Quotulatiousness

December 17, 2013

Legal precedents and technological change

Filed under: Law, Liberty, Technology, USA — Tags: , , , — Nicholas @ 10:04

At Ace of Spades HQ, Ace explains why a court decision from the 1970s set a very bad precedent for today’s legal and technological world:

Fifty years ago the police had a very limited ability to utilize your fingerprints record to harm you. If you became a suspect in a case — and only in that case — they could painstakingly compare your fingerprints to those found at a crime scene using slow, precious human labor resources.

There were serious practical limits on what could be done with citizen data held in government files. Yes, the government could use that data to put people in jail, but analysis and comparison was a labor intensive process that at least served as a naturally-existing limiting principle on government intrusion: Sure, the government could search your personally-identifying data to connect you with a crime, but, as a practical matter, it was so time-consuming to do so that they generally would not do so, not unless they had a strong suspicion you were actually a culprit.

They wouldn’t just compare every fingerprint on file with every fingerprint found at unsolved crime scenes, after all.

Well, today, they can — and do — actually do that. So there is no longer any practical limitation on the government’s ability to use your DNA to connect you with unknown DNA found at a crime. They can run everyone’s DNA through the database with virtually no effort.

I exaggerate; there is some lab work needed to process the DNA and reduce it to a 13 allele “genetic fingerprint.” Nevertheless, this can all be done fairly inexpensively, and running it through the database once reduced to a short code is very nearly cost-free.

But within the next ten years all of this will become entirely cost-free.

This is why I disagreed with the Supreme Court’s reliance on an old precedent in claiming that the police can take a DNA sample from every single person arrested. Merely arrested, not convicted. They relied on a precedent established at the dawn of investigatory police science, that every arrestee’s fingerprints may be collected and catalogued.

But way ‘back then, there were natural limitations on the State’s power to make use of such data which simply no longer exist. What would have been considered a silly hypothetical sci-fi objection back then — “But what stops the state from merely searching these fingerprints against every fingerprint ever lifted at a crime scene?” — is actual reality now.

The same arguments apply to all police/FBI/NSA mass data collection: cell-phone usage, internet activity, license plate scanning, facial recognition software, and so on. It resets the baseline assumptions of civil society, where the authorities only look for suspects in actual criminal cases, rather than tracking everyone all the time and deducing “criminal” actions without needing to detect the crime. If your first reaction is to think “if you’ve done nothing wrong, you’ve got nothing to fear”, remember that you cannot possibly know all the laws of your country and that statistically speaking, you probably violate one or more laws every day without realizing it (one author suggests it’s actually three felonies per day).

Update: Ayn Rand explained this phenomenon fictionally in Atlas Shrugged.

“Did you really think that we want those laws to be observed?” said Dr. Ferris. “We want them broken. You’d better get it straight that it’s not a bunch of boy scouts you’re up against — then you’ll know that this is not the age of beautiful gestures. We’re after power and we mean it. You fellows were pikers, but we know the real trick, and you’d better get wise to it. There’s no way to rule innocent men. The only power any government has is the power to crack down on criminals. Well, when there aren’t enough criminals, one ‘makes’ them. One declares so many things to be a crime that it becomes impossible for men to live without breaking laws. Who wants a nation of law-abiding citizens? What’s there in that for anyone? But just pass the kind of laws that can neither be observed nor enforced nor objectively interpreted — and you create a nation of law-breakers and then you cash in on the guilt. Now that’s the system, Mr. Rearden, that’s the game, and once you understand it, you’ll be much easier to deal with.”

December 12, 2013

Paranoid? You’re probably not paranoid enough

Filed under: Technology — Tags: , , , , — Nicholas @ 09:26

Charles Stross has a few adrenaline shots for your paranoia gland this morning:

The internet of things may be coming to us all faster and harder than we’d like.

Reports coming out of Russia suggest that some Chinese domestic appliances, notably kettles, come kitted out with malware — in the shape of small embedded computers that leech off the mains power to the device. The covert computational passenger hunts for unsecured wifi networks, connects to them, and joins a spam and malware pushing botnet. The theory is that a home computer user might eventually twig if their PC is a zombie, but who looks inside the base of their electric kettle, or the casing of their toaster? We tend to forget that the Raspberry Pi is as powerful as an early 90s UNIX server or a late 90s desktop; it costs £25, is the size of a credit card, and runs off a 5 watt USB power source. And there are cheaper, less competent small computers out there. Building them into kettles is a stroke of genius for a budding crime lord looking to build a covert botnet.

