AdBlock arms race?

I have been happily using AdBlock for years, with few if any inconveniences resulting. Lately, however, I have noticed websites partially sabotaging themselves for AdBlock users. I suppose this makes sense – they must hate the loss of advertising revenue.

It wouldn’t surprise me if even the sites that aren’t taking action in response to AdBlock now are tracking which of their visitors have used the software in the past.

Be careful with free WordPress themes

A public advisory to fellow bloggers: many free WordPress themes available online contain dodgy links or even malicious code.

Here is some information on how to find safe ones.

I use the (non-free) Thesis theme, but would prefer if other people stopped adopting it. There are too many sites that look just like mine already…

Sovereign debt crises in the EU

I find all the economic anxiety in the European Union (EU) to be rather worrisome, from a long-term historical perspective. I think the last 500 years of history demonstrate pretty convincingly that the most benign possible way for European states to spend their time is arguing over agricultural subsidies and cheese standards. It’s definitely a lot more congenial than building tanks and smashing through Poland and Belgium over and over.

As such, I rather hope the EU is able to sort things out and set up systems that prevent these problems in the future. There definitely need to be ways in which the actions of less responsible governments can be prevented from requiring frequent bailouts from more responsible governments, but I don’t think the risk of that happening from time to time is so severe that it is worth derailing the whole European project over.

How to start a cult

While I am having difficulty finding a reputable source to confirm it, I have been told the following odd thing about human psychology: if a person wears glasses that flip their vision upside down, about three days later their brain will adjust and invert their sight. If they then remove the glasses, their vision will seem to be upside down before it flips again, more quickly.

I don’t think all that many people are aware of this quirk of human psychology. As such, it seems like something you could build a cult around.

You would come up with a long and convincing build-up to a supposedly sacred ritual in which people wear the glasses. You tell them that if their vision eventually flips, it is because your deity has deemed them worthy of being tested. Then, you tell them that when they remove the glasses, one of two things will happen. Either their vision will be inverted forever, or it will flip back. Tell them that if it flips back, it means your deity has found them worthy, and they are on track for some sort of magnificent afterlife.

Because people would think the flipping was supernatural, it would make a gullible subset believe anything else you cared to tell them (like about how they need to sell their home to help fund the crystal statue that will bring about the end of the world). Eventually, people will leave the cult and tell their story, and neurologists will appear on the news to explain that the vision-flipping is normal and being used to scam people. By then, however, you will be long gone with a lot of money.

I think this could work partly because vision is such a key part of a person’s life. Seeing it flip would be a powerful emotional experience, especially if you were prepared in advance to interpret it in a specific metaphysical way. The period between the first and second flip would be full of anxiety – since you already know the flipping is possible, but fear it could be permanent for you. Then, the second flip would really lock at least a few people in. It would feed their narcissism by telling them they are special, and it would seem to be something beyond the power of ordinary science or reasoning to explain.

I think people have probably bought into cults on the basis of less convincing evidence than this. Get a couple of celebrity adherents and the road to wealth and influence would be short and smooth.

Disclaimer: While you might actually be able to start a cult in this way, it wouldn’t be a very nice thing to do.

The first rule of the internet

Against a sophisticated attacker, nothing connected to the internet is secure. Not your GMail account, not your Facebook account, not your website, not your home computer (especially if you are using WiFi), not industrial facilities, not governments.

While this may not absolutely always hold, I am increasingly convinced that the right way to treat the internet is to act as if this is so. If there is some information you absolutely want to keep private, keep it in a form that is not linked to the internet. Dig out an old computer for non-networked use or, better yet, use paper. Accept that anything you put online, even in a private email, could end up on display to the entire world.

People can certainly do a lot to protect themselves from what are essentially untargeted attacks. The people who run botnets just need control of random computers, and their attack methods are good enough to breach security on your average system. If security in yours is significantly better than average, you are probably at little risk from such annoyances. Everything changes, however, when the attacker has resources and expertise at their disposal, and they have you for a specific target. Organizations like governments, corporations, and organized crime groups have these resources, and attack techniques are always spreading to less sophisticated operators. As they say at the NSA, “Attacks always get better; they never get worse.”

