would be a world where you can see it, you can stop it.
CINDY COHN: I hear you and what I hear is that, that the internet should be a place where it's, you know, always available, and not subject to the whims of the government or the companies. There's technologies that can help do that, but we need to make them better and more widely available. That speaking out online is something you can do. And organizing online is something you can do. Um, but also that you have real accountability for harassment that might come as a response. And that could be, you know, technically protecting people, but also I think that sounds more like a policy and legal thing where you actually have resources to fight back if somebody, you know, misuses technology to try to harass you.
HELEN ANDROMEDON: Yeah, absolutely. Because right now the cases get to a point where it seems like depending on the whim of the person in charge, maybe if they go to, to report it, the case can just be dropped or it's not taken seriously. And then people do harm to themselves also, which is on, like, the extreme end and which is something that's really not, uh, nice to happen and should, it shouldn't happen.
CINDY COHN: It shouldn't happen, and I think it is something that disproportionately affects women who are online or marginalized people. Your vision of an internet where people can freely gather together and organize and speak is actually available to a lot of people around the world, but, but some people really don't experience that without tremendous blowback.
And that's, um, you know, that's some of the space that we really need to clear out so that it's a safe space to organize and make your voice heard for everybody, not just, you know, a few people who are already in power or have the, you know, the technical ability to protect themselves.
JASON KELLEY: We really want to, I think, help talk to the people who listen to this podcast and really understand and are building a better future and a better internet. You know, what kind of things you've seen when you train people. What are you thinking about when you're building these resources and these curriculums? What things come up like over and over that maybe people who aren't as familiar with the problems you've seen or the issues you've experienced.
HELEN ANDROMEDON: yeah, I mean the, Hmm, I, maybe they could be a couple of, of reasons that I think, um. What would be my view is, the thing that comes up in trainings is of course, you know, hesitation. there's this new thing and I'm supposed to download it. What is it going to do to my laptop?
My God, I share this laptop. What is it going to do? Now they tell me, do this, do this in 30 minutes, and then we have to break for lunch. So that's not enough time to actually learn because then you have to practice or you could practice, you could throw in a practice of a session, but then you leave this person and that person is as with normal.
Forget very normal. It happens. So the issues sometimes it's that kind of like hesitation to play with the tech toys. And I think that it's, good to be because we are cautious and we want to protect this device that was really expensive to get. Maybe it's borrowed, maybe it's secondhand.
I won't get, you know, like so many things that come up in our day to day because of, of the cost of things.
JASON KELLEY: You mentioned like what do you do when you leave your phone in a taxi? And I'll say that, you know, a few days ago I couldn't find my phone after I went somewhere and I completely freaked out. I know what I'm doing usually, but I was like, okay, how do I turn this thing off?
And I'm wondering like that taxi scenario, is that, is that a common one? Are there, you know, others that people experience there? I, I know you mentioned, you know, internet shutoffs, which happen far too frequently, but a lot of people probably aren't familiar with them. Is that a common scenario? You have to figure out what to do about, like, what are the things that pop up occasionally that, people listening to this might not be as aware of.
HELEN ANDROMEDON: So losing a device or a device malfunctioning is like the top one and internet shutdown is down here because they are not, they're periodic. Usually it's when there's an election cycle, that's when it happens. After that, you know, you sometimes, you have almost a hundred percent back to access. So I think I would put losing a device, destroying a device.
Okay, now what do I do now for the case of the taxi? The phone in the taxi. First of all, the taxi is probably crowded. So you don't think that phone will not be returned most likely.
So maybe there's intimate photos. You know, there's a lot, there's a lot that, you know, can be. So then if this person doesn't have a great password, which is usually the case because there is not so much emphasis when you buy a device. There isn't so much emphasis on, Hey, take time to make a strong password now. Now it's better. Now obviously there are better products available that teach you about device security as you are setting up the phone. But usually you buy it, you switch it on, so you don't really have the knowledge. This is a better password than that. Or maybe don't forget to put a password, for example.
So that person responding to that case would be now asking if they had maybe the find my device app, if we could use that, if that could work, like as you were saying, there's a possibility that it might, uh, bing in another place and be noticed and for sure taken away. So there's, it has to be kind of a backwards, a learning journey to say, let's start from ground zero.
JASON KELLEY: Let's take a quick moment to say thank you to our sponsor. How to Fix The Internet is supported by the Alfred p Sloan Foundation's program in public understanding of science and technology enriching people's lives through a keener appreciation of our increasingly technological world and portraying the complex humanity of scientists, engineers, and mathematicians.
We also wanna thank EFF members and donors. You are the reason we exist.
You can become a member for just $25 and for a little more, you can get some great, very stylish gear. The more members we have, the more power we have in state houses, courthouses and on the streets.
EFF has been fighting for digital rights for decades, and that fight is bigger than ever. So please, if you like what we do, go to ff.org/pod to donate.
We also wanted to share that our friend Cory Doctorow has a new podcast. Listen to this. [Who Broke the Internet trailer]
And now back to our conversation with Helen Andromedon.
CINDY COHN: So how do you find the people who come and do the trainings? How do you identify people who would be good fellows or who need to come in to do the training? Because I think that's its own problem, especially, you know, the Safe Sisters is very spread out among multiple countries.
HELEN ANDROMEDON: Right now it has been a combination of partners saying, Hey, we have an idea, and then seeing where the issues are.
As you know, a fellowship needs resources. So if there is an interest because of the methodology, at least, um, let's say it's a partner in Madagascar who is working on digital rights. They would like to make sure that their community, maybe staff and maybe people that they've given sub-grants to. So that entire community, they want to make sure that it is safe, they can communicate safely. Nothing, you know, is leaked out, they can work well. And they're looking for, how do we do this? We need trainers, we need content. we need somebody who understands also learning separate from the resources. So I think that the Safe Sister Fellowship also is something that, because it's like you can pick it up here and you can design it in, in whatever context you have.
I think that has made it like be stronger. You take it, you make it your own. So it has happened like that. So a partner has an interest. We have the methodology, we have the trainers, and then we have the tools as well. And then that's how it happens.
CINDY COHN: What I'm hearing here is that, you know, there's already a pretty strong network of partners across Africa and the communities you serve. there's groups and, you know, we know this from EFF, 'cause we hear from them as well ,that there are, there are actually a pretty well developed set of groups that are doing digital activism and human rights defenders using technology already across, uh, Africa and the rest of the communities. And that you have this network and you are the go-to people, uh, when people in the network realize they need a higher level of security thinking and training than they had. Does that sound right?
HELEN ANDROMEDON: sound right? Yeah. A higher level of our being aware And usually it comes down to how do we keep this information safe? Because we are having incidents. Yeah.
CINDY COHN: Do you have an incident that you could, you explain?
HELEN ANDROMEDON: Oh, um, queer communities, say, an incident of, executive director being kidnapped. And it was, we think, that it's probably got to do with how influential they were and what kind of message they were sending. So it, it's apparent. And then so shortly after that incident, there's a break-in into the, the office space. Now that one is actually quite common, um, especially in the civic space. So that one then, uh, if they, they were storing maybe case files, um, everything was in a hard copy. All the information was there, receipts, checks, um, payment details. That is very, very tragic in that case.
