Quotulatiousness

December 13, 2010

The impossible balance of security and utility

Filed under: Military, Technology — Tags: , , , — Nicholas @ 12:35

Strategy Page looks at the mechanic that PFC Bradley Manning is reported to have used to grab copies of all the information now being released by WikiLeaks:

A bit late, the U.S. military has finally forbidden the use of all removable media (thumb drives, read/write DVD and CD drives, diskettes, memory cards and portable hard drives) from SIPRNet. Thumb drives had earlier been banned. The motivation for this latest action was Wikileaks, which obtained hundreds of thousands of secret American military and diplomatic documents from a U.S. soldier (PFC Bradley Manning). As an intel specialist, Manning had a security clearance and access to SIPRNet (Secret Internet Protocol Router Network). This was a private Department of Defense network established in 1991, using Internet technology and able to handle classified (secret) documents. But Manning got access to a computer with a writable CD drive, and was able to copy all those classified documents to a CD (marked as containing Lady Gaga tracks) and walk out of his workplace with it. The big error here was having PCs available with writable media. You need some PCs with these devices, but they should be few, and carefully monitored. Normally, you would not need to copy anything off SIPRNet. Most of the time, if you want to share something, it’s with someone else on SIPRNet, so you can just email it to them, or tell them what it is so they can call it up themselves. A network like SIPRNet usually (in many corporations, and some government agencies) has software that monitors who accesses, and copies, documents, and reports any action that meets certain standards (of possibly being harmful). SIPRNet did not have these controls in place, and still does not on over a third of the PCs connected.

Just like their civilian counterparts, soldiers have been very eager to get and keep connected, both for personal and professional reasons. Data not shared can’t be useful.

For the last decade, the Pentagon has had increasing security problems with its internal Internet networks. The Department of Defense has two private Internets (using Internet technology, but not connected to the public Internet). NIPRNet is unclassified, but not accessible to the public Internet. SIPRNet is classified, and all traffic is encrypted. You can send secret stuff via SIPRNet. However, some computers connected to SIPRNet have been infected with computer viruses. The Pentagon was alarmed at first, because the computers only used SIPRNet. As a result, they did not have any anti-virus software installed. It turned out that worm type hackware was the cause of infection, and was installed when someone used a memory stick or CD, containing the worm, to work and, well, you know the rest.

[. . .]

It’s easy for troops to be doing something on SIPRNET, then switch to the Internet, and forget that they are now on an unsecure network. Warnings about that sort of thing have not cured the problem. The Internet is too useful for the troops, especially for discussing technical and tactical matters with other soldiers. The army has tried to control the problem by monitoring military accounts (those ending in .mil), but the troops quickly got hip to that, and opened another account from Yahoo or Google, for their more casual web surfing, and for discussions with other troops. The Internet has been a major benefit for combat soldiers, enabling them to share first hand information quickly, and accurately. That’s why the troops were warned that the enemy is actively searching for anything G.I.s post, and this stuff has been found at terrorist web sites, and on captured enemy laptops. In reality, information spreads among terrorists much more slowly than among American troops. But if soldiers discuss tactics and techniques in an open venue, including posting pictures and videos, the enemy will eventually find and download it. The terrorists could speed up this process if they could get the right hackware inside American military computers.

December 10, 2010

The Economist: “America … should learn from its mistakes in the past decade and stick to its own rules”

Filed under: Bureaucracy, Law, USA — Tags: , , , , , — Nicholas @ 08:23

A very good column in The Economist seems to cover the issues quite well:

BIG crimes deserve tough responses. In any country the theft and publication of 250,000 secret government documents would deserve punishment. If the leak costs lives, let alone the careers and trust that have already perished amid the WikiLeaks disclosures, the case for action is even stronger.

[. . .]

For the American government, prosecution, not persecution, offers the best chance of limiting the damage and deterring future thefts. The blustering calls for the assassination of Julian Assange, the WikiLeaks founder now in custody in London awaiting extradition to Sweden on faintly mysterious charges of sexual assault, look both weak and repellent. If Mr Assange has broken American law, it is there that he should stand trial, just like Bradley Manning, the alleged source of the stolen documents. If not, it may be some consolation that the cables so far reveal a largely flattering picture of America’s diplomats: conscientious, cool-headed, well-informed, perceptive and on occasion eloquent.

[. . .]

