Then and now

George W. Bush, 3/17/03:

The Iraqi regime has used diplomacy as a ploy to gain time and advantage. It has uniformly defied Security Council resolutions demanding full disarmament. Over the years, U.N. weapon inspectors have been threatened by Iraqi officials, electronically bugged, and systematically deceived. Peaceful efforts to disarm the Iraqi regime have failed again and again — because we are not dealing with peaceful men.

UN Committee Against Torture, 5/19/06, as summarized by the BBC:

The US should close any secret “war on terror” detention facilities abroad and the Guantanamo Bay camp in Cuba, a United Nations report has said. The UN Committee against Torture urged the US to ensure no one was detained in any secret facility.

Full report here (PDF).

More Amtrak observations

Some bitching and MacGyvering from on the road….

Bitching: it is absolutely stunning how many people, when exiting an Amtrak bathroom, do not close the fracking door behind them. If you happen to be sitting near the bathroom, this is a Very Bad Thing.

MacGyvering: in a pinch, toothpaste can be used to adhere a 3×5 card on a bathroom door when you need a makeshift sign. Plus, it’s minty fresh where minty is very useful.

Wiretapping, pen traces, and free SkypeOut

Ars Technica with an excellent overview of NSA programs. Be sure to follow the links to the story about Mark Klein, the AT&T whistleblower, and Klein’s statement to the press.

Meanwhile, I received an email today from Skype telling me that all phone calls made via Skype from anywhere in the US and Canada to any phone number in either country are now free for the rest of 2006. (They were previously about two eurocents a minute.) Since Skype phone calls are encrypted, this may or may not be related to what’s going on in the NSA revelations, but it’s very interesting. Notably, since Skype calls can be made from public wifi points, this bypasses both wiretapping and casual attempts at an IP trace. And it will probably lead me to buy less cell phone minutes. How many millions of others will do the same?

Only downsides that I can think of are that my laptop is not available while walking around (but PocketPC PDAs are, and are Skype compatible), and that SkypeOut calls don’t provide a caller ID, which strikes me as marginally unprofessional for business calls.

These are minor knocks, and it might move millions of phone calls into encrypted channels. I’m trying to wrap my head around how huge this might be.

Addendum: Apparently, reporters at ABC News are being individually targeted to find out who they are calling.

Phone calls that aren’t (yet) being monitored

According to Engadget Mobile, T-Mobile and Verizon Wireless cell phone records are not being provided to the NSA. Obviously, if you’re calling a US landline, they can pick it up on the other end.

The jury is still out on whether a pen trace on Skype phone calls is possible, but as far as I’ve heard they’re currently outside the NSA dragnet. On the other hand, Skype is still the only consumer-level phone system that provides end-to-end 128-bit encryption transparently to its users, so the call itself cannot be tapped if you’re calling to another Skype user — again, if you’re calling a landline, you’re exposed on the other side.

Idiot, indicted, and just maybe, telling us what we need to know

Gary McKinnon is an idiot. Or he’s the most dangerous hacker who has ever penetrated US military systems.

Evidence for idiocy comes from Slashdot’s discussion of McKinnon’s failed attempt in a British court to block his extradition to the United States.

Evidence for danger comes from this BBC report that the US claims he caused $700,000 in damages hacking military and government computers.

A few thoughts, off the cuff:

No question, we’re talking grade-A idiot. For one thing, he was looking for hidden UFO data. For another, he was spelunking about in US military systems and got caught using off-the-shelf monitoring tools, rather than hacker tools that might at least have given him a shot at covering his tracks.

But is he dangerous? And more importantly, is there anything we should be taking away from this story?

For one thing, if McKinnon’s claims are true that he accessed some of these systems and found that they had no password protection, that’s something we need to be looking at very strongly. I don’t think it excuses his actions (neither does his stupidity, for that matter), but there’s not a great deal of difference between what McKinnon did to NASA and what you’re doing to jeffporten.com right now. That is, the difference isn’t “hacking”, but rather that I want you here, and the NASA computer is more obscure than my site. But still findable, and still on the Internet.

Here’s an example. Let’s say you’re using a computer with nmap installed, and you type in the following command:

nmap -sS 209.124.50.132

What you will get back is a list of protocols on which my website is willing to talk to you. Now let’s say you do this instead:

nmap -sS 143.84.24.*

and you’re stupid enough to do this from somewhere other than someone else’s Wifi access point. What you’ll get back is a list of people in dark suits with badges who are suddenly interested in what you’re doing. Because now you’re mapping a block of sites that includes the Army Research Laboratory, whose scary warning I blogged a while back.