But that’s not what I’m here to talk about.

[…]

I’m dozy and slow on the uptake: I should have been all over this years ago.

And it’s not just keyboards. It’s ebook readers. Flashlights. Not your smartphone, but the removable battery in your smartphone. (Have you noticed it running down just a little bit faster?) Your toaster and your kettle are just the start. Could your electric blanket be spying on you? Koomey’s law is going to keep pushing the power consumption of our devices down even after Moore’s law grinds to a halt: and once Moore’s law ends, the only way forward is to commoditize the product of those ultimate fab lines, and churn out chips for pennies. In another decade, we’ll have embedded computers running some flavour of Linux where today we have smart inventory control tags — any item in a shop that costs more than about £50, basically. Some of those inventory control tags will be watching and listening to us; and some of their siblings will, repurposed, be piggy-backing a ride home and casing the joint.

The possibilities are endless: it’s the dark side of the internet of things. If you’ll excuse me now, I’ve got to go wallpaper my apartment in tinfoil …

December 9, 2013

Admiral Grace Hopper on Letterman

Filed under: History, Military, Technology, WW2 — Tags: , , , , — Nicholas @ 17:23

November 26, 2013

The illusion of omnicompetence

Filed under: Business, Humour, Technology — Tags: , , , , — Nicholas @ 08:38

I’ve expressed this as variations on “the deeper the specialization, the more those specialists feel they’re experts on much wider subjects”. Megan McArdle‘s formulation is rather neater than that:

Amid the chaos, I got a call from the secretary of a very senior executive at the firm. His new voice-recognition software wasn’t working, and he needed me to come up right away.

I had servers that weren’t working right and a bunch of workstations that couldn’t access the network. “He should call the help desk,” I told her.

Her tone was arctic.

“He doesn’t deal with help desk personnel,” she said. “Please come up here right away.”

So I went to the office of Mr. Senior Executive. He was not at his desk. I played with his new software, which seemed to be working fine — a bit slow, but in 1998, voice-recognition software took a while to become acclimated to your voice. I told the secretary it seemed to be working, and I left my pager number. It went off as I got to the elevator bank. I trekked wearily back to the office, where Mr. Senior Executive gestured at his computer. “It still doesn’t work right,” he said, and started to leave the office again.

“Hold on, please,” I said. “Can you show me exactly what’s not working?”

“It’s not doing what I want,” he said.

“What do you want?” I asked.

“I want it to be,” he replied, “like the computer on Star Trek: The Next Generation.”

“Sir, that’s an actor,” I replied evenly, despite being on the sleepless verge of hysteria. With even more heroic self-restraint, I did not add “We can get you an actor to sit under your desk. But we’d have to pay SAG rates.”

Now, when I used to tell this story to tech people, the moral was that executives are idiots. No, make that “users are idiots.” Tech people tend to regard their end-users as a sort of intermediate form of life between chimps and information-technology staffers: They’ve stopped throwing around their feces, but they can’t really be said to know how to use tools.

And, of course, users can do some idiotic things. But this particular executive was not an idiot. He was, in fact, a very smart man who had led financial institutions on two continents. None of the IT staffers laughing at his elementary mistake would have lasted for a week in his job.

Call it “the illusion of omnicompetence.” When you know a lot about one thing, you spend a lot of time watching the less knowledgeable make elementary errors. You can easily infer from this that you are very smart, and they are very stupid. Presumably, our bank executive knew that the phasers and replicators on Star Trek are fake; why did he think that the talking computer would be any more real?

November 20, 2013

An app like this may justify the existence of Google Glass

Filed under: Randomness, Technology — Tags: , , , , , — Nicholas @ 08:38

I have a terrible memory for people’s names (and no, it’s not just early senility … I’ve always had trouble remembering names). For example, I’ve been a member of the same badminton club for nearly 15 years and there are still folks there whose names just don’t register: not just new members, but people I’ve played with or against on dozens of occasions. I know them … I just can’t remember their names in a timely fashion. David Friedman suggests that Google Glass might be the solution I need:

I first encountered the solution to my problem in Double Star, a very good novel by Robert Heinlein. It will be made possible, in a higher tech version, by Google glass. The solution is the Farley File, named after FDR’s campaign manager.

