|Ken Novak's Weblog
Purpose of this blog: to retain annotated bookmarks for my future reference, and to offer others my filter technology and other news. Note that this blog is categorized. Use the category links to find items that match your interests.
Subscribe to get this blog by e-mail.
New: Read what I'm reading on Bloglines.
Ken Novak's Weblog
Sunday, May 30, 2004
Counterfeit trail led to Chalabi: "The coalition's decision to introduce a new Iraqi currency could scarcely have been avoided. No one wanted banknotes bearing the face of Saddam Hussein. Yet the operation to exchange and destroy countless old Iraqi dinars was an invitation to fraud. The way judge Zuhair Maleki related the story last week, a routine investigation into a giant currency fiddle eventually led to a heavily guarded Baghdad compound belonging to Ahmad Chalabi.. Maleki was in charge of a curious case involving one of Chalabi's minions. Sabah Nouri, described by Maleki as a "former driver and smuggler with no qualifications", had been appointed to head an audit committee at the Iraqi finance ministry, which fell under Chalabi's council wing. When evidence emerged that old dinars sent for burning were being switched with counterfeit bills – and that the genuine dinars were being represented in exchange for more dollars – Nouri apparently set off in hot pursuit of culprits. ..
When Maleki followed up complaints that the bank tellers had been kidnapped, the scam began to unravel. After weeks of further investigation, the judge concluded that Nouri and other Chalabi aides had in fact been running the counterfeit currency switch. When 15 arrest warrants were issued, the most prominent name on the list was Aras Habib, Chalabi's security chief, who is now in hiding. The charges included murder, kidnapping, fraud, forgery, extortion and stealing government property.
On Saturday, two of the judge's bodyguards were wounded in an attempt to shoot him at a petrol station. "Twice a pistol was pointed at me and twice my bodyguards hurled themselves at me to protect me," said the 38-year-old judge, who escaped with nothing worse than a broken tooth. He declined to speculate on the reason for the attack. ..
weapons inspectors had long been doubtful of the INC's intelligence... "The information provided by Chalabi was so specific it appeared to be very credible," said Joseph Cirincione, author of a WMD report for the Carnegie Endowment for International Peace. "He would tell people, 'You go to this facility, and in the third building, first corridor, second door, there's a refrigerator with anthrax in it.' Well, inspectors went to those facilities, and there wasn't even a third building, or a corridor, or a door."
Cirincione and others believe there were compelling reasons for Bush administration officials not to believe it. The return of UN inspectors to Iraq in late 2002 provided ample evidence that defectors introduced by the INC had consistently lied about or exaggerated what they claimed to have seen. " 10:11:04 AM
Down on Chalabi:
"One diplomat from the region grimly cited an old Punjabi saying: "It's very bad when grandma marries a crook, but it is even worse when she divorces the crook.'
Chalabi's wealthy family was swept out of Iraq in a coup in 1958, and he spent much of his life plotting a coup to take back his homeland, a far-fetched scheme that took on life when he hooked up with Wolfowitz, Richard Perle and Doug Feith, who had their own dream of staging a coup of American foreign policy to do an extreme Middle East makeover.
The hawks dismissed warnings from their own people like the Bush Middle East envoy Gen. Anthony Zinni that the Iraqi National Congress was full of "silk-suited, Rolex-wearing guys in London.' As Zinni told The New York Times in 2000: "They are pie in the sky. They're going to lead us to a Bay of Goats, or something like that.'" 9:43:39 AM
Friday, May 28, 2004
What is an AGM battery: Background on absorbed glass mat battery products. In this battery design, acid is completely absorbed into microfiber glass mat separators which are sandwiched between lead plates and typically wound in coils. Advantages:
- totally sealed and maintenance free design
- more heat and vibration resistant
- slower self discharge rate (longer shelf life). A wet battery discharges 15% a month, some AGM batteries discharge only 2-3% a month, so 6 months idle is no problem
Many vendors are online. 2:52:37 PM
Pace of Securing Nuclear Weapons Material Has Slowed Since 9/11
: "The amount of potential nuclear weapons material secured in the two years immediately following September 11, 2001, was less than the amount secured in the two years immediately prior to the 9/11 terrorist attacks, according to official data described in a new report from Harvard University on steps needed to keep nuclear weapons out of the hands of terrorists and hostile states. To accelerate the pace, sustained Presidential leadership, particularly in the United States and Russia, is urgently needed to sweep aside disputes over access to sensitive sites and other bureaucratic obstacles to progress, according to the report. ..
During fiscal year (FY) 2003, U.S.-funded programs completed comprehensive security and accounting upgrades on enough weapons-usable nuclear material to make more than two thousand nuclear weapons (35 tons of nuclear material), and over 30 tons of highly enriched uranium (HEU) was permanently destroyed. However, the 35 tons of potential bomb material secured last year is just 6% of the estimated 600 tons of potentially vulnerable nuclear material in Russia alone. By the end of FY2003, comprehensive security and accounting upgrades had been completed for only 22% of this material, and initial “rapid upgrades” – bricking over windows, installing detectors at doors – for only 43%. If progress continues at last year’s rate of 35 tons per year, it will take 13 years to finish the job in just the former Soviet Union. With Presidential action to break through the logjams, the work could be completed in four years." Many recommendations made. Companion website has more info. 11:15:11 AM
52 U.S. agencies examine personal data on Americans: "Numerous federal government agencies are collecting and sifting through massive amounts of personal information, including credit reports, credit-card purchases and other financial data, posing new privacy concerns, according to the General Accounting Office (GAO). The GAO surveyed 128 federal departments and agencies and found that 52 are using, or planning to implement, 199 data-mining programs, with 131 already operational.
The Education, Defense, Homeland Security, Veterans Affairs, Health and Human Services, Interior, Labor, Justice, and Treasury departments are among those that use the contentious new technology to detect criminal or terrorist activity; manage human resources; gauge scientific research; detect fraud, waste and abuse; and monitor tax compliance. The audit released yesterday shows 36 data-mining programs collect and analyze personal information that is purchased from the private sector, including credit reports and credit-card transactions. Additionally, 46 federal agencies share personal information that includes student-loan application data, bank-account numbers, credit-card information and taxpayer-identification numbers.
The Defense Department is the largest user of data-mining technology, followed by the Education Department, which uses private information to track the life of student direct loans and to monitor loan repayments. "Mining government and private databases containing personal information creates a range of privacy concerns," the report said. " 10:39:06 AM
Thursday, May 27, 2004
Embedded Linux marches on: "One of the cheapest Linux computers you can buy brand new (not at a garage sale) is the Linksys WRT54G, an 802.11g wireless access point and router that includes a four-port 10/100 Ethernet switch and can be bought for as little as $69.99 according to Froogle. That's a heck of a deal for a little box that performs all those functions, but a look inside is even more amazing. There you'll find a 200 MHz Intel processor and either 16 or 32 megs of DRAM and four or eight megs of flash RAM -- more computing power than I needed 10 years ago to run a local Internet Service Provider with several hundred customers. But since the operating system is Linux and since Linksys has respected the Linux GPL by publishing all the source code for anyone to download for free, the WRT54G is a lot more than just a wireless router. It is a disruptive technology. ..
it isn't what the WRT54G does that matters, but what it CAN do when reprogrammed with a different version of Linux with different capabilities. .. Linksys, now owned by Cisco, not only doesn't mind your hacking the box, they are including some of those hacks in their revised firmware...
Probably the most popular third-party firmware you can get for the WRT54G comes from Sveasoft .. [whose] head techie is James Ewing.. If you have a WRT54G, here's what you can use it for after less than an hour's work. You get all the original Linksys functions plus SSH, Wonder Shaper, L7 regexp iptables filtering, frottle, parprouted, the latest Busybox utilities, several custom modifications to DHCP and dnsmasq, a PPTP server, static DHCP address mapping, OSPF routing, external logging, as well as support for client, ad hoc, AP, and WDS wireless modes. .. The parts of this package I like best are Wonder Shaper and Frottle. Wonder Shaper is a traffic-shaping utility that does a very intelligent job of prioritizing packets to dramatically improve the usability of almost any broadband connection [by prioritizing voice and optionally a particular user's traffic. Frottle also prioritizes traffic.] .. Neither Wonder Shaper nor Frottle are the most elegant solutions, but they work well and they work together on the Sveasoft firmware. ..
The result is a box [that] automatically attaches itself to an OSPF mesh network that is self-configuring. In practical terms, this mesh network, which allows distant clients to reach edge nodes by hopping through other clients en route, is limited to a maximum of three hops as the WiFi radios switch madly back and forth between sending and repeating modes. If you need to go further, switch to higher-gain antennas or gang two WRT54Gs together. Either way, according to Ewing, his tests in Sweden indicate that if 16 percent of the nodes are edge nodes (wireless routers with DSL or cable modem Internet connections), they can provide comparable broadband service to the other 84 percent who aren't otherwise connected to the Net." Cringley then speculates on how to take on phone companies with this. 11:22:56 PM
Venture Capital Clean Tech Growth
: Broad review of investments in clean technology. "Sandy Selman, founder and managing director of Asia West, a small Westport, Conn.-based fund that specializes in Asian environmental investments, [says] he's been trying to convince institutional investors to do private equity investing in this space for years, but has not met with any success. But now venture capitalists are confident that the news from California [Calpers investment] will sway other limited partners. "I think you will see tens if not hundreds of large pension funds coming into this sector," says NGEN's Grubstein." 10:51:06 PM
Codan experience in Guinea-Bissau Elections: "The National Elections Commission of Guinea-Bissau used new Information and Communication Technology tools to coordinate the legislative elections held March 28 and enable poll workers to verify names and identity card numbers on the voter rolls. .. The project was designed by Sila Technologies (SITEC), a private company, and funded by a grant from the European Economic Community.
About a week before the elections, SITEC had up and running high frequency (HF) radio units in all nine regional capitals of Guinea-Bissau and verified that they could communicate with each other via voice, fax, or data transmission over up to 200 kilometers. Fax transmission was reported to be flawless, and voice communication was functional. According to SITEC engineer Amidu Sila, some level of noise is to be expected in using this technology and frequency range for voice, though this never impeded communication. ..
