Russia

Russia hasn’t occupied this much airtime on American news channels since the Cold War. But everywhere you look it’s Russia this and Russia that. Russia is propping up the Assad regime in Syria! Russia rigged the election! Russia stole my lunch money!

Wait, let’s step back to the second one. A lot of charges are being made that Russia “hacked” the election, which allowed Trump to win. And there’s some evidence that shenanigans were taking place regarding the election:

Georgia’s secretary of state says the state was hit with an attempted hack of its voter registration database from an IP address linked to the federal Department of Homeland Security.

Well that’s embarrassing. Apparently the Department of Motherland Fatherland Homeland Security (DHS) is a Russian agency. Who would have guessed?

Could Russia have influenced the election? Of course. We live in an age of accessible real-time global communications. Anybody could influence anybody else’s voting decision. A person in South Africa could influence a voter in South Korea to opt for one choice over another. This global communication system also means that malicious hackers in one nation could compromise any connected election equipment in another country.

However, the biggest check against Russian attempts to rig the election is all of the other forces that would be trying to do the exact same thing. People have accused both the Federal Bureau of Investigations (FBI) and the Central Intelligence Agency (CIA) (admittedly, rigging elections is what the CIA does) of trying to rig the election. Likewise, there are some questions about what exactly the DHS was doing in regards to Georgia. Major media companies were working overtime to influence people’s voting decision. Countries in Europe had a vested interest in the election going one way or another as did pretty much every other country on Earth.

I have no evidence one way or another but that’s never stopped me from guessing. My guess as to why these accusations against Russia are being made so vehemently is that a lot of voters are looking for answers as to why Trump won but are unwilling to consider that their preferred candidate was terrible. When you convince yourself that the candidate you oppose is Satan incarnate then you lose the ability to objectively judge your own candidate because in your head it’s now a battle between evil and good, not a battle between two flawed human beings.

The Planes Have Ears

While a bunch of nationalists continue to call Snowden a traitor and demand he return to the United States for execution the rest of us are looking at the material he provided about the criminal organization he worked for as a contractor. Through the information he provided we’ve learned a great deal about how the National Security Agency (NSA) has been abusing its power to surveil the American public. Whether on the ground, on the sea, or in the air the NSA is spying on you:

IN THE TROVE of documents provided by former National Security Agency contractor Edward Snowden is a treasure. It begins with a riddle: “What do the President of Pakistan, a cigar smuggler, an arms dealer, a counterterrorism target, and a combatting proliferation target have in common? They all used their everyday GSM phone during a flight.”

This riddle appeared in 2010 in SIDtoday, the internal newsletter of the NSA’s Signals Intelligence Directorate, or SID, and it was classified “top secret.” It announced the emergence of a new field of espionage that had not yet been explored: the interception of data from phone calls made on board civil aircraft. In a separate internal document from a year earlier, the NSA reported that 50,000 people had already used their mobile phones in flight as of December 2008, a figure that rose to 100,000 by February 2009. The NSA attributed the increase to “more planes equipped with in-flight GSM capability, less fear that a plane will crash due to making/receiving a call, not as expensive as people thought.” The sky seemed to belong to the agency.

In a 2012 presentation, Government Communications Headquarters, or GCHQ, the British equivalent of the NSA, in turn disclosed a program called “Southwinds,” which was used to gather all the cellular activity, voice communication, data, metadata, and content of calls on board commercial aircraft. The document, designated “top secret strap,” one of the highest British classification levels, said the program was still restricted to the regions covered by satellites from British telecommunications provider Inmarsat: Europe, the Middle East, and Africa.

I vaguely remember something about some bill listing some supposed rights. If I remember correctly one of the items on that list mentioned something about a right to being protected from unwarranted searches.

Anybody who is even moderately well read on history knows that national surveillance apparatuses are generally developed under the guise of surveilling external threats but always end up being used to surveil the nation’s own people. This is why privacy advocates tend to have a zero tolerance policy in regards to national surveillance efforts. It is also why only a fool would support such efforts.