Note that I have not actually run that command and I don’t think you should either. You’ll end up scanning 256 computers that are most likely all military, and for all I know some of them are not supposed to be accessed by guys without uniforms. But all of them are on the Internet, and all you’ve done so far is walk up to all of them and say, “Hi! What services are you running?”

So let’s say you’ve done this, and somebody over in the Double Secret Probation Security Department decides to figure out if you’re an idiot or a true threat. He gets a team to trace your traffic. But you used several of nmap’s standard obfuscation techniques (which I’m not going to document for you; they’re easy enough to find), so it takes them a week to figure out which logs apply to you. Then they have a map of IP addresses from which Internet providers you used, so they ask an FBI type to go knocking on ISP doors and connect those to physical addresses.

Then they set up a surveillance team and nail your ass.

No, I’m not running off on some paranoid fantasy. I’m just working some numbers from the Bureau of Labor Statistics, and doing a few sums in my head, and the figure I come up with is that what took you about five seconds to do, cost about $25K for the US government to nail you for, just in terms of salaries for the people involved. Probably higher since my numbers presume that these computer techies and FBI types don’t have any supervisors and prosecution is done pro bono.

That’s why I’m, well, skeptical when I see numbers like “$700,000 [in] damage to military and NASA systems”. I remember seeing reports of attacks on military computers from the 1990s, designed to scare the hell out of Congress, where the exact line of code I listed earlier would have been counted as 16,777,216 separate attacks on military networks. Under extremely vague statutes in force today, opening your laptop in the wrong part of Washington DC, and accidentally handshaking with an open government Wifi base station, could constitute a terrorist attack.

Which is not to say that I think this is a secret government plot to throw all computer users in Gitmo. Every server I run is attacked on the order of 1,000 times a day by automated attacks, and I’m guessing that any government system gets hit far worse. Most folks fly way beneath the radar even if they are terminally stupid, and I presume that McKinnon did something to set off an alarm bell or two.

But if he is right, and he did find services that were inadequately protected, then it would be awfully nice if the process of prosecuting him also exposed these problems and caused them to be fixed. Because it’s axiomatic that if he found them, he wasn’t the first nor the last. Somehow, I don’t expect that kind of open trial is going to take place.

And I gotta say… the worst hack in US military history came from a UFO nut in London, working alone, and cost only $700K to fix? Man, that’s the most reassuring news I’ve heard in years.

The Moussaoui verdict

I’ve recently had to resurrect a line when discussing Zacarias Moussaoui that I originally used when discussing Timothy McVeigh — that is, I’m morally opposed to the death penalty, but you wouldn’t catch me with a sign protesting the night this particular guy got the hot shot.

So I was pleasantly surprised last week, wandering by a CNN broadcast at the CFP hotel, to see that our national drive for blood revenge took a brief recess. As I’ve discussed before, much of our military action since 9/11 has been as much (or more) driven by a need to “get the bastards” as by a real understanding of what needed to be done to protect ourselves in the future, or to bring the right bastards to justice. I assumed that Moussaoui, as the only 9/11-related case to be brought to trial, was toast.

And that’s the tricky thing about justice — it just gets so messy when you involve judges and juries and the need to make a coherent argument. Especially when your prosecutors taint the evidence. But thanks to Mark Kleiman for pointing out an interesting blowback effect from our war on terror and its concomitant war on legality.

As Michael Isikoff notes in the linked video, Moussaoui isn’t the only guy we have in custody, but he’s the only guy who’ll be going to trial. And that’s because our trial system doesn’t allow for waterboarding, genital electrocution, or imprisonment without trial. By our own definitions, it’s impossible to bring the rest of the 9/11 conspirators to justice, because we ourselves have violated our standards for justice.

Kleiman shows he has a great sense of humor by suggesting that we can send these people to the International Criminal Court for trial for war crimes. Anyone care to lay me the odds of that happening before 2009?

Debunking the nuclear “bunker buster”

I find it hard to believe that it’s still necessary to make the argument that “nuclear weapons are bad”, but apparently half the country still hasn’t gotten the memo. Worthwhile reading is this Harper’s essay discussing why a nuclear earth penetrator is neither clean nor efffective.

