Compromising Self-Driving Vehicles

The difficult part about being a technophile and an anarchist is that the State often highjacks new technologies to further its own power. These highjackings are always done under the auspices of safety and the groundwork is already being laid for the State to get its fingers into self-driving vehicles:

It is time to start thinking about the rules of the new road. Otherwise, we may end up with some analog to today’s chaos in cyberspace, which arose from decisions in the 1980s about how personal computers and the Internet would work.

One of the biggest issues will be the rules under which public infrastructures and public safety officers may be empowered to override how autonomous vehicles are controlled.

When should law enforcers and safety officers be empowered to override another person’s self-driving vehicle? Never. Why? Setting aside the obvious abuses such empowerment would lead to we have the issue of security, which the article alludes to towards the end:

Last, but by no means least, is whether such override systems could possibly be made hack-proof. A system to allow authorized people to control someone else’s car is also a system with a built-in mechanism by which unauthorized people — aka hackers — can do the same.

Even if hackers are kept out, if every police officer is equipped to override AV systems, the number of authorized users is already in the hundreds of thousands — or more if override authority is extended to members of the National Guard, military police, fire/EMS units, and bus drivers.

No system can be “hacker-proof,” especially when that system has hundreds of thousands of authorized users. Each system is only as strong as its weakest user. It only takes one careless authorized user to leak their key for the entire world to have a means to gaining access to everything locked by that key.

In order to implement a system in self-driving cars that would allow law enforcers and safety officers to override them there would need to be a remote access option that allowed anybody employed by a police department, fