| |
"The future masters of technology will have to be lighthearted and intelligent. The machine easily masters the grim and the dumb." -- Marshall McLuhan, 1969 |
|
Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall, by Greg Conti, et. al. |
|
|
Topic: Technology |
5:00 am EDT, May 30, 2006 |
In 2005, Greg Conti [2] presented a paper at the IEEE conference hosted by Georgia Tech and at which Rita Katz spoke. Included below is the abstract of his talk. The proceedings were published by Springer, linked here for subscribers. An extended version of the paper is also available directly from Conti, along with PowerPoint slides. Intelligence analysts are flooded with massive amounts of data from a multitude of sources and in many formats. From this raw data they attempt to gain insight that will provide decision makers with the right information at the right time. Data quality varies from very high quality data generated by reputable sources to misleading and very low quality data generated by malicious entities. Disparate organizations and databases, global collection networks and international language differences further hamper the analyst’s job. We present a web based information firewall to help counter these problems. It allows analysts to collaboratively customize web content by the creation and sharing of dynamic knowledge-based user interfaces that greatly improve data quality, and hence analyst effectiveness, through filtering, fusion and dynamic transformation techniques. Our results indicate that this approach is not only effective, but will scale to support large entities within the Intelligence Community.
I've gotten a copy of the IEEE paper. I should have a chance to read it later. Looks interesting. Filtering, Fusion and Dynamic Information Presentation: Towards a General Information Firewall, by Greg Conti, et. al. |
|
Topic: War on Terrorism |
2:10 pm EDT, May 29, 2006 |
The following is a massive roundup of links about Rita Katz from noteworthy: --- You may remember Terrorist 007, Exposed from a few months ago. That was an article by Rita Katz. I was interested in whether the New Yorker article had generated any buzz in the press. The story was picked up yesterday by The Middle East Times, a Cyprus based publisher. The SITE Institute provides an open listing of its publications, including a summary of each item. As a non-profit, SITE seeks donations. If you give $1,000 or more, she will send you a "free" copy of her book -- a $16 value, absolutely free! About the book, Robert Steele says: Reliable sources in the counter-terrorism world inform me that this book is partly fiction in that the author is systematically integrating the accomplishments of others into her story as if they were her own. I have, however, decided to leave my review intact because she tells a very good story and its key points are right on target. I recommend the book for purchase by all--on balance it is a fine contribution. As I finished the book, I agreed completely with the author's basic premise, to the effect that open source information about US terrorist and charity ties, properly validated, should be posted to the Internet for all to see.
Here's an early article about the brouhaha over her book. She was also interviewed by National Review. Islamic terrorism is different from organized crime on several levels and it needs to be confronted accordingly. For terrorists, money is not a goal, but rather a means. Islamic terrorists, unlike other criminals, have no value for life, not even their own. Without understanding their motives and way of thinking, they cannot be defeated. Therefore, Islamic terrorism needs to be studied in depth, and it needs to be addressed as a global, long-term problem. Which brings me to the strategic planning of the war on terror. The only way we can win this war is if we, the West, will force countries, governments, and organizations that educate, preach, and fund jihad to stop what they are doing.
Her relationship with the government has been rocky at times, as she related in her book: "The CIA was investigating me and t... [ Read More (2.9k in body) ] Googling Rita Katz
|
|
A New Open-Source Politics | MSNBC |
|
|
Topic: Politics and Law |
6:04 am EDT, May 29, 2006 |
Will 2008 bring the first Internet president? Last time, Howard Dean and later John Kerry showed that the whole idea of "early money" is now obsolete in presidential politics. The Internet lets candidates who catch fire raise millions in small donations practically overnight. No one knows exactly where technology is taking politics, but we're beginning to see some clues. For starters, the longtime stranglehold of media consultants may be over. In 2004, Errol Morris, the director of "The Thin Blue Line" and "The Fog of War," on his own initiative made several brilliant anti-Bush ads (they featured lifelong Republicans explaining why they were voting for Kerry). Not only did Kerry not air the ads, he told me recently he never even knew they existed. In 2008, any presidential candidate with half a brain will let a thousand ad ideas bloom (or stream) online and televise only those that are popular downloads. Deferring to "the wisdom of crowds" will be cheaper and more effective.