[A] 400-ton explosion would have to occur a full 600 meters underground in order to be “contained.” These guidelines also stipulate a carefully sealed burial shaft to contain the blast, not a maw. Even the B61-11, at its current, inadequate impact speeds, does not burrow a clean rabbit-hole in the ground but rather kicks up a crater like a meteorite; any faster-moving penetrator would do so to a still greater degree.

Even supposing that the missile’s point of entry were miraculously neat, a nuclear blast at the depths a real missile could attain would invariably breach the surface of the earth, expelling a hot fallout cloud in what is known as a “base surge.” Base surges are more dangerous than traditional fallout clouds because they are more toxic, containing irradiated particles of dirt and rock. They also spread more quickly, sweeping across the surface of the earth in every direction, outward rather than upward. Bunkers are usually built in urban areas, so many thousands of deaths would be a virtual certainty. Even a 1-kiloton bunker buster–a relative firecracker, with a tiny fraction of the explosive power of the high-yield RNEP–detonated at fifty feet underground could eject about 1,000,000 cubic meters of radioactive soil.

Sleep is for the weak

Fascinating science reporting can be found in Sleep Retardant Properties of My Ex-Girlfriend, which proves once again that CMU researchers have a sense of humor, and really need one:

I spoke to Hermina and explained my study and its results, as well as the importance of getting sufficient sleep. I concluded by explaining that, due to her sleep-retardant properties, I could not continue to sleep with her, an act she termed “breaking up”.

When Tom, who I mentioned earlier in the paper, discovered that Hermina and I had broken up, he expressed interest anew in sleeping with her. I attempted to warn him about Hermina’s sleep-retardant properties. In response, he referred to me as an “idiot”. This clearly demonstrates his lack of understanding of the value of sleep.

How people find me, April version

My favorite search terms that brought people here, in order of Google PageRank:

1. flying hoverboards (5/10,900)

2. pookaliscious (6/80)

3. atlantic city slots players on september 11 2001 (8/348,000)

4. jeffrey wing war of world (10/16,500,000)

5. jewish deli montana (20/212,000)

6. bryan greenberg said (28/998,000)

7. coolest website (31/17,800,000)

8. perry como gettysburg (not in the top 100 out of 174,000)

9. sick canary (not in the top 100 out of 828,000)

10. sign of the coming apocalypse (not in the top 100 out of 5,260,000)

And oddly enough, for the popular search for “jeff is an idiot”, I’ve dropped from first place to not even in the top 100.

Twain. Mencken. Colbert.

Who says there’s nothing entertaining on C-SPAN? Tune in to Stephen Colbert’s address to the White House Correspondent’s Association dinner for the most scathing satire I’ve heard in many years. Co-starring Helen Thomas as the Terminator.

The video is in two parts — the video itself is SFW, but the site that hosts it may have some, er, interesting stills on the rest of the page. Part one, part two.

jeff@themovies: Protocols of Zion (2005)

A few years ago, I attended a conference in Europe where one of the participants was an Egyptian graduate student. As it turned out, she was also an outspoken anti-Semite, as we found out shortly after she made the mistake of assuming that the redheaded guy from Texas was a safe person to talk to. Apparently in Egypt there are no Jewish redheads.

In the space of about an hour, those of us at the conference who were Jewish became palpably aware of it, both in ourselves and in our acquaintances. It’s not that we suddenly distrusted the goyim—in fact, the universal rejection of this woman’s beliefs at an international conference was highly encouraging—but for an American who happens to be Jewish, it was a sudden reminder that others see me as a Jew who happens to be American, should they happen to care.

At the end of that conference, I had a long conversation with one of its organizers, who had been hidden during World War II from Nazi sympathizers. He is secular and (so far as I know) staunchly agnostic, but he’s from a Jewish family, and he would have died at the age of six if a few dozen people hadn’t given him a place to be. During this conversation, I commented that as an American, I think of anti-Semitism as a largely historical artifact.

He responded, in essence, that I had the luxury of believing this because I was young and naive, and that I lived in a place that temporarily allowed me to remain ignorant. If I were lucky, I could remain so, but he didn’t expect this would happen.

This experience has informed my view of both Judaism and anti-Semitism since, and it’s with this in mind that I think every Jew should be required to watch the HBO documentary Protocols of Zion. I think it’s a fairly important movie for everyone in the anti-hate community, Jewish or gentile, but for us it’s compulsory. Especially for those of us living in urban areas where being Jewish is so common that we forget for years at a time that it makes us different. Separate. Apes and pigs, in the words of one three-year-old interviewed in the documentary.