So in that, what we did, because this incident had happened in multiple places, we decided to run a program for all the staff that was, um, involved in their day to day. So we could do it like that and make sure that as a response to what happened, everybody gets some education. We have some quizzes, we have some tests, we have some community. We keep engaged and maybe. That would help. And yeah, they'll be more prepared in case it happens again.
CINDY COHN: Oh yeah. And this is such an old, old issue. You know, when we were doing the encryption fight in the nineties, we had stories of people in El Salvador and Guatemala where the office gets raided and the information gets in the hands of the government, whoever the opposition is, and then other people start disappearing and getting targeted too, because their identities are revealed in the information that gets seized. And that sounds like the very same pattern that you're still seeing.
HELEN ANDROMEDON: Yeah there's a lot to consider for that case. Uh, cloud saving, um, we have to see if there's somebody that can, there's somebody who can host their server. It's very, yeah, it's, it's interesting for that case.
CINDY COHN: Yeah. I think it's an ongoing issue and there are better tools than we had in the nineties, but people need to know about them and, and actually using them is not, it's not easy. It's, you, you have to actually think about it.
HELEN ANDROMEDON: Yeah, I, I don't know. I've seen a model that works, so if it's a tool, it's great. It's working well. I've seen it, uh, with I think the Tor project, because the, to project, has user communities. What it appears to be doing is engaging people with training, so doing safety trainings and then they get value from, from using your tool. because they get to have all this information, not only about your tool, but of safety. So that's a good model to build user communities and then get your tool used. I think this is also a problem.
CINDY COHN: Yeah. I mean, this is a, another traditional problem is that the trainers will come in and they'll do a training, but then nobody really is trained well enough to continue to use the tool.
And I see you, you know, building networks and building community and also having, you know, enough time for people to get familiar with and use these tools so that they won't just drop it after the training's over. It sounds like you're really thinking hard about that.
HELEN ANDROMEDON: Yeah. Um, yeah, I think that we have many opportunities and because the learning is so difficult to cultivate and we don't have the resources to make it long term. Um, so yes, you do risk having all the information forgotten. Yes.
JASON KELLEY: I wanna just quickly emphasize that some of the scenarios, Cindy, you've talked about, and Helen you just mentioned, I think a lot of: potential break-ins, harassment, kidnapping, and it's, it's really, it's awful, but I think this is one of the things that makes this kind of training so necessary. I know that this seems obvious to many people listening and, and to the folks here, but I think it's, it's really it. I. Just needs emphasized that these are serious issues. That, and that's why you can't make a one size fits all training because these are real problems that, you know, someone might not have to deal with in one country and they might have a regular problem with in another. Is there a kind of difference that you can just clarify about how you would train, for example, groups of women that are experiencing one thing when they, you know, need digital security advice or help versus let's say human rights defenders? Is the training completely different when you do that, or is it just really kind of emphasizing the same things about like protecting your privacy, protecting your data, using certain tools, things like that?
HELEN ANDROMEDON: Yeah. Jason, let me, let me first respond to your first comment about the tools. So one size fits all, obviously is wrong. Maybe get more people of diversity working on that tool and they'll give you their opinion because the development is a process. You don't just develop a tool - you have time to change, modify, test. Do I use that? Like if you had somebody like that in the room, they would tell you if you had two, that would be great because now you have two different points of evidence. And keep mixing. And then, um, I know it's like it's expensive. Like you have to do it one way and then get feedback, then do it another way. But I, I think just do more of that. Um, yeah. Um, how do I train? So the training isn't that different. There are some core concepts that we keep and then, so if it, if I had like five days, I would do like one or two days. The more technical, uh, concepts of digital safety, which everybody has to do, which is, look, this is my device, this is how it works, this is how I keep it safe. This is my account, this is how it works. This is how I keep it safe.
And then when you have more time, you can dive into the personas, let's say it's a journalist, so is there a resource for, and this is how then you pull a resource and then you show it is there a resource which identify specific tools developed for journalists? Oh, maybe there is, there is something that is like a panic button that one they need. So you then you start to put all these things together and in the remaining time you can kind of like hone into those differences.
Now for women, um, it would be … So if it's HRDs and it's mixed, I still would cover cyber harassment because it affects everyone. For women would, would be slightly different because maybe we could go into self-defense, we could go into how to deal, we could really hone into the finer points of responding to online harassment because for their their case, it's more likely because you did a threat model, it's more likely because of their agenda and because of the work that they do. So I think that would be how I would approach the two.
JASON KELLEY: And one, one quick thing that I just, I want to mention that you brought up earlier is, um, shared devices. There's a lot of, uh, solutionism in government, and especially right now with this sort of, assumption that if you just assume everyone has one device, if you just say everyone has their phone, everyone has their computer, you can, let's say, age verify people. You can say, well, kids who use this phone can't go to this website, and adults who use this other phone can go to this website. And this is a regular issue we've seen where there's not an awareness that people are buying secondhand devices a lot, people are sharing devices a lot.
HELEN ANDROMEDON: Yeah, absolutely. Shared devices is the assumption always. And then we do get a few people who have their own devices. So Jason, I just wanted to add one more factor that could be bad. Yeah. For the shared devices, because of the context, and the regions that I'm in, you have also the additional culture and religious norms, which sometimes makes it like you don't have liberty over your devices. So anybody at any one time, if they're your spouse or your parent, they can just take it from you, and demand that you let them in. So it's not necessarily that you could all have your own device, but the access to that device, it can be shared.
CINDY COHN: So as you look at the world of, kind of, tools that are available, where are the gaps? Where would you like to see better tools or different tools or tools at all, um, to help protect and empower the communities you work with?
HELEN ANDROMEDON: We need a solution for the internet shutdowns because, because sometimes it could have an, it could have health repercussions, you could have a need, a serious need, and you don't have access to the internet. So I don't know. We need to figure that one out. Um, the technology is there, as you mentioned earlier, before, but you know, it needs to be, like, more developed and tested. It would be nice to have technology that responds or gives victim advice. Now I've seen interventions. By case. Case by case. So many people are doing them now. Um, you, you know, you, you're right. They verify, then they help you with whatever. But that's a slow process.
Um, you're processing the information. It's very traumatic. So you need good advice. You need to stay calm, think through your options, and then make a plan, and then do the plan. So that's the kind of advice. Now I think there are apps because maybe I'm not using them or I don't, maybe that means they're not well known as of now.
Yeah. But that's technology I would like to see. Um, then also every, every, everything that is available. The good stuff. It's really good. It's really well written. It's getting better – more visuals, more videos, more human, um, more human like interaction, not that text. And mind you, I'm a huge fan of text, um, and like the GitHub text.
That's awesome. Um, but sometimes for just getting into the topic you need a different kind of, uh, ticket. So I don't know if we can invest in that, but the content is really good.
Practice would be nice. So we need practice. How do we get practice? That's a question I would leave to you. How do you practice a tool on your own? It's good for you, how do you practice it on your own? So it's things like that helping the, the person onboard, doing resources to help that transition. You want people to use it at scale.
