Correct me, Lord, but in moderation…

Jeremiah 10:24.

Accounts of error-correcting codes always start with the (3,1)-repetition code — transmit three copies of each bit, and let them vote, choosing the best two out of three when there is disagreement. Apparently this code has been in use for longer than anyone had realised, to judge by this passage from the Jerusalem Talmud:

Three scrolls [of the Torah] did they find in the Temple courtyard. In one of these scrolls they found it written “The eternal God is your dwelling place (maon)“. And in two of the scrolls it was written, “The eternal God is your dwelling place (meonah)”. They confirmed the reading found in the two and abrogated the other.

In one of them they found written “They sent the little ones of the people of Israel”. And in the two it was written, “They sent young men…”. They confirmed the two and abrogated the other.

In one of them they found written “he” [written in the feminine spelling] nine times, and in two they found it written that way eleven times. They confirmed the reading found in the two and abrogated the other. (tractate Ta’anit 4:2, trans. Jacob Neusner)

(h/t Masorti Rabbi Jeremy Gordon, who alluded to this passage in an inter-demominational panel discussion yesterday at the OCHJS. He was making a different point, which for some reason had very little to do with information theory.)

What would they do with the data?

The Conservatives and the security services are ramping up the propaganda for the digital panopticon, now particularly pressuring US-based social network companies to give up their quaint ideas of privacy. If you’re not with the snoopers you’re with the terrorists and the paedophiles.

“Terrorists are using the internet to communicate with each other and we must not accept that these communications are beyond the reach of the authorities or the internet companies themselves,” [David Cameron] told MPs after the report was published.

“Their networks are being used to plot murder and mayhem. It is their social responsibility to act on this.”

This refers to the government report on the murder of soldier Lee Rigby by an Islamist extremists Michael Adebolajo and Michael Adebowale, that accuses Facebook (not by name — the name of the company was only leaked to the press, for some reason) of failing to inform the security services that they had been carrying on conversations about plans to murder a soldier on Facebook.

Try this out with regard to telephone service: If criminals were found to have plotted a killing on the telephone — not that such things ever happened before there was Facebook — would that be taken to prove that the telecoms are responsible for monitoring the content of every phone call? What about the post? What if they didn’t use electronic media, but fiendishly took advantage of the fact that there is currently no electronic surveillance in everyone’s bedrooms?

Why aren’t the security services who have been downloading all of our communications, including everything on Facebook, supposedly to protect us from terrorism, responsible for detecting the terrorist chats?

Those who see no problem with the collection of vast quantities of private data by various security services, or who see it as a necessary evil, tend to assume that Western democracies can ensure through legal structures that the information is used in the public interest, in the defence of democracy. Others believe this is naïve. There is nothing about Western democracy that nullifies the basic truths of humanity, and how people respond to the temptations of power.

If you are having difficulty imagining what our wise and good protectors in the security services might get up to if they had access to a complete collection of correspondence, maps of contacts, purchasing history for everyone in the country — indeed, for most of the world — consider this historical affair that has recently been in the news: Continue reading “What would they do with the data?”

“Networks of choice”

I’ve commented before on the brilliant satirical sketch from the 2008 US election campaign, in which John McCain’s campaign staff discussed an ad accusing Barack Obama of proposing tax breaks for child molesters. “Did he really do that?” asks the candidate. “He proposed tax breaks for all Americans, and some Americans are child molesters” was the answer.

Last year, Home Secretary Theresa May applied this joke structure to the abuse of anti-terror laws to attack press freedom. Now the Guardian reports that the new director of GCHQ Robert Hannigan is keeping up this satiric tradition. He

has used his first public intervention since taking over at the helm of Britain’s surveillance agency to accuse US technology companies of becoming “the command and control networks of choice” for terrorists.

Fortunately, since it’s just the terrorists who prefer using Google and Apple and Facebook and Twitter they’ll be easy for the security services to target. The honest people are presumably all using the upstanding high-quality British online services. Because they have nothing to hide.