The thing about being Jewish is that we forget that it’s not us who decides whether it matters. I’ve been called a kike from time to time, but so far as I know I’ve never been discriminated against, nor do I think it’s in the least bit likely. But cultures have a way of changing course, and I note how simple it has been to flare up anti-Muslim hatred in the last five years. It seems to me to be a short step from hating the followers of Allah to hating the followers of, well, the same God but without the Jesus part. It’s something I think about when evangelicals use the language of religion in the pursuit of political office. It’s something I think about when I hear hateful, and sometimes justifiable, things being said about Israel in regards to their Palestinian policies.

In 1990, I got lost on the Leningrad subway, and a local who spoke English escorted me halfway across town and spoke with me for nearly an hour. I introduced myself as an American. He introduced himself as a Jew. He planned to emigrate to Israel, where he would then be regarded as Russian, and probably persecuted for that. He was teaching his children self-defense, because the one thing he knew is that they would be in many fights at schools in both countries.

He didn’t decide that he was a member of something Other. That was done for him. And while I still think it ludicrous that my own ancestry might ever do the same to me here, history has a tendency of surprising the hell out of many people who felt the same way I do.

Protocols of Zion is available on Cinemax on Demand through May 10th.

About the Cult of Macintosh

You can rapidly judge whether an argument is emotional or rational by the amount of backstory that’s necessary to justify it.

This argument will require a lot of backstory.

I’m replying to Brian’s Being All That Apple Can Be essay here, and I can already tell that I’ll spend as much time talking about the “Apple community” and my experience working with Apples (dating back to 1981 or so) as I am going to discuss these nifty new machines that can boot Windows. In fact, in this essay, the Mac community is all I have room to discuss.

We’re Not Zealots, We’re Fanatics

The first thing I’d like to address is the term “zealot”. Yes, Apple users are, well, emotionally involved with their computers. Actually, all computer users are emotionally involved with their computers, and if you don’t think so, then you’ve never seen an undergraduate have a breakdown in a computer lab when his senior thesis got eaten by a power surge.

We’re all human (most of us, anyway), and we anthropomorphize the technologies we rely on. We name our cars. We customize our cell phones. And we chant reassuring incantations to our computers to encourage them to do what we want.

What differentiates Apple users from the superset of all computer users is that we attach our pet concepts to the brand name. I doubt that there’s any computer user on the planet who hasn’t verbally attacked his computer—brand name notwithstanding—when it foiled his plans for the day. But what Apple users have noticed is that we seem to say nice things to our computers more often than the rest of you.

Perhaps that’s no longer true. Perhaps there are thousands of Windows XP users out there who have named their laptop “Strawberry” and who sing metaphorical lullabies to it when it goes to sleep. All I can say is that I haven’t met those people, but I meet their Apple counterparts on a daily basis.

The vast majority of my interaction with “average” computer users is at Starbucks and other public Wifi points. All I can report on is this anecdotal experience. There was once a time when I would frequently be the only Apple user in the store. Today that ratio is closer to 50% or greater. Apple users talk to each other; the glowing bat-signal on the case is a beacon that invites conversation. I’ve seen this rarely with Palm users; never with Windows laptops.

The distinction between zealots and fanatics is that zealots are engaged in religious battles. Fanatics have reasons, however tenuous, for their devotion. The Apple community does have its zealots, no question; arguably, this dynamic was created when the zealots of the 1980s believed that any computer with a graphic interface was a “toy”. But most of us do stick with Apple for sound reasons, and most of us do note when Apple makes a misstep.

Our Relation to the Mothership

There’s no doubt that most computer companies do not have users sticking decals on their cars. Few non-Mac users ever cared about the loss of graphic doodads on their computers like we noted the discontinuation of the rainbow Apple and the happy Mac.

But we also remember, and not with fondness, John Scully and Gil Amelio. We remember the proliferation of beige boxes with incomprehensible numbers and completely different architectures. We remember the twelve different versions of System 7.

Which is why we treat Steve Jobs like a demigod: not because he is the head of Apple, but because he remade Apple into the company we wanted it to be.

And what do we want it to be? Brian accuses us as follows:

Among the most brand-loyal consumers on the planet, the Zealots believe that Apple is a different kind of company.  Nicer.  Purer.  Out for something more than generating profit for its shareholders.  Out to make the world a better place.  The only company on the planet that would willingly forego something profitable for something “cool.” The Luke Skywalker to Microsoft’s Darth Vader. The Ben & Jerry’s of personal computing.