The company chose radios made by Codan Ltd., model NGT SR, for the project, along with a system that automatically selects and switches between available frequencies to get the best transmission. The HF units reportedly cost around $7,000 each, and the additional link management system goes for about $1,200. Before beginning installation, SITEC had to be assigned twenty available HF-band frequencies, which they chose together with the regulatory agency. Half of the frequencies were for use during the day, and the other half for the different atmospheric conditions of nighttime. Sila thinks that the radio could work over distances as far as 1500 kilometers." 12:34:57 PM
: "Relief workers are often encumbered by poor Internet connectivity, fragile or expensive equipment, or security concerns associated with collecting detailed geographic data in areas recovering from conflict. As connectivity expands and the tools get cheaper and more diverse, the specific needs of relief workers in the field are increasingly being met. Companies such as Global Relief Technologies
and Groove Networks appear to point the way." 12:24:53 PM
Wednesday, May 26, 2004
Devices and sensors for watching places like computer rooms remotely. Tracks humidity, temperature, air flow, light and sound levels, doors open/closed, webcam, etc. Sensors with RS232 under $200, packaged with self-contained web site under $400. Similar but more expensive are NetBotz
. 5:15:15 PM
Yahoo! wifi finder:
Directory of wifi locations, including iPass, Boingo, etc. Appears to be US only. Searchable by type of location and distance from a street address. Includes some free hotspots (like public libraries) but doesn't list open access points. 10:20:31 AM
: "RSSlib - this library allows you to add RSS content to your site (PHP or ASP)." From a site with yet another directory of RSS feeds. 8:27:13 AM
Tuesday, May 25, 2004
PIPA - Americans Continue to Believe Iraq Supported Al Qaeda and Had WMD: The University of Maryland conducted a poll in March 2004. 57% of Americans "continue to believe that before the war Iraq was providing substantial support to al Qaeda, including 20% who believe that Iraq was directly involved in the September 11 attacks. 45% believe that evidence that Iraq was supporting al Qaeda has been found. 60% believe that just before the war Iraq either had weapons of mass destruction (38%) or a major program for developing them (22%).
Despite statements by Richard Clarke, David Kay, Hans Blix and others, few Americans perceive most experts as saying the contrary. Only 15% said they are hearing “experts mostly agree Iraq was not providing substantial support to al Qaeda,” while 82% either said that “experts mostly agree Iraq was providing substantial support” (47%) or “experts are evenly divided on the question” (35%). Only 34% said they thought most experts believe Iraq did not have WMD, while 65% said most experts say Iraq did have them (30%) or that experts are divided on the question (35%).
Not surprisingly, perceptions of what experts are saying are highly correlated with beliefs about prewar Iraq, which in turn are highly correlated with support for the decision to go to war.
Perhaps most relevant politically, perceptions of what the experts are saying are also highly correlated with intentions to vote for the President in the upcoming election. Among those who perceived experts as saying that Iraq had WMD, 72% said they would vote for Bush and 23% said they would vote for Kerry, while among those who perceived experts as saying that Iraq did not have WMD, 23% said they would vote for Bush and 74% for Kerry.
Among those who perceived experts as saying that Iraq had supported al Qaeda, 62% said they would vote for Bush and 36% said they would vote for Kerry. Among those who perceived experts as saying that Iraq was not supporting al Qaeda, just 13% said they would vote for Bush and 85% for Kerry. ..
Despite polling showing that the majority of world public opinion is opposed to the US war with Iraq, only 41% were aware that this is the case. A 59% majority was unaware of this, with 21% saying that a majority of world public opinion favored the US having gone to war, and 38% saying “views are evenly balanced.”
Among those who knew that world public opinion opposed the US going to war with Iraq, only 25% thought that going to war was the right decision. Among the group that thought world public opinion was about evenly balanced, 70% said going to war was the right decision, and among those who perceived world public opinion as favoring the war, 88% said going to war the right decision. ..
Perceptions of world public opinion are also related to voting intentions. Among those who are aware that world public opinion is critical of the war, only 22% said they intended to vote for President Bush’s reelection (Kerry: 75%). Among those who thought world public opinion was about evenly balanced, Bush received support from a modest majority--53%, with 40% preferring Kerry. In the group that perceived world public opinion as favoring the war, 71% said they intended to vote for the president and only 25% said they would vote for Kerry." 12:17:23 PM
Monday, May 24, 2004
Gen. Zinni: 'They've Screwed Up'
: "Zinni, who now teaches international relations at the College of William and Mary, says he feels a responsibility to speak out, just as former Marine Corps Commandant David Shoup voiced early concerns about the Vietnam war nearly 40 years ago.
“It is part of your duty. Look, there is one statement that bothers me more than anything else. And that's the idea that when the troops are in combat, everybody has to shut up. Imagine if we put troops in combat with a faulty rifle, and that rifle was malfunctioning, and troops were dying as a result,” says Zinni. “I can't think anyone would allow that to happen, that would not speak up. Well, what's the difference between a faulty plan and strategy that's getting just as many troops killed? It’s leading down a path where we're not succeeding and accomplishing the missions we've set out to do.” 10:08:44 AM
Sunday, May 23, 2004
Watching Rats Abandon Ship
: Transcript of Bruce Sterling Lecture/Rant of the Moment in support of The Zenith Angle Book Tour. Crazy fun. "My situation is quite serious. It really is a conundrum. It's a security problem. It's a societal problem. It's a social, cultural, literary problem. It's a personal problem of my own. My credibility is at stake here. Although I've written a book about computer security which goes into agonizing detail of the intractability of some of these difficulties, I can't solve the problem within my own damn home. I have no solution. And who's got it?" 5:41:56 AM
Web programming references:
Talking Points Memo: Josh Marshall is a great read, this time on the right-wing blame game: "How'd we get into this? After 50 years of pretty consistently prudential foreign policy, managed mostly on a consensus of bipartisan agreement (yes, there are exceptions, but by and large, true), they decided to bet the national ranch on an idea. Actually it was a series of ideas, wrapped together in an odd tangle that could look like an odd jumble when viewed from outside. The key, however, was betting the national ranch on steep odds. Only, they weren't confident the country would get behind such a riverboat gamble. So they lied about what they were doing. They didn't trust the people -- which might be an epitaph we should return to.
Now, what do we expect of people who make reckless gambles with other people's money? Of people who can't discipline themselves enough to distinguish between their hopes and reality? What do you expect of that ne'er-do-well relative who's always hitting you up for a loan because he's come up with a sure thing? Do you expect those sorts of folks to take responsibility when things go bad? Or do you expect them to blame others?
Character, alas, really does count. " 1:38:21 AM
"Confidence Men" by Joshua Micah Marshall
: More from Nov 2002 on the Bush administration governing style. "Faced with seemingly insurmountable odds, the administration insisted they were going to do it anyway, believing that if you project confidence and invincibility, others will come around. And to a remarkable extent that's just what happened. In the Bushies' lexicon this is called "leadership." And to some extent it is. Getting people to follow you by force of personality, persuasion, and will is the essence of leadership. ... But mostly, what the Bushies call "leadership" is just a confidence game. And over time, that kind of leadership will get its butt kicked by reality every time. There's no better example than the Bush administration's bungling in the Middle East. " 1:07:56 AM
"Vice Grip" by Joshua Micah Marshall
: Great summary of Cheney's incompetence -- from Jan 2003, no less -- with a diagnosis. "They see themselves as men of action. But their style of action is shaped by the government bureaucracies and cartel-like industries in which they have operated. In these institutions, a handful of top officials make the plans, and then the plans are carried out. Ba-da-bing. Ba-da-boom.
In such a framework all information is controlled tightly by the principals, who have "maximum flexibility" to carry out the plan. Because success is measured by securing the deal rather than by, say, pleasing millions of customers, there's no need to open up the decision-making process. To do so, in fact, is seen as governing by committee. If there are other groups (shareholders, voters, congressional committees) who agree with you, fine, you use them. But anyone who doesn't agree gets ignored or, if need be, crushed. Muscle it through and when the results are in, people will realize we were right is the underlying attitude.
The danger of this mindset is obvious. No single group of people has a monopoly on the truth. Whether it be plumbers, homemakers, or lobbyist bureaucrats, any group will inevitably see the world through its own narrow, mostly self-interested, prism. But few groups are so accustomed to self-dealing and self-aggrandizement as the cartel-capitalist class. And few are more used to equating their own self-interest with the interests of the country as a whole.
Not since the Whiz Kids of the Kennedy-Johnson years has Washington been led by men of such insular self-assurance. Their hierarchical, old economy style of management couldn't be more different from the loose, non-hierarchical style of, say, high-tech corpor-ations or the Clinton White House, with all their open debate, concern with the interests of "stake-holders," manic focus on pleasing customers (or voters), and constant reassessment of plans and principles. The latter style, while often sloppy and seemingly juvenile, tends to produce pretty smart policy. The former style, while appearing so adult and competent, often produces stupid policy. " 12:59:01 AM
: Robert Wright's interesting website: "Welcome to meaningoflife.tv, which addresses big, cosmic questions (Is the universe imbued with purpose? Does life have meaning even if the universe isn't imbued with purpose?) as well as some littler, but still significant questions (How do you keep from going crazy in the modern world?). I've gone around asking scientists, social scientists, philosophers, and theologians such questions, and the results are here for you to see." 12:30:17 AM
Democratizing Iraq, piece by piece. By Robert Wright
: Interesting speculations on the value of early, incremental elections. And the implications of anything resembling democracy for US goals: "One big obstacle to implementing this plan is the mindset of the Bush White House. Administration officials would have to accept a reality they never quite acknowledged before the war: that a democratic and truly sovereign Iraq may do things the United States doesn't like. In particular, they would have to let go of a primary, if rarely articulated, motivation for the war: to use Iraq as a platform from which to project American military power.