What does it mean, by the way, that the Guardian calls this a “public intervention” (rather than a speech, as other political figures are described as delivering)? It sounds ominous.

Wi-fi jumprope

At a recent committee meeting, where the provision of wireless internet access in our college library was discussed, someone raised the question “What does ‘wifi’ mean, anyway?” As it happens, I’d looked into that about a decade ago, when I was brought up short by a bizarre comment in an article the East Bay Express (a generally excellent free weekly in the Berkeley-Oakland area):

In the East Bay, cities such as Concord, Hayward, San Pablo, and Walnut Creek are launching or planning on launching citywide wi-fi, which is short for wireless fidelity.

I’d been a fairly early adopter of wireless internet, having installed it at home in 2003, before it was available in many public places (though I’d first encountered it at the University of Copenhagen, when I attended a conference there in January 2003; at that time my Apple laptop didn’t have any built-in wireless connectivity) but I’d never paid much attention to the term “wifi”, which seemed silly to me. I assumed it was a meaningless back-formation from “hi-fi” — odd in a way, since that term itself was so outdated, and even in my childhood I knew it mainly as a joke, as in the Peanuts strip (which itself was more than a decade old at that point) where Lucy boasts to Charlie Brown that she has a “hi-fi jumprope” — which turned out to be true. But I found it hilarious that some journalists completed the cycle, assuming that if “hi-fi” was short for “high fidelity” and “wi-fi” is analogous to “hi-fi”, then “wi-fi” stands for “wireless fidelity”.

The force of “overwhelming”

The New Republic has published a film review by Yishai Schwartz under the portentous title “The Edward Snowden Documentary Accidentally Exposes His Lies”. While I generally support — and indeed, am grateful — for what Snowden has done, I am also sensitive to the problems of democratic governance raised by depending on individuals to decide that conscience commands them to break the law. We are certainly treading on procedural thin ice, and our only recourse, despite the commendable wish of Snowden himself, as well as Greenwald, to push personalities into the background, is to think carefully about the motives — and the honesty — of the man who carried out the spying. So in principle I was very interested in what Schwartz has to say.

Right up front Schwartz states what he considers to be the central dishonesty of Snowden’s case:

Throughout this film, as he does elsewhere, Snowden couches his policy disagreements in grandiose terms of democratic theory. But Snowden clearly doesn’t actually give a damn for democratic norms. Transparency and the need for public debate are his battle-cry. But early in the film, he explains that his decision to begin leaking was motivated by his opposition to drone strikes. Snowden is welcome to his opinion on drone strikes, but the program has been the subject of extensive and fierce public debate. This is a debate that, thus far, Snowden’s and his allies have lost. The president’s current drone strikes enjoy overwhelming public support.

“Democratic theory” is a bit ambivalent about where the rights of democratic majorities to annihilate the rights — and, indeed, the lives — of individuals, but the reference to “overwhelming” public support is supposed to bridge that gap. So how overwhelming is that support? Commendably, Schwartz includes a link to his source, a Gallup poll that finds 65% of Americans surveyed support “airstrikes in other countries against suspected terrorists”. Now, just stopping right there for a minute, in my home state of California, 65% support isn’t even enough to pass a local bond measure. So it’s not clear that it should be seen as enough to trump all other arguments about democratic legitimacy.

Furthermore, if you read down to the next line, you find that when the targets to be exterminated are referred to as “US citizens living abroad who are suspected terrorists” the support falls to 42%. Not so overwhelming. (Support falls even further when the airstrikes are to occur “in the US”, but since that hasn’t happened, and would conspicuously arouse public debate if it did, it’s probably not all that relevant.) Not to mention that Snowden almost surely did not mean that he was just striking out at random to undermine a government whose drone policies he disapproves of; but rather, that democratic support for policies of targeted killing might be different if the public were aware of the implications of ongoing practices of mass surveillance. Continue reading “The force of “overwhelming””