JASON KELLEY: I wonder if you can talk a bit about that moment when you're training someone and you realize that they really get it. Maybe it's because it's fun, or maybe it's because they just sort of finally understand like, oh, that's how this works. Is that something, you know, I assume it's something you see a lot because you're clearly, you know, an experienced and successful teacher, but it's, it's just such a lovely moment when you're trying to teach someone
HELEN ANDROMEDON: when trying to teach someone something. Yeah, I mean, I can't speak for everybody, but I'll speak to myself. So there are some things that surprise me sitting in a class, in a workshop room, or reading a tutorial or watching how the internet works and reading about the cables, but also reading about electromagnetism. All those things were so different from, what were we talking about? Which is like how internet and civil society, all that stuff. But that thing, the science of it, the way it is, that should, for me, I think that it's enough because it's really great.
But then, um. So say we are, we are doing a session on how the internet works in relation to internet shutdowns. Is it enough to just talk about it? Are we jumping from problem to solution, or can we give some time? So that the person doesn't forget, can we give some time to explain the concept? Almost like moving their face away from the issue for a little bit and like, it's like a deception.
So let's talk about electromagnetism that you won't forget. Maybe you put two and two together about the cyber optic cables. Maybe you answer the correction, the, the right, uh, answer to a question in, at a talk. So it's, it's trying to make connections because we don't have that background. We don't have a tech background.
I just discovered Dungeons and Dragons at my age. So we don't have that tech liking tech, playing with it. We don't really have that, at least in my context. So get us there. Be sneaky, but get us there.
JASON KELLEY: You have to be a really good dungeon master. That's what I'm hearing. That's very good.
HELEN ANDROMEDON: yes.
CINDY COHN: I think that's wonderful and, and I agree with you about, like, bringing the joy, making it fun, and making it interesting on multiple levels, right?
You know, learning about the science as well as, you know, just how to do things that just can add a layer of connection for people that helps keep them engaged and keeps them in it. And also when stuff goes wrong, if you actually understand how it works under the hood, I think you're in a better position to decide what to do next too.
So you've gotta, you know, it not only makes it fun and interesting, it actually gives people a deeper level of understanding that can help 'em down the road.
HELEN ANDROMEDON: Yeah, I agree. Absolutely.
JASON KELLEY: Yeah, Helen, thanks so much for joining us – this has been really helpful and really fun.
Well, that was really fun and really useful for people I think, who are thinking about digital security and people who don't spend much time thinking about digital security, but maybe should start, um, something that she mentioned that, that, that you talked about, the Train the Trainer model, reminded me that we should mention our surveillance self-defense guides that, um, are available@ssd.ff.org.
That we talked about a little bit. They're a great resource as well as the Security Education companion website, which is security education companion.org.
Both of these are great things that came up and that people might want to check out.
CINDY COHN: Yeah, it's wonderful to hear someone like Helen, who's really out there in the field working with people, say that these guides help her. Uh, we try to be kind of the brain trust for people all over the world who are doing these trainings, but also make it easy if. If you're someone who's interested in learning how to do trainings, we have materials that'll help you get started. Um, and as, as we all know, we're in a time when more people are coming to us and other organizations seeking security help than ever before.
JASON KELLEY: Yeah, and unfortunately there's less resources now, so I think we, you know, in terms of funding, right, there's less resources in terms of funding. So it's important that people have access to these kinds of guides, and that was something that we talked about that kind of surprised me. Helen was really, I think, optimistic about the funding cuts, not obviously about them themselves, but about what the opportunities for growth could be because of them.
CINDY COHN: Yeah, I think this really is what resilience sounds like, right? You know, you get handed a situation in which you lose, you know, a lot of the funding support that you're gonna do, and she's used to pivoting and she pivots towards, you know, okay, these are the opportunities for us to grow, for us to, to build new baselines for the work that we do. And I really believe she's gonna do that. The attitude just shines through in the way that she approaches adversity.
JASON KELLEY: Yeah. Yeah. And I really loved, while we're thinking about the, the parts that we're gonna take away from this, I really loved the way she brought up the need for people to feel ownership of the online world. Now, she was talking about infrastructure specifically in that moment, but this is something that's come up quite a bit in our conversations with people.
CINDY COHN: Yeah, her framing of how important the internet is to people all around the world, you know, the work that our friends at Access now and others do with the Keep It On Coalition to try to make sure that the internet doesn't go down. She really gave a feeling for like just how vital and important the internet is, for people all over the world.
JASON KELLEY: Yeah. And even though, you know, some of these conversations were a little bleak in the sense of, you know, protecting yourself from potentially bad things, I was really struck by how she sort of makes it fun in the training and sort of thinking about, you know, how to get people to memorize things. She mentioned magnetism and fiber optics, and just like the science behind it. And it really made me, uh, think more carefully about how I'm gonna talk about certain aspects of security and, and privacy, because she really gets, I think, after years of training what sticks in people's mind.
CINDY COHN: I think that's just so important. I think that people like Helen are this really important kind of connective tissue between the people who are deep in the technology and the people who need it. And you know that this is its own skill and she just, she embodies it. And of course, the joy she brings really makes it alive.
JASON KELLEY: And that's our episode for today. Thanks so much for joining us. If you have feedback or suggestions, we'd love to hear from you. Visit ff.org/podcast and click on listen or feedback. And while you're there, you can become a member and donate, maybe even pick up some of the merch and just see what's happening in digital rights this week and every week.
Our theme music is by Nat Keefe of Beat Mower with Reed Mathis, and How to Fix the Internet is supported by the Alfred Peace Loan Foundation's program and public understanding of science and technology. We'll see you next time. I'm Jason Kelly.
CINDY COHN: And I'm Cindy Cohn.
MUSIC CREDITS: This podcast is licensed creative commons attribution 4.0 international, and includes the following music licensed creative commons attribution 3.0 unported by its creators: Drops of H2O, The Filtered Water Treatment by Jay Lang. Sound design, additional music and theme remixes by Gaetan Harris.
How to more efficiently study complex treatment interactions
MIT researchers have developed a new theoretical framework for studying the mechanisms of treatment interactions. Their approach allows scientists to efficiently estimate how combinations of treatments will affect a group of units, such as cells, enabling a researcher to perform fewer costly experiments while gathering more accurate data.
As an example, to study how interconnected genes affect cancer cell growth, a biologist might need to use a combination of treatments to target multiple genes at once. But because there could be billions of potential combinations for each round of the experiment, choosing a subset of combinations to test might bias the data their experiment generates.
In contrast, the new framework considers the scenario where the user can efficiently design an unbiased experiment by assigning all treatments in parallel, and can control the outcome by adjusting the rate of each treatment.
The MIT researchers theoretically proved a near-optimal strategy in this framework and performed a series of simulations to test it in a multiround experiment. Their method minimized the error rate in each instance.
This technique could someday help scientists better understand disease mechanisms and develop new medicines to treat cancer or genetic disorders.
“We’ve introduced a concept people can think more about as they study the optimal way to select combinatorial treatments at each round of an experiment. Our hope is this can someday be used to solve biologically relevant questions,” says graduate student Jiaqi Zhang, an Eric and Wendy Schmidt Center Fellow and co-lead author of a paper on this experimental design framework.
