Seeking USB stick crypto

A piece of software that does the following would be very helpful to me:

  1. Creates an encrypted archive on a USB key
  2. Does so using a credible open-source algorithm, such as AES
  3. Ideally, is open source and well scrutinized by competent members of the security community
  4. This archive can be read using software on the key, on either a Mac OS X machine or a Windows XP box
  5. The software that does the encryption and decryption does not require administrator priveleges to run.

Do any such utilities exist? TrueCrypt is cool, but requires an admin account. SanDisk’s CruzerLock is Windows only, and has a really awkward interface. The disk encryption feature of PGP cannot be run off a flash drive. The encrypted disk images created by Mac OS cannot be read using a Windows machine.

Responding to the violence in Kenya

Hydro installation on the Ottawa River

Reading about the ongoing strife in Kenya is both worrisome and depressing. This is especially true if the lessons of Paul Collier’s The Bottom Billion are taken to heart. He highlights how a single period of instability can often initiate a pattern of recurring conflict, as well as how problems in one state can plague an entire region. Both risks seem to be acute in the Kenyan case, as democratic institutions and investor confidence are undermined and the trade and security prospects of landlocked neighbouring states like Uganda and Rwanda are threatened. The last thing Africa needs is another unstable neighbourhood, in addition to those around Sudan, Zimbabwe, and the DRC.

All the more reason for the African Union and other bodies to use their influence to convince Mwai Kibaki to change course. Ideally, the election that he rigged should be repeated under fair conditions, as monitored and enforced by representatives of the international community. The AU has been shamefully complacent in the face of abusive and corrupt regional governments, but it has an opportunity here to limit the scope of escalating violence and hopefully prevent the descent of the region into a conflict trap. For the sake of Kenya, the region, and the continent, other influential powers and organizations should support that effort.

Facebook and the expectation of privacy

Graffiti on a bench

Another privacy spat has erupted in relation to Facebook, the social networking site. It all began when the site began actively advertising everything you did you all of your friends: every time a photo was updated or a relationship status changed, everyone could see it by default, rather than having to go looking. After that, it emerged that Facebook was selling information to third parties. Now, it seems that the applications people can install are getting access to more of their information than is required for them to operate, allowing the writers of such applications to collect and sell information such as the stated hometown and sexual orientation of anyone using them.

Normally, I am in favour of mechanisms to protect privacy and sympathetic to the fact that technology makes that harder to achieve. Facebook, I think, is different. As with a personal site, everything being posted is being intentionally put into the public domain. Those who think they have privacy on Facebook are being deluded and those who act as though information posted there is private are being foolish. The company should be more open about both facts, but I think they are within their rights to sell the information they are collecting.

The best advice for Facebook users is to keep the information posted trivial, and maintain the awareness that whatever finds its way online is likely to remain in someone’s records forever.

[Update: 12 February 2008] Canada’s Privacy Comissioner has a blog. It might be interesting reading for people concerned with such matters.

Cut cables in the Middle East

Something strange is happening to undersea fiber optic cables in the Middle East: they are being cut. At least four, and possibly five, of the communications links have failed in the last twelve days. The first two were allegedly damaged by a ship’s anchor; subsequent failures are more mysterious. Serious disruptions are being experienced in Egypt and India, along with lesser problems in Bahrain, Bangladesh, Kuwait, the Maldives, Pakistan, Qatar, Saudi Arabia and the United Arab Emirates. The fifth cable cut seems to have disabled internet access in Iran.

It’s tempting to ascribe some nefarious motive to all of this. That said, it is sensible to recall how past hysterias proved unjustified. After much hoopla in the media, it turned out that the ‘cyberwar’ against Estonia was the work of a twenty year old subsequently fined $1,620 for his misdeeds.

The cable problems are being widely discussed:

[Update: 16 February 2008] According to The Economist, all this was just hysteria.

The failure of liberal dreams for Afghanistan

Sayed Pervez Kambaksh’s death sentence is a compelling demonstration of how thoroughly the west has failed in Afghanistan. The death sentence was issued by an Afghan court in response to the allegation that Kambaksh had downloaded and distributed a report about the oppression of women. This is not the first time a death sentence has been issued for blasphemy in Afghanistan since the imposition of the Karzai government, but it is a pretty egregious case. Yesterday, the sentence was confirmed by the Afghan Senate.

Is the whole point of the war in Afghanistan the replacement of one brutal band of thuggish warlords with another? Admittedly, the present government is better than the Taliban was, but that is hardly a ringing endorsement. Canada is considering an ever-more long term commitment to the protection of this government while, at the same time, we cannot trust them not to torture detainees that are transferred to them.