Similarly, it is safest to assume that there is no mechanism that you can use to secure a non-networked computer from a sophisticated attacker. You can use encryption, but chances are they will be able to pull the passphrase from somewhere or find some workaround. If that passphrase is short, it can be defeated using brute force dictionary attacks. If it is stored anywhere on your computer, phone, or the internet, it can be found.

If you want secure encryption, use something like random.org to generate a random alphanumeric string with as many bits of data as the encryption you are using (there is little point in using 256-bit AES with a weak key like ‘AnteLope2841’. You need a key like:

xxDTAJjghYCb7YFm8zcV6YYhmgmvmNxE.

Once you have a strong key, write it down on paper, keep it locked up, and never use it for anything other than decrypting that one file.

Ethics and weapons of mass destruction

Unsurprisingly, my review of Richard Rhodes’ The Making of the Atomic Bomb generated a discussion on the ethics of the United States using such bombs on Japan in 1945.

In the same book, a moral question with some similar characteristics comes up. Describing the American attack on Iwo Jima, Rhodes explains:

Washington secretly considered sanitizing the island with artillery shells loaded with poison gas lobbed in by ships standing well offshore; the proposal reached the White House by Roosevelt curtly vetoed it. It might have saved thousands of lives and hastened the surrender – arguments used to justify most of the mass slaughters of the Second Worlld War, and neither the United States nor Japan had signed the Geneva Convention prohibiting such use – but Roosevelt presumably remembered the world outcry that followed German introduction of poison gas in the First World War and decided to leave the sanitizing of Iwo Jima to the U.S. Marines.

In the end, 6,821 American marines were killed and 21,865 were injured. 20,000 Japanese troops died, with 1,083 ultimately surrendering.

I presume most readers think the use of poison gas would have been more immoral than attacking with Marines, despite how similar numbers of Japanese troops would likely have been killed in either case. What I am curious about is the reasoning. Is the use of certain kinds of weapons fundamentally unacceptable, regardless of the consequences of their use or non-use? Or would using poison gas on Iwo Jima have established a harmful precedent that would have caused greater suffering later? Or is there some other justification?

Spying on the U.N.

In addition to describing many situations of allies spying on allies, Richard Aldrich’s GCHQ: The Uncensored Story Of Britain’s Most Secret Intelligence Agency also describes a number of alleged incidents of the United States and United Kingdom spying on the United Nations, particularly during the led-up to the Iraq War.

Aldrich describes how the NSA and GCHQ used the UNSCOM weapons inspectors in Iraq as “short-range collectors” of signals intelligence (SIGINT). He also describes the bugging of the U.N. headquarters in Iraq during that period, the bugging of the U.N. Secretariat (including Secretary General Annan’s office), and espionage conducted against non-permanent members of the Security Council before the vote that would have authorized the 2003 invasion of Iraq.

Aldrich claims that “listening in on the UN was routine” and that “in 1945 the United States had pressed for the UN headquarters to be in New York precisely in order to make eavesdropping easier”.

A relentless rise

According to data published in Nature Geoscience, global carbon dioxide emissions fell because of the recession in 2009, though by less than initially expected. Now, they are increasing once again.

The atmospheric concentration of CO2 is now at 387.18 parts per million, about 34% above where it was before the Industrial Revolution. For the concentration to stop rising – and the climate to stabilize – net global greenhouse gas emissions must fall to zero.

GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency

Richard Aldrich’s excellent GCHQ: The Uncensored Story of Britain’s Most Secret Intelligence Agency contributes significantly to the public understanding of the role secret intelligence agencies have played in world affairs and the domestic politics of Britain and elsewhere. From the codebreaking of the second world war to the frightening mass surveillance and data mining of the modern era, Aldrich provides a consistently interesting and informative account. Technical details on signals intelligence (SIGINT) techniques are relatively few, but the book contains a lot of new and interesting information running quite close to the present day.