She is joined on the paper by co-lead author Divya Shyamal, an MIT undergraduate; and senior author Caroline Uhler, the Andrew and Erna Viterbi Professor of Engineering in EECS and the MIT Institute for Data, Systems, and Society (IDSS), who is also director of the Eric and Wendy Schmidt Center and a researcher at MIT’s Laboratory for Information and Decision Systems (LIDS). The research was recently presented at the International Conference on Machine Learning.
Simultaneous treatments
Treatments can interact with each other in complex ways. For instance, a scientist trying to determine whether a certain gene contributes to a particular disease symptom may have to target several genes simultaneously to study the effects.
To do this, scientists use what are known as combinatorial perturbations, where they apply multiple treatments at once to the same group of cells.
“Combinatorial perturbations will give you a high-level network of how different genes interact, which provides an understanding of how a cell functions,” Zhang explains.
Since genetic experiments are costly and time-consuming, the scientist aims to select the best subset of treatment combinations to test, which is a steep challenge due to the huge number of possibilities.
Picking a suboptimal subset can generate biased results by focusing only on combinations the user selected in advance.
The MIT researchers approached this problem differently by looking at a probabilistic framework. Instead of focusing on a selected subset, each unit randomly takes up combinations of treatments based on user-specified dosage levels for each treatment.
The user sets dosage levels based on the goal of their experiment — perhaps this scientist wants to study the effects of four different drugs on cell growth. The probabilistic approach generates less biased data because it does not restrict the experiment to a predetermined subset of treatments.
The dosage levels are like probabilities, and each cell receives a random combination of treatments. If the user sets a high dosage, it is more likely most of the cells will take up that treatment. A smaller subset of cells will take up that treatment if the dosage is low.
“From there, the question is how do we design the dosages so that we can estimate the outcomes as accurately as possible? This is where our theory comes in,” Shyamal adds.
Their theoretical framework shows the best way to design these dosages so one can learn the most about the characteristic or trait they are studying.
After each round of the experiment, the user collects the results and feeds those back into the experimental framework. It will output the ideal dosage strategy for the next round, and so on, actively adapting the strategy over multiple rounds.
Optimizing dosages, minimizing error
The researchers proved their theoretical approach generates optimal dosages, even when the dosage levels are affected by a limited supply of treatments or when noise in the experimental outcomes varies at each round.
In simulations, this new approach had the lowest error rate when comparing estimated and actual outcomes of multiround experiments, outperforming two baseline methods.
In the future, the researchers want to enhance their experimental framework to consider interference between units and the fact that certain treatments can lead to selection bias. They would also like to apply this technique in a real experimental setting.
“This is a new approach to a very interesting problem that is hard to solve. Now, with this new framework in hand, we can think more about the best way to design experiments for many different applications,” Zhang says.
This research is funded, in part, by the Advanced Undergraduate Research Opportunities Program at MIT, Apple, the National Institutes of Health, the Office of Naval Research, the Department of Energy, the Eric and Wendy Schmidt Center at the Broad Institute, and a Simons Investigator Award.
Connect or reject: Extensive rewiring builds binocular vision in the brain
Scientists have long known that the brain’s visual system isn’t fully hardwired from the start — it becomes refined by what babies see — but the authors of a new MIT study still weren’t prepared for the degree of rewiring they observed when they took a first-ever look at the process in mice as it happened in real-time.
As the researchers in The Picower Institute for Learning and Memory tracked hundreds of “spine” structures housing individual network connections, or “synapses,” on the dendrite branches of neurons in the visual cortex over 10 days, they saw that only 40 percent of the ones that started the process survived. Refining binocular vision (integrating input from both eyes) required numerous additions and removals of spines along the dendrites to establish an eventual set of connections.
Former graduate student Katya Tsimring led the study, published this month in Nature Communications, which the team says is the first in which scientists tracked the same connections all the way through the “critical period,” when binocular vision becomes refined.
“What Katya was able to do is to image the same dendrites on the same neurons repeatedly over 10 days in the same live mouse through a critical period of development, to ask, what happens to the synapses or spines on them?,” says senior author Mriganka Sur, the Paul and Lilah Newton Professor in the Picower Institute and MIT’s Department of Brain and Cognitive Sciences. “We were surprised by how much change there is.”
Extensive turnover
In the experiments, young mice watched as black-and-white gratings with lines of specific orientations and directions of movement drifted across their field of view. At the same time, the scientists observed both the structure and activity of the neurons’ main body (or “soma”) and of the spines along their dendrites. By tracking the structure of 793 dendritic spines on 14 neurons at roughly Day 1, Day 5 and Day 10 of the critical period, they could quantify the addition and loss of the spines, and therefore the synaptic connections they housed. And by tracking their activity at the same time, they could quantify the visual information the neurons received at each synaptic connection. For example, a spine might respond to one specific orientation or direction of grating, several orientations, or might not respond at all. Finally, by relating a spine’s structural changes across the critical period to its activity, they sought to uncover the process by which synaptic turnover refined binocular vision.
Structurally, the researchers saw that 32 percent of the spines evident on Day 1 were gone by Day 5, and that 24 percent of the spines apparent on Day 5 had been added since Day 1. The period between Day 5 and Day 10 showed similar turnover: 27 percent were eliminated, but 24 percent were added. Overall, only 40 percent of the spines seen on Day 1 were still there on Day 10.
Meanwhile, only four of the 13 neurons they were tracking that responded to visual stimuli still responded on Day 10. The scientists don’t know for sure why the other nine stopped responding, at least to the stimuli they once responded to, but it’s likely they now served a different function.
What are the rules?
Having beheld this extensive wiring and rewiring, the scientists then asked what entitled some spines to survive over the 10-day critical period.
Previous studies have shown that the first inputs to reach binocular visual cortex neurons are from the “contralateral” eye on the opposite side of the head (so in the left hemisphere, the right eye’s inputs get there first), Sur says. These inputs drive a neuron’s soma to respond to specific visual properties such as the orientation of a line — for instance, a 45-degree diagonal. By the time the critical period starts, inputs from the “ipsilateral” eye on the same side of the head begin joining the race to visual cortex neurons, enabling some to become binocular.
It’s no accident that many visual cortex neurons are tuned to lines of different directions in the field of view, Sur says.
“The world is made up of oriented line segments,” Sur notes. “They may be long line segments; they may be short line segments. But the world is not just amorphous globs with hazy boundaries. Objects in the world — trees, the ground, horizons, blades of grass, tables, chairs — are bounded by little line segments.”
Because the researchers were tracking activity at the spines, they could see how often they were active and what orientation triggered that activity. As the data accumulated, they saw that spines were more likely to endure if (a) they were more active, and (b) they responded to the same orientation as the one the soma preferred. Notably, spines that responded to both eyes were more active than spines that responded to just one, meaning binocular spines were more likely to survive than non-binocular ones.
“This observation provides compelling evidence for the ‘use it or lose it’ hypothesis,” says Tsimring. “The more active a spine was, the more likely it was to be retained during development.”
The researchers also noticed another trend. Across the 10 days, clusters emerged along the dendrites in which neighboring spines were increasingly likely to be active at the same time. Other studies have shown that by clustering together, spines are able to combine their activity to be greater than they would be in isolation.