What Snowden did wasn’t traitorous, it was an attempt to bring some accountability to the unaccountable. The NSA has been performing untargeted searches. Untargeted searches necessarily means no warrants have been issued, which means these searches of the American people are in violation of the language of the Fourth Amendment. This is why it amuses me when self-proclaimed constitutionalists call for Snowden’s head. It is also why I’m amused by people who claim that the Constitution is a protection against the government’s power. To quote Lysander Spooner, “But whether the Constitution really be one thing, or another, this much is certain – that it has either authorized such a government as we have had, or has been powerless to prevent it. In either case it is unfit to exist.”

History Repeats Itself

I swear that the United States government is hellbent on repeating all of its dumbest mistakes over and over again. One mistake that the United States loves to repeat is handing out weapons to groups that will eventually use those weapons against it. This strategy was a staple of the Cold War. During that period the United States would hand weapons out like candy to anybody who declared themselves in opposition to the Soviet Union. Today the same strategy is being used although the weapons are being handed to anybody who declares themselves in opposition to whatever particular nation or organization is the flavor of the day. Right now the flavor is Syria:

Washington, D.C. – Congress for the first time authorized the Department of Defense to provide vetted-Syrian rebels with anti-aircraft missiles.

The provision is contained within the $619 billion Fiscal Year 2017 National Defense Authorization Act, which passed the Senate on Dec. 8 and the House on Dec. 2.

Under the bill, the Secretaries of Defense and State must submit a report to Congress explaining why they determined Syrian groups need man-portable air defense systems (MANPADS).

We keep hearing that it’s impossible to vet Syrian refugees but apparently it’s not too much trouble to vet entire Syrian rebel groups.

If you’ve read any history, even badly, of the proxy wars that were waged by the Soviet Union and the United States you know how this will play out. The Secretaries of Defense and State will submit a report to Congress, which will give Congress the ability to cover its ass. Congress will authorize the transfer of weapons to the Syrian rebel groups. Those weapons will then eventually be used to shoot down a commercial airliner or some such nonsense and Congress will act shocked and demand to know where this terrorist organization (they cease being a rebel group when they no longer serve the United States’ interests) obtained such weaponry.

Everything Old is New Again

During the Cold War Senator Joe McCarthy believed that the Soviets had infiltrated every branch of the United States government. Unhappy by the prospect of evil communists infiltrating his beloved fascist government, McCarthy decided to do the only thing he knew how to do, perform witch hunts. He made the lives of many people miserable all because he didn’t want international socialists in his national socialist government.

Those who don’t remember history are doomed to repeat it. Those who do remember history are doomed to watch everybody else repeat it:

On Tuesday, Democratic Whip Steny Hoyer (D-Md.) and six ranking members of major House committees sent President Obama a letter declaring, “We are deeply concerned by Russian efforts to undermine, interfere with, and even influence the outcome of our recent election.”

A prominent signer of the letter — Rep. Adam Schiff (D-Calif.), the ranking member of the House Intelligence Committee — is among the Democrats most eager to denounce Russian subversion.

A week ago, when the House approved by a 390-30 margin and sent to the Senate the Intelligence Authorization Act for fiscal 2017, Schiff praised “important provisions aimed at countering Russia’s destabilizing efforts — including those targeting our elections.” One of those “important provisions,” Section 501, sets up in the executive branch “an interagency committee to counter active measures by the Russian Federation to exert covert influence.”

The only difference between the beginning of this story and the beginning of McCarthy’s story is that in this revision Russia isn’t a communist nation anymore.

If you read the document you’ll see that it tasks the committee with nebulous responsibilities that are vague enough to mean anything. My favorite responsibility is probably dealing with media manipulation. It must be noted that the document is tasking the committee with specifically countering Russian media manipulation, not manipulation performed by the United States government because that form of manipulation is doubleplusgood. What this requirement will boil down to is any media reports that aren’t favorable to the interests of the United States will likely be called Russian influence and dealt with accordingly. I’m sure there are a lot of journalists out there that will find themselves under federal investigation, probably of the secret variety, because they reported the wrong side of a story.

