Categories
Business History Memories Radio

Permissionless Airwaves: The Legacy of FCC Part 15

Right now, as you read this, the air around you is thick with invisible conversations. Your phone is whispering to your router, your wireless headphones are singing to your laptop, and the smartwatch on your wrist is syncing quietly in the background.

We take this symphonic digital ecosystem completely for granted. But this panoply of wireless magic wasnโ€™t just an inevitable product of technological march. It exists because of a profound, remarkably philosophical decision made by a bureaucracy in 1985.

It traces back to a seemingly mundane piece of regulatory code: the Federal Communications Commissionโ€™s Part 15 rules.

Historically, the airwaves were treated like highly exclusive real estate. If you wanted to broadcast a signal, you needed a license, a specific frequency, and a strict, government-approved mandate for what you were doing.

But within the radio spectrum, there were segments known as the ISM bands (Industrial, Scientific, and Medical). These were essentially the “garbage bands” of the airwaves. Microwave ovens, for instance, operated here, blasting out radio noise at 2.4 GHz. The interference was so heavy that the spectrum was considered practically useless for traditional communications.

Enter an FCC engineer named Michael Marcus. Marcus possessed a visionary understanding of a World War II-era technology called “spread spectrum” (famously co-invented by actress Hedy Lamarr). Spread spectrum didn’t rely on a single, clean channel; instead, it scattered a signal across a wide swath of frequencies, easily dodging interference.

Marcus argued for something radical: what if we opened up these “junk” bands to the public, allowing anyone to use spread-spectrum devices without asking for a license, so long as they adhered to basic power limits and didn’t cause harmful interference to primary users?

Incumbents fought it bitterly. Broadcasters and traditional telecommunications companies warned of absolute chaos. But in 1985, the FCC adopted the new Part 15 rules.

“We often talk about the great technological breakthroughs of our time as hardware or software triumphs. But sometimes, the most important enabling technology is just a clearing in the woods.”

Think about the nature of most regulation. It usually prescribes behavior. It looks at the future and says, “You may do exactly X, under condition Y.” But the Part 15 ruling did the opposite. It created a sandbox. The FCC didn’t try to predict Wi-Fi, Bluetooth, cordless phones, baby monitors, or the Internet of Things. In fact, they couldn’t have. They simply set the structural ground rules for how devices should coexist without stepping on each other’s toes, and then they stepped back.

This is the beauty of permissionless innovation. When you don’t have to ask a gatekeeper for access, a massive, uncoordinated burst of creativity happens.

A small company in the Netherlands could start working on what would eventually become Wi-Fi. Ericsson could invent Bluetooth. Innovators didn’t need to petition the government to launch a new product; the space was already cleared for them to play.

Part 15 was an admission of humility by a regulatory bodyโ€”an acknowledgment that the most profound inventions are the ones we cannot yet foresee.

The greatest legacy of Part 15 isn’t Wi-Fi or Bluetooth. It is the enduring lesson that when you give brilliant minds a blank canvas and the freedom to experiment without asking permission, they will build a world more connected than you ever dared to imagine.


Note: this post was triggered by my reading of David Pogue’s new book Apple: The First 50 Years in which he describes the development of the Apple III and how its design met the requirements of the FCC’s Part 15 in terms of reduced RF interference.

Categories
AI

Claude Shannon’s Mirror: Signal, Noise, and Secrets

We spend a great deal of our lives trying to be understood. We shout into the void, send texts across oceans, and build increasingly complex tools to bridge the gaps between our minds.

Yet, equally human is the desire to concealโ€”to keep our thoughts private, to mask our vulnerabilities, to hide our signals in the static.

It seems paradoxical that communication and secrecy would share the same architecture. But Claude Shannon, the somewhat eccentric yet brilliant father of information theory, saw past the paradox. He recognized that building a bridge and building a fortress require the exact same understanding of physics.

In Fortune’s Formula, William Poundstone captures this dual realization perfectly:

“Shannon later said that thinking about how to conceal messages with random noise motivated some of the insights of information theory. ‘A secrecy system is almost identical with a noisy communications system,’ he claimed. The two lines of inquiry ‘were so close together you couldnโ€™t separate them.'”

When we try to communicate over a noisy channelโ€”a noisy radio or a crowded roomโ€”we are fighting entropy. We want our signal to survive the chaos so we can be heard.

When we encrypt a message, however, we are deliberately weaponizing that same chaos. We wrap our signal in artificial noise so dense that only the intended recipient possesses the mathematical filter to extract it.

It is a profound symmetry: clarity and obscurity are merely two ends of the exact same thing.

Today, one of our most advanced AI models is named “Claude” in tribute to Shannon. These neural networks are, at their core, sophisticated engines for separating signal from noise. They ingest the vast, chaotic, and often contradictory static of human knowledge and attempt to synthesize clarity and connection from it. They are mathematical mirrors reflecting Shannon’s earliest theories back at us.

But Shannon’s realization reflects something deeper about the human condition, far beyond the realm of zeroes and ones. We are all walking communications systems, constantly modulating our signals. Every day, we navigate an overwhelming digital landscape filled with deafening static.

Sometimes we desperately want the noise to clear so our true selves can be seen. Other times, we retreat behind a wall of our own generated staticโ€”small talk, busyness, deflection, and carefully curated avatarsโ€”to protect our inner world from being decoded by those who haven’t earned the key.

Perhaps the real wisdom of information theory isn’t just in knowing how to efficiently transmit a message, but in recognizing the sheer necessity of the noise itself. Without the static, the signal holds no meaning. Without the capacity for secrecy and privacy, the choice to be vulnerable and communicate clearly wouldn’t be nearly as profound.

It seems that we are defined as much by what we choose to encrypt as by what we choose to broadcast. Mirror indeed.