Observation

Even with my cheap 8 x 25 binoculars, the moon is impressive on a cold, clear night. You can get quite a sense of its differing terrain and three-dimensional character. It may be an illusion, but it even seems barely possible to make out that Venus is a crescent rather than a point.

It would be really interesting to try out a pair of image stabilized 15 x 80 binoculars. With those, you could see a lot more detail – especially if you could get away from city lights.

Primer on website security

Smashing Magazine has put up a good article introducing some of the most common security vulnerabilities in websites. They are all things that site administrators should at least be aware of – including those who never actually touch code, but rely on something like WordPress to sort it out for them. Some of the attack types described include SQL injection, cross-site scripting (including the vulnerability of JavaScript), path traversal, cross-site request forgery, remote file inclusion, phishing, and clickjacking.

For those who run websites but know nothing about coding, there are three take-home messages:

  1. Update your software, to ensure that security holes get patched as they emerge. If you are still running WordPress 1.5, you have a big problem.
  2. Keep an eye out for weird behaviours. Are links appearing on your site that you didn’t put there? If so, there is a good chance it has been compromised.
  3. Remember: the internet is a dangerous place. Running a Mac doesn’t mean you’re safe from malware and other sorts of attacks. Neither does running a virus scanner or avoiding dodgy websites. If you have information you want to keep private, keep it encrypted. If you have data you don’t want to lose, back it up.

Sadly, the great majority of people are annoyingly indifferent about security these days. It seems like a couple of my friends always have their MSN or Facebook accounts taken over by spammers, and others are content to let their blogs fill up with spam comments. Such recklessness makes the internet a worse place, and it would be appreciated if people who choose to engage online do so with a bit more diligence and respect.

CES Franks on democracy in Canada

CES Franks, of Queen’s University, has written an interesting essay describing the state of parliamentary democracy in Canada: “The Functioning of the Present-Day Canadian House of Commons: a paper prepared for the conference in honour of Peter Aucoin.” It focuses to a considerable extent on the reality of minority governments in Canada today, though also considers broader factors and long-term trends. For instance, the number of days per year in which Parliament is sitting has fallen by a third since the 1950s and the proportion of government bills eventually receiving Royal Assent has fallen from over 90% to just over 50%.

Franks also highlights the drift towards a bigger role for the provinces, with fewer national strategies and initiatives:

[M]y findings leave me with a sense of slight unease, and I am prepared to argue that the role of Parliament has diminished in recent decades and is continuing to diminish, to the detriment of good government in Canada. Further, much of the reason for this diminished role does not lie in the fact that we now have a Pizza Parliament with four parties and a likelihood of continuing minority parliaments. The causes lie elsewhere, and many are beyond the control of Parliament and government. They lie in fundamental changes in recent decades in the political economy of the Canadian Federation, in the increasing role of provincial governments as compared to the federal government, and in the unwillingness, rightly or wrongly, for better or worse, of recent federal governments to establish national programmes, policies, and national standards for the services Canadians expect from their governments.

In some ways, wider variation between the provinces doesn’t seem problematic. After all, there is nothing objectionable about populations with different perspectives being governed under differing rules, selected through democratic processes in which they participate. At the same time, there does seem to be reason for concern about the possible diminishing of the entity that is Canada. For one thing, there are major cross-cutting challenges that all provinces need to address, and it makes sense to do so in a cooperative way. For another, the temptations to make policy with only an eye turned towards the short-term consequences might be even greater for individual regions than they are for the confederation as a whole.

The full Word document is online, and linked from the Macleans website.

Protective cushion for helicopters

Here’s a neat idea: a protective expandable honeycomb cushion for helicopters. They are rather dangerous machines, compared with fixed-wing aircraft, so anything that reduces the lethality of crashes would be welcome. Apparently, a test was conducted with a helicopter going 53 km/h and falling over 10m. Not only did the crash test dummies indicate that the accident would have been survivable for those inside, but the helicopter was in good enough shape to repair for a second trial.