From the beginning, this goal was essentially incompatible with the professed goal of democratizing Iraq. A democratic and sovereign Iraq was never likely to let American troops use its soil to intimidate its various neighbors. How President Bush and his advisers mentally reconciled the idealistic and realpolitik rationales for this war is a question for future psycho-historians to answer. In any event, the contradiction is now manifest, and we don't even have the luxury of choosing between the two scenarios—between a democratic but unwieldy Iraq and a non-democratic but strategically valuable Iraq. Only a stable Iraq would be useful as a strategic platform, and an Iraq being used as a strategic platform is unlikely ever to be stable." 12:26:24 AM
Saturday, May 22, 2004
The coming October surprise:
"Secretary Powell told George Stephanopoulos that theoretically the new Iraqi government can demand that foreign troops leave and America would respect such a request from a sovereign state. Our reaction: that's their exit strategy! " Yup, I too thought that Powell's comment hadn't been reported on enough, but I hadn't thought of the political implications. Like, the new Iraqi government starts in August, then by mid-Sept (say, just after the GOP convention), it requests a US withdrawal, and the first phase starts in time for some of our boys to visibly come home in the last half of October. Of course, that doesn't have to be the end of it; there could be "problems" after the election that keep the rest of the troops there for a few more years, but the Bush campaign would harvest the political value of their "exit strategy". 10:31:49 PM
Friday, May 21, 2004
Wi-Fi Provider Cometa Closes:
"Less than 18 months after it was created in a well-publicized bid to bring about nationwide wireless access in the United States, Wi-Fi wholesale network operator Cometa Networks has announced it is suspending operations, citing a lack of money." 9:59:34 PM
Film deal for 'Baghdad blogger': "The Baghdad Blog, a book based on an online diary written by an Iraqi man about life during the conflict there, is to be made into a film. 9:53:07 PM
Media group Intermedia is searching for a scriptwriter to adapt the book by the man, who calls himself Salam Pax. "He's like a Nick Hornby in the middle of a war," Scott Kroopf, chairman of the company's film division, told film industry website ScreenDaily.com"
Ace Sherpa guide becomes fastest Mt. Everest climber: "Ace Sherpa guide Pemba Dorjee scaled Mount Everest in a record 8 hours and 10 minutes Friday.. The climb from the 17,380-foot base camp to the 29,035-foot summit usually takes about four days. Dorjee, 26, held the speed record of 12 hours and 45 minutes for three days last year until another Sherpa guide, Lakpa Gyelu, made the journey in 10 hours and 56 minutes. " 12:27:14 PM
Thursday, May 20, 2004
WWW conference mulls Web as personal memory store
: "In a keynote speech to the conference, Microsoft's Rashid described what consumers might do with a terabyte of data storage that costs around $1,000 .. "You can store every conversation you have ever had, from the time you are born to the time you die," Rashid said. A person could have snap picture with a 180-degree fish-eye view of one's surroundings for every minute of every day for the rest of one's life. Microsoft researchers in the United Kingdom have built prototypes of such a life-recording device called SenseCam. They are gearing up for a second generation of photo capture systems no bigger than a necklace pendant, Rashid said
" 4:41:25 PM
Monday, May 17, 2004
NASA's Advanced Communications Technology Satellite (ACTS)
: 10 years old, the program continues to provide capacity and sometimes, people, to demonstrate new satellite applications. Education in developing countries is one ongoing area. "The Advanced Communications Technology Satellite (ACTS), a significant activity of the Space Communications Program
, provided for the development and flight test of high-risk, advanced communications satellite technology. Using multiple spot beam antennas and advanced on-board switching and processing systems, ACTS pioneered new initiatives in communications satellite technology." 4:27:01 PM
SMTP SPF: Sender Policy Framework
: Considerable progress on this anti-spam protocol: software available for many MTAs; a wizard for generating new DNS records; supported so far by 14,000 domains. "SMTP has a security hole: any connecting client can assert any sender address. This flaw has been exploited by spammers to forge mail. The result: your mailbox fills up with bounces to messages that you didn't send. Close the hole, and we can easily block spammers by sender domain." 2:57:51 PM
IDrive - Online Storage Network Drive
: New service from iBackup. "IDrive maps your IBackup online storage account as a local drive on your computer allowing you to drag-n-drop, open, edit and save files in your online backup account as if they were on your local computer. Recommended for most users for its ease of installation and 128 bit SSL support.
IDrive Plus is another variation of Network Drive technology (available only for XP and 2000) with ability to support Concurrent Operations for Access, Act! and many other applications in addition to all the features of IDrive. IDrive Plus is the recommended Network Drive application if you have a need to directly edit large office files such as Access and Act!. It is more efficient as it sends only changes over the network, and reads only what is necessary for direct edits and saves. Unlike Network Drive solutions from competing services, IDrive Plus does not do background downloading of files first. It is a true Internet Network Drive technology." 11:57:31 AM
Arms trafficker protected: report: "BRITAIN had bowed to US pressure to keep the name of a notorious arms trafficker off a list of those subject to planned United Nations sanctions, the Financial Times reported today. "London had originally supported moves to freeze Mr (Victor) Bout's assets, but appeared to have reversed its view under pressure from Washington," the newspaper said, citing evidence from several western diplomats.
In 2000, Peter Hain, then British foreign office minister responsible for Africa, described Victor Bout as "the chief sanctions-buster and ... a merchant of death who owns air companies that ferry in arms" to rebel and government forces in several African conflicts, including Liberia, Angola and Sierra Leone. ..
The paper quoted a senior western diplomat close to the UN negotiations as saying, "We are disgusted that Bout won't be on the list, even though he is the principal arms dealer in the region. If we want peace in that region (of West Africa), it seems evident that he should be on that list."
According to the anonymous diplomats cited in the Financial Times report, the US may be using an air freight company linked to Bout to help supply their forces in Iraq. "The American defence forces are using Victor's planes for their logistics," a former senior UN official told the paper." 2:08:09 AM
Sunday, May 16, 2004
802.11b wireless flaw identified: ""In order to exploit the vulnerability potential attackers only need a common wireless adaptor which retails for about US$35 and instead of using it to enable their computer to access a network, they can change its coding to interfere with transmission. "With this adaptor you can basically totally disrupt any wireless network that uses this technology within a kilometer of its operation in anywhere between five and eight seconds.".. [Professor] Looi said any computer, PDA or notebook could send out the signal if the wireless adaptor was programmed accordingly. ..
Wireless technology is gaining traction and in some countries is used to control infrastructures such as railway networks, energy transmission and other utilities. QUT's School of Software Engineering and Data Communications deputy head, associate professor Mark Looi said the discovery of the flaw should send a warning to high levels of government and industry worldwide. "Any organization that continues to use the standard wireless technology (IEEE 802.11b) to operate critical infrastructure could be considered negligent," Professor Looi said. "This wireless technology should not be used for any critical applications as the results could potentially be very serious."" 11:11:14 AM
: "Science.gov is a gateway to authoritative selected science information provided by U.S. Government agencies, including research and development results" 11:00:15 AM
: Nifty interactive international street mapper. 10:55:01 AM
In a Road That's All Eyes, the Driver Finds an Ally: Adding PV cells, LEDs sensors and cameras to road lane markers has many benefits (and could create a mass market for these components). "after perfecting illuminated markers that are embedded in the road surface to guide motorists through bad weather or warn of dangerous conditions, Mr. Dicks's company, Astucia Traffic Management Systems, is going a step further. Its latest creation is an embedded stud equipped with a camera that catches speeders, monitors traffic for criminals or stolen cars and even checks for bald tires on the fly...
illuminated marker would be more visible than a plain reflector, and the idea was that a car passing over the markers would cause them to stay illuminated long enough so that they would provide a warning trail of lights for any vehicles close behind. Working mostly with family members at first, Mr. Dicks produced a prototype marker within two years. He dodged the white L.E.D. problem by combining the glow from red, green and blue arrays. The group not only overcame the limitations of solar cells, but also managed to engineer markers that turned red to warn when the gap between two cars was dangerously small...
Optical systems inside the casing are able to monitor the atmosphere for fog. Electrical resistance detectors can check for standing water. The addition of a thermometer allows the marker to predict ice.
[Now, high-resolution digital cameras inside] the flush-mounted housings [use] a special series of lenses that in effect allow the camera to look upward and forward from its subsurface location. .. Astucia has developed a system that is operating on a highway in Scotland. It employs three embedded cameras to give front, rear and side views of passing vehicles. Other embedded sensors project two infrared beams over the road that are used to time traffic and determine its speed. The images and the speed data travel under the road by cable to a computer. It in turn relays the data by satellite to Astucia's offices. The system is currently being used to monitor traffic slowdowns. When it detects them, it turns on illuminated markers farther up the road as a warning. Mr. Dicks said that its speed measurements were accurate within 0.5 percent, well within the tolerances demanded for traffic enforcement [including catching speeders]. Similarly, he said, the systems can be combined with optical character recognition software to automatically track stolen vehicles or cars believed to be used by suspected criminals..
Mr. Dicks was not the only person with a desire to illuminate to road markers. After a friend struck and killed a pedestrian in 1991 at a crosswalk in Santa Rosa, Calif., Michael Harrison developed a system that uses flashing L.E.D.'s in the road surface to make crosswalks more visible. The company he founded in 1994, LightGuard Systems, now has about 700 installations in the United States. A study of 100 illuminated crosswalks by Katz, Okitsu & Associates, a traffic engineering firm based in Southern California, estimates that adding the blinking L.E.D.'s to crosswalks can reduce pedestrian accidents by 80 percent." 8:55:29 AM
Solar Roofing System: Marley Roofing is a major UK manufacturer of many kinds of roofing products. They have introduced a solar tile system. "The Marley SolarTile™ was designed to integrate with the Marley Modern interlocking tile and is easily installed by fixing to standard batterns. .. Each tile has a PV laminate comprising of 10 BP Solar Saturn cells generating an output of 23Wp. Over the year a suitably orientated installation of 100 Marley Solar Tiles will generate enough electricity for a typical 3 bedroom household (excluding central heating and water heating).