A New Open-Source Politics | MSNBC |
|
The Organization Man, by William Whyte |
|
|
Topic: Society |
5:24 am EDT, May 29, 2006 |
In the 21st century, the "scene" transcends the concepts of individual and organization. This book is about the organization man. If the term is vague, it is because I can think of no other way to describe the people I am talking about. They are not the workers, nor are they the white-collar people in the usual, clerk sense of the word. These people only work for The Organization. The ones I am talking about belong to it as well. They are the ones of our middle class who have left home, spiritually as well as physically, to take the vows of organization life, and it is they who are the mind and soul of our great self-perpetuating institutions. Only a few are top managers or ever will be. In a system that makes such hazy terminology as "junior executive" psychologically necessary, they are of the staff as much as the line, and most are destined to live poised in a middle area that still awaits a satisfactory euphemism. But they are the dominant members of our society nonetheless. They have not joined together into a recognizable elite--our country does not stand still long enough for that--but it is from their ranks that are coming most of the first and second echelons of our leadership, and it is their values which will set the American temper. I am going to call it a Social Ethic. With reason it could be called an organization ethic, or a bureaucratic ethic; more than anything else it rationalizes the organization's demands for fealty and gives those who offer it wholeheartedly a sense of dedication in doing so--in extremis, you might say, it converts what would seem in other times a bill of no rights into a restatement of individualism. But there is a real moral imperative behind it, and whether one inclines to its beliefs or not he must acknowledge that this moral basis, not mere expediency, is the source of its power. Nor is it simply an opiate for those who must work in big organizations. The search for a secular faith that it represents can be found throughout our society--and among those who swear they would never set foot in a corporation or a government bureau. Though it has its greatest applicability to the organization man, its ideological underpinnings have been provided not by the organization man but by intellectuals he knows little of and toward whom, indeed, he tends to be rather suspicious. Let me now define my terms. By social ethic I mean that contemporary body of thought which makes morally legitimate the pressures of society against the individual. Its major propositions are three: a belief in the group as the source of creativity; a belief in "belongingness" as the ultimate need of the individual; and a belief in the application of science to achieve the belongingness. An ideal of individualism which denies the obligations of man to others is manifestly impossible in a society such as ours, and it is a credit to our wisdom that while we preached it, we never fully practiced it.... [ Read More (0.3k in body) ] The Organization Man, by William Whyte
|
|
Private Jihad: How Rita Katz got into the spying business | The New Yorker |
|
|
Topic: War on Terrorism |
3:27 am EDT, May 29, 2006 |
Counterterrorism as vocation. True Believers Wanted. Rita Katz has a very specific vision of the counterterrorism problem, which she shares with most of the other contractors and consultants who do what she does. They believe that the government has failed to appreciate the threat of Islamic extremism, and that its feel for counterterrorism is all wrong. As they see it, the best way to fight terrorists is to go at it not like G-men, with two-year assignments and query letters to the staff attorneys, but the way the terrorists do, with fury and the conviction that history will turn on the decisions you make -- as an obsession and as a life style. Worrying about overestimating the threat is beside the point, because underestimating the threat is so much worse.