Waiting on Massachusetts

It seems as though there are an absurd series of magnifying glasses over top of the Massachusetts senate race. If Scott Brown, the Republican candidate, takes over the senate seat of the late Ted Kennedy there is a good chance health care reform will die. If that happens, it seems certain that climate change will become even less of a priority in the United States. Also, it would probably increase the chances of a big swing towards the Republicans in the upcoming mid-term elections. If they lose their supermajority in the senate, the chances of either a domestic cap-and-trade strategy or the ratification of an international climate change treaty with binding targets will become very remote indeed.

All this at a time when global emissions need to peak in the next 1-10 years, if we are going to have a decent chance of avoiding more than 2°C of temperature increase. Note that that is a global peak; to accommodate continuing growth in poorer countries, places like Canada and the US will need to cut faster and deeper than average.

Of course, just because there is a plausible connection between a Republican win in this senate race and eventual failure to address climate change, the logic of failure cannot be flipped around to produce a template for success. To get the kind of action we need on climate change, a lot more things will need to go right.

Rapier’s insights into blogging

Over on his energy blog, Robert Rapier has written a summary of what he has learned, blogging about energy issues. The points seem pretty broadly applicable to those writing about technical and politically contentious topics. For those thinking of giving serious blogging a whirl, a couple of his points seem especially pertinent and well matched to my own experience. In particular, you won’t be able to predict which posts are popular and produce discussion, and which will not. Also, you shouldn’t expect to make any significant amount of money, and you should expect to be plagued by spambots trying to do so.

At its worst, blogging on substantive issues just produces a discordant echo chamber of people yelling at one another, continuing to use discredited arguments, and generally not advancing the state of discourse. That being said, I do think blogs have a lot of societal and pedagogic value. By forcing the author and commenters to defend their views in the face of criticism, they provide a valuable mechanism for sharpening thinking. Here’s hoping that helps to address the world’s grave problems, over the long term.

Cold: Adventures in the World’s Frozen Places

Dylan Prazak, wide angle

Bill Streever’s book takes a meandering and often macabre journey through various facts and stories about the world’s chilled regions: discussing everything from ground squirrel hibernation to the fatalities that resulted from the Schoolchildren’s Blizzard of 1888. While it contains a lot of highly interesting information, the book’s non-linear structure is distracting and contributes to its repetitiveness. Had Streever stuck to a conventional structure with chapters focused on different topics, the result would probably have been better.

Streever is at his best when discussing the human suffering brought on by cold, and the ingenious ways by which animals have learned to survive in it. The story of the Arctic caterpillars that freeze solid every winter, and take ten years to eat enough to undergo metamorphosis, is a poignant one. So too are Streever’s excellent descriptions of snow and feathers as insulating materials, as well as frostbite and hypothermia as unwanted consequences of extreme cold. The book has an entertaining habit of pointing out odd coincidences. For instance, readers will discover what a certain volcanic eruption has to do with Mary Shelley’s Frankenstein, Mormonism, and the invention of the bicycle.

Cold gives a fairly cursory treatment of climate change: mentioning it fairly often, but not getting into great detail. Streever takes it as a given that human greenhouse gas emissions will forever and substantially alter the world’s frozen places, and does not devote any time or attention to the kind of actions humanity could take if it wished to preserve the polar ice caps, glaciers, etc. The author acknowledges how his own jet-setting lifestyle is contributing to the destruction of the places that interest him so, but never takes time to really contemplate alternative behaviour for himself or humanity as a whole.

All told, Cold is well worth the couple of hours it takes to read. While some judicious editing would have been welcome, Streever’s book does manage to convey an appropriate sense of both curiosity and visceral dread about the importance that cold has played in our warming world.