If America sticks to those standards now it will display a strength and sanity that contrasts with the shrill absolutism and cyber-vandalism of the WikiLeaks partisans. Calling Mr Assange a terrorist, for example, is deeply counterproductive. His cyber-troops do not fly planes into buildings, throw acid at schoolgirls or murder apostates. Indeed, the few genuine similarities between WikiLeaks and the Taliban — its elusiveness and its wide base of support — argue against ill-judged attacks that merely broaden that support. After a week of clumsy American-inspired attempts to shut WikiLeaks down, it is now hosted on more than 700 servers around the world.

The big danger is that America is provoked into bending or breaking its own rules, straining alliances, eroding credibility and — because it will not be able to muzzle WikiLeaks — ultimately seeming impotent. In recent years America has promoted the internet as a menace to foreign censorship. That sounds tinny now. So did its joy of hosting next year’s World Press Freedom Day this week. Chinese and Russian glee at American discomfort are a sure sign of such missteps.

H/T to John Perry Barlow for the link.

Update: This certainly matches what I expected Julian Assange’s personality to be like:

Defectors include Daniel Domscheit-Berg, otherwise known as Daniel Schmitt, who made a high-profile exit from WikiLeaks in September, and Herbert Snorrason, an Icelandic student. Both resigned in September. Snorrason is quoted as telling Assange, in an online chat log acquired by WiReD:

And you’re not even fulfilling your role as a leader right now. A leader communicates and cultivates trust in himself. You are doing the exact opposite. You behave like some kind of emperor or slave trader.

Snorrason’s departure was fomented by this declaration from Assange:

I am the heart and soul of this organization, its founder, philosopher, spokesperson, original coder, organizer, financier and all the rest. If you have a problem with me, piss off.

And he did.

December 9, 2010

Bruce Schneier on the WikiLeaks situation

Filed under: Bureaucracy, Media, USA — Tags: , , , , — Nicholas @ 07:48

Bruce Schneier has some useful observations about the ongoing WikiLeaks document release:

4. This has little to do with WikiLeaks. WikiLeaks is just a website. The real story is that “least trusted person” who decided to violate his security clearance and make these cables public. In the 1970s he would have mailed them to a newspaper. Today he uses WikiLeaks. Tomorrow he will have his choice of a dozen similar websites. If WikiLeaks didn’t exist, he could have put them up on BitTorrent.

5. I think the government is learning what the music and movie industries were forced to learn years ago: it’s easy to copy and distribute digital files. That’s what’s different between the 1970s and today. Amassing and releasing that many documents was hard in the paper and photocopier era; it’s trivial in the Internet era. And just as the music and movie industries are going to have to change their business models for the Internet era, governments are going to have to change their secrecy models. I don’t know what those new models will be, but they will be different.

November 27, 2010

Anyone remember when Homeland Security got the right to shut down websites?

Filed under: Bureaucracy, Government, Law, USA — Tags: , , , — Nicholas @ 12:24

In addition to their role in defending the homeland, apparently they’re also now copyright enforcers:

The investigative arm of the Homeland Security Department appears to be shutting down websites that facilitate copyright infringement.

Immigration and Customs Enforcement (ICE) has seized dozens of domain names over the past few days, according to TorrentFreak.

ICE appears to be targeting sites that help Internet users download copyrighted music, as well as sites that sell bootleg goods, such as fake designer handbags.

The sites are replaced with a note from the government: “This domain named has been seized by ICE, Homeland Security Investigations.”

H/T to Ace of Spades HQ for the link.

It would be nice to know what part of the act of Congress that set up the Department of Homeland Security permits this kind of action. So that I can know whether to thank George Bush or Barack Obama.

[. . .]

First they were grabbing crotches in airports…

This overrreach by the DHS is breathtaking and clearly violates the spirit of the act of Congress that created it and the public’s understanding of the rationale for the creation of DHS. I’m not saying the domains were not involved in copyright infringement. I’m saying the DHS involvement is odd and the method — seizure of the domains — lacks a certain due process.

It’s ugly and ham-fisted. And it is difficult to see how it could be aimed at drawing the public’s attention away from the travails of the TSA. Rather, it looks like another run-of-the-mill stupid move on the part of Obama and Napolitano. It will be interesting next week to see the reaction of Representatives and Senators.

November 20, 2010

Apologies for the temporary interruption in service

Filed under: Administrivia — Tags: , — Nicholas @ 10:56

The blog was down for a couple of hours this morning, but the friendly folks at HostGator got the problem fixed as soon as I called it to their attention. <plug>HostGator has been a great ISP for me. I happily recommend them to you if you need web hosting.</plug>

November 14, 2010

Well, give them partial credit for their answer . . .