What is to be done in response? Do we become hard-headed realists, asserting that aiming to empower women or promote human rights was never a realistic or appropriate aim of the war in Afghanistan? Supporting a government just because they seem relatively pliable and seem to say the right things about cracking down on groups that worry us is certainly a practice with a long history. That said, it isn’t a very successful one. After all, it is why the west armed the Mujahideen in the first place (not to mention the Pinochets and Musharrafs of the world). Do we become isolationists, then, despairing of our ability to effect any progressive or worthwhile change in the world? That doesn’t seem practically or morally tenable in a world as interconnected as ours has become.

Perhaps all we can do is become a bit more cynical and a lot more critical about the supposed justifications for interventions. Rather than aspiring to replace oppressive societies with somewhat better ones, perhaps we should admit that overthrowing governments – however awful – will normally lead to horribly broken societies. That is not to say that it is always the worst option available. A horribly broken society is better than one in which an active genocide is occurring. With such exceptions admitted, it does seem as though the dream of a transition to liberal democracy through military intervention has been essentially invalidated by the experience of western states in Afghanistan and Iraq since 2001.

Radiation types and units

Types of radiation

Radiation is categorized in several different ways. One is on the basis of energy levels: ionizing radiation is sufficiently energetic that it can cause an atom or molecule to be stripped of an electron, turning it into an ion. This depends on the energy level of the individual particles or waves and has nothing to do with the total number of them. Non-ionizing radiation is simply that which doesn’t have enough energy to liberate an electron.

Another way to classify radiation is in terms of whether it is electromagnetic (consisting of photons) or particle radiation. There are three types of particle radiation: alpha decay, based on the emission of two protons and neutrons bound together in a helium nucleus, beta decay, wherein the particle emitted is an electron, and neutron radiation, where atoms release neutrons. Alpha particles are not generally very dangerous, because they are unable to penetrate much of substance. Even a few centimetres of air can have a strong protective effect. That said, ingestion can still be highly dangerous. The Polonium-210 that killed Alexander Litvinenko is an alpha emitter. Beta particles can usually be shielded from using a few milimetres of lead. Neutron radiation is unusual insofar as it is capable of producing radioactivity in the atoms it encounters. Shielding consists of a large mass of hydrogen rich materials.

Electromagnetic radiation with sufficient energy to be ionizing cosists of x-rays and gamma rays. Both consist of high-energy photons (those with short wavelengths), with gamma rays having shorter wavelengths than x-rays (10^(-12)m rather than 10^(-10)m). Shielding, especially for gamma rays, must be dense and fairly extensive.

Measuring radiation

Radiation is also measured in a variety of ways: important ones being Roentgens, rads, rems (Roentgen equivalent in man), Curies, Becquerels, and Sieverts.

Becquerels are a unit of radioactive decay based only on the number of decays per second. A Curie is equal to 3.7 x 10^10 Becquerels, and is approximately equivalent to the activity of 1 gram of Radium isotope. These units reflect the number of emissions only – not their physical or biological effects.

A Roentgen is a measure of ionizing radiation based on the ratio between charge and unit mass. Rads are a largely obselete unit of radiation dose, equal to 100 ergs of energy being absorbed by one gram of matter. Rems are the product of the number of Roentgens absorbed, multiplied by the biological efficiency of the radiation. Rems are also considered highly dated as a measure of radiation. 450 rems is an approximate lethal dose (LD50), for those who do not receive prompt treatment.

Sieverts are the recommended replacemend, “found by multiplying the absorbed dose, in grays, by a dimensionless “quality factor” Q, dependent upon radiation type, and by another dimensionless factor N, dependent on all other pertinent factors.” The LD50 for ionizing radiation is about 5 grays or about 3-5 Sieverts. If the biological efficiency used to calculate rems equals one, one Sievert is 100 rems.

Mastercard and RFID

I got a replacement Mastercard in the mail today and was slightly surprised to learn that it has an embedded radio frequency identification (RFID) tag in it. The idea is that it will let merchants bill you card by having you put it near a reader, rather than swipe it though a magnetic strip reader. The existence of the RFID tag does raise a couple of issues, however.