After the conclusion of the Cold War you might have expected the United States to chill the fuck out. With its only credible adversary out of the picture the United States could stop living in a constant state of fear. Instead it sought high and low for a new threat. Many were tried; Iran, al Qaeda, Iraq, etc.; but it quickly became obvious that the hole in the United States’ heart could only be filled by Russia. So here we are, decades after the fall of the Soviet Union, still looking to hold witch trails on account of Russia.

Nothing changes.

Time Urges Readers to Stop Paying Taxes

You know we’ve all been sucked into a wormhole and dumped out into Bizarro World when statist rags like Time start sounding more like me:

The approximately 65 million Democrats who voted for Hillary Clinton should pledge that in the future if a Republican wins the presidency with fewer votes than a Democrat for the third time in our era, we won’t pay taxes to the federal government. No taxation without representation!

Admittedly, I didn’t really care which of the two crooks was elected president but watching the Democrats suddenly become more anti-state has been filling with me no minor amount of joy. The anti-war left is starting to come back out of the woodwork, Democrats are suddenly outraged by the expansive surveillance powers the State has granted itself, Californians are talking about secession, and Time is urging their readers to stop paying taxes. Of course they will revert to their old selves as soon as their guy gets back in power but for at least four years I’ve got some really good entertainment to watch.

Unite and Rule

I’m sure all of you have heard the phrase divide and conquer. It’s basic wisdom. If you can divide a large united force into multiple smaller groups (preferably groups at odds with each other) it’s easier to conquer each of them one at a time. I feel as though there needs to be an addendum that says unite and rule.

Several of my friends have been circulating this piece by The Daily Show host Trevor Noah. It’s titled Let’s Not Be Divided. Divided People Are Easier to Rule. As the title promises, Mr. Noah tries to make an argument that we must all unite because united people are harder to rule.

I have to call bullshit on that. While divide people may be easier to conquer initially they tend to be harder to rule. Why? Because you have to appeal to each group in order to successfully rule them. But anybody who manages to appeal to one group is likely to put themselves at odds that group’s enemies. When you’re dealing with a united people then you just have one group to please, which generally means you only need to appeal to whatever tribe identity they share.

This is why rulers work so hard to instill nationalism into their people. We see this every day here in the United States. If you can trigger the part of Americans’ monkey brains that deals with their identity as Americans you can get them to roll over for almost anything. Do you want to invade Iraq? Do you have no pretense for doing so? No problem, just convince the people that Iraq is somehow a threat to the United States. Do you want to pass draconian surveillance powers? No problem, just convince the people that those powers will protect the people of the United States. And less somebody think this is unique to the United States, it’s not. It’s a common tactic used throughout history by rulers. Britain, for example, has probably played the nationalism game even better than the United States currently is.

Instilling strong individualism and a small group mentality into people will make them much harder to rule than instilling collectivism and a large group mentality.

Using Data Classification to Hide the Truth

Continuing on my theme of the State having many layers of protection that hinder any meaningful change, I came across a story about how the Department of Defense used data classification to protect itself from possible budget cuts:

In January of 2015, as the US Department of Defense was chafing under the sequestration of its budget, the Pentagon leadership got some great news. A study prepared by the Defense Business Board (DBB) and a team from the global management consulting giant McKinsey and Company found that even with “moderate” changes to business practices, the DOD could save $125 billion over five years.

[…]

That good news, however, did not fall upon welcoming ears. DOD officials had no real idea how much bureaucratic overhead was costing them, as the costs were never accurately measured. When they saw the numbers from the DBB, the Washington Post reports, some of the Pentagon’s leadership was afraid of a legislative backlash. After DOD officials had complained for years about not having enough money to Congress, the department feared findings would trigger further cuts to the DOD’s budget. So the data for the study was designated as sensitive, and an overview of the report that had already been published to the Defense Business Board website was pulled.

You will never find a department within the State that will willingly submit to a budget cut. In fact, departments will go to great lengths to justify expanding their budgets. Different departments have different strategies to argue against cuts but they all work together to ensure that the State always has a justification to keep cranking up taxes.