Filed under: Liberty, Media, Technology — Tags: , , — Nicholas @ 11:33

Another article where the headline really carries the whole story:

WSJ Warnings About Privacy-Invading Cookies Carry Privacy-Invading Cookies
Can you move this one to the ‘Irony’ section?

The Wall Street Journal posted a story yesterday about the Obama administration’s plan to add a privacy watching task force to evaluate rules on cookies, metacookies, flash cookies and all the other online threats to consumer privacy.

[. . .]

Of the threatening, deletion-resistant Flash cookies they revealed on in my browser, tracking my trip over to the NYT to read more: two from the Wall Street Journal.

November 11, 2010

Even more reason to believe that ACTA is a bad deal

Filed under: Bureaucracy, Law, Liberty, Media — Tags: , , , , , — Nicholas @ 08:45

From the folks at BoingBoing:

New revelations on ACTA, the Anti-Counterfeiting Trade Agreement (ACTA), a secretive global copyright being privately negotiated by rich countries away from the UN: ACTA will require ISPs to police trademarks the way they currently police copyright. That means that if someone accuses you of violating a trademark with a web-page, blog-post, video, tweet, etc, your ISP will be required to nuke your material without any further proof, or be found to be responsible for any trademark violations along with you. And of course, trademark violations are much harder to verify than copyright violations, since they often hinge on complex, fact-intensive components like tarnishment, dilution and genericization. Meaning that ISPs are that much more likely to simply take all complaints at face-value, leading to even more easy censorship of the Internet with nothing more than a trumped-up trademark claim.

November 6, 2010

Creating a more privileged class of commenter

Filed under: Cancon, Media — Tags: , , — Nicholas @ 18:44

I don’t normally read comment threads at the Globe and Mail website (actually, I rarely get too far in comment threads anywhere . . . too many comments, too little time), so the creation of Globe Catalysts was news to me earlier today. Elizabeth mentioned that certain prolific commenters at the Globe website had been given privileges which makes their individual comments much more visible and (apparently) keeps catalyst comments near the top of the thread.

It must have appeared to Globe management that the comment threads were getting too unruly, so they’ve appointed class monitors or “trustys” to keep the unwashed masses in line.

It’s nice that they chose a name for these folks that allows the group of them to be referred to as “the Cattle List”.

October 21, 2010

Aha! I knew there had to be a way!

Filed under: Bureaucracy, Humour, Technology — Tags: , , — Nicholas @ 12:54

Tech Support
Click image to see the whole strip.

October 4, 2010

A cameo economic round-up by Monty

Filed under: Economics, USA — Tags: , , , — Nicholas @ 13:11

One of the most interesting features over at Ace of Spades HQ used to be the daily economic round-ups by Monty. Unfortunately, he had to take a breather, but we’re able to get an occasional update like this one:

[In which Monty, long away from the neighborhood, returns to save the local mom-n-pop bank from a hostile takeover through a stylish melange of breakdancing, infectious urban beats, and the rap music that all the youngsters seem to be so fond of. Thrill to the parachute pants, Jheri curls, and mirrored wraparound sunglasses! (The soundtrack, “Monty Raps! Funky Accordion and Theremin Music For These Troubled Modern Times”, now available in fine discout outlets nationwide!)]

[. . .]

I just wouldn’t be me if I didn’t point out that gold is now $1314/oz as I write this. I bought some gold five years back at about $500/oz; that’s a pretty damned good rate of return for something that’s just supposed to be an inflation hedge. The naysayers can continue mumbling that I can’t eat gold, that I will be crucified on a cross of gold, the gold is just metal and has no innate value — I will simply point to the fact that it has outperformed every other investment in my portfolio, and by quite a large margin. And as a long-term store of value, I trust it a hell of a lot more than Treasuries. (Silver has done even better in absolute terms.)

Ah, but what about those safe-haven darlings of investors, municipal bonds? The romance may be on the rocks. I’ve thought for a long time that municipal debt is the next big shoe to drop in this recession/depression/worker’s paradise that we’re living in. Harrisburg, PA made the news recently when they barely escaped having to declare bankruptcy, but Harrisburg is only one of tens or even hundreds of muncipalities in the nation in dire financial straits. There seems to be a belief that the feds will bail them out before things get too grim, but this ignores two facts: a) the appetite for another trillion-dollar bailout is at subzero levels, and b) it’s not clear that taxpayers of one state will be willing to bail out the profligate citizenry of another. Prudent residents of Lincoln, NE or Minot, ND may not wish to fund the rather more lavish lifestyles of a San Diego or Miami. However much we “feel” the federal and state debt, we’d feel a municipal crash a lot harder because it hits us right where we live (literally): trash collection, sewer, water, road repair, snow removal, all the rest. You pay more and more and get less and less from it. (Oh, and guess what the major financial burden on municipal governments is these days? If you said “public-employee pension and health benefits”, give yourself a gold star and then a smack upside the head for being an insufferable know-it-all.)