Marley SolarTiles™ are easy to install, use standard battening and are completely modular to meet the requirements of any roofing application. The Solar Tile has just two parts, a Top and a Base. The tile top fits onto the base and contains the photovoltaic elements which generate electricity. The tile base fits onto the roof and provides the electrical connectors to the house wiring." This would allow the substitution of new PV cells as they are developed. 8:42:18 AM
: SIP VOIP for the Palm OS, turning any online Palm into a phone. 8:19:20 AM
Saturday, May 15, 2004
Programmable presentation templates for PHP developers. 8:51:43 AM
Bradbury Software - Creators of TopStyle and FeedDemon
: "FeedDemon makes RSS newsfeeds as easy to access as your email." 30-use trial, $30 lisence. Also, TopStyle manages creation and update of CSS stylesheets, with XHTML cleanup, automatic conversion to CSS, some adaptation to programmed pages, etc. 2:05:05 AM
WebFX code samples
: "On this page you'll be able to find Dynamic HTML samples that you can use on your own pages, all the samples may be used freely for personal use or you may change the source code for your own applications" 1:44:22 AM
Friday, May 14, 2004
The Needle in the Database
: Former FBI intelligence agent prescribes changes. "blame usually falls on the F.B.I. and C.I.A. — agencies the public thinks it understands. "Why can't they work together?" people ask, ignorant of the fire walls that separate the agencies in order to protect the personal privacy and civil rights of all Americans.
Why don't they get along? Because they shouldn't. Law enforcement and the intelligence community are pegs designed not to fit in the same hole. One works on rule of law to gather legally admissible evidence; the other digs up intelligence that may be used even when it doesn't meet a standard of reasonable doubt.
First, the government should integrate all intelligence programs in a single agency. Make the Central Intelligence Agency just what it is supposed to be: central. The director of central intelligence serves, at least in principle, as the president's chief intelligence officer. Give him the resources and authority to go with the title.
Second, we should divide the C.I.A. into counterterrorism, war-fighting and diplomatic directorates to better manage all national security objectives. Make the C.I.A. a service provider for other government agencies; create a common strategic goal.
Third, the government should define the differences between foreign and domestic spying but provide for both. It is naïve to think we don't need some sort of internal surveillance capacity.
Finally, we need to standardize the classification process and make secrets accessible to the people who need them. Classification should be a means of channeling information, not hoarding it. Knowledge of a Qaeda plot is useless if we can't pass it on to local and state authorities." 7:54:51 PM
: "ZPhotoSlides is a web photo gallery for the dynamic web-based server Zope
. ZPhotoSlides will [show] photos in a nice environment, to thumbnailize them, modify them (Apply filters, rotate, resize...) within your browser and access wherever you are. " 4:03:30 PM
NewsGator and X1 aggregate and search files, email, and RSS
: " X1 and NewsGator Partner to Provide Instant Search Capabilities of Aggregated RSS News and Information.. 'Integrated solution provides instant access to news and information as fast as users can type' ". I wish it could also produce RSS automatically... 9:54:04 AM
.Text weblog tool
: ".Text is a powerful blogging engine that is used to host hundreds of blogs. The application
is an example of an N-tiered application. It can be used to host 1 to X number of blogs using a single IIS application. The application is written entirely in C#/ASP.NET and was built using VS.NET 1.1." Also, there's a .NET wiki tool around, and a free .NET browser editing tool
. 9:49:40 AM
Rise of an 'Iraq generation' in Europe?: "In the short term, European public disgust at the pictures probably rules out any chance that America's NATO allies will offer military help securing the transition to Iraqi rule in Baghdad. In the long run, some observers worry, the photographs could perpetuate a graver transatlantic rift. "They might help create an 'Iraq generation' in Europe like the 'Vietnam generation,'" suggests Bernhard May, an expert on European relations with the US at the influential German Foreign Policy Society in Berlin. "If a whole generation comes to think of America in terms of the Iraq war, then we are in trouble for years to come." ..
US officials had hoped to persuade NATO to take a formal role in Iraq after the transition to Iraqi rule, but no such decision is expected now at the alliance summit next month in Istanbul. With European mistrust of the US administration running so high, "the last thing the Europeans want to do is come to the June summit and allow George W. Bush to preside over the alliance as a great leader," said Philip Gordon, a Brookings Institute scholar and coauthor of a new book on the transatlantic rift over Iraq, in a recent speech to the Transatlantic Center, a Brussels think tank." 3:50:15 AM
Thursday, May 13, 2004
Software Coop formed: Avalanche
is a legally constituted intellectual-property cooperative. Companies pay $30,000 a year to become members. They can then donate any in-house software they choose to the Avalanche library, with the project becoming the legal owner of the code. Project members get to use, free of charge, any of the other programs in the library.
While just a few weeks out of the chute, Avalanche already has some impressive sponsors, including tier-one names like Best Buy, Cargill and Medtronic. The group has a board of directors and full-time CEO, Jay Hansen, a former IT consultant. " 5:54:23 PM
Why RSS Will Kill E-mail Publishing:
Good summary of advantages of RSS over email publishing. I think Bloglet-type services
supply a bridge. A publisher can work strictly in an RSS world, aggregators get what they want, and people who use email but not aggregators can listen in. 2:19:37 PM
Fly the Wi-Fi skies: On May 17, 2004, Lufthansa will become the first airline to offer in-flight Wi-Fi to passengers. "For the time being, only non-stop flights from Munich to L.A. will offer the service, but Lufthansa plans to roll it out to the entire fleet over the next year. The service will be provided by Boeing's wireless broadband service Connexion, which is being eyed by several U.S. airlines. Yet none of the cash-strapped U.S. airlines have ordered it, crying poor mouth. Lufthansa will charge $30 for access for the entire flight or $10 for 30 minutes. " 2:10:32 PM
Stretch Your Signal
: Options for extending wifi's range in a difficult or large house, including directional antennas and home wiring systems. 2:04:08 PM
How Akamai is like Google
"one other company that gets a lot of mileage out of a large number of computers [is] Akamai Technologies. Akamai's network operates on the same complexity scale as Google's. Although Akamai has only 14,000 machines, those servers are located in 2,500 different locations scattered around the globe. The servers are used by companies like CNN and Microsoft to deliver Web pages. Just as Google's servers are used by practically everyone on the Internet today, so are Akamai's." 2:02:29 PM
MTI MicroFuel powers RFID tags with tiny fuel cell:
Production to begin under contract this summer. "MTI MicroFuel Cells Inc. will supply the power source for a new product to be manufactured by Intermec Technologies Corp. and used in an inventory tracking system." 2:00:40 PM
Phatbot arrest throws open trade in zombie PCs: "The arrest of the suspected author of the Phatbot Trojan could lead to valuable clues about the illicit trade in zombie PCs. .. This expanding network of infected, zombie PCs can be used either for spam distribution or as platforms for DDoS attacks, such as those that many online bookies have suffered in recent months. By using compromised machines - instead of open mail relays or unscrupulous hosts - spammers can bypass IP address blacklists. Phatbot was been used to spam, steal information or perform DDoS attacks..
Networks of compromised hosts (BotNets) are commonly traded between virus writers, spammers and middlemen over IRC networks. The price of these BotNets (DoSNets) was roughly $500 for 10,000 hosts last Summer when the MyDoom and Blaster first appeared on the scene. "I have no doubt it's doubled since then as hosts are cleaned and secured," Andrew Kirch, a security admin at the Abusive Hosts Blocking List told El Reg. By his reckoning, non-exclusive access to compromised PCs sells for about 10 cents a throw. "
More background from April 30 2004: "MessageLabs reckons two thirds of the spam it blocks originates from computers infected by viruses such as Sobig-F or Bagle. Spam volumes are growing. More than two thirds of the email passing through MessageLabs systems so far this month was spam compared to 53 per cent for March as a whole." 1:51:25 PM
Spam protocol changes:
Intro to Sender Policy Framework, email CallerID (from Microsoft), and DomainKeys (from Yahoo). 1:40:33 PM
The Israeli Toture Template: How hot could it get? What if Israelis are part of the US intelligence team in Iraq? "it is noteworthy that one, John Israel, who was identified in the report as being employed by both CACI International of Arlington, Virginia, and Titan, Inc., of San Diego, may not have even been a U.S. citizen. The Taguba report states that Israel did not have a security clearance, a requirement for employment as an interrogator for CACI. According to CACI's web site, "a Top Secret Clearance (TS) that is current and US citizenship" are required for CACI interrogators working in Iraq. In addition, CACI requires that its interrogators "have at least two years experience as a military policeman or similar type of law enforcement/intelligence agency whereby the individual utilized interviewing techniques."
Speculation that "John Israel" may be an intelligence cover name has fueled speculation whether this individual could have been one of a number of Israeli interrogators hired under a classified contract.
Although the Taguba report refers twice to Israel as an employee of Titan, the company claims he is one of their sub-contractors. CACI stated that one of the men listed in the report "is not and never has been a CACI employee" without providing more detail. A U.S. intelligence source revealed that in the world of intelligence "carve out" subcontracts such confusion is often the case with "plausible deniability" being a foremost concern.
In fact, the Taguba report does reference the presence of non-U.S. and non-Iraqi interrogators at Abu Ghraib. The report states, "In general, US civilian contract personnel (Titan Corporation, CACI, etc), third country nationals, and local contractors do not appear to be properly supervised within the detention facility at Abu Ghraib." " 1:00:27 PM
Bush admin passed on attacking Zarqawi: Smoking gun: pursing Iraq while allowing Al Queda to grow. From the folks who criticized Clinton for "only" using cruise missles in Afghanistan. Note this was in northern Iraq where we had easy access and local Kurdish forces. "NBC News has learned that long before the war the Bush administration had several chances to wipe out his terrorist operation and perhaps kill Zarqawi himself — but never pulled the trigger. In June 2002, U.S. officials say intelligence had revealed that Zarqawi and members of al-Qaida had set up a weapons lab at Kirma, in northern Iraq, producing deadly ricin and cyanide. The Pentagon quickly drafted plans to attack the camp with cruise missiles and airstrikes and sent it to the White House, where, according to U.S. government sources, the plan was debated to death in the National Security Council.
“Here we had targets, we had opportunities, we had a country willing to support casualties, or risk casualties after 9/11 and we still didn’t do it,” said Michael O’Hanlon, military analyst with the Brookings Institution. “People were more obsessed with developing the coalition to overthrow Saddam than to execute the president’s policy of preemption against terrorists,” according to terrorism expert and former National Security Council member Roger Cressey.
Four months later, intelligence showed Zarqawi was planning to use ricin in terrorist attacks in Europe. The Pentagon drew up a second strike plan, and the White House again killed it. By then the administration had set its course for war with Iraq. In January 2003, the threat turned real. Police in London arrested six terror suspects and discovered a ricin lab connected to the camp in Iraq. The Pentagon drew up still another attack plan, and for the third time, the National Security Council killed it.