A politician such as Roosevelt meets lots of people over the course of his career. For each of them the meeting is an event to be remembered and retold. It is much less memorable to the politician, who cannot possibly remember the details of ten thousand meetings. He can, however, create the illusion of doing so by maintaining a card file with information on everyone he has ever met: The name of the man’s wife, how many children he has, his dog, the joke he told, all the things the politician would have remembered if the meeting had been equally important to him. It is the job of one of the politician’s assistants to make sure that, any time anyone comes to see him, he gets thirty seconds to look over the card.

My version will use more advanced technology, courtesy of Google glass or one of its future competitors. When I subvocalize the key word “Farley,” the software identifies the person I am looking at, shows me his name (that alone would be worth the price) and, next to it, whatever facts about him I have in my personal database. A second trigger, if invoked, runs a quick search of the web for additional information.

Evernote has an application intended to do some of this (Evernote Hello), but it still requires the immersion-breaking act of accessing your smartphone to look up your contact information. Something similar in a Google Glass or equivalent environment might be the perfect solution.

November 1, 2013

Let’s hope badBIOS is an elaborate Halloween hoax

Filed under: Technology — Tags: , , , , , — Nicholas @ 08:05

Dan Goodin posted a scary Halloween tale at Ars Technica yesterday … at least, I’m hoping it’s just a scary story for the season:

In the intervening three years, Ruiu said, the infections have persisted, almost like a strain of bacteria that’s able to survive extreme antibiotic therapies. Within hours or weeks of wiping an infected computer clean, the odd behavior would return. The most visible sign of contamination is a machine’s inability to boot off a CD, but other, more subtle behaviors can be observed when using tools such as Process Monitor, which is designed for troubleshooting and forensic investigations.

Another intriguing characteristic: in addition to jumping “airgaps” designed to isolate infected or sensitive machines from all other networked computers, the malware seems to have self-healing capabilities.

“We had an air-gapped computer that just had its [firmware] BIOS reflashed, a fresh disk drive installed, and zero data on it, installed from a Windows system CD,” Ruiu said. “At one point, we were editing some of the components and our registry editor got disabled. It was like: wait a minute, how can that happen? How can the machine react and attack the software that we’re using to attack it? This is an air-gapped machine and all of a sudden the search function in the registry editor stopped working when we were using it to search for their keys.”

Over the past two weeks, Ruiu has taken to Twitter, Facebook, and Google Plus to document his investigative odyssey and share a theory that has captured the attention of some of the world’s foremost security experts. The malware, Ruiu believes, is transmitted though USB drives to infect the lowest levels of computer hardware. With the ability to target a computer’s Basic Input/Output System (BIOS), Unified Extensible Firmware Interface (UEFI), and possibly other firmware standards, the malware can attack a wide variety of platforms, escape common forms of detection, and survive most attempts to eradicate it.

But the story gets stranger still. In posts here, here, and here, Ruiu posited another theory that sounds like something from the screenplay of a post-apocalyptic movie: “badBIOS,” as Ruiu dubbed the malware, has the ability to use high-frequency transmissions passed between computer speakers and microphones to bridge airgaps.

October 31, 2013

A garage of historical significance

Filed under: History, Technology, USA — Tags: , , — Nicholas @ 08:28

In The Register, a remarkably blasé report on the designation of the house where Jobs and Wozniak created the first Apple computers:

The house where Steve Jobs built his first computers has been added to a list of historic buildings in Los Altos.

The Los Altos Historical Commission voted unanimously to add the home at 2066 Crist Drive as a historic resources, since its hallowed garage was where Jobs made his first computers and co-founded Apple, the San Jose Mercury News reported.

The commission’s report said that it had been reviewing the property for potential designation for the past two years due to its “association with an event and an individual of historic significance”.