September 30, 2010

Censorship and blocking ineffective, says AK Zensur

Filed under: Britain, Europe, Germany, Law, Technology — Tags: , , , , — Nicholas @ 07:41

Attempts to block websites showing child pornography don’t appear to be as effective as direct action, according to a press release from the German Working Group against Access Blocking and Censorship (AK Zensur):

Internet blocking is advocated as an allegedly effective measure against the proliferation of child abuse images. Countries such as the United Kingdom, Sweden and Denmark have been using this technology for years. But a practical test by the German Working Group against Access Blocking and Censorship (AK Zensur) in cooperation with European civil rights advocacy groups has shown: Internet blocking does not fight abuse, in practice it only serves to conceal the failures of politics and police. Websites can remain on blocking lists for years even though they have either been deleted or could be deleted easily and quickly.

How is this possible, and what could be done against illegal sites? Answers are given by a new analysis of current blocking lists from Sweden and Denmark by the Working Group against Access Blocking and Censorship. The group developed software to select, categorise and geo-locate 167 blocked Internet domains as a representative sample of websites blocked in Denmark at the time of the investigation. “The result is a smack in the face of law enforcement authorities”, says Alvar Freude of the Working Group. “Of the 167 listed sites, only three contained material that could be regarded as child pornography.” Two of these three sites had been blocked in Denmark since 2008, and these are, or least were, blocked in Sweden, Norway and Finland as well. These sites were therefore known for at least two years in several countries, and apparently law enforcement authorities did nothing to try and get this illegal content removed.

This is even more disturbing because the Working Group managed to take down the remaining sites just by sending a few emails. Two of the sites were hosted in the USA, and even during the weekend (Friday, ca. 10 p.m. EDT) they were removed by the hosters within 30 minutes. On the following Tuesday, the third website was taken down by its registry in India, three hours after notification. The content was stored on a server in the Netherlands. “The removal of this dehumanising content and the pursuit of the perpetrators must have absolute priority. Internet Blocking leads to the exact opposite”, says Alvar Freude, who sent the take-down requests.

H/T to BoingBoing for the link.

Chopping off the “long tail” of Google searches?

Filed under: Economics, Technology — Tags: , , — Nicholas @ 07:29

For your daily contrarian view of the wonderfulness of Google’s new Instant Search feature, we turn to SmoothSpan:

The Internet is a Mighty Echo Chamber, and with one fell swoop, Google Instant Search has added a big ole’ Marshall Stack to turn the Echo levels all the way up to 11.

Google reports that Instant Search will save 350 million hours of user time per year. What isn’t reported is how it will cut off the Long Tail where it starts by promoting banal sameness for searchers. This is great for Google. After all, keeping up with every last oddball search someone may want to do costs them more infrastructure money. At their scale, it is significant. So, corralling everyone into fewer more common searches is a good thing.

[. . .]

How does Google Instant Search contribute to the Echo Chamber? Well anyone who has bothered to look through keyword information on their website will see that people find sites through a bewildering array of queries. Some might even say much of it is accidental, but looking over these lists gives a wonderful window onto how your content is found and perceived by others. How often do we get to commit such telepathy with our followers? Rarely. Yet, Instant Search will substitute popular searches for those individually created. More people will be driven off the back roads search trails and onto the superhighways that lead to whomever controls the first few search results connected to the Instant Searches Google is recommending at the time.

Oddly enough, I was talking about Google searches the other day with DarkWaterMuse (whose blog is offline at the moment), but it was more in the context of “how often are the sponsored links actually useful to you?” We both agreed that the correct answer fell somewhere in the range of “rarely” to “never”.

September 29, 2010

QotD: “Never attribute to malice that which can be explained by malice and incompetence”

Filed under: Media, Quotations — Tags: , , , , — Nicholas @ 13:11

I used to publish in the National Post back in the day Conrad Black ran the show. It was a business run with integrity. The last time I had a call from their editorial board I had to explain the Post paid me 40 cents a word. The man was genuinely scandalized — I mean audibly taken aback and offended — when I told him I would not hand my work over to him for free (btw, Adam, how did selling your integrity work out for you? Looks like you got what it was worth).