First, it has been shown that such tags can be activated using inexpensive directional transmitters from relatively long ranges. The way they work is by using the energy in the incoming radio signal to power the circuitry that produces a response. I don’t know if the tag in my card simply has a unique identifier, or whether it actually performs a challenge-response authentication. Either way, it is likely that the presence of the card, and the fact that it is a Mastercard, can be determined at a distance of several tens of metres at least, using information and equipment fairly easily acquired.

Secondly, I don’t know about the liability associated with such cards. I know that if I lose my Mastercard and report it promptly, I am only liable or $50 at the most. I am not sure about a situation where somebody clones the RFID tag and uses it to make purchases.

Overall, I see little value in contact-free payment systems. I would rather have a traditional card without new features and vulnerabilities. Unfotunately, Mastercard says that RFID-free cards are no longer available.

More on RFID:

Good information on space militarization

This briefing on the militarization of space is very interesting. It is especially good insofar as it describes the special situation of the United States in relation to space and warfare, the consequences of the recent Chinese test of an anti-satellite missile, and some of the practicalities involved in tracking space debris and keeping satellites away from it.

Democracy as constraint

One common view of the nature of democracy is a system wherein a populace seeks to advance the common interest, either through direct participation in decision-making that affects everyone or through the election of representatives to do so. This view posits the existence of a universal interest that is beyond the sum of individual interests; the aim of government is to help to pull the reality of life closer to the kind of life that would be established through the realization of that universal good.

One major problem with this view is the possibility that, with a few exceptions, no such universal interest exists. We have a universal interest in not being exterminated, but it’s not clear that there is any such thing in the realm of social policy. An alternative view of the nature of democracy highlights its procedural characteristics, two of which I consider to be the most important: the division of power and oversight.

Democracy, viewed in this way, is a system of rules designed to limit the collection and arbitrary usage of power by individuals and groups. It recognizes the fundamental difficulty of this struggle, derived from the way in which most people given the opportunity to rule will try to use that power to perpetuate their influence. It likewise recognizes that authority in the absence of oversight leads inevitably to abuse, whether by corrupt politicians, unaccountable police, or an unconstrained army. The most important institutions within a democracy, then, are things like the rule of law, courts, regulatory bodies, a free press, and elections. The last of these serve less to select a group of representatives who have the right ideas about the universal good and more to rotate people often enough that they cannot escape the shackles that democracy is meant to impose upon them. When rulers do wriggle out of those bonds, the results are corruption, incompetence, and tyranny.

A procedural view of democracy does not assume the existence of a universal good – it just acknowledges that people have life projects of their own and, unconstrained, most are happy to trample all over the plans of others. The basic idea derives from the expression: “My right to swing my fist ends where your nose begins.” Unfortunately, plenty of people are happy to swing regardless. Only by constraining individuals in some ways – especially those in positions of power – can we have any hope of living our lives unmolested.

What, then, of social programs and all the efforts government makes to cajole and convince the populace of things? It is certainly possible that such cajoling can serve worthwhile ends, such as making people aware of previously unknown dangers. It can also serve far less universal ends: the promotion of the interests of one group through a devious appeal to a universal good. Arguably, much of politics is jostling between groups with narrow interests, seeking both to gain access to power and represent their personal interests as universal. This is exactly the kind of conduct a procedural democracy is meant to check: marrying empowerment within the sphere of individual agency with constraint in realms of inappropriate interference.

I am not willing to wholly disregard the possibility that democracies can develop projects based on the universal good, and perhaps even carry them out more effectively than other systems of government. What I am arguing is that such endeavours are a potentially valuable benefit of democracy, rather than its foundational justification. The aim is less to achieve the ‘best’ – a mode of thinking perhaps best suited to fascist states – but to moderate and avoid the worst. As such, when we abandon the principles of oversight and divided power, whether out of ambition or fear, we sacrifice a critical aspect of what it means to live in a democratic society.

Foregoing WEP and WPA

Bruce Schneier, the security guru and internet sensation, has been suggesting that people unlock their wireless networks. Given the constant and well-justified anxiety that exists about computer security, it is unconventional advice. That said, he argues effectively that the risks are fairly limited and that it is a neighbourly thing to do. Who hasn’t benefitted once or twice from the availability of an open wireless network? They were invaluable during my early weeks in Ottawa: allowing me to access Craiglist, Google Maps, and other vital apartment-hunting data while I was out there searching.

I am going to try leaving my wireless network open for a couple of weeks. If it doesn’t seem likely to burst my 200GB monthly bandwidth cap, I will leave it that way indefinitely. Hopefully, it will transpire that others have done the same when I start hunting around for a quieter flat in a more interesting neighbourhood this spring.