I would have liked to see the looks on the faces of those Department of Defense (DoD) bureaucrats when they saw that they could cut $125 billion for their budget. I’m sure they made more than a few implied threats to the people who created the report to discourage them from performing such an investigation in the future. And if the DoD didn’t have a policy to mark any reports arguing in favor of a budget cut as sensitive before, I’m sure it does now.

People talk about changing the system from the inside but that’s not possible when every component of the system has hundreds or thousands of roadblocks preventing changes. Concealing information is one such roadblock. How can somebody make an accurate budget when the information they need is inaccurate or missing? So long as every department only reveals information arguing for the need to increase their budget there is no way anybody within the system is going to be able to make a valid (to the State, not to the people) argument for decreasing taxes.

Renting Freedom

Robert Higgs is one of my favorite anarchist philosophers. He has a knack for pointing out the bloody obvious that many people fail to see. In October he wrote a short post pointing out that nobody who is required to pay taxes is truly free:

In the antebellum South, it was not uncommon for slaves to rent themselves from their masters. As a young man, Frederick Douglass did so, for example. His owner gave him leave to go out on his own, to find employment where he could, and to pocket the pay he received for such work, except that each month he had to pay his master a fixed sum for his freedom. Douglass worked in the shipyards of Baltimore, caulking ships. Aside from his rental payment for his own body, he lived as he wished, subject to his income constraint. He found his own housing, acquired his own food and clothing, and so forth, just as a free wage worker would have done.

It strikes me that this practice has much in common with the situation in which an ordinary private person finds himself in any modern country today. The person is in general at liberty to arrange his own employment, spend his earnings as he pleases, acquire his own food and housing, and so on, except that he must pay a rental for this personal liberty, which takes the form of a portion of his earnings that must be paid to the various governments that collect income and employment taxes in the jurisdiction.

People believe that feudalism and slavery are, for the most part, a thing of the past. We’re living under both of those systems but under different names. Instead of being serfs we’re called citizens. Instead of barons, lords, and other royal titles we have sheriff’s, city councils, and other bureaucratic titles. Much like the slaves of the South, we must rent our freedom. We can’t own land, we can only rent it. If we fail to pay our rent on either our freedom or our land one of the royal slave catchers will find us and kidnap us so that a royal judge can decide how best to punish us.

The United States isn’t the freest country on Earth. In fact, it’s one of the more draconian countries because it not only has ridiculous high rents but also because those rents are enforced by a ruthlessly efficient government.

So Much for Farook’s Phone

Shortly after the attack in San Bernardino the Federal Bureau of Investigations (FBI) tried to exploit the tragedy in order to force Apple to assist it in unlocking Syed Rizwan Farook’s iPhone. According to the FBI Farook’s phone likely contained information that would allow them to find his accomplices, motives, and basically solve the case. Apple refused to give the FBI the power to unlock any iPhone 5C willy nilly but the agency eventually found a third party that had an exploit that would allow the built-in security to be bypassed.

One year later the FBI hasn’t solved the case even with access to Farook’s iPhone:

They launched an unprecedented legal battle with Apple in an effort to unlock Farook’s iPhone and deployed divers to scour a nearby lake in search of electronic equipment the couple might have dumped there.

But despite piecing together a detailed picture of the couple’s actions up to and including the massacre, federal officials acknowledge they still don’t have answers to some of the critical questions posed in the days after the Dec. 2, 2015, attack at the Inland Regional Center.

Most important, the FBI said it is still trying to determine whether anyone was aware of the couple’s plot or helped them in any way. From the beginning, agents have tried to figure out whether others might have known something about Farook and Malik’s plans, since the couple spent months gathering an arsenal of weapons and building bombs in the garage of their Redlands home.

Officials said they don’t have enough evidence to charge anyone with a crime but stressed the investigation is still open.

This shouldn’t be surprising to anybody. Anybody who had the ability to plan out an attack like the one in San Bernardino without being discovered probably had enough operational security to not use an easily surveilled device such as a cellular phone for the planning. Too many people, including those who should know better, assume only technological wizards have the knowhow to plan things without using commonly surveilled communication methods. But that’s not the case. People who are committed to pulling off a planned attack that includes coordination with third parties are usually smart enough to do their research and utilize communication methods that are unlikely to be accessible to prying eyes. It’s not wizardry, it’s a trick as old as human conflict itself.