From other discussion on the topic, this will require the current owner of the property (Patricia Jobs, the sister of the late Steve Jobs) to get the commission’s advance permission to do any kind of work on the house … including ordinary maintenance. No funds from the municipality go along with this designation: once your house has been so designated, you no longer exercise full rights of ownership, but you still are required to pay for any work the commission deems necessary or desirable. Ms Jobs apparently still has a right to appeal, but I don’t know what her chances of success might be.

October 29, 2013

What happens when you challenge hackers to investigate you?

Filed under: Law, Technology — Tags: , , , , — Nicholas @ 09:13

Adam Penenberg had himself investigated in the late 1990s and wrote that up for Forbes. This time around, he asked Nick Percoco to do the same thing, and was quite weirded out by the experience:

It’s my first class of the semester at New York University. I’m discussing the evils of plagiarism and falsifying sources with 11 graduate journalism students when, without warning, my computer freezes. I fruitlessly tap on the keyboard as my laptop takes on a life of its own and reboots. Seconds later the screen flashes a message. To receive the four-digit code I need to unlock it I’ll have to dial a number with a 312 area code. Then my iPhone, set on vibrate and sitting idly on the table, beeps madly.

I’m being hacked — and only have myself to blame.

Two months earlier I challenged Nicholas Percoco, senior vice president of SpiderLabs, the advanced research and ethical hacking team at Trustwave, to perform a personal “pen-test,” industry-speak for “penetration test.” The idea grew out of a cover story I wrote for Forbes some 14 years earlier, when I retained a private detective to investigate me, starting with just my byline. In a week he pulled up an astonishing amount of information, everything from my social security number and mother’s maiden name to long distance phone records, including who I called and for how long, my rent, bank accounts, stock holdings, and utility bills.

[…]

A decade and a half later, and given the recent Edward Snowden-fueled brouhaha over the National Security Agency’s snooping on Americans, I wondered how much had changed. Today, about 250 million Americans are on the Internet, and spend an average of 23 hours a week online and texting, with 27 percent of that engaged in social media. Like most people, I’m on the Internet, in some fashion, most of my waking hours, if not through a computer then via a tablet or smart phone.

With so much of my life reduced to microscopic bits and bytes bouncing around in a netherworld of digital data, how much could Nick Percoco and a determined team of hackers find out about me? Worse, how much damage could they potentially cause?

What I learned is that virtually all of us are vulnerable to electronic eavesdropping and are easy hack targets. Most of us have adopted the credo “security by obscurity,” but all it takes is a person or persons with enough patience and know-how to pierce anyone’s privacy — and, if they choose, to wreak havoc on your finances and destroy your reputation.

H/T to Terry Teachout for the link.

October 11, 2013

Creating an “air gap” for computer security

Filed under: Liberty, Technology — Tags: , , , , — Nicholas @ 12:13

Bruce Schneier explains why you’d want to do this … and how much of a pain it can be to set up and work with:

Since I started working with Snowden’s documents, I have been using a number of tools to try to stay secure from the NSA. The advice I shared included using Tor, preferring certain cryptography over others, and using public-domain encryption wherever possible.

I also recommended using an air gap, which physically isolates a computer or local network of computers from the Internet. (The name comes from the literal gap of air between the computer and the Internet; the word predates wireless networks.)

But this is more complicated than it sounds, and requires explanation.

Since we know that computers connected to the Internet are vulnerable to outside hacking, an air gap should protect against those attacks. There are a lot of systems that use — or should use — air gaps: classified military networks, nuclear power plant controls, medical equipment, avionics, and so on.

Osama Bin Laden used one. I hope human rights organizations in repressive countries are doing the same.

Air gaps might be conceptually simple, but they’re hard to maintain in practice. The truth is that nobody wants a computer that never receives files from the Internet and never sends files out into the Internet. What they want is a computer that’s not directly connected to the Internet, albeit with some secure way of moving files on and off.

He also provides a list of ten rules (or recommendations, I guess) you should follow if you want to set up an air-gapped machine of your own.