By these rules, over the course of the critical period, neurons apparently refined their role in binocular vision by selectively retaining inputs that reinforced their budding orientation preferences, both via their volume of activity (a synaptic property called “Hebbian plasticity”) and their correlation with their neighbors (a property called “heterosynaptic plasticity”). To confirm that these rules were enough to produce the outcomes they were seeing under the microscope, they built a computer model of a neuron, and indeed the model recapitulated the same trends as what they saw in the mice.
“Both mechanisms are necessary during the critical period to drive the turnover of spines that are misaligned to the soma and to neighboring spine pairs,” the researchers wrote, “which ultimately leads to refinement of [binocular] responses such as orientation matching between the two eyes.”
In addition to Tsimring and Sur, the paper’s other authors are Kyle Jenks, Claudia Cusseddu, Greggory Heller, Jacque Pak Kan Ip, and Julijana Gjorgjieva. Funding sources for the research came from the National Institutes of Health, The Picower Institute for Learning and Memory, and the Freedom Together Foundation.
Despite Supreme Court Setback, EFF Fights On Against Online Age Mandates
The Supreme Court’s recent decision in Free Speech Coalition v. Paxton did not end the legal debate over age-verification mandates for websites. Instead, it’s a limited decision: the court’s legal reasoning only applies to age restrictions on sexual materials that minors do not have a legal right to access. Although the ruling reverses decades of First Amendment protections for adults to access lawful speech online, the decision does not allow states or the federal government to impose broader age-verification mandates on social media, general audience websites, or app stores.
At EFF, we continue to fight age-verification mandates in the many other contexts in which we see them throughout the country and the world. These “age gates” remain a threat to the free speech and privacy rights of both adults and minors.
Importantly, the Supreme Court’s decision does not approve of age gates when they are imposed on speech that is legal for minors and adults.
The court’s legal reasoning in Free Speech Coalition v. Paxton depends in all relevant parts on the Texas law only blocking minors’ access to speech to which they had no First Amendment right to access in the first place—what has been known since 1968 as “harmful to minors” sexual material. Although laws that limit access to certain subject matters are typically required to survive “strict scrutiny,” the Texas law was subject instead to the less demanding “intermediate scrutiny” only because the law was denying minors access to this speech that was unprotected for them. The Court acknowledged that having to prove age would create an obstacle for adults to access speech that is protected for them. But this obstacle was merely “incidental” to the lawful restriction on minors’ access. And “incidental” restrictions on protected speech need only survive intermediate scrutiny.
To be clear, we do not agree with this result, and vigorously fought against it. The Court wrongly downplayed the very real and significant burdens that age verification places on adults. And we disagree with numerous other doctrinal aspects of the Court’s decision. The court had previously recognized that age-verification schemes significantly burden adult’s First Amendment rights and had protected adults’ constitutional rights. So Paxton is a significant loss of internet users’ free speech rights and a marked retreat from the court’s protections for online speech.
The decision does not allow states or the federal government to impose broader age-verification mandates
But the decision is limited to the specific context in which the law seeks to restrict access to sexual materials. The Texas law avoided strict scrutiny only because it directly targeted speech that is unprotected as to minors. You can see this throughout the opinion:
- The foundation of the Court’s decision was the history, tradition, and precedent that allows states to “prevent children from accessing speech that is obscene to children, rather than a more generalized concern for child welfare.
- The Court’s entire ruling rested on its finding that “no person – adult or child –has a First Amendment right to access speech that is obscene to minors without first submitting proof of age.”
- The Court explained that “because the First Amendment permits States to prohibit minors from accessing speech that is obscene to them, it likewise permits States to employ the ordinary and appropriate means of enforcing such a prohibition.” The permissibility of the age verification requirement was thus dependent on the unprotected nature of the speech.
- The only reason the law could be justified without reference to protected speech, a requirement for a content-neutral law subject to only intermediate scrutiny, is that it did not “regulate the content of protected speech” either “‘on its face’ or in its justification.” As the Court explained, “where the speech in question is unprotected, States may impose “restrictions” based on “content” without triggering strict scrutiny.”
- Intermediate scrutiny was applied only because “[a]ny burden experienced by adults is therefore only incidental to the statute's regulation of activity that is not protected by the First Amendment.”
- But strict scrutiny remains “the standard for reviewing the direct targeting of fully protected speech.”
There is only sentence in Free Speech Coalition v. Paxton addressing the restriction of First Amendment rights that is not cabined by the language of unprotected harmful to minors speech. The Court wrote: “And, the statute does not ban adults from accessing this material; it simply requires them to verify their age before accessing it on a covered website.” But that sentence was entirely surrounded by and necessarily referred to the limited situation of a law burdening only access to harmful to minors sexual speech.
We and the others fighting online age restrictions still have our work cut out for us. The momentum to widely adopt and normalize online age restrictions is strong. But Free Speech Coalition v. Paxton did not approve of age gates when they are imposed on speech that adults and minors have a legal right to access. And EFF will continue to fight for all internet users’ rights to speak and receive information online.
Professor Emeritus Daniel Kleppner, highly influential atomic physicist, dies at 92
Daniel Kleppner, the Lester Wolfe Professor Emeritus of Physics at MIT whose work in experimental atomic physics made an immense mark on the field, died on June 16 at the age of 92, in Palo Alto, California.
Kleppner’s varied research examined the interactions of atoms with static electric and magnetic fields and radiation. His work included creating precision measurements with hydrogen masers, including the co-invention of the hydrogen maser atomic clock; his research into the physics of Rydberg atoms and cavity quantum electrodynamics; and his pioneering work in Bose-Einstein condensation (BEC).
Kleppner, who retired in 2003 after 37 years at MIT, was a highly literate and articulate scientist whose exacting research and communication skills helped set the direction of modern atomic, molecular, and optical (AMO) physics. From 1987 to 2000, he was associate director of the MIT Research Laboratory of Electronics (RLE), and served as interim director in 2001. He also co-founded the MIT-Harvard Center for Ultracold Atoms (CUA) in 2000, where he was co-director until 2006.
While he was never awarded a Nobel Prize, Kleppner's impact on the field of atomic physics and quantum optics, and his generous mentorship, enabled the Nobel achievements of many others. His patient and exacting pursuit of discovery led to basic research insights that led to major achievements. His extensive research into the tiny atom provided the fundamental knowledge necessary for the huge: the eventual development of groundbreaking technologies such as the global positioning system (GPS), magnetic resonance imaging (MRI), and quantum computing.
“He was a leader in the department, and a leader in the American Physical Society,” says Wolfgang Ketterle, the John D. MacArthur Professor of Physics at MIT and a 2001 Nobel laureate. “He was a statesman of science. He was this eloquent person, this master of words who could express things in memorable ways, and at the same time he has this sense of humility.”
“Dan Kleppner was a giant in the area of AMO physics, and in science more broadly,” says John Doyle PhD ’91, Harvard Quantum Initiative co-director and Kleppner advisee who helped Kleppner create the Bose-Einstein condensate from atomic hydrogen. “Perhaps his most impactful legacy is leading a culture of respect and supportive community actions that all scientists in the area of AMO physics enjoy today. Not only did his science lay the path for current research directions, his kindness, erudition, and commitment to community — and community service — are now ever-expanding waves that guide AMO physics. He was a mentor and friend to me."