Default settings, encryption, and privacy

One essay that powerfully shaped my intellect in my impressionable youth was Douglas Hofstadter’s Changes in Default Words and Images, Engendered by Rising Consciousness, that appeared in the November 1982 issue of Scientific American (back when Scientific American was good), and Hofstadter’s associated satire A Person Paper on Purity in Language. Hofstadter’s point is that we are constantly filling in unknown facts about the world with default assumptions that we can’t recognise unless they happen to collide with facts that are discovered later. He illustrates this with the riddle, popular among feminists in the 1970s, that begins with the story of a man driving in a car with his young son. The car runs off the road and hits a tree, and the man is killed instantly. The boy is brought to the hospital, prepped for surgery, and then the surgeon takes one look at him and says “I can’t operate on this boy. He’s my son.” As Hofstadter tells it, when this story was told at a party, people were able to conceive of explanations involving metempsychosis quicker than they could come to the notion that the surgeon was a woman. It’s not that they considered it impossible for a woman to be a surgeon. It’s just that you can’t think of a human being without a sex, so it gets filled in with the default sex “male”. (The joke wouldn’t really work today, I imagine. Not only are there so many women surgeons that it’s hard to have a very strong default assumption, but the boy could have two fathers. On the other hand, a “nurse” has a very strong female default, so much so that a male nurse is frequently called a “male nurse”, to avoid confusion.)

Continue reading “Default settings, encryption, and privacy”

Frege and sexual abuse

Slate’s Amanda Hess has written about the case of Retaeh Parsons, a Nova Scotia girl who committed suicide last year, four years after being the victim of bullying over a photograph of her being sexually assaulted. She became famous across Canada after the police originally refused to prosecute those who assaulted her. The national, and then international, outcry, inspired some creativity among the reluctant police, who have now successfully prosecuted one of the perpetrators for child pornography.

The main point of the article was to comment on how

the judge in the case has barred Canadian journalists and everyday citizens from repeating the girl’s name in newspapers, on television, over the radio, and on social media. He cited a portion of Canadian criminal code that bans the publication of a child pornography victim’s name in connection to any legal proceeding connected to that alleged crime.

She quotes a Halifax reporter Ryan Van Horne on the perverse effect:

If you say the name “Rehtaeh” in Nova Scotia… you’ll be met with “instant recognition” of the case and all of the issues it represents. But when Van Horne asks locals, “You know that victim in that high-profile child pornography case?” he draws blanks. The famous circumstances surrounding Rehtaeh Parsons’ bullying and death don’t fit the traditional conception of a child pornography case, which makes linking the two difficult if reporters aren’t allowed to use her name and photograph.

This sounds like a horrible version of Frege’s Morning-Star/Evening-Star puzzle: News media (including social media) are allowed to talk about Retaeh Parsons (the famous child victim of sexual abuse and online harassment); and they are allowed to talk about the victim in that high-profile child pornography case. But they are barred from talking about Retaeh Parsons as the victim in that child pornography case. In Fregian terms, it’s as though we banned any reference to the “morning star”, but were still allowed to talk about the evening star.

Of course, there’s nothing terribly unusual here: Often important privacy concerns turn on concealing the identity of what appear to be two different individuals. It only seems so perverse here because the person whose privacy would implicitly be protected is 1) famous for her role in this case; and 2) deceased, which means that the only people whose privacy is being protected are the police officials who screwed up so badly in the first place.

Porn suits

One of Roald Dahl’s final and most bitter stories (from the late 1980s) tells of a scam engineered by a rare book seller, who picks names out of the obituaries, and then sends a bill to the grieving family that includes expensive items of exotic erotica. The families inevitably pay the bill and avoid asking any embarrassing questions, assuming that the deceased had kept these proclivities well hidden.

I was reminded of this when I saw this article in The New Yorker, about the web site X-art.com, that has become “the biggest filer of copyright-infringement lawsuits” in the US.