Military officials insist their case for attacking Zarqawi’s operation was airtight, but the administration feared destroying the terrorist camp in Iraq could undercut its case for war against Saddam. The United States did attack the camp at Kirma at the beginning of the war, but it was too late — Zarqawi and many of his followers were gone. “Here’s a case where they waited, they waited too long and now we’re suffering as a result inside Iraq,” Cressey added. And despite the Bush administration’s tough talk about hitting the terrorists before they strike, Zarqawi’s killing streak continues today." 11:04:56 AM
Wednesday, May 12, 2004
'Holy war' general linked to Iraq prison scandal:
"The US Army general under investigation for anti-Islamic remarks has been linked by US officials to the Iraqi prisoner abuse scandal, which experts warned could touch off new outrage overseas. A Senate hearing into the abuse of Iraqi prisoners was told on Tuesday that Lieutenant General William Boykin, an evangelical Christian under review for saying his God was superior to that of the Muslims, briefed a top Pentagon civilian official last summer on ways military interrogators could gain more intelligence from Iraqi prisoners. Critics have suggested those recommendations amounted to a senior-level go-ahead for the sexual and physical abuse of prisoners, possibly to "soften up" detainees before interrogation, a charge the Pentagon denies. Lt Gen Boykin touched off a firestorm last October after giving speeches while in uniform in which he referred to the war on terrorism as a battle with "Satan" and said America had been targeted "because we're a Christian nation". " Boykin is still "on review" for those statements, 8 months later; Bush and Rumsfeld refused to reassign him pending the outcome of the review. 10:14:03 AM
Overdosing on Islam
: "Qom is the religious center of Iran, but even here, there is anger and disquiet. One of the central questions for the Middle East is whether Iran's hard-line Islamic regime will survive. I'm betting it won't.
"Either officials change their methods and give freedom to the people, and stop interfering in elections, or the people will rise up with another revolution," Grand Ayatollah Hossein Ali Montazeri told me.
"There is no freedom," added Ayatollah Montazeri, who is among the senior figures in the Shiite world but is excluded from power in Iran because of his reformist ideas. "Repression is carried out in the name of Islam, and that turns people off. . . . All these court summonses, newspaper closings and prosecutions of dissidents are wrong. These are the same things that were done under the shah and are now being repeated. And now they are done in the name of Islam and therefore alienate people."
Whoa! Ayatollah Montazeri was a leader of the Islamic Revolution, and was initially designated by his close friend Ayatollah Ruhollah Khomeini to be his successor as supreme leader of Iran. Everything he says carries immense credibility, for he is a more senior religious figure than any of Iran's present leaders." 9:14:49 AM
Ongoing riots, massacres in Nigeria: "Muslim and Christian militants are fighting bloody street battles in Nigeria's northern city of Kano for a second day, killing at least 15 people, witnesses say. The rioting, which killed at least another 11 on Tuesday, was sparked by popular anger over what the Islamic community sees as the government's failure to prevent last week's massacre [in] Yelwa. .. Survivors of last week's attack on Yelwa town said they buried 630 corpses after a two-day assault by heavily armed Christian militia. It was not possible to verify the figure independently and police have said "hundreds" were killed.
The Yelwa massacre was the latest outbreak of a conflict dating to 2001 when more than 1,000 were killed in fighting in the state capital Jos. At least 1,000 have been killed in the past three months. The Yelwa massacre came three months after Islamic militia killed almost 100 Christians there. ..
People of the Tarok and other predominantly Christian tribes in Plateau accuse the Hausa-Fulani of invading their ancestral land and want to drive them out of the state. Semi-nomadic Hausa-Fulani say their families have grazed cattle there for generations." As in Linden's book, another case where population growth and ecological decline generate violent conflict. 9:05:11 AM
Reuters - Mexico Air Force video creates UFO stir
: "The Mexican Air Force has released footage of what a UFO expert said were 11 invisible unidentified flying objects picked up by an infrared camera as they whizzed around a surveillance plane. .. The ministry confirmed to Reuters it had provided the video, filmed by the Air Force on March 5 over the eastern coastal state of Campeche. "We are not alone! This is so weird," one of the pilots can be heard yelling, after the plane's crew switched on an infrared camera to track the objects, first picked up by radar.
The film, recorded by a plane looking for drugs trafficking near the Gulf of Mexico, shows 11 objects as blobs of light that hover in formation or dart about, sometimes disappearing into cloud. .. Interviewed by Mausson on another section of the video, the pilots said they grew nervous when the objects, still invisible, turned back during a chase and surrounded the plane. "There was a moment when ... the screens showed they were behind us, to the left and in front of us. It was at that point that I felt a bit tense," said Maj. Magdaleno Castanon.
Mexico has a long history of fanciful UFO sightings, most of which are dismissed by scientists as space debris, missiles, weather balloons, natural weather phenomena or hoaxes" 8:57:46 AM
Spammer wins restraining order against Spamcop: "mass e-mailing firm OptInRealBig.com was successful in the first phase of his lawsuit against anti-spam group Spamcop: The organization for now is barred from sending complaints to ISPs other than its own as well as removing email addresses from such complaints. The temporary restraining order is critical for Richter's business and will be in effect until May 20. Spamcop's complaints often resulted in the cancellation of Richter's contracts with ISP's and limited his bandwidth and connectivity to send out his campaigns.
OptInRealBig.com claims that its emailings stays within the law and are sent out only to people in the US who sign up for the service. According to Richter, more than 100 million emails are sent every day from his servers which are all located the US. Representatives from Ironport, which operates Spamcop, will appear before the United States District Court .. Ironport as well as other email marketers were surprsied by the judge's decision. If upheld, it would be first case of a spammer barring an anti-spam group from reporting unwanted commercial emails. " 8:50:43 AM
Tuesday, May 11, 2004
Four on the Floor:
John McCain says "he has no idea why George Tenet still runs the CIA. "I think he must have some negatives somewhere," McCain says, meaning photo negatives." Guess I'm not the only one who thinks so... 10:23:23 PM
MOTE-KIT 5x4x: XBow has new sensor gear. Kits integrate up to 8 sensors for $2000. Upgrades are annouced to support zigbee. New products:
The Law of Accelerating Returns: Kurzweil's 2001 manifesto. "An analysis of the history of technology shows that technological change is exponential, contrary to the common-sense "intuitive linear" view. So we won't experience 100 years of progress in the 21st century -- it will be more like 20,000 years of progress (at today's rate). .. Within a few decades, machine intelligence will surpass human intelligence, leading to The Singularity -- technological change so rapid and profound it represents a rupture in the fabric of human history. The implications include the merger of biological and nonbiological intelligence, immortal software-based humans, and ultra-high levels of intelligence that expand outward in the universe at the speed of light. " 9:33:33 AM
Army Times Editorial: "Around the halls of the Pentagon, a term of caustic derision has emerged for the enlisted soldiers at the heart of the furor over the Abu Ghraib prison scandal: the six morons who lost the war. .. But the folks in the Pentagon are talking about the wrong morons. ..
The entire affair is a failure of leadership from start to finish. From the moment they are captured, prisoners are hooded, shackled and isolated. The message to the troops: Anything goes. .. Army commanders in Iraq bear responsibility for running a prison where there was no legal adviser to the commander, and no ultimate responsibility taken for the care and treatment of the prisoners. ..
On the battlefield, Myers’ and Rumsfeld’s errors would be called a lack of situational awareness — a failure that amounts to professional negligence. .. This was not just a failure of leadership at the local command level. This was a failure that ran straight to the top. Accountability here is essential — even if that means relieving top leaders from duty in a time of war." 9:17:10 AM
Monday, May 10, 2004
Time for Bush to See The Realities of Iraq:
Even George Will is disgusted: "Pat Moynihan [once[ said: "The central conservative truth is that it is culture, not politics, that determines the success of a society. The central liberal truth is that politics can change a culture and save it from itself." Here we reach the real issue about Iraq.. -- our ability to wield political power to produce the requisite cultural change in a place such as Iraq. Time was, this question would have separated conservatives from liberals. Nowadays it separates conservatives from neoconservatives.
Condoleezza Rice, a political scientist, believes there is scholarly evidence that democratic institutions do not merely spring from a hospitable culture, but that they also can help create such a culture. She is correct; they can. They did so in the young American republic. But it would be reassuring to see more evidence that the administration is being empirical, believing that this can happen in some places, as opposed to ideological, believing that it must happen everywhere it is tried.
Being steadfast in defense of carefully considered convictions is a virtue. Being blankly incapable of distinguishing cherished hopes from disappointing facts, or of reassessing comforting doctrines in face of contrary evidence, is a crippling political vice. " 9:48:48 PM
Anti-Bayes spam starts to resemble AI. 4:13:05 PM
How to Get Out of Iraq
: Detailed exploration of options for powersharing in Iraq, from a diplomat who worked in the Balkans. Advocates loose federation of 3 states as only alternative, along with its implications for US policy. 4:02:21 PM
Sy Hersh on the chain of command: More direct evidence of torture, and details on who did or should have done what in the prison scandal, naming a major general, a provost marshal and a contractor, with hints of CIA involvement. Insights into the Rumsfeld regime in the process: "The Pentagon official told me that many senior generals believe that, along with the civilians in Rumsfeld’s office, Sanchez and Abizaid .. had done their best to keep the issue quiet in the first months of the year. .. [A] Pentagon official said. “What is the motive for not being forthcoming? They foresaw major diplomatic problems.”
Secrecy and wishful thinking, the Pentagon official said, are defining characteristics of Rumsfeld’s Pentagon, and shaped its response to the reports from Abu Ghraib. “They always want to delay the release of bad news—in the hope that something good will break,” he said. The habit of procrastination in the face of bad news led to disconnects between Rumsfeld and the Army staff officers who were assigned to planning for troop requirements in Iraq. A year ago, the Pentagon official told me, when it became clear that the Army would have to call up more reserve units to deal with the insurgency, “we had call-up orders that languished for thirty or forty days in the office of the Secretary of Defense.” Rumsfeld’s staff always seemed to be waiting for something to turn up—for the problem to take care of itself, without any additional troops. The official explained, “They were hoping that they wouldn’t have to make a decision.” The delay meant that soldiers in some units about to be deployed had only a few days to prepare wills and deal with other family and financial issues.