Kleppner’s daughter Sofie Kleppner notes: “People who worked on early lasers never imagined we would be scanning groceries at the checkout counter. When they developed the hydrogen maser, they were a bunch of nerdy people who really wanted to understand Einstein’s theory of relativity. This was the basis for GPS, this is how our flights run on time. Our dad was convinced that basic research today could lead to all sorts of valuable things down the road.”
Early life and career
Born in Manhattan on Dec. 16, 1932, Kleppner was the son of Vienna native and advertising agency founder Otto Kleppner, who wrote the best-selling book “Advertising Procedure.” His mother, Beatrice (Taub) Kleppner, grew up in New Jersey and was a graduate of Barnard College. She helped with Otto’s manuscripts. Daniel Kleppner was the second of three siblings; his brother, the late Adam Kleppner, was a professor of mathematics at the University of Maryland, and his sister, Susan Folkman, was a research psychologist at the University of California at Berkeley.
“As a teenager, I just liked building things,” Kleppner once said. “And that turned out to be very useful when I went on to become an experimental physicist. I had a crystal radio, so I could listen to the radio over earphones. And the thought that the signals were just coming out of the atmosphere, I remember thinking: totally remarkable. And actually, I still do. In fact, the idea of the electromagnetic field, although it’s very well understood in physics, always seems like a miracle to me.”
In high school, he was inspired by his physics teacher, Arthur Hussey, who allowed Kleppner to work all hours in the labs. “There was one time when the whole school was having a pep rally, and I wasn’t that interested in cheering football, so I stayed up and worked in the lab, and the high school principal noticed that I was in there and called me in and gave me a dressing down for lack of school spirit.”
He didn’t care. Hussey talked with Kleppner about quantum mechanics, and “that sort of put a bee in my bonnet on that,” and taught him a little calculus. “In those years, physics was extremely fashionable. These were the post-war years, and physicists were considered heroes for having brought the war to conclusion with the atom bomb, and … the development of radar.”
He knew by then that he was “destined to spend a life in physics,” he said in a video interview for InfiniteMIT. “It was an easy era to become delighted by physics, and I was.”
Studying physics at Williams College, he was drawn to Albert Einstein’s theory of general relativity. He built a programmable machine that he called a forerunner of cybernetics. Williams also instilled in him a lifelong love of literature, and he almost became an English major. However, he didn’t appreciate what he called the school fraternities’ “playboy” and “anti-intellectual” atmosphere, and worked to graduate quickly within three years, in 1953.
He deferred his acceptance to Harvard University with a Fulbright Fellowship to Cambridge University, where he met the young physicist Kenneth Smith, whose research was with atomic beam resonance. Smith introduced him to the book “Nuclear Moments,” by Harvard professor Norman Ramsey, and presented a proposal by Ramsey’s advisor I.I. Rabi, who invented a technique that could make an atomic clock so precise “that you could see the effect of gravity on time that Einstein predicted,” said Kleppner.
“I found that utterly astonishing,” Kleppner noted. “The thought that gravity affects time: I had a hard time just visualizing that.”
When Kleppner wandered Harvard’s halls in 1955, he was excited to see a door with Ramsey’s name on it. He was interested in Ramsey’s research on molecular beam magnetic resonance, atomic clocks, and precision measurements. “Fortunately, I came along at a time when he had an opening in his research group,” Kleppner recalled.
A new atomic clock
As Kleppner’s advisor, Ramsey encouraged him to create a new type of atomic clock, believing that cesium and ammonia masers, a technology of amplified microwaves, were not precise enough to measure the effect of gravity on time.
Kleppner’s thesis was on using the concepts behind an ammonia maser to advance toward a hydrogen maser, which uses the natural microwave frequency of hydrogen atoms and amplifies it through stimulated emission of radiation. Kleppner discovered that coherent cesium atoms can bounce from properly prepared surfaces without losing their coherence.
After his 1959 PhD, Kleppner stayed on at Harvard, becoming an assistant professor in 1962.
Kleppner’s research on hydrogen led to a method to keep hydrogen atoms locked in a glass container for study over a longer period of time. The result, featuring hydrogen atoms bouncing within a microwave cavity, is used to stabilize the frequency of a clock to a precision better than one microsecond in a year.
In 1960, he and Ramsey successfully created a new atomic clock whose significant stability could confirm the minute effects of gravity on time, as predicted by Einstein’s theory of general relativity.
The current generation of optical clocks “are good enough to see the gravitational red shift for a few centimeters in height, so that’s quite extraordinary, and it’s had an extraordinary result,” said Kleppner. “We got to rethink just what we mean by time.”
While the hydrogen maser did verify Einstein’s conjecture about time and gravity, it took more than a decade before being widely used, at first by radio astronomers. Today, atomic clocks such as the hydrogen maser are used in applications requiring high short-term stability, such as the synchronization of ground-based timing systems that track global positioning satellites, for timekeeping and communication by naval observatories to maintain a precise and stable time reference known as UTC (USNO); very long-baseline microwave interferometry (VLBI) that enables astronomers to achieve very high resolution and study distant radio sources, including black holes; and, indirectly, in magnetic resonance imaging.
“When we first set out to make these atomic clocks, our goals were about the least practical you can think of,” Kleppner said in an interview with the MIT Physics Department. “From being a rather abstract idea that you’d like to somehow witness, it becomes a very urgent thing for the conduct of human affairs.”
Ramsey went on to win the Nobel Prize in Physics in 1989 for his work on the separated oscillatory fields method and its application in the hydrogen maser and atomic clocks.
MIT, ultracold gases, and BEC advancements
Kleppner figured he wouldn’t get tenure at Harvard, “because no matter how generous and good-spirited Norman was, he casts a long shadow, and it was good for me to be at just the right distance. When I came to MIT, I had a pallet of experiments that I wanted to pursue, and some ideas about teaching that I wanted to pursue, and the transition was very simple.”
Kleppner joined the Institute in 1966, and his Harvard PhD student (and current MIT professor post-tenure) David Pritchard followed him, to work on scattering experiments: Kleppner worked with pulsed lasers, and Pritchard with continuous-wave (CW) lasers.
“He was young, he was verbal, and he seemed to have new ideas about what to do,” says Pritchard. “We foresaw how important lasers would become. For a long time, it was just Dan and myself. That was actually the era in which lasers took over. Dan and I started off, we both got into lasers, and he did Rydberg atoms, and I did collisions and spectroscopy of weakly bound molecules and two-photon spectroscopy.”
Kleppner led the tiny MIT Atomic Physics Group to eventually become the US News and World Report’s No. 1 nationally ranked atomic physics group in 2012. “Dan was the leader on this,” recalled Pritchard. “To start from non-tenure and build it into the number-one ranked department in your subfield, that’s a lifetime achievement.”
The group became what Pritchard called “the supergroup” of laser developers that included Charles Townes, who won the Nobel for his work; Ali Javan, who established a major laser research center at MIT; and Dolly Shibles. Pritchard joined the faculty in 1970, and Ketterle joined in 1990 as his postdoc. “We were pioneers, and the result was of course that our total group had a bigger impact.”