It's clear the US government, and much of the international community, seeks to deter, detect, and seize the proceeds of international fundraising for terrorism. But what about private financing of non-governmental counterterror organizations? I'm not talking about desk jockeys. I'm talking about, what if Stratfor went activist, moved to the Sudan, or Somalia, or Yemen, and used the proceeds of a vastly expanded subscription business to fund their own private Directorate of Operations? Would governments indict the subscribers? If private counterterrorism is deemed terrorism in the eyes of official national governments, how should transnational corporations respond when terrorists begin targeting them directly? To whom do you turn when your infrastructure is simultaneously attacked in 60 countries? Must you appeal to the security council, or wait for all 60 countries (some of whom are not on speaking terms with each other) to agree on an appropriate response? What about when some of those countries are sponsors of the organization perpetrating the attack? "The problem isn't Rita Katz -- the problem is our political conversation about terrorism," Timothy Naftali says. "Now, after September 11th, there's no incentive for anyone in politics or the media to say the Alaska pipeline's fine, and nobody's cows are going to be poisoned by the terrorists. And so you have these little eruptions of anxiety. But, for me, look, the world is wired now: either you take the risks that come with giving people -- not just the government -- this kind of access to information or you leave them. I take them."
It's the computer security story again. Katz runs a full disclosure mailing list. Privately the Feds are subscribers, even as they complain publicly about training and propriety. This article probably earns a Silver Star, although it might have been even stronger if it had been a feature in Harper's or The Atlantic, where it could have been twice as long, and could have been less a personal profile and more about the substance and impact of her work. It's been a year now, and at risk of self-promotion, I'll say it's worth re-reading the Naftali thread. Private Jihad: How Rita Katz got into the spying business | The New Yorker |
|
Academic freedom and the hacker ethic |
|
|
Topic: Computer Security |
6:20 pm EDT, May 27, 2006 |
Hackers advocate the free pursuit and sharing of knowledge without restriction, even as they acknowledge that applying it is something else.
Decius has been published in this month's issue of Communications of the ACM. Its a typical Decius rant about freedom to tinker; really a hacker's perspective on the Bill Joy/Fukuyama argument that science needs to be centrally controlled and partially abandoned. The issue is a special issue on Computer Hackers with submissions from Greg Conti, FX, Kaminsky, Bruce Potter, Joe Grand, Stephen Bono, Avi Rubin, Adam Stubblefield, and Matt Green. Many folks on this site might enjoy reading the whole thing if you can get your hands on it. The articles mesh together well and there is some neat stuff in here. Academic freedom and the hacker ethic |
|
©opyBites: Copyright Law Blog: Orphan Works Legislation |
|
|
Topic: Intellectual Property |
11:10 pm EDT, May 24, 2006 |
Lamar Smith has a nack for writing bills that I hate, but this rule change is baddly needed and I support it. Chairman Lamar Smith (TX-21) today introduced the “Orphan Works Act of 2006” (H.R. 5439), which creates new guidelines for use of copyrighted material when the original owner cannot be located.
©opyBites: Copyright Law Blog: Orphan Works Legislation |
|
SpaceRef | LiftPort Group releases book: ''LiftPort -- The Space Elevator: Opening Space to Everyone'' |
|
|
Topic: Space |
8:50 pm EDT, May 24, 2006 |
LiftPort Group, the space elevator companies, today announced the release of "LiftPort -- The Space Elevator: Opening Space to Everyone," a new book on the LiftPort Space Elevator, a revolutionary new way of sending cargo and humans into space. Compiled by LiftPort, the Seattle based company dedicated to building the first commercial elevator to space, the new book is an exploration of both the scientific and social aspects relating to the development of the LiftPort Space Elevator, as told by a collection of nearly 40 leading authors and experts on science and space.