The same deliberate indifference to bad news was evident in the past year, the Pentagon official said, when the Army conducted a series of elaborate war games. Planners would present best-case, moderate-case, and worst-case scenarios, in an effort to assess where the Iraq war was headed and to estimate future troop needs. In every case, the number of troops actually required exceeded the worst-case analysis. Nevertheless, the Joint Chiefs of Staff and civilian officials in the Pentagon continued to insist that future planning be based on the most optimistic scenario. .. The official added, “From the beginning, the Army community was saying that the projections and estimates were unrealistic.” ..
No amount of apologetic testimony or political spin last week could mask the fact that, since the attacks of September 11th, President Bush and his top aides have seen themselves as engaged in a war against terrorism in which the old rules did not apply. The Pentagon’s impatience with military protocol extended to questions about the treatment of prisoners caught in the course of its military operations. Soon after 9/11, as the war on terror got under way, Donald Rumsfeld repeatedly made public his disdain for the Geneva conventions. Complaints about America’s treatment of prisoners, Rumsfeld said in early 2002, amounted to “isolated pockets of international hyperventilation.” 3:18:35 PM
Undercutting Mideast Democracy: The Mid East democracy focus of the Bush administration has essentially imploded. Not only the photos from Abu Ghraib, but Israel and Libyan policies. The "withdrawal of settlements from the Gaza Strip was welcomed by most Arabs, above all the liberals. But Bush's gratuitous concession to Sharon of far-reaching changes in the public U.S. stance on the terms of a final Israeli-Palestinian settlement was greeted with dismay." And, "Gaddafi represents everything the Bush initiative is meant to be against. He is a massive violator of human rights and a dictator who grooms his children to succeed him. He seeks the same devil's bargain with the United States that Arab autocrats have always cut: Ignore my domestic thuggery, and I'll sell you oil and cooperate with your foreign policy. "
Each decision on its own has merits. "But that's not the point. What the Libya and Israel decisions show is that, despite its New Year's resolution, the White House isn't ready to change the old calculus of U.S. Middle East policy. Promotion of democracy remains the top priority -- except when it conflicts with something else."
Once again, there's a lack of coherent strategy in US foreign policy -- nobody home integrating policy across the departments and interest groups. Depressing, esp combined with US ineptitude on gathering and integrating human intelligence (Abu Gharab, WMD, inability to hit Al Queda before and after 9/11). 12:50:27 PM
Aljazeera.Net - ICRC in US for Guantanamo talks: Turns out Aljazeera covered the ICRC visit, from story dated 15 Jan 04: "Eight months after openly criticising the US treatment of detainees at Guantanamo Bay naval base, the head of the International Committee of the Red Cross is back in Washington for talks with senior administration officials. Jakob Kellenberger, who arrived in the US capital on Thursday, is scheduled to meet with US Secretary of State Colin Powell, National Security Adviser Condoleezza Rice and Deputy Defence Secretary Paul Wolfowitz, said the ICRC in a statement.
It added that the Guantanamo situation would be top of the agenda, as it was last May when Kellenberger met with Powell and Rice. .. In an unusual act after that meeting, Kellenberger publicly called for US authorities to institute due legal process for the more than 650 detainees at Guantanamo and also demanded significant changes in their conditions of detention." 9:35:53 AM
The Observer: Catastrophe: Many important details on the Iraq abuse story. "For [Red Cross president Jakob] Kellenberger and other senior officials in Geneva, that [late December] summary report confirmed worrying reports that were coming from across the US-administered prison system set up to deal with suspects detained in the war in terror. From Afghanistan to Guantanamo Bay to Iraq and to friendly third-party countries with poor human rights records which were willing to open up their facilities to the US, a picture was emerging of routine and arbitrary ill treatment. Of men picked up, sometimes on the smallest pretext, disappearing into a chilling closed world.
Determined to raise the organisation's concerns, Kellenberger had scheduled a trip to Washington to talk to the most senior US officials in the Bush administration. On 13 and 14 January he attended a series of meetings in Washington. In two days he would meet US Secretary of State Colin Powell, National Security Adviser Condoleezza Rice and Deputy Defence Secretary Paul Wolfowitz. In each meeting, say Red Cross sources, Kellenberger would deliver the same message: his organisation's belief that coalition soldiers were torturing and mistreating Iraqi detainees. Within hours that message would be on the desks of Donald Rumsfeld and the most senior officers in the US military. But if Rumsfeld is to be believed, even as a discreet inquiry was launched into the allegations, none of the President's most senior officials thought to tell George Bush. ..
But Kellenberger was not alone in being concerned. According to the timeline leaked by investigators to the US media, army investigators had also been tipped about the abuses and, after months of inaction, were taking the issue seriously. Joseph Darby, a 24-year-old reservist at Abu Ghraib, had plucked up his courage and slipped an anonymous note underneath the door of one of his superior officers. It described brutal incidents of abuse of Iraqi prisoners and the existence of graphic photographs taken by Darby's own colleagues. .. Darby eventually turned over a computer disk of pictures to a sergeant in his unit on 13 January. A few hours later, army investigators seized other computers and disks from members of the unit. By 14 January - according to this version of events - General John Abizaid was on the phone to Rumsfeld, as Kellenberger was also raising his concern.
On 16 January, the US army curtly announced it had ordered an investigation into abuses at the prison - a five-sentence press release said that an inquiry into 'reported' incidents of detainee abuse had begun. It did not even name the prison. ..
According to one officer recently returned from Iraq, sexual humiliation of prisoners in Abu Ghraib was not an invention of 'maverick guards' but part of a system of degradation developed for use by British and US troops called R2I - resistance to interrogation - which uses sexual jibes and stripping prisoners to prolong 'the shock of capture' when detainees are at their most vulnerable. In an interview with the Guardian yesterday, the officer said: 'It was clear from discussions with US private contractors in Iraq that prison guards were using R2I techniques, but they didn't know what they were doing.'
What has also emerged is the role that US military intelligence officers - and private intelligence contractors - have played in directing the abuse with most of the reservists involved alleging that they thought their duty was to 'soften up' the prisoners for questioning. Indeed, Taguba's leaked confidential report identifies at least three contractors as being potentially to blame for the problems - contractors who are neither subject to Iraqi law, military discipline or the Geneva Conventions" 9:32:42 AM
Unmarried, Female and Turned Off by Politics: "According to pollsters, when single women are compared with married men, married women and single men, they account for the largest number of Americans who are, in essence, voluntarily disenfranchised. More than 21 million single women — almost half of those eligible — did not cast ballots in the last presidential election. .. Had this group voted in the same proportion as married women in the 2000 election, she discovered, an additional 6 million votes would have been cast around the country .. In the survey, 65% of single women said they viewed the country as "seriously off on the wrong track." (During the same period, 50% of all respondents to The Times Poll agreed with that statement.)" 9:15:35 AM
Saturday, May 08, 2004
And behold, there came the time of Refactored Overloaded Objects
: "If you're a Perl coder who hasn't been keeping a close eye on CPAN then you may have missed the latest chunk of code making quite a stir, namely Brian "Ingy" Ingerson's marvellous IO::All
. And it is
marvellous: if Perl is the Swiss Army Chainsaw then this is the new light saber attachment - can't do anything you couldn't do previously but it slices through most IO jobs in one or two lines, from file slurping (one line, obviously) to creating a forking server (er, two lines). This Perl.com piece
would be a great introduction if another burst of coding from Ingy hadn't rendered it half-obsolete a mere three days later. But, dammit, that's what we like to see!
IO::All's design could be described, for want of a decent OO education, as "overload one class with a billion different uses" and in this case it seems to work well. The vast majority of the code revolves around grabbing code from other modules and wrapping them up in several big contextualising switches so that this single class is almost all you need for your to-ing and fro-ing with the outside filesystem. " 3:50:32 PM
VIPS image processing library
: "It's a free image processing system. It aims to be about half way between Excel and Photoshop." Claims to be good with large image files. Has a scripting interface. 9:35:33 AM
Friday, May 07, 2004
: "This module is a wrapper for the Google Web APIs. It allows you to do Google searches, retrieve pages from the Google cache, and ask Google for spelling suggestions." 11:03:00 PM
India's secret army of online ad 'clickers':
"A growing number of housewives, college graduates, and even working professionals across metropolitan cities are rushing to click paid Internet ads to make $100 to $200 (up to Rs 9,000) per month. "It's boring, but it is extra money for a couple of hours of clicking weblinks every day," says a resident of Delhi's Patparganj, who has kept a $300-target for the summer
" 11:02:40 PM
: "MIDlog, a J2ME client for all blogging systems that support the Blogger API.
MIDlog is open-source and GPL software," 10:34:31 PM
PMICRO Temperature recorder
: Cheezy wired temperature sensor gear that uses SNMP and ethernet for data collection. Very cheap: $200 per ethernet collection box, wired to up to 16 daisy-chained $15-25 sensors. 4:49:16 PM
Internet-Enabled Wireless Web Sensor Network (WWSN)
: "Combining direct sensor inputs and microprocessor based transmitters employing time division multiple access (TDMA) techniques, this system allows large networks of remote transmitters to communicate digital data to a single receiver. A sleep timer with random wake-up allows multiple periodic transmitters to operate on the same communications channel (418 MHz RF) with a very low collision probability. Each transmitter includes sensor signal conditioning, multiplexer, 16 bit A/D converter, microprocessor, and RF link. The transmitters are compatible with a wide variety of sensors, including thermocouples (cold junction compensated), strain gauges, load cells, torque transducers, and displacement transducers (DVRT’s).
The receiver includes a single board computer (SBC) with Ethernet capability, built in XML and HTML (internet enabled) file transfer protocols, and data storage capability. The web server interrogates the SBC from a standard web browser (MicroSoft’s Internet Explorer or Netscape’s Navigator) to receive multi-channel sensor data from the SBC in extensible mark-up language (XML) format." User manual and pricing online, currently $895 for wifi or ethernet base station, $395 for temperature/humidity node, $2495 for 3 node, base station and software." 4:21:32 PM
How Secure Is Secure?