These days they don’t bother to call. Last week, they took my Margaret Atwood story and ran with it uncredited. They lacked the decency to do something that would have cost them nothing.

[. . .]

I am a writer. I don’t expect to get paid much. But I do expect to get paid. If this country aspired to be something more than a grasping, pissant kleptocracy celebrating third-raters and UCC school ties my work — this blog and others like it — would be understood as part of the real Canadian cultural establishment.

Fortunately, I don’t require their acknowledgement.

Nicholas Packwood, “Neither honour nor courage: The National Post”, Ghost of a Flea, 2010-09-29

Austin Bay summarizes the demographic problems China is facing

Filed under: China, Economics, Environment — Tags: , , , — Nicholas @ 09:11

This is all old hat if you’ve been reading the blog for a while, but it’s always good to see a good summary of key points, like this list by Austin Bay:

Internal Disorder: China’s primary threat is not the United States, or any other foreign power, but internal disorder. There are more angry people in China every day, and the government knows that this could blossom into widespread uprisings. It has happened so many times before in Chinese history. Protesting factory workers are an indicator.

Corruption: Corruption is the biggest complaint among China’s discontented; government officials, who are more interested in enriching themselves than in taking care of “the people” are particular targets. Many of the demonstrations and labor disruptions are the result of corruption among local officials, including the police.

The Communications Dilemma: In 2007, Chinese Internet use grew to over 210 million users. Cell phones are also increasingly available. China is the world’s largest cell phone market. The Internet is an economic and educational tool. However, it also undermines an authoritarian government’s ability to control (deny and spin) information. China’s 2010 “war with Google.com” illustrated this dilemma.

Ethnic Minorities and Language: China has a population of 1.4 billion. Han Chinese (“ethnic Han”) constitute approximately 92 percent of China’s population. China also has 55 “minority nationalities,” however, amounting to 100 million people. The 2009 Uighur riots in Xinjiang province (western China) and resistance in Tibet are symptomatic of the problem. They are resisting “Hanicization.”

Pollution and Water: In early 2008, China began shutting down “high pollution” factories. The reason? To clear the air for the 2008 Beijing Olympics. The growing wealth of the Chinese people is causing enormous pollution problems and water shortages. Effective pollution controls mean more expensive production methods. That makes Chinese goods less competitive.

The Marriage Gap: China’s “one child” policy crimped population growth, all right. More boys were born than girls; Chinese culture “favors” sons. As a result, there is a serious imbalance between men and women. In some places, there are 120 men per 100 women. Marriageable daughters are, reportedly, going largely to the upper social groups within each village or district. The sons of the poorest families are, to an extent, not finding wives. This is an indicator of future social trouble.

As I’ve said several times before, I’m not anti-Chinese: China has accomplished economic marvels in amazingly short time spans . . . but not without serious costs. Urban and coastal dwellers have benefitted disproportionally from the growth: rural and inland Chinese have suffered to provide the means for that growth. China is still not a free economy, and still represses dissent, imprisons critics, and controls far too much of the country’s economy both directly and indirectly. Corruption is rife, despite the savage punishment meted out to (some of) the (accused) perpetrators.

China’s miracle can’t continue for much longer unless the government starts to address these problems with the same kind of single-mindedness that they’ve brought to other problems. Introducing the rule of law would be an excellent first step, but it would directly challenge too many powerful men, some of whom (literally) have armies.

September 23, 2010

Meh. Civ V isn’t that addictive . . . is it really 2am?

Filed under: Gaming, Randomness, Technology — Tags: , — Nicholas @ 08:58

I received my copy of Civilization V from Amazon.ca yesterday, but I was in town all evening, so I didn’t sit down to start installing it until 10:30. I figured I could install it, twiddle about with the new UI, and still get to sleep by midnight. I probably could have, except you can’t play Civ V without registering an account with Steam. After creating the account, you apparently have to download the whole game (no idea why, as there’s a DVD-ROM in the package), and because I was online at peak hour for west coast gamers, the connection speed left more than a bit to be desired.

At around 11:30, the game finished downloading and I was able to actually start. “Oh,” I said to myself, “they’ve included tutorials. That’s nice of them. I guess that’ll cover the changed UI elements. I’ll try ’em.” I spent the next two hours just playing the tutorial scenarios.

It certainly does have the “gotta play just one more turn” thing down pat. It’ll do nicely to cover the gap until Guild Wars 2 is released.

« Newer PostsOlder Posts »

Powered by WordPress