Michael Laine did a series of panels at the science and technology programming track JonnyX organized at DragonCon last year. I was very impressed with the work the LiftPort Group has done. This book should be interesting SpaceRef | LiftPort Group releases book: ''LiftPort -- The Space Elevator: Opening Space to Everyone'' |
|
Reporting Vulnerabilities is for the Brave |
|
|
Topic: Computer Security |
3:51 pm EDT, May 23, 2006 |
As a consequence of that experience, I intend to provide the following instructions to students (until something changes): 1. If you find strange behaviors that may indicate that a web site is vulnerable, don’t try to confirm if it’s actually vulnerable. 2. Try to avoid using that system as much as is reasonable. 3. Don’t tell anyone (including me), don’t try to impress anyone, don’t brag that you’re smart because you found an issue, and don’t make innuendos. However much I wish I could, I can’t keep your anonymity and protect you from police questioning (where you may incriminate yourself), a police investigation gone awry and miscarriages of justice. We all want to do the right thing, and help people we perceive as in danger. However, you shouldn’t help when it puts you at the same or greater risk. The risk of being accused of felonies and having to defend yourself in court (as if you had the money to hire a lawyer — you’re a student!) is just too high. Moreover, this is a web site, an application; real people are not in physical danger. Forget about it. 4. Delete any evidence that you knew about this problem. You are not responsible for that web site, it’s not your problem — you have no reason to keep any such evidence. Go on with your life. 5. If you decide to report it against my advice, don’t tell or ask me anything about it. I’ve exhausted my limited pool of bravery — as other people would put it, I’ve experienced a chilling effect. Despite the possible benefits to the university and society at large, I’m intimidated by the possible consequences to my career, bank account and sanity. I agree with HD Moore, as far as production web sites are concerned: “There is no way to report a vulnerability safely”.
The problems remains, there is no way to report vulnerabilities to site owners without taking on a huge personal risk. I've seen security issues at the university I attend, and I've looked the other way. There is no incentive to point them out, and no whistleblower protections for security researchers. Reporting Vulnerabilities is for the Brave |
|
Wired News: Why We Published the AT&T Docs |
|
|
Topic: Civil Liberties |
2:34 pm EDT, May 22, 2006 |
AT&T claims information in the file is proprietary and that it would suffer severe harm if it were released. Based on what we've seen, Wired News disagrees. In addition, we believe the public's right to know the full facts in this case outweighs AT&T's claims to secrecy.
Wired has now published ALL of the AT&T documents. I agree with Wired that this information doesn't create a competitive problem for AT&T. AT&T is playing the proprietary card for technical reasons. I also don't think that publishing this information harms national security. Basically, yawn, there is nothing here that indicates that this is anything more then a CALEA compliance room. Mind you, the problem with CALEA is that it creates all of the infrastructure needed to allow access to all of the content, and anyone who had access to the content, or possibly anyone who can guess your SNMPv3 password, can pretty much do whatever they want with it so long as they don't get caught. This is why civil libertarians opposed CALEA. However, proving that the intercepts in this case aren't lawful is going to take more evidence than this. Suggested reading on Prior Restraint: * New York Times v. United States (403 U.S. 713) - Pentagon Papers case The only effective restraint upon executive policy and power in the areas of national defense and international affairs may lie in an enlightened citizenry. Because of the importance of these rights, any prior restraint on publication comes into court under a heavy presumption against its constitutional validity.
* United States v. Progressive (467 F. Supp. 990) - H-Bomb Case This case is different in several important respects. In the first place, the study involved in the New York Times case contained historical data relating to events that occurred some three to twenty years previously. Secondly, the Supreme Court agreed with the lower court that no cogent reasons were advanced by the government as to why the article affected national security except that publication might cause some embarrassment to the United States. The Secretary of State states that publication will increase thermonuclear proliferation and that this would "irreparably impair the national security of the United States." The Secretary of Defense says that dissemination of the Morland paper will mean a substantial increase in the risk of thermonuclear proliferation and lead to use or threats that would "adversely affect the national security of the United States." Defendants have stated that publication of the article will alert the people of this country to the false illusion of security created by the government's futile efforts at secrecy. They believe publication will provide the people with needed information to make informed decisions on an urgent issue of public concern.
The title of this Wired article is a reference to the issue of The Progressive that revealed the Teller-Ulam design. "The H-Bomb Secret: How we got it, why we're telling it" Wired News: Why We Published the AT&T Docs |
|