“He’s not just the father figure of the field, he is my scientific father,” says Pritchard. “When I’m writing something and it’s not going very well, I would sort of think to myself, ‘What would Dan say? What would he advise you?”
With MIT low-temperature physicist Tom Greytak ’63, PhD ’67, Kleppner developed two revolutionary techniques — magnetic trapping and evaporative cooling. When the scientific community combined these techniques with laser cooling, atomic physics went into a major new direction.
In 1995, a group of researchers, led by Kleppner's former students Eric Cornell PhD ’90 and Carl Weiman ’73, made a BEC using rubidium atoms, and Ketterle succeeded with sodium atoms. For this achievement, they received the 2001 Nobel Prize in Physics. Kleppner called BEC “the most exciting advance in atomic physics for decades.”
At a conference on BEC in 1996, Ketterle recalls Kleppner describing his own contributions: “'I feel like Moses, who showed his people the Holy Land, but he never reached it himself.' This was exactly what Dan did. He showed us the Holy Land of Bose-Einstein condensation. He showed us what is possible … He was the godfather of Bose-Einstein condensation.”
But he did reach the Holy Land. In 1998, when only a few groups had been able to create BECs, Kleppner and Greytak realized a hydrogen BEC. When he presented their work at the summer school in Varenna soon afterward, he received a long-lasting standing ovation — after 20 years of hard work, he had reached his goal.
“It is an irony that when Dan started this work, hydrogen was the only choice to reach the low temperatures for BEC,” says Ketterle. But in the end, it turned out that hydrogen has special properties that made it much harder to reach BEC than with other atoms.
Rydberg atoms
In 1976, Kleppner pioneered the field of Rydberg atoms, a highly excited atom that shares the simple properties that characterize hydrogen. Kleppner showed that these states could be excited by a tunable laser and easily detected with field ionization. He then mapped out their response in high electric and magnetic fields, which he used to provide new physical insights into the connections between quantum mechanics and classical chaos.
In 1989, his research into atomic energy levels, under conditions where the corresponding classical motion is chaotic, mapped out the positions of thousands of quantum levels as a function of laser frequency and applied field using high-resolution laser spectroscopy. His observations gave new physical insight into the implications of classical chaos on quantum systems.
“I see Dan as being the inventor of Rydberg atoms,” says Dan’s former student William Phillips PhD ’76, physicist at the Institute of Standards and Technology (NIST). “Of course, Rydberg atoms is something that nature gives you, but Dan was the one who really understood this was something that you could use to do really new and wonderful things.”
Such atoms have proved to be useful for studying the transition between quantum mechanics and classical chaos. Kleppner’s 1976 paper on Rydberg atoms’ strong interactions, long lifetimes, and sensitivity to external fields has led to current scientific research and multimillion-dollar startups interested in developing the promising Rydberg quantum computer; highly accurate measurements of electric and magnetic fields; and in quantum optics experiments.
“Largely due to Dan’s seminal roadmap, Rydberg atoms have become atomic physics’ E. coli for investigating the interaction of radiation with matter,” wrote Ketterle in his nomination for Kleppner’s 2017 APS Medal for Exceptional Achievement in Research. “They are being used by others in quests for experimental systems to realize Schrödinger’s cat, as well as for making a quantum computer.”
In 1981, Kleppner suggested in a theoretical paper the possibility of suppressing spontaneous emission with a cavity: excited atoms cannot decay when the cavity lacks the oscillatory modes to receive their emissions. This was followed by his demonstration of this effect, and launched the field of cavity quantum electrodynamics (cQED), the study of how light confined within a reflective cavity interacts with atoms or other particles. This field has led to the creation of new lasers and photonic devices.
“This work fundamentally changed the way physicists regard the process of spontaneous emission by showing that it is not a fixed property of a quantum state, but can be modified and controlled,” said Ketterle. “Current applications of these principles, which Dan terms ‘wrecking the vacuum,’ include thresholdless lasers and the construction of photonic bandgap materials in which light propagation is forbidden at certain frequencies.”
MIT-Harvard Center for Ultracold Atoms
In 2000, Kleppner secured National Science Foundation funding to co-found the Center for Ultracold Atoms (CUA), an MIT-Harvard collaboration that linked RLE with the Harvard Department of Physics to explore the physics of ultracold atoms and quantum gases. Kleppner served as its first director until 2006, and was a member of a group that included MIT professors Ketterle, Pritchard, Vladan Vuletic, Martin W. Zwierlein, Paola Cappellaro PhD ’06, and Isaac Chuang ’90.
“Many centers disappear after 10 to 20 years; sometimes their mission is fulfilled,” says Ketterle, the CUA director from 2006 to 2023. “But given the excitement and the rapid evolution in atomic physics, the CUA is a super-active center brimming with excitement, and we just recently got renewed. That’s partially due to the efforts of Dan. He created the tradition of atomic physics at MIT. We are one of the best atomic physics groups in the world. And we are really a family.”
Boost-phase intercept report
Kleppner co-authored a highly influential 2003 report that examined the technical feasibility of boost-phase intercept, a concept central to President George H.W. Bush’s proposed controversial Strategic Defense Initiative (SDI), nicknamed "Star Wars,” which purportedly would render nuclear weapons obsolete. The focus of the APS Study on Boost-Phase Intercept for National Missile Defense, published as a special supplement to Reviews of Modern Physics, was on the physics and engineering challenges of intercepting a missile during its boost phase.
“This was a subject on which I had no technical background at all,” Kleppner recalled, so he expressed gratitude for the skills of co-chair Fred Lamb of the University of Illinois. “But the APS [American Physical Society] felt that it was important to have information for the public … and no one knew anything about it. It was the point in my life where I could do that. And I feel that you have an obligation when the need arises and you can do it, to do that.”
The result? “Technically, it really would not succeed, except in very limited circumstances,” Kleppner said. Added Pritchard, “It vastly changed the path of the nation.”
“He was the perfect person to chair the committee,” says Ketterle. “He excelled in being neutral and unbiased, and to create a no-nonsense report. I think the APS was very proud of this report. It shows how physicists analyze something which was at that moment of immense political and societal importance. This report helped to understand what laser weapons cannot do and what they can do. The fact that (SDI) eventually, slowly, disappeared, the report may have contributed to that.”
Dedicated educator
Kleppner trained generations of physicists, including as advisor to 23 PhD students who have gone on to attain positions in major universities and achieve major scientific awards.
He was awarded the Oersted Medal of the American Association of Physics Teachers in 1997, and earned the Institute’s prestigious 1995-1996 James R. Killian, Jr. Faculty Achievement Award for his service to MIT and society on behalf of atomic physics. “He has given generously of his time and effort to the formation of national science policy, and he has served the Institute with distinction as teacher, administrator and counselor,” the Killian committee wrote.
Kleppner and Ramsey wrote the widely used text “Quick Calculus” in 1972 — the third edition of the book was updated in 2022 edition with MIT Department of Physics’ Peter Dourmashkin. With Robert J. Kolenkow, Kleppner also wrote “An Introduction to Mechanics” in 1973, and its second edition in 2013. Physics department head Deepto Chakrabarty ’88 called it “a masterpiece:” “It has formed the foundation of our freshman 8.012 course for potential physics majors for over 50 years and has provided a deep, elegant, and mathematically sophisticated introduction to classical mechanics of physics majors across the U.S. It was my own introduction to serious physics as an MIT freshman in 1984.”