October 7, 2013

CSEC’s sudden media prominence … in Brazil

Filed under: Americas, Cancon, Technology — Tags: , , , , , — Nicholas @ 10:50

If you haven’t heard of CSEC before, you’re certainly not alone. The signals intelligence service known as Communications Security Establishment Canada has been eager not to be in the public eye, but allegations are being made that CSEC has been spying on the Brazilian government’s mining and energy ministry:

The impact for Canada of these revelations could be equally grave: they come at a time when Brazil has become a top destination for Canadian exports, when a stream of delegations from the oil and gas industries are making pilgrimages to Rio de Janeiro to try to get a piece of the booming offshore oil industry, and when the Canadian government is eager to burnish ties with Brasilia. Foreign Affairs Minister John Baird visited Brazil in August, and spoke repeatedly about the country as a critical partner for Canadian business.

[…]

While CSEC’s role in conducting economic espionage has been alluded to before, how it does this job has not. The significance of the documents obtained by Globo in Brazil is that they speak to how “metadata” analysis by CSEC can be used to exploit a rival country’s computer systems.

The CSEC-labeled slides about the “Olympia” program describe the “Brazilian Ministry of Mines and Energy” as a “new target to develop” despite “limited access/target knowledge.”

The presentation goes on to map out how an individual’s smartphone — “target’s handset” — can be discerned by analysis, including by cross-referencing the smartphone’s Sim card with the network telephone number assigned to it and also to the handset’s unique number (IMEI).

The “top secret” presentation also refers to attacks on email servers.

“I have identified MX [email] servers which have been targeted to passive collection by the Intel analysts,” one slide says, without explaining who the speaker is.

September 29, 2013

Unplugging your laptop to give your battery a longer working life

Filed under: Technology — Tags: — Nicholas @ 11:53

In Wired, Roberto Baldwin says you shouldn’t leave your laptop plugged in all the time:

In order to squeeze as much life out of your lithium-polymer battery, once your laptop hits 100 percent, unplug it. In fact, you should unplug it before that.

Cadex Electronics CEO Isidor Buchmann told WIRED that ideally everyone would charge their batteries to 80 percent then let them drain to about 40 percent. This will prolong the life of your battery — in some cases by as much as four times. The reason is that each cell in a lithium-polymer battery is charged to a voltage level. The higher the charge percentage, the higher the voltage level. The more voltage a cell has to store, the more stress it’s put under. That stress leads to fewer discharge cycles. For example, Battery University states that a battery charged to 100 percent will have only 300-500 discharge cycles, while a battery charged to 70 percent will get 1,200-2,000 discharge cycles.

Buchmann would know. His company Cadex sponsers Battery University. The site is the go-to destination for anyone interested in battery technology. And it’s not just constant power that shortens your battery’s life. While batteries degrade naturally, heat also accelerates the degradation. Extreme heat can cause the cells to expand and bubble. Kyle Wiens of iFixit told WIRED: “Too much heat to the battery over time, and the battery isn’t going to last as long.”

You can battle this degradation by keeping the lid open and your laptop out of your actual lap while using it.

September 27, 2013

The day World War III didn’t happen

Filed under: History, Military — Tags: , , , , , — Nicholas @ 08:59

In The Register, Iain Thomson takes us back to the depth of the Cold War, when it nearly turned very hot indeed:

Computer problems are an annoyance for us all, but thirty years ago a fault in the Soviet Union’s ballistic missile early warning system very nearly caused nuclear war, if not for the actions of Lieutenant Colonel Stanislav Petrov of the Soviet Air Defense Forces.

[…]

in the early hours of the morning on the September 26, there was panic when the Soviet early warning system Oko, a monitoring system of geostationary satellites and ground stations designed to spot ballistic missile launches, reported that the US had fired off a missile against the Soviet Union. Then four more launches were reported by the system in quick succession.

“An alarm at the command and control post went off with red lights blinking on the terminal. It was a nasty shock,” Petrov told Moscow News in 2004. “Everyone jumped from their seats, looking at me. What could I do? There was an operations procedure that I had written myself. We did what we had to do. We checked the operation of all systems — on 30 levels, one after another. Reports kept coming in: All is correct.”

Petrov, then the officer in command of the Oko system at a bunker near Moscow, had the responsibility of informing the Soviet high command in the event of a US missile launch. Although he didn’t have launch control of the USSR’s huge nuclear arsenal, he was the first responder, and given the scant minutes available in the event of a surprise attack, his word would most likely have been accepted by the Soviet leadership.

