Open thread: Libya

I haven’t had time to write anything about the ongoing situation in Libya, but I thought it would be worthwhile to have a discussion thread on the topic.

How do people interpret what is happening? As a democratic uprising? As a civil war? As a combination of the two?

What, if anything, should the international community do? Would imposing a no-fly zone be legal? Would it be a good idea?

Selling F15s

Does it strike anyone else as strange and somewhat objectionable that the United States is selling the F-15 attack aircraft to Saudi Arabia? Before being supplanted with the F22 and F35, the F15 had unmatched capabilities. As such, you need to wonder whether the United States would be better off keeping sales of the old plane restricted and being less bothered about developing new generations of attack aircraft during an era where they already possess complete air superiority.

A cynical perspective is that this all comes down to the arms industry. They can’t sell F-15s to the United States anymore, so they want new customers. Even better, they know that the United States will feel threatened by F15s in the hands of potentially unstable regimes like Saudi Arabia, and that the US will respond by purchasing more F22, F35s, and other hardware.

It’s like a gun shop that sells its newest weapons only to its best customers, but progressively makes each new weapon available to anyone with the cash. That keeps the best customers locked on an upgrade pathway and keeps weapon designers in business. Unfortunately, it also makes the world a riskier place, and wastes substantial resources that could be better applied to reducing poverty or building a more sustainable society.

Intrusion detection systems

One side of computer security is keeping people from getting unauthorized access: choosing good passwords, patching software to protect against known exploits, etc. But when you reach a more advanced level than that, intrusion detection systems (IDS) become an important way of detecting and mitigating attacks. These systems monitor the functioning of a computer system or account and produce some sort of alert if suspicious activity is ongoing.

For example, GMail includes a rudimentary IDS. It allows users to check whether anyone is logged into their account from another location. If you check the list and see only your home IP address and your phone, everything is probably fine. If some random IP address from Berlin or Mumbai or Tokyo is on there, someone has probably compromised your account.

IDS can be much more sophisticated than this. While GMail calls upon the user to keep an eye on things manually, automated systems can flag suspicious activity and produce warnings. A classic example would be a computer in a distant country accessing your GMail via POP3 and starting to download the entire contents of your archive. That is super suspicious and – if you are someone like Sarah Palin – potentially career-ending.

The same goes, naturally, for a situation where some random army private starts accessing and downloading thousands of diplomatic cables. Say what you will about the ethics of Wikileaks, but from a computer security perspective there should have been an IDS that spotted that aberrant pattern.

Attackers always get more sophisticated and their attacks always improve. As a consequence, those who want to defend computer systems must keep raising their own game by implementing sophisticated security strategies. Deploying IDS both on personal computers and within cloud services like GMail is one way in which people can become aware of breaches in time to stop them from becoming too severe. It’s never comfortable to learn that you are dealing with an intruder, but it is much better to have that awareness than to continue blindly forward while they persist in nefarious activities.

P.S. Does anyone know of a good IDS for Macs? Given how many people are on always-on internet connections these days, and given that all operating systems have security flaws that take time to fix, operating an IDS on one’s personal computer is probably a good security trade-off. Indeed, I am planning to set up a second system unconnected to the internet, next time I buy a new desktop machine. It is axiomatic that any computer connected to the internet is vulnerable.

Adrian Harewood on Black History Month

As part of Black History Month, I attended a speech by Adrian Harewood, a journalist with the CBC. One of the things he spoke about was the importance of interrogating received versions of history – going back and uncovering the more complex story that has usually been streamlined into a simpler narrative. He gave the example of Viola Desmond, from Nova Scotia, who has arrested and tried for sitting in the portion of a movie theatre in New Glasgow designated for white people in 1946. People like to think such segregation was something that happened in the southern United States, but it seems it was something that happened in Nova Scotia too. He also talked about the two teenaged black women who did exactly what Rosa Parks later did in Montgomery, Alabama but who were deemed unappealing test cases by the black community, given that they seemed radical and unsavoury, in comparison with Rosa Parks herself.

There are a number of lessons to draw from all of this. It reinforces the important point that history serves a purpose, and that dominant narratives can be highlighted while more awkward counter-narratives are suppressed. For instance, the second world war is often presented as a response to the Holocaust, whereas the historical evidence for that claim is weak. Indeed, Canada refused to accept at least some Jewish refugees during WWII. Similarly, while people are quick to point out the war crimes committed by the Axis powers, they are much more hesitant to consider whether the indiscriminate bombing of German civilians was a war crime. Similarly, embarrassments like the 1967 Klippert decision of the Supreme Court of Canada are not much mentioned.