This is almost entirely accurate. Apple isn’t alone in this, either; Ben & Jerry’s does quite nicely on its own corporate benevolence policies, and there are even organizations that promote the idea that turning a profit should not be the be-all and end-all of a corporation, as heretical as that might seem in the halls of Wharton.

Where it is inaccurate is the belief that we don’t care whether Apple turns a profit. You can’t go out today and buy a Timex/Sinclair, or an Amiga, or a SpectraVideo, despite the fact that each of these computers had some rather nifty features. If Apple collapses as a company, then the day comes when we can’t go out and buy a Macintosh. I am seriously invested in using Macintoshes; this is something I care about.

But let’s explore the idea of “cool” for a moment. No, Apple didn’t invent the GUI, but Apple did popularize it. Apple did set the standard for twenty years (and counting) of what a computer should do. Apple also introduced trackballs and palm rests into their laptops. Apple arguably set the stage for Palm devices. Apple was the first to popularize Wifi computing, and the first to build Bluetooth into an entire line of laptops.

Are these merely cool features? Hardly. These are affordances; design choices that allow the average person to do things with technology that were previously impossible. These things did not happen because they were guaranteed to be profitable; they happened because the designers at Apple do think that they are working towards some goal that is higher than the pursuit of profit.

I don’t know what the accountants in 1993 had to say about the profitability of the palm rest design. What I can say, with little fear of contradiction, is that having worked with Apple laptops for 13 years, 10-12 hours per day, seven days a week, I probably owe my lack of a crippling RSI injury to some anonymous industrial designer working at Apple when I was an undergraduate. Now that these are the industry standard, so does nearly every other laptop user.

As Brian points out, Apple enjoys a level of rockstar coverage in the tech world and mainstream press that is far out of proportion to its market share. Is that because the news media has been brainwashed by the Jobs Reality Distortion Field, like we are? Or because it’s generally recognized that when you go to an Apple announcement, you are likely going to see something that makes news, even for non-Apple users?

This is why we give allegiance to Apple. Making the world a better place should not be an accusation.

Safety in (Low) Numbers

Which brings us to the perennial market share argument. A few years ago, I found myself quoted extensively on the Internet with the line, “Yes, it’s true: Windows has 50,000 applications you will never use, while the Macintosh has only 10,000 applications you will never use.” From the user perspective, the market share argument has much the same dimensions.

No question, there are more Windows users out there than Mac users, by some vast number. There are constant arguments about what percentage of people use Macs, since market sales overlook the fact that Macs have longer lifespans than Windows machines.

I’ll leave that aside for now; pick your pundit and run with his numbers. I’ll just return to Starbucks. In Washington DC, New York, and Philadelphia, at Wifi hotspots, the number of Apples has been steadily growing for years. It’s not uncommon to only see Apples in such places. Maybe all the Windows users have desktops. Maybe Windows has complete market domination of the red states. Maybe the Mac users like their laptops more and bring them with them to coffeeshops in greater numbers. Doesn’t much matter; the community is visibly growing and has been for some time.

There are two viewpoints a current Mac user could bring to this phenomenon:

1) They might like being part of a small, special clique, a member of the “rest of us”, and view with some suspicion any move by Apple that will grow the market share quickly.

2) They might just like using Apples and talking to other people who use Apples, and the more, the merrier.

Of course, I’m firmly in the second camp. I make my living selling clever ideas to people who use Macs, and every new Mac user is part of Jeff’s expanded target market. However, all of us in camp 2 share some concerns with camp 1:

1) If Apple expands their market by creating radically different computers (i.e., computers that suck), then since we have to buy those computers eventually, we fear that someday our computers won’t be as enjoyable to use.

2) A flood of new people means people who don’t enculturate into the existing community as smoothly. Cf. the “Christmas modemers” of the late 1980s who changed the nature of many BBS systems, or the AOL onslaught that caused the “death of USENET”. Mac users are self-selected, and so part of why we have a community is because we might share some things in common. Expand that community rapidly, and the commonality fades.

I personally don’t think either is likely; Apple’s next computers are different, but they don’t suck and I don’t expect that to change. And I’ll worry about the community changes that come with larger market share when it happens; that would alter the community, but there will be concomitant benefits.

In my next essay, I’ll cover technical details that Brian brings up, and get into more detail about shipping hardware.