GCHQ’s history

The Government Communication Headquarters (GCHQ) is Britain’s version of America’s National Security Agency (NSA) or Canada’s Communication Security Establishment (CSE). They are primarily the governments interceptors and decrypters of communications: from the telemetry data from the missile tests of foreign powers to (increasingly) the electronic records tracking the communication and behaviour of all ordinary citizens. Aldrich covers the history of GCHQ from the second world war virtually up to the present day: with long sections on the U.S.-U.K. intelligence alliance; the Cold War; progressing intelligence technologies; overseas listening stations and decolonization; terrorism; secrecy, the media, and oversight by politicians and the public; the post-Cold War era; and the modern day.

Aldrich describes an extraordinary number of cases of allies spying on one another: from the United States and United Kingdom during the interwar and WWII periods to India bugging Tony Blair’s hotel room during a Prime Ministerial visit to the considerable espionage conducted by the U.S. and U.K. against the United Nations Security Council and Secretariat in the lead-up to the 2003 Iraq War. It is safe to assume that everybody is spying on everybody all the time. Indeed, in the later chapters, GCHQ describes how private organizations and organized crime groups are increasingly getting into the game. For instance, he alleges that British banks have paid out billions of Pounds to hackers who have gotten into their systems and blackmailed them.

GCHQ also documents the collusion between private companies and espionage organizations, going back at least to the telegraph and earliest submarine cables. Right from the beginning, the owners and operators of these communication links secretly passed along data to intelligence organizations, which was used for purposes of diplomatic and military espionage, as well as to gain economic advantage through industrial espionage. Aldrich also describes how private companies have been made to build back doors into their products so that organizations like GCHQ and the NSA can crack the communications of people using them. This applied to manufacturers of cryptographic equipment in neutral countries like Switzerland during the Cold War.

Aldrich also argues that the Data Encryption Standard (DES) was intentionally weakened to allow NSA snooping, though I have read elsewhere that the NSA actually used its expertise to strengthen the algorithm. Aldrich does a good job of describing one deep tension in the current mandate of GCHQ: on one hand, it is increasingly encouraged to help private British companies like banks secure their computer and communication systems. At the same time, it tries to preserve back doors and insecure communication methods in products used by others, so as not to undermine its own espionage mandate. Similarly, Aldrich talks on a number of occasions about the tension between using intelligence information and protecting the sources and methods used to acquire it. While it may be especially damning to condemn the dubious actions of a foreign power using their own intercepted and decrypted communication, doing so inevitably informs them that you are reading their traffic. Something similar is true when it comes to using surreptitiously acquired information to prosecute criminal trials.

GCHQ contains lots of information on the spotty record of the world’s intelligence services, when it comes to predicting major events. He describes many situations where policy-makers were caught by surprise, because their spy services didn’t pass along warning. These include the Yom Kippur War, the overthrow of the Shah of Iran, the Soviet invasion of Czechoslovakia, the fall of the Berlin Wall, and others. Aldrich also describes the Iraq-WMD fiasco, what it shows about the analysis of intelligence services, and what some of its broader political ramifications were.

At many points, Aldrich identifies how GCHQ and the NSA are by far the most costly intelligence services of the U.K. and U.S. respectively. The NSA dwarfs the CIA, just as GCHQ dwarfs MI5 and MI6 in staffing and resources. This is reflective of the special importance placed on intercepted communications by policy-makers. It is arguably also demonstrative of how GCHQ has been able to use the deep secrecy of its work to evade government scrutiny and secure considerable material support.

GCHQ’s present

The last section of Aldrich’s book is positively frightening. He describes how the fear of terrorism has driven a massive increase in technical surveillance – certainly within the U.K. but very likely elsewhere as well. He describes how a 2006 European law requires telephone and internet companies to retain comprehensive records of the communications of their customers for ten years, and how the government is planning to store their own copy of the information for data mining purposes. Aldrich explains:

The answer [to why the government wants its own copy of the data] is ‘data mining’, the use of computers to comb through unimaginable amounts of information looking for patterns and statistical relationships. This practice now constitutes the most insidious threat to personal liberty. What makes surveillance different in the age of ubiquitous computer and the mobile phone is that our data is never thrown away. Machines routinely store millions of details about our everyday lives, and at some point in the future it will be possible to bring these all together and search them.