Today, they average more than three suits a day, and defendants have included elderly women, a former lieutenant governor, and countless others. “Please be advised that I am ninety years old and have no idea how to download anything,” one defendant wrote in a letter, filed in a Florida court. Nearly every case settles on confidential terms, according to a review of dozens of court records…

It is hard to see why anyone facing such a suit would choose not to settle: hiring a lawyer costs more than settling, and damages are exponentially higher in the event of a loss at trial. Plus, no one wants to be publicly accused of stealing pornography. To avoid embarrassment, many defendants may choose to settle before Malibu Media names them in a complaint.

Quoting clichés

There’s an interesting article in the NY Times on hackers’ use of remotely controlled devices like thermostats and vending machines to penetrate otherwise well-secured corporate networks. The subject matter is interesting, but I was also interested in the way experts were quoted. In particular, one network security expert

 compared the process of finding the source of a breach to “finding a needle in a haystack.”

I’m sure she really did use those words, but it seems peculiar to be putting a standard phrase like that in quotation marks, which are usually reserved for individual turns of phrase, or for emphasising the particular choice of words. In particular, it’s strange that only the cliché was quoted. It’s as though a national security reporter wrote “An administration source said the decision would have to be made by “the president”. Another source agreed that the decision would be made by “Barack Obama”.” Or “the engineer in charge of developing the product reduced the size of the design team, arguing that “too many cooks spoil the broth”.”

Hackers will be hackers

Guardian reporter Luke Harding has published some background material on the reporting for his new book The Snowden Files. Apparently someone in the security services decided to play with his mind while he was reporting on them. Not only did he and other reporters have laptops stolen (including from a locked hotel safe), not only did both the Guardian offices in London and in Washington, as well as the New York home of their US editor in chief suddenly have sections of pavement being dug up and replaced, but when Harding was texting his wife from Rio de Janeiro

“The CIA sent someone to check me out. Their techniques as clumsy as Russians.” She replied: “Really? WTF?” I added: “God knows where they learn their spycraft.” This exchange may have irritated someone. My iPhone flashed and toggled wildly between two screens; the keyboard froze; I couldn’t type.

And then, while writing the book at home in Hertfordshire,

I was writing a chapter on the NSA’s close, and largely hidden, relationship with Silicon Valley. I wrote that Snowden’s revelations had damaged US tech companies and their bottom line. Something odd happened. The paragraph I had just written began to self-delete. The cursor moved rapidly from the left, gobbling text. I watched my words vanish. When I tried to close my OpenOffice file the keyboard began flashing and bleeping.

Over the next few weeks these incidents of remote deletion happened several times. There was no fixed pattern but it tended to occur when I wrote disparagingly of the NSA.

Now, this isn’t the worst abuse of human rights in recorded history. It’s just a prank. But exactly for that reason, it underscores a point I made back at the beginning of l’affaire Snowden: Fear of the techniques the NSA and its confederates have been developing, and in the data they gather, depends not on their being villains with nefarious intentions. It depends on their being careless mortals who have no idea what use their techniques and their data will be put to.

I doubt that there was any senior official who thought that tipping off a Guardian reporter to their real-time computer manipulation capabilities would be a brilliant idea. My guess is, some bored hacker assigned to monitor Harding’s computer got cocky, and decided to show off his electronic muscles. (It’s pretty intimidating, though. Presumably it would be child’s play for them to remotely plant child pornography on the hard drive of someone they’re eager to shut down. At least in the old days, the spies needed to break into your home to plant drugs.)

GCHQ and the NSA can’t exist without hiring hackers, but getting hackers to work on your security problems is like the old lady who swallowed the spider to catch the fly. (She’s dead, of course.) I like hackers, by and large. But I like them as scrappy underdogs. The combination of arrogant macho hacker culture with essentially unlimited resources and military organisation is, to put it bluntly, terrifying. And if the leaders of our security services think they can keep the hackers under control, they’re delusional.