|Ken Novak's Weblog
Purpose of this blog: to retain annotated bookmarks for my future reference, and to offer others my filter technology and other news. Note that this blog is categorized. Use the category links to find items that match your interests.
Subscribe to get this blog by e-mail.
New: Read what I'm reading on Bloglines.
Tuesday, August 03, 2004
The Niger forgeries:
British newspapers report that an Italian fraudster claims to be the source. Very interesting account of how the political demand for evidence about Iraq (in this case, ironically, from French intelligence) resulted in the supply of fictitious information. 11:52:28 PM
: A visual rendering of google news, with cool options for filtering categories or countries and reaching back in time. 11:04:21 PM
Heading for trouble:
Prescient criticisms of Iraq invasion from Nov 2002 by a Reagan Secy of the Navy: "The connotations of "a MacArthurian regency in Baghdad" show how inapt the comparison is. Our occupation forces never set foot inside Japan until the emperor had formally surrendered and prepared Japanese citizens for our arrival. Nor did MacArthur destroy the Japanese government .. The Iraqis are a multiethnic people filled with competing factions who in many cases would view a U.S. occupation as infidels invading the cradle of Islam. Indeed, this very bitterness provided Osama bin Laden the grist for his recruitment efforts in Saudi Arabia when the United States kept bases on Saudi soil after the Gulf War.
In Japan, American occupation forces quickly became 50,000 friends. In Iraq, they would quickly become 50,000 terrorist targets.
Nations such as China can only view the prospect of an American military consumed for the next generation by the turmoil of the Middle East as a glorious windfall. Indeed, .. it lends credence to their insistent cultivation of the Muslim world. One should not take lightly the fact that China previously supported Libya, that Pakistan developed its nuclear capability with China's unrelenting assistance and that the Chinese sponsored a coup attempt in Indonesia in 1965. An "American war" with the Muslims, occupying the very seat of their civilization, would allow the Chinese to isolate the United States diplomatically as they furthered their own ambitions in South and Southeast Asia." 12:54:33 PM
Sustainable Resources: "An International Forum Connecting People with Hands-on Solutions to World Poverty." Boulder CO, Sept 30 - Oct 2, 2004 (plus pre- and post-conference workshops). Keynotes by John Todd, A.T. Ariyaratne, William McDonough.
Unfortunately, it overlaps with Engineers for a Sustainable World - 2004 National Conference, Stanford CA, Sept 30-October 2, 2004. Keynotes by William McDonough (busy guy!), and Jeffrey Sachs. 12:27:22 PM
RSA Security - The Blocker Tag: Selective Blocking of RFID Tags for Consumer Privacy: Clever scheme for allowing consumers to block scanning of tags on items that they have purchased (eg, while in public places), and allowing scanning of those same items when desired (eg, in a medicine cabinet or refrigerator at home).
"One may think of a the RSA® Blocker Tag as "spamming" any reader that attempts to scan tags without the right authorization. (The RSA® Blocker Tag manipulates the reading protocol with the aim of making the reader think that RFID tags representing all possible serial numbers are present.) When a Blocker is in proximity to ordinary RFID tags, they benefit from its shielding behavior; when the Blocker tag is removed, the ordinary RFID tags may be used normally.
Thanks to their selective nature, RSA® Blocker Tags are designed not to interfere with the normal operation of RFID systems in retail environments. They help prevent unwanted scanning of purchased items, but do not affect the scanning of shop inventories. Thus RSA® Blocker Tags are designed not to be usable, for example, to circumvent theft-control systems or mount denial-of-service attacks -- only to protect the privacy of law-abiding consumers." 9:53:04 AM