We should not allow ourselves to get too comfortable with official histories that only tell the stories that flatter us. It is only be recognizing the grave errors in our own histories that we can really appreciate our own potential for error. When we recognize that people who we admire were dead wrong about critical moral issues in the past, we also open our own minds to the possibility that we are passively accommodating – or even facilitating – grave injustice today.

Feynman and the Trinity test

This post have been revamped in response to a perceptive comment. The old version is available here.

In Surely You’re Joking, Mr. Feynman, American physicist Richard Feynman speculates that he may have been the only person who watched the Trinity Test relatively directly, using a windshield to exclude ultraviolet light. Everyone else, he claims, was looking through something akin to welding goggles.

This claim is contradicted in chapter 18 of Richard Rhodes’ The Making of the Atomic Bomb, in which Rhodes claims that Ernest Lawrence considered watching the test through a windshield, but decided to step out of the car and watch it directly, and that Robert Serber also watched with unprotected eyes.

Feynman does come up a few times in Rhodes’ Pulitzer Prize-winning book. He is quoted on the limitations of human understanding (p.32-33 paperback), the boundaries of science (35), and the status of Seth Neddermeyer‘s plutonium implosion setup in 1943 (479). The book also describes Feynman coining of the term ‘tickling the dragon’s tail’ to describe Otto Robert Frisch‘s dangerous criticality experiment (611), and fixing a shortwave radio being used during the Trinity test itself (668). In one of his books, Feynman describes how he began fixing neighbourhood radios as a small boy.

Quite possibly, people other than Feynman did watch the test without welding goggles and he never found out about it, or at least learned of it after the wrote the speculative comment in his book.

The social and political importance of sustained Chinese growth

Some socio-economic questions are so complex that they are probably impossible to definitively answer, since we only have one planet to work with and one human history unfolding. We can’t run a bunch of trials and work out the probabilities involved (sweet, sweet Monte Carlo method). At the moment, one such question is: “What would happen geopolitically if economic growth in China really slowed down for a while?”

The question relates to how quickly China should deploy renewable energy, to help respond to climate change.

One can imagine a benign scenario where growth slows a bit while China focuses on greenery, the air in Beijing gets cleaner for a span longer than the Olympics, and China’s importance within the global system continues to increase smoothly (though how benign that increase is is another question).

One can also imagine a less benign scenario where the Chinese economy isn’t producing enough jobs to employ the generation entering the workforce. Without jobs, they could focus in large numbers on more destabilizing things, like overthrowing the Communist Party and establishing a more credible democracy (though what the many considerations involved in any such matter would be is another question, as well).

All told, the state of the global economy now seems pretty worrying. The immediate financial crisis was staved away with giant amounts of public money. But not much actual reform seems to have taken place in the financial system. At the same time, the European Union is dealing with a crisis and Japan continues to stagnate. If you believe that growth is generally good (though greenhouse gas pollution must fall), you have good reason to worry about the state of the world economy today. Alternatively, the same is true if you think growth is generally good for global stability, and global stability is important (World Wars are nasty things).

Oversight over institutions of armed power

On Yes, Prime Minister, a character describing a situation in which a document was leaked discusses the difference between what you do when you really want to find the source of a leak and what you do when it is all just for show. When it is for show, he says, you conduct a leak inquiry. If it is for a serious investigation, you call in ‘Special Branch’.

Reading through the Wikipedia entry on ‘Special Branch’ gave me a bit of pause. It seems like the term is used to refer to two different types of sub-organizations, within broader security structures like national police forces and armies.

Outward intelligence gathering

One sort of Special Branch is the macho Jack Bauer sort that wears flak jackets and drops in on terrorists from helicopters. They are also the ones with the machines for listening to private phone calls and reading private emails, back doors into supposedly confidential databases, and other such legally dubious trickery.

Having some kind of organization of this sort is important – especially for keeping genuinely dangerous things like biological and nuclear weapons away from terrorists. At the same time, giving such an organization an increasingly broad mandate just increases the risk that the organization itself will become abusive, or that the intelligence it collects will be used for inappropriate purposes.

There has to be some kind of meaningful, outside, civilian scrutiny of such organizations. If they are allowed to sit up at the top of the chain deciding who can trust who, we cannot allow them to be a secretive band of unknown people. It may render them less effective as an intelligence organization, to be subject to civilian oversight, but it is ultimately important for the security of society that this be so.

Quite possibly, governments shouldn’t have any organizations that they are not prepared to appear before a fairly elected legislature (in secret, perhaps) and answer detailed questions about.

Internal oversight

The other sort of Special Branch answers the question: Quis custodiet ipsos custodes? They are a response to the reality that organizations like armies and police forces attract bullies – people who are themselves attracted to power. At times, such people will abuse that power. That danger is increased enormously when the people are put within structures that will protect them, regardless of what they do. If the police force protects officers who use excessive force, their violent tendencies are likely to get worse.

Having a Special Branch to check for this kind of corruption in the rest of the service makes a lot of sense, and is an important check on police power. After all, a bad police officer is a scary thing. They are armed with weapons and power, and the judge will almost always take their word for how a situation went (unless there are photos or a video).

Changing balance

On Yes, Prime Minister, I think they were talking about the internal sort of Special Branch, looking for wrongdoing within powerful organizations. These days, I fear the outward-looking type of Special Branch has grown more powerful by comparison, partly by capitalizing on the fear people have of terrorism (despite the tiny chance of being a victim).

When people are fearful of non-governmental forces, they can easily err and make the government overly mighty. People also need to maintain in their minds the corresponding fear of abuse by government itself. The government is so powerful that it can do considerable harm by accident, and its control over information is such that we may never really know what accidents or abuse have taken place.

Terrorists can kill some innocent civilians – maybe a lot if they get hold of something dangerous. But the police can create a police state. They can seize the government with one of their own by force, if the other institutions of the state become weak enough. We need independent people watching over them more than we need them to be looking into the local radical cell.

House of Cards

House of Cards is a British television series available on Netflix.ca. It is like an evil version of Yes, Minister – documenting the functioning of British politics, but with a much darker and more brutal tone. For example, the Prime Minister uses the SAS to carry out assassinations which are blamed on the IRA; security personnel murder unarmed civilians with impunity; and extensive cover-ups are successfully undertaken.

It’s the sort of show political junkies might appreciate, though I think it is probably less true to life overall than its more light-hearted equivalent.

Prosecuting high-level Western war criminals

Writing in the Ottawa Citizen, Dan Gardner argues convincingly that the admission of former President Bush that he ordered people tortured makes him a war criminal who can be prosecuted as such:

Do laws apply to the United States and its president as they do to other nations and men? On the weekend, Swiss officials were very nearly forced to answer that explosive question. Depending on George W. Bush’s travel schedule, Canadian officials could be put on the spot next.

In his memoirs, published late last year, and in subsequent interviews, Bush explicitly said he ordered officials to subject terrorism suspects to waterboarding and other torture techniques. The fact that he had done so wasn’t much of a surprise. There was already heaps of evidence implicating the Bush administration, up to and including the president. What was shocking was that Bush admitted it. He even seemed to boast about it. “Damn right,” he said when Matt Lauer asked whether he had ordered waterboarding.

Gardner goes on to recognize that Bush is unlikely to actually be charged by any state, given how much doing so would probably harm that state’s bilateral relationship with the United States.

Under the terms of the United Nations Convention Against Torture and Other Cruel, Inhuman and Degrading Treatment or Punishment (UNCAT), an official doesn’t need to engage in torture directly to be in contravention. The torture needs to happen at “the instigation of or with the consent or acquiescence of a public official or other person acting in an official capacity”.

By that standard, there are probably a lot of war criminals around. It’s not clear whether President Obama has stopped all American-initiated interrogation techniques that constitute torture. Similarly, given what is known about the Afghan security services, it is quite possible that officials from states including Canada have violated international law by handing over prisoners to people who were likely to torture them (potentially violating Part II of the Third Geneva Convention).

In a related story, British journalist George Monbiot has helped to establish a bounty for those who attempt to arrest former British Prime Minister Tony Blair for committing war crimes.

Egypt and oil

FiveThirtyEight has some interesting analysis posted on Egypt, Tunisia, and (lack of) oil supplies:

Egypt does have some oil: it produces about 600,000 barrels a day, with a retail value of about $18 billion annually. Still, because of Egypt’s large population, this would translate to only about $220 per capita. And most of Egypt’s oil stays in its domestic market: it exports only 89,000 barrels a day, which would produce $2.6 billion a year at a price of $80 per barrel, or just $32 per person. This is much less than the aggregate figure for the Middle East, which is $1,605 per person.

All told, countries are probably better off when they don’t have oil. Most of the ones that have it are at least partly corrupted because of it, and even the ones who avoid that get hooked on oil revenues despite the better angels of their environmental consciousness.