Simple description of 802.11 and other signal processing, and how more advanced signal processing like direct-sequence spread spectrum (DSSS) can enhance security. In effect, the signal can disappear below the noise level, and only be detected by knowing where to look (which frequencies and time slots) in advance. 4:07:34 PM
Krugman on oil supplies:
"the end [the energy crisis of the 1970's] has been widely misunderstood: prices went down not because the world found new sources of oil, but because it found ways to make do with less. During the 1980's, oil consumption dropped around the world as the delayed effects of the energy crisis led to the use of more fuel-efficient cars, better insulation in homes and so on. Although economic growth led to a gradual recovery, as late as 1993 world oil consumption was only slightly higher than it had been in 1979. In the United States, oil consumption didn't regain its 1979 level until 1997.
Since then, however, world demand has grown rapidly: the daily world consumption of oil is 12 million barrels higher than it was a decade ago, roughly equal to the combined production of Saudi Arabia and Iran. It turns out that America's love affair with gas guzzlers, shortsighted as it is, is not the main culprit: the big increases in demand have come from booming developing countries. China, in particular, still consumes only 8 percent of the world's oil — but it accounted for 37 percent of the growth in world oil consumption over the last four years.
The collision between rapidly growing world demand and a limited world supply is the reason why the oil market is so vulnerable to jitters. .. In a way it's ironic. Lately we've been hearing a lot about competition from Chinese manufacturing and Indian call centers. But a different kind of competition — the scramble for oil and other resources — poses a much bigger threat to our prosperity.
So what should we be doing? Here's a hint: We can neither drill nor conquer our way out of the problem. Whatever we do, oil prices are going up. What we have to do is adapt." 8:50:35 AM
Wednesday, May 05, 2004
Those Friendly Iranians: "Finally, I've found a pro-American country. Everywhere I've gone in Iran, with one exception, people have been exceptionally friendly and fulsome in their praise for the United States, and often for President Bush as well. ..
In the 1960's and 1970's, the U.S. spent millions backing a pro-Western modernizing shah — and the result was an outpouring of venom that led to our diplomats' being held hostage. Since then, Iran has been ruled by mullahs who despise everything we stand for — and now people stop me in the bazaar to offer paeans to America as well as George Bush. Partly because being pro-American is a way to take a swipe at the Iranian regime, anything American, from blue jeans to "Baywatch," is revered..
Indeed, many Iranians seem convinced that the U.S. military ventures in Afghanistan and Iraq are going great, and they say this with more conviction than your average White House spokesman. ..
Iran-U.S. relations are now headed for a crisis over Tehran's nuclear program, which appears to be so advanced that Iran could produce its first bomb by the end of next year. The Bush administration is right to address this issue, but it needs to step very carefully to keep from inflaming Iranian nationalism and uniting the population behind the regime. We need to lay out the evidence on satellite television programs that are broadcast into Iran, emphasizing that the regime is squandering money on a nuclear weapons program that will further isolate Iranians and damage their economy...
In a teahouse near the Isfahan bazaar, where I was interviewing religious conservatives, they were warm and friendly, but a group of people two tables away went out of their way to be rude, yelling at me for being an American propagandist. So I finally encountered hostility in Iran — from a table full of young Europeans" 5:49:56 PM
VentureBlog: Tapping The Trillion Dollar Market
: "Hard-headed venture investors have suddenly become environmentalists; there's money to be made in saving the world. .. Investing in the area has been growing more than 8% a year. After several false starts in the late 80's and mid 90's, is now the time to invest in alternative energy?" The author notes that
"The California Public Employees' Retirement System (CalPERS) launched a new investment program that will invest up to $200 million in the burgeoning environmental technology sector during the next few years [that] will target investments in environmental technology solutions .. such as recycling; minimizing the use of natural resources; and reducing emissions, refuse, and contamination to air, water, and land." It is part of a larger
"plan to invest $1.5 billion of the state's pension funds in environmental technologies. State Treasurer Phil Angelides said the "Green Wave" initiative is aimed at helping the state improve financial returns, generate jobs and clean up the environment. "I want to see California in the best position to reap the benefits of this growing sector of the global economy," Angelides said in an interview. The California Public Employees' Retirement System, the nation's largest pension fund, voted in March to invest $200 million in clean technology startups, and agreed this month to pump $500 million into environmentally responsible stocks and mutual funds." 2:46:27 PM
Expanded footprint:"Thuraya Satellite has announced that it has expanded its satellite telecommunications southward in Africa, thereby providing blanket coverage to Kenya, Uganda, Democratic Republic of the Congo, Gabon, Rwanda, Burundi, Angola, Zambia, Malawi, Mozambique, the Seychelles, Zimbabwe, and Tanzania...
Last October, Thuraya announced its imminent expansion into East and South East Asia by the end of this year, in response to high demand and growth opportunities in these new market segments. The expanded Far East footprint includes Brunei, Cambodia, China, East Timor, Indonesia, Japan, Lao, Malaysia, Mongolia, Myanmar, the Koreas, Papua New Guinea, Philippines, Thailand, Vietnam and Singapore as well as large area of Eastern Russian Federation. " I wonder if rBgan will come with it, or if rBgan will remain only on the original satellite and footprint. 1:42:20 PM
Integrity of electronic voting questioned
: Some progress: "Legislation requiring voter-verified paper ballots has been introduced in 15 states (Alabama, Alaska, Colorado, Connecticut, Florida, Georgia, Maryland, New Jersey, New York, Ohio, Tennessee, Virginia, Washington, West Virginia, and Wisconsin) that currently use electronic voting machines, and four states (Arizona, Maine, Minnesota and Vermont) that have yet to upgrade their voting equipment. Sixteen states with electronic voting machines have not discussed paper ballots: Arkansas, Delaware, Indiana, Iowa, Kansas, Kentucky, Louisiana, Michigan, Mississippi, New Mexico, North Carolina, North Dakota, Pennsylvania, South Carolina, Texas and Wyoming. Election officials in Illinois, Oregon, Nevada and New Hampshire already have banned paperless, electronic voting systems. Nevada Secretary of State Dean Heller recently made Nevada the only state to mandate that printers be installed on all electronic voting machines by November, despite the fact that Nevada had experienced no problems with the machines used by 70 percent of the stateâ019s voters in 2002. " 10:01:21 AM
Tuesday, May 04, 2004
US diplomats' letter to Bush
: 60 former US diplomats (several ambassadors) wrote: "You have placed US diplomats, civilians and military doing their jobs overseas in an untenable and even dangerous position. Your unqualified support of Sharon's extra-judicial assassinations, Israel's Berlin Wall-like barrier, its harsh military measures in occupied territories, and now your endorsement of Sharon's unilateral plan are costing our country its credibility, prestige and friends" 10:40:24 PM
Diskless, Low-Form-Factor OpenBSD Systems:
"In a previous article
we built a tiny OpenBSD system out of a Soekris miniature PC, a bootstrap workstation, and a Compact Flash (CF) card. While this combination works nicely for many purposes, once you have Soekrii scattered all around your network, managing the CF cards can be annoying. Replacing the CF cards with a diskless boot system eases management problems. " 5:39:48 PM
Lloyd's satellite constellations
: "These pages form an index to useful web information discussing [Low Earth Orbit or LEO] satellite constellations. You won't gain a complete picture of what any proposed constellation is capable of, or really in-depth technical details, but you will gain an idea of what the developments in this area are, where the industry and technology is headed - and you will pick up background knowledge of satellites along the way. " 3:27:37 PM
Grow-your-own to replace false teeth: From the too-good-to-be-true department: "Instead of false teeth, a small ball of cells capable of growing into a new tooth will be implanted where the missing one used to be. The procedure needs only a local anaesthetic and the new tooth should be fully formed within a few months of the cells being implanted.
Paul Sharpe, a specialist in the field of regenerative dentistry at the Dental Institute of King's College, London, says the new procedure .. is fairly simple. Doctors take stem cells from the patient. These are unique in their ability to form any of the tissues that make up the body. By carefully nurturing the stem cells in a laboratory, scientists can nudge the cells down a path that will make them grow into a tooth. After a couple of weeks, the ball of cells, known as a bud, is ready to be implanted. Tests reveal what type of tooth - for example, a molar or an incisor - the bud will form.
Using a local anaesthetic, the tooth bud is inserted through a small incision into the gum. Within months, the cells will have matured into a fully-formed tooth, fused to the jawbone. As the tooth grows, it releases chemicals that encourage nerves and blood vessels to link up with it.
Tests have shown the technique to work in mice, where new teeth took weeks to grow. "There's no reason why it shouldn't work in humans, the principles are the same," said Prof Sharpe." 12:11:20 AM
Monday, May 03, 2004
Dowd: Wolfie's Fuzzy Math: "This is, of course, an administration that refuses to quantify or acknowledge the cost of its chuckleheaded empire policies, in bodies, money, credibility in the Arab world, reputation among our allies or the reinvigoration of militant Muslims around the globe. Duped themselves, they duped Americans into thinking it would be easy, paid for with Iraqi oil. But Donald Rumsfeld's vision of showing off a slim, agile military was always at odds with the neocons' vision of infusing enough security into Iraq to turn it into an instant democratic paradise.
Crushed in the collision of these two grandiose dreams are all the smaller dreams of fallen soldiers, to raise kids and watch baseball and grill hot dogs on the Fourth of July. Now things have deteriorated to the point that the administration is pathetically begging for help from the very people it was trying to roll over -- the U.N., Saddam's Baathist generals and the Iranians." 4:34:55 PM
Smart Mobs: Phones, Radio, Elections in Ghana
: "Ethan Zuckerman of Geekcorps notes at etcon panel that the last Ghana election "went considerably more smoothly than the last US national election" due to the use of cellphones and radio to report voting fraud: Whenever someone at a polling place reported fraud, the called the radio station, which broadcast it; the police had to check it out, not having the excuse that they didn't receive a report." 2:11:10 PM
: "Pac-Manhattan is a large-scale urban game that utilizes the New York City grid to recreate the 1980's video game sensation Pac-Man. This analog version of Pac-man is being developed in NYU's Interactive Telecommunications graduate program, in order to explore what happens when games are removed from their "little world" of tabletops, televisions and computers and placed in the larger "real world" of street corners, and cities. A player dressed as Pac-man will run around the Washington square park area of Manhattan while attempting to collect all of the virtual "dots" that run the length of the streets. Four players dressed as the ghosts Inky, Blinky, Pinky and Clyde will attempt to catch Pac-man before all of the dots are collected. Using cell-phone contact, Wi-Fi internet connections, and custom software designed by the Pac-Manhattan team, Pac-man and the ghosts will be tracked from a central location and their progress will be broadcast over the internet for viewers from around the world. " 1:44:44 PM
"Inverse Surveillance" -- What We Should Do With All Those Phonecams: Steve Mann's ideas of citizen "sousveillance" predated the cameraphone phenomena by nearly a decade. [He has] reknown as the longtime online cyborg. He started wearing computers and sent his "eyetap" camera images to the Web way back in 1994. His first reference to his activities as a new kind of newsgathering date back to the day in 1995 when he followed a fire truck to a fire and sent the pictures from his head-mounted camera to the Web ..