But Petrov didn’t make the call. He knew that the Oko system, which had only gone live the year before, was buggy. He also later described how logically such a move made no sense. While a first strike by the US wasn’t out of the question, if the capitalists were to do so they’d launch everything they had, not a few missiles at a time, he reasoned.

September 24, 2013

The horrors of Greek Austerity strike!

Filed under: Bureaucracy, Europe, Government, Greece — Tags: , , — Nicholas @ 09:02

Those poor Greek civil servants … this is so hard on them:

In a sign of just how hard the austere financial climate is hitting, it has been reported that the Greek government has been forced to put an end to one of its civil servants’ most treasured privileges. We speak, of course, of the Hellenic Sir Humphreys’ entitlement to an extra six days a year paid holiday if they are compelled to work with that frightful engine of misery, the computer.

Reuters reports that the long-standing regulation, in which all Greek government workers compelled to use a computer for more than 5 hours a day get an extra day’s leave every two months, was axed in an official announcement on Friday.

September 19, 2013

After smartphones, genius machines?

Filed under: Books, Business, Media, Technology — Tags: , , , — Nicholas @ 07:41

In the Daily Beast, Robert Herritt reviews the latest book by Tyler Cowen, Average Is Over: Powering America Beyond the Age of the Great Stagnation.

Cowen’s main background assumption is that in the not-too-distant future various kinds of “genius machines” will be everywhere. In the workplace, business negotiations and client introductions “will be recorded, processed, and analyzed [and] … [e]ach party to the communications might receive a real-time report on when the other people are likely lying …” At the supermarket, “[y]our shopping cart will use GPS to track your moves through the store, including which aisles you visit most often.” As for our personal lives, “[a] woman might consult a pocket device in the ladies’ room during a date that tells her how much she really likes the guy. The machine could register her pulse, breathing, tone of voice … or whichever biological features prove to have predictive power.”

Even a few years ago, this forecast would have sounded silly, but that was before many of us trusted Match.com algorithms to suggest potential spouses and smartphones came with fingerprint scanners. Cowen’s not talking about flying cars (that futurist mainstay that always seems both just out of reach and comically unnecessary), but rather slightly more sophisticated versions of the technologies that many of us already use.

The bad news, he tells us, is that the rise of the machines will only worsen the wage polarization we are seeing today. Cowen predicts a situation where 10 percent to 15 percent of Americans are “extremely wealthy” with “fantastically comfortable and stimulating lives.” Most of the rest will see stagnant or falling wages but will benefit from plenty of “cheap fun and also cheap education.” For those wondering, this vanishing middle ground is where the book gets its catch-phrase title.

What will determine whether you end up a high earner or a low-wage left-behind will be, in large part, your answer to some variation on the following questions: “Are you good at working with intelligent machines or not? Are your skills a complement to the skills of the computer, or is the computer doing better without you?”

September 8, 2013

Sometimes the worst possible thing for you is to dominate your market

Filed under: Business — Tags: , , , — Nicholas @ 10:53

Charles Hugh Smith on the dangers of being too big in your own market:

Microsoft is a case study in dominance leading to incompetence and catastrophe. Within the moat of near-monopoly/dominance, competence dwindles to the ability to keep doing what worked spectacularly well in the past, and keeping bureaucratic infighting and divisional rivalries down to a dull background erosion of initiative and talent.

Doing more of what succeeded spectacularly in the past works until it doesn’t, at which point doggedly pressing on with the old formula of success leads to catastrophic failures.

Nokia and Blackberry are recent case studies, but the rise of Google Chrome and smart-phone/tablet computing is beginning to threaten Microsoft’s core business of being the utility monopoly in the PC space.

Dominance means leaders and employees alike lose the ability to experience risk. The customer will take what is delivered, regardless, for the simple reason that alternatives are either unavailable or cumbersome.

[…]

Dominance in any space breeds complacency and enables the luxuries of political squabbling, sclerosis and loss of focus. Competence becomes incompetence, and the infrastructure that fosters creativity and flexibility — that is, a keen appreciation of risk and spontaneity — is slowly dismantled.

That applies not just to corporations but to governments, nations and empires.

H/T to Zero Hedge for the link.

« Newer PostsOlder Posts »

Powered by WordPress