Recently, while Kleppner was being wheeled into surgery, one of the medical personnel noticed that his patient was the author of that book and blurted out, “Oh my God, I still am wondering about one of those problems that I found so difficult,” recalls his wife, Bea, laughing.
Kleppner called his method of teaching “an engagement with the students and with the subject.” He said that his role model for teaching was his wife, who taught psychology at Beaver Country Day High School. “Fortunately, at MIT, the students are so great. There’s nothing tough about teaching here, except trying to stay ahead of the students.”
He leaves a legacy of grateful physicists impacted by his generous teaching style.
“I’ve always felt that I’ve just been incredibly lucky to be part of Dan’s group,” says Phillips, who was at Princeton when his research into magnetic resonance caught Kleppner’s attention, and invited him to MIT. “Dan extended this idea to putting this hydrogen maser in a much higher magnetic field. Not that many people are trained by somebody like Dan Kleppner in the art of precision measurement.”
Kleppner also gifted Phillips an apparatus he built for his thesis, which shaved years off the laser cooling experiments that led to Phillips’ Nobel.
Ketterle credited Kleppner’s mentorship for his career at MIT. “He was an older, experienced person who believed in me. He had more trust in me than I had initially myself. I felt whenever I was at a crossroads, I could go to Dan and ask him for advice. When I gave him a paper to edit … there was red ink all over it, but he was absolutely right on almost everything.’”
In 2003, Kleppner was dismayed at the statistic that over 60 percent of middle and high school teachers teaching physics have no background in the subject. He started the CUA’s Teaching Opportunities in Physical Science summer program with his then-postdoc Ted Ducas to train physics majors to prepare and teach physics material to middle and high school students. In its 14-year run, they worked with 112 students.
According to Ducas, one survey “indicates over 60 percent of our undergraduates have gone into, or plan to go into, pre-college teaching — a higher percentage than expected, because physics majors have so many other career opportunities often paying significantly more. The potential positive impact of that number of highly qualified and motivated teachers is dramatic.”
Kleppner also partnered with Japanese mathematician Heisuke Hironaka on the mentoring program Japanese Association for Mathematical Sciences (JAMS), which connected American college science students with their Japanese counterparts. “His interest in ensuring that future generations also see the value of international communities was reflected in JAMS,” says Sofie Kleppner.
Recognitions and public service
Kleppner was promoted to professor in 1974 and headed the physics department’s Division of Atomic, Plasma and Condensed Matter Physics from 1976 to 1979. He was named the Lester Wolfe Professor of Physics in 1985.
Active in the interface between physics and public policy, he served on more than 30 committees. For the APS, he was on the Panel on Public Affairs (POPA), chaired the Physics Planning Committee and the Division of Atomic, Molecular and Optical Physics, and contributed to a study on the growth and mentorship of young physics professors. He chaired a report for the National Academy of Sciences on atomic physics that he presented on various congressional committees, served on the National Research Council's Physics Survey Committee, and was chair of the International Union of Pure and Applied Physics’ Commission on Atomic and Molecular Physics. At MIT, he was also an ombuds of the Physics Department.
Kleppner was a fellow of the American Academy of Arts and Sciences, American Association for the Advancement of Science, OSA (now Optica), French Academy of Sciences, and the American Philosophical Society; a member of the National Academy of Sciences; and a Phi Beta Kappa lecturer.
His interest in literature at Williams bloomed into a secondary career as a writer, including decades of writing witty and insightful, yet accessible, pieces for Physics Today, including his “Reference Frame” columns on physics history and policy.
Kleppner was a recipient of many awards, including the prestigious Wolf Prize in 2005 “for groundbreaking work in atomic physics of hydrogenic systems, including research on the hydrogen maser, Rydberg atoms, and Bose-Einstein condensation.” Other accolades include a 2014 Benjamin Franklin Medal and a 2006 National Medal of Science, presented by U.S. President George W. Bush. He also received the Frederic Ives Medal (2007), the William F. Meggers Award (1991), the Lilienfeld Prize (1991), and the Davisson-Germer Prize (1986).
His articles, congressional testimony, and advocating on behalf of physicists around the world at one point inspired his Physics Planning Committee colleagues to present him with a Little League trophy of a golden baseball player, with the inscription “Dan Kleppner — Who Went to Bat for Atomic Physics.”
Kleppner said that he was inspired by his mentor, Ramsey, to get involved in the scientific community. “It’s a privilege to be a scientist in this country,” said Kleppner. “And I think that one has some obligation to pay for the privilege, when you can.”
He wrote, “Any scenario for a decent future of our nation and the world must include a reasonable component of science that is devoted to the search for new knowledge. We cannot afford to abandon this vision under a barrage of criticism, no matter how eloquent or powerful the critics.”
Family and retired life
Kleppner met his future wife, Beatrice Spencer, in 1954 on the USS United States, when both were England-bound and in their second year of studying at Cambridge. They began as friends, and eventually married in 1958, in Ipswich, Massachusetts. They raised their three children, Sofie, Paul, and Andrew, at their home in Belmont, Massachusetts, and their vacation home in Vermont.
Kleppner’s family described him as an optimist who didn’t believe in lying, worrying, or unethical behavior. He and Bea generously invited into their home anyone in need. “When we were growing up, we had the international community in our house,” recalls Sofie. “He was just a tremendously generous person. At my father’s 80th birthday celebration at MIT, there were three hours of five-minute reminiscences. It was really moving to hear the number of people who felt that just having the open door at my parents’ house meant the difference to them as they went through difficult times.”
In his retirement, Kleppner continued with his woodworking projects, including building beds, lamps, cabinets, a beautiful spiral staircase, a cradle curved like the hull of a boat, and bookcases featuring super ellipses, a closed curve that blends elements of an ellipse and a rectangle.
“I enjoy designing,” he said in one video. “It’s the same instinct for making things work in experimental physics. It’s lovely to make a piece of apparatus that starts functioning, and even if the experiment doesn’t do what you want it to do. There’s always a lot of jubilation when the apparatus is first turned on and first works.”
His last article for Physics Today was in 2020. In his later years, he kept in touch with his colleagues, swapping book ideas with Ketterle’s wife, Michele Plott, and, since the Covid-19 pandemic, maintained regular Zoom meetings with a group of his former students, hosted by Mike Kash; and another, what they called “The Famous Physicists,” that included Phillips and their Brazilian colleague Vanderlei Bagnato.
“In recent years, I would still go to Dan for advice about difficult questions,” says Phillips, “sometimes about physics, sometimes just about life and public policy, because maybe I always felt that if there was anything you wanted done in which physics or science was part of the question that Dan would be the best person to do it.”
His family says that Kleppner suddenly fell ill at a Father’s Day dinner. According to his wife, his last words before being rushed to the hospital were a toast to his grandson, who recently graduated high school: “To Darwin and all youth who have new and exciting ideas.”
Says Bea, “He always said that you have to be optimistic to be a scientist, because you have to be patient. Things don’t work out and they’re fiddly, and there are lots of things that go wrong. His last words were ones that make you feel there’s hope for the future.”