Crush the Cell

Covered bridge at night, Vermont

Michael Sheenan’s Crush the Cell: How to Defeat Terrorism Without Terrorizing Ourselves covers ground that overlaps with that of Ghost: Confessions of a Counterterrorism Agent and Securing the City. Namely, the history of Al Qaeda in relation to the United States, and the question of what sort of policies the United States should adopt in response to terrorism. Sheehan brings an insider’s perspective, having served as New York’s Deputy Commissioner for counterterrorism. While Sheehan provides a lot of information and tries to argue a few key points, the book succeeds more as a source of raw information than as a source of analysis. In particular, Sheehan fails to fully justify his views that Al Qaeda will fizzle out in a few decades, and fails to provide a comparative justification for why targeting cells is the most effective way of undermining terrorist plots while avoiding unwanted secondary effects.

Sheehan covers a number of important and interesting topics: methods for counterterrorism, intelligence, and law enforcement; the (limited) competence of Al Qaeda operatives; the risks that arise then officials practice ‘cover your ass’ security; the significance of weapons of mass destruction; torture and human rights; and the importance of not granting terrorists the psychological advantages that arise when we allow ourselves to be terrorized. In the last of those, he echoes a point well-made by Bruce Schneier. Sheehan also provides an insider’s perspective on the controversial rebuilding of the former World Trade Center site, including why construction has been so slow to begin.

Among the three books I have recently read on this subject, Securing the City probably provides the most insight into effective counterterrorism strategies developed and deployed in New York, while Ghost may be the most compelling personal account (though one lacking in balance). Crush the Cell occupies a middle territory – worth reading for those who want even more details and examples than they have found from other sources, but probably not essential reading for those only moderately interested in the subject.

Generation IV nuclear

The Economist has an article summarizing a few possible next-generation fission reactor technologies. They include the Supercritical water-cooled reactor (SCWR), the Very High Temperature Reactor (VHTR), the Sodium-cooled fast reactor (SFR), the Gas-cooled fast reactor (GFR), the Lead-cooled reactor (LFR), and the Molten-salt reactor (MSR). Most promise higher efficiency than conventional pressurized water reactors, largely because they run at a higher temperature. Some are also capable of using more esoteric forms of fuel. For instance, the MSR can use thorium once it has been ‘seeded.’

The article doesn’t give too much consideration to the many challenges facing the nuclear industry: cost, chief among them. Given how opaque the costs of nuclear are, it is hard to know whether existing reactor technologies are really cost-competitive with renewables now, much less untested new variants.

Intercepting UAV video

Metal steps

In an unexpected development in the contest between insurgents and drone-wielding western armies, it seems that cheap software is capable of intercepting video feeds from UAVs, and that this is being put to use in Afghanistan, Iraq, and Pakistan. This is done using software like SkyGrabber, which is available online for about $25.

Insurgents with radio gear and the software cannot control the drones, but they can see what the Americans consider to be worth watching, work out where convoys are located, etc. The US is apparently working on improving the encryption used by the drones, in order to make it harder to intercept and interpret their communication. You wouldn’t think it would be so difficult to put chips on the drones that are capable of applying strong symmetric or public key encryption algorithms to outgoing communications. And as for bandwidth on the network, few contemporary encryption algorithms produce ciphertext that is substantially larger than plaintext; as such, the burden of transmission should be about the same with or without strong encryption.

Partly, all this is an illustration of how the security of a whole chain of operations can be compromised by the weakest components – especially when other components in the system will reduce their security level for the sake of compatibility. Just as it is problematic to have card readers for chip and PIN cards that will fall back to using the magnetic strip when the chip doesn’t work, it is problematic to have a drone communications network in which a few non-upgraded components degrade the quality of encryption across the entire link.

Making the transmissions more directional, and employing other techniques like frequency hopping, could also reduce the vulnerability of UAVs to both cryptanalysis and simple traffic analysis. Drones operating off satelite uplinks could be set up to broadcast overwhelmingly upward, where signals are unlikely to be intercepted. More autonomous drones that can operate independently and transmit information in short bursts might also be more resistant to interception. While the Taliban can’t be too advanced in their cryptographic capabilities, you can be sure that competing navies will be tryingt to get into the drone-based Broad Area Maritime Surveillance (BAMS) system the US Navy is building.