In 2000, Mann and his students streamed images directly to the Web when violence broke out at a demonstration by the Ontario Coalition Against Poverty. If you think about it, this kind of journalism is a breakthrough in at least one dimension: whenever police abused their power in past political demonstrations, they made a point of breaking or confiscating cameras. Whether you are a violent demonstrator or an abusive police officer, it doesn't do a lot of good to disguise your misbehavior by trashing a camera if it has already sent images to the Whole Wide World. ..
"Surveillance" is French for "watching from above," but Mann's ["sousveillance"] is French for "watching from below." If you think about it, there really is little that citizens can do at this point to prevent others from watching, listening, and tracking us – but we are beginning to get the tools to watch the watchers. Mann notes that surveillance is about authorities watching from on high, but sousveillance is a down-to-earth human's eye view; surveillance cameras are usually automatic devices statically mounted on the ceiling, but sousveillance is human-situated and eye-level; activities are surveilled by authorities but sousveilled by participants; surveillance is secret but sousveillance is public."
Here's a practical application: People For the American Way Election Protection: "Volunteer poll monitors make EP an effective advocate for voters and a powerful deterrent to those who would try to deny voters their rights. Trained by attorneys and armed with cell phones that connect them with a lawyers hotline, EP volunteers distribute the 'Voters Bill of Rights at the polls and identify and solve problems as they happen -- not after Election Day has passed." They say they will use cameras in cell phones when possible. 1:12:15 PM
A Fine Mesh
: "public safety organizations such as police and fire departments have emerged as the primary early market for mesh wireless systems. These organizations need instant, secure mobile data connections, but today they are stuck with multiple incompatible legacy systems that don't even provide the necessary capacity. With homeland security a pressing concern throughout the US, public safety agencies are in a position spend money on emerging technologies that solve difficult problems. Corporate and residential deployments may take longer," 1:03:22 PM
The Triumph of Good Enough: Converged devices make headway: "Smaller form factors, better performance, lower prices, and miniaturization of components all play a role. My Treo 600 will never be as good a wireless email device as the single-function Blackberry, nor will it compare to an iPod as a music player. Yet, with a 512 megabyte SD expansion card for those MP3 files, it's quite serviceable for both functions. The same goes for its prowess as an organizer, camera, and Web browser. Moreover, because the Treo runs a real operating system with storage and downloading capabilities, it's more adaptable than the single-function devices will ever be. Shortly after buying the Treo, I added an application to read RSS syndication feeds from my favorite Weblogs, and an MP3 player than can pull in live streaming audio from the Web-based Shoutcast service. Try that on an iPod! My point isn't tied to the particular product. Sony Ericsson's P900, Nokia's Communicator line, Danger's HipTop, and PocketPC phones from vendors such as Samsung and Hitachi are also closing in on converged nirvana. "
And, personal radio too: "Using a Palm application called Pocket Tunes, I can now tap into Shoutcast streaming Internet radio stations from my Treo 600. There is something incredibly cool about this. It's a hideous hack, linking together a series of elements that were designed for other purposes: 12:55:34 PM
Radio Station --> MP3 files --> Shoutcast server --> Internet --> SprintPCS network -- > PalmOS application --> Treo
But that's what's so great about it. The end-to-end architecture and open standards of the Internet means that new applications can take advantage of existing networks and services.. Right now this is mostly an indulgence for early-adopters like myself, but why shouldn't every mobile phone also be a personal radio? "
Nigerian Mobs Alerted By Texting
: From Nov 2002 Howard Rheingold notes "the reported use of texting to summon rioters in Nigeria
Ironically, the blasphemous story published against the prophet has tended to unite the nation's muslims who have not only been unanimous in their condemnation of the story, but have also been sending solidarity text messages on their GSM phones to alert one another on the blasphemy since last Sunday.
AbdulHameed Daramola, a Lagos Muslim told Weekly Trust that he alone alerted over seventy Muslims across the country about the blasphemy through text messages on his GSM since last Sunday when he became aware of the issue"
Electoral Smart Mobs in Kenya
: "For the first time, we Kenyans have more or less agreed that this time we have had a fair election with the highest number of voters turning out to vote. One key instrument has been the mobile phone." Uses: Planning, Campaigning, and Results Dissemination.
"We in the ICT field know this is a best practice on how ICTs can help curb rigging, enhance transparency and keep people together. The two cell phone poviders were licensed less than five years ago and cover most of Kenya and have outstripped fixed lines government provider by more than 300% in that short period. Incidentally, no fixed lines were working in all the polling stations I visited further proving the maxim..Africa telecommunications development will be more wireless than fixed. " 12:45:22 PM
Intelligence: A Double Game
: "NEWSWEEK has learned that top Bush administration officials have been briefed on intelligence indicating that Chalabi and some of his top aides have supplied Iran with "sensitive" information on the American occupation in Iraq. U.S. officials say that electronic intercepts of discussions between Iranian leaders indicate that Chalabi and his entourage told Iranian contacts about American political plans in Iraq. There are also indications that Chalabi has provided details of U.S. security operations. According to one U.S. government source, some of the information Chalabi turned over to Iran could "get people killed." .. Each month the Pentagon still pays his group a $340,000 stipend, drawn from secret intelligence funds, for "information collection." Still, the State Department and the CIA are using the intelligence about his Iran ties to persuade the president to cut him loose once and for all." 8:28:20 AM
The Secret Source of Google's Power
: Fun read; their long-term comparative advantage may be scale: "Google is a company that has built a single very large, custom computer. It's running their own cluster operating system. They make their big computer even bigger and faster each month, while lowering the cost of CPU cycles. It's looking more like a general purpose platform than a cluster optimized for a single application. While competitors are targeting the individual applications Google has deployed, Google is building a massive, general purpose computing platform for web-scale programming. .. What will they do next with the world's biggest computer and most advanced operating system? " More on Google architecture: a note
, a paper
, and a presentation
. 2:05:48 AM
Solar Thermal Hydrogen:
Solarec trials 10m x 10m dishes to concentrate solar heat to split CO2, add water, and yield hydrogen. Additional byproducts are commercially usable hydrogen and high grade heat for direct electricity production. A supply of CO2 is split and rejoins repeatedly. 1:14:56 AM
Sunday, May 02, 2004
Patriot Act Suppresses News Of Challenge to Patriot Act: " The American Civil Liberties Union disclosed yesterday that it filed a lawsuit three weeks ago challenging the FBI's methods of obtaining many business records, but the group was barred from revealing even the existence of the case until now. The lawsuit was filed April 6 in U.S. District Court in Manhattan, but the case was kept under seal to avoid violating secrecy rules contained in the USA Patriot Act, the ACLU said. The group was allowed to release a redacted version of the lawsuit after weeks of negotiations with the government. " The heart of the suit is are the administrative subpeonas that the FBI now uses frequently, for collecting copies of databases without judicial oversight. 6:16:50 PM
Google files for unusual $2.7 billion IPO
: "The amount of the $2.7 billion offering contains an inside joke for the math-minded. The exact offering, $2,718,281,828, is the product of "e" and $1 billion, where "e" is the base of the natural logarithm
--a logarithm especially useful in calculus--and equals about 2.718281828." And, e is an irrational number... 6:10:50 PM
The Wi-Fi Positioning System: " Quarterscope has developed a Wi-Fi Positioning System (WPS) that can complement or, in certain cases, replace the traditional Global Positioning System (GPS). .. [GPS fails if] you're indoors, or in a skyscraper-filled urban canyon.. But WPS uses the 5 million Wi-Fi hotspots that are scattered around the United States (which some esitmates say will grow to 10 million in the next 12 months) to pinpoint the location of any device that has a Wi-Fi chipset in it. As long as a Wi-Fi access point in range it’ll figure out where you are.
Several companies have developed indoor Wi-Fi location-based services (for museums and the like), but they are used in tightly controlled conditions. Quarterscope's WPS is the first outdoor [software-only] Wi-Fi location detection system.. WPS takes advantage of the fact that almost all access points are configured to transmit their unique IDs whenever a Wi-Fi client sends out a scan request. Quarterscope exploits this capability (which doesn't drain the resources or compromise the security of access points) by combining it with the data collected by wardrivers, who use GPS systems and laptops to discover and map out access points in towns and cities. .. Quarterscope says it can locate a device to within 20 feet, and that improvements in the coming months will allow for even better positioning. The company hopes to launch the product commercially later this year, and plans to charge a monthly subscription fee to use the service. It says it'll have 90% coverage throughout the top 25 cities in the US.
Because WPS is interoperable with any application that can use GPS, it can be put to use right away in applications such as Microsoft Streets and Trips and Delorme Street Atlas. Quarterscope is also working on several in-house applications. One, called, WhereIsIt, will give you directions to the nearest gas station, ATM, hotel or restaurant. Another application provides a more general local search for different kinds of businesses and attractions. It can also add a location stamp to digital photos and documents. One intriguing application for WPS is a "LoJack" for laptops. (Notebook theft is a big problem -- 1.6 million were stolen in the US in the last three years, and only three percent were recovered.) WPS could be used to quietly send e-mail with your laptop's coordinates to a special address. If the laptop is ever stolen, you can find out where it is and track it down. "
A related effort is Intel's Place Lab: "a software base and a community-building activity that facilitates widespread adoption of low-cost, easy-to-use user positioning for location-enhanced computing applciations." It's open source with a whitepaper on privacy. 9:54:17 AM