Aldrich quotes a disturbing warning from the retiring Director of Public Prosecutions, Sir Ken Macdonald GC. Macdonald warns that powers are being irreversibly granted to the state, and that “we may end up living with something we can’t bear.”

Personally, I think all this is much more dangerous than terrorism. If the choice is between tolerating a few terrorist attacks per year and building up a gigantic secret alliance between government and private companies, designed to track all the details of the lives of individuals, I would prefer the terrorism. After all, terrorist groups are weak outlaw organizations with limited resources. The state, by contrast, is massive, potent, permanent, and not always subject to effective oversight. Our fear of a few bands of fanatics (collectively far less dangerous than smoking or car crashes) is driving us into giving the state unparalleled ability to monitor everybody.

The book is similar in purpose to Matthew Aid’s The Secret Sentry: The Untold History of the National Security Agency, though I think Aldrich’s book is significantly better. I recommend the entire book to history buffs and those with an interest in intelligence or the Anglo-American alliance. The last section – on the growing power of the state in response to terrorism – I recommend to everybody.

The Warrior’s Honour

It is strange to read Michael Ignatieff’s The Warrior’s Honour now, when he is leader of the official opposition rather than a journalist. Back in 1998, Ignatieff described the purpose of the book:

I wanted to find out what mixture of moral solidarity and hubris led Western nations to embark on this brief adventure in putting the world right.

Ignatieff is making reference to the whole notion of ‘humanitarian intervention’ and the ‘responsibility to protect’ which emerged strongly after the scale of both killing and western inaction in the 1994 Rwandan genocide became apparent. The book is certainly dated in some ways, which can be a liability. At the same time, it has value insofar as it does express one perspective of that time, and facilitates consideration of what has changed since.

The central concept of Ignatieff’s book is the ethics of warriors themselves – the internal moral forces that sometimes help to constrain behaviour within the most limited bounds of ethics, even in wartime. He explores the role of the International Committee of the Red Cross (ICRC) as special representatives (‘enforcers’ is too strong a word) of the Geneva Conventions. He explains how Henry Dunant – founder of the organization – established a continuing tradition in which delegates of the ICRC have “made their pact with the devil of war” and “accept[ed] the inevitability, sometimes even the desirability of war” while “trying, if it is possible, to conduct it according to certain rules of honour.” Ignatieff also describes the consequences when warriors abandon honour, as he alleges took place during and after the breakup of Yugoslavia, when former neighbours destroyed their collective homeland driven by “the narcissism of minor difference.”

The Warrior’s Honour is not an especially practical book. The tone is more mournful and ambiguous than certain or persuasive. It doesn’t offer much guidance to those trying to decide how to respond to the humanitarian emergencies of today. Ignatieff’s book does more to describe the predicament than to suggest paths out of it, though that is a valuable undertaking in itself. In the conclusion, he explains:

The chief moral obstacle in the path of reconciliation is the desire for revenge. Now, revenge is commonly regarded as a low and unworthy emotion, and because it is regarded as such, its deep moral hold on people is rarely understood. But revenge – morally considered – is the desire to keep faith with the dead, to honour their memory by taking up their cause where they left of. Revenge keeps faith between generations; the violence it engenders is a ritual form of respect for the community’s dead – therein lies its legitimacy. Reconciliation is difficult precisely because it must compete with the powerful alternative morality of violence. Political terror is tenacious because it is an ethical practice. It is a cult of the dead, a dire and absolute expression of respect.

One has to wonder whether it wouldn’t be better for humanity to simply forget the outrages of the past, given the tragic way in which they perpetuate conflict into the present and future. Like feuding gangs, human beings feel this constant compulsion to respond to every slight with a larger slight, and pay back every rape and murder with two more.

Given the course of Michael Ignatieff’s life, the book also highlights the tragic theatrical character of government and opposition. As a journalist, Ignatieff could grapple with major political and ethical questions with a kind of integrity and with acceptance that the answers derived from history are usually imperfect and uncertain. As a politician, he must engage in a much less sophisticated slinging back-and-forth of accusations. One of many unfortunate facts about political life is that proximity to power tends to be accompanied by a cheapening of discourse.