Humans are both unpredictable and adaptable, which is what makes mass surveillance useless. When an agency such as the National Security Agency (NSA) performs mass surveillance they get an exponentially greater amount of noise than signal. We’re not even talking about a 100:1 ratio. It would probably be closer to 1,000,000,000,000:1. Furthermore, people with enough intelligence to pull off coordinated attacks are usually paranoid enough to assume the most commonly available communication mechanisms are being surveilled so they adapt. Mass surveillance works well if you want a lot of grandmothers’ recipes, Internet memes, and insults about mothers made by teenagers. But mass surveillance is useless if you’re trying to identify individuals who are a significant threat. Sure, the NSA may get lucky once in a while and catch somebody but that’s by far the exception, not the rule. The rule, when it comes to identifying and thwarting significant threats, is that old fashioned investigative techniques must be employed.

The Real Life Ramification of Software Glitches

When people think of software glitches they generally think of annoyances such as their application crashing and losing any changes since their last save, their smart thermostat causing the furnace not to kick on, or the graphics in their game displaying abnormally. But as software has become more and more integrated into our lives the real life implications of software glitches have become more severe:

OAKLAND, Calif.—Most pieces of software don’t have the power to get someone arrested—but Tyler Technologies’ Odyssey Case Manager does. This is the case management software that runs on the computers of hundreds and perhaps even thousands of court clerks and judges in county courthouses across the US. (Federal courts use an entirely different system.)

Typically, when a judge makes a ruling—for example, issuing or rescinding a warrant—those words said by a judge in court are entered into Odyssey. That information is then relied upon by law enforcement officers to coordinate arrests and releases and to issue court summons. (Most other courts, even if they don’t use Odyssey, use a similar software system from another vendor.)

But, just across the bay from San Francisco, one of Alameda County’s deputy public defenders, Jeff Chorney, says that since the county switched from a decades-old computer system to Odyssey in August, dozens of defendants have been wrongly arrested or jailed. Others have even been forced to register as sex offenders unnecessarily. “I understand that with every piece of technology, bugs have to be worked out,” he said, practically exasperated. “But we’re not talking about whether people are getting their paychecks on time. We’re talking about people being locked in cages, that’s what jail is. It’s taking a person and locking them in a cage.”

First, let me commend Jeff Chorney for stating that jails are cages. Too many people like to prevent that isn’t the case. Second, he has a point. Case management software, as we’ve seen in this case, can have severe ramifications if bugs are left in the code.

The threat of bugs causing significant real life consequences isn’t a new one. A lot of software manages a lot of equipment that can lead to people dying if there is a malfunction. In response to that many industries have gone to great lengths to select tools and come up with procedures to minimize the chances of major bugs making it into released code. The National Aeronautics and Space Administration (NASA), for example, has an extensive history of writing code where malfunctions can cost millions of dollars or even kill people and its programmers have developed tools and standards to minimize their risks. Most industrial equipment manufacturers also spend a significant amount of time developing tools and standards to minimize code errors because their software mistakes can lead to millions of dollars being lost of people dying.

Software developers working on products that can have severe real life consequences need to focus on developing reliable code. Case management software isn’t Facebook. When a bug exists in Facebook the consequences are annoying to users but nobody is harmed. When a bug exists in case management software innocent people can end up in cages of on a sex offender registry, which can ruin their entire lives.

Likewise, people purchasing and use critical software needs to thoroughly test it before putting it in production. Do you think there are many companies that buy multi-million dollar pieces of equipment and don’t test them thoroughly before putting it on the assembly line? That would be foolish and any company that did that would end up facing millions of dollars of downtime or even bankruptcy if the machine didn’t perform as needed. The governments that are using the Odyssey Case Management software should have thoroughly tested the product before using it in any court. But since the governments themselves don’t face any risks from bad case management software they likely did, at best, basic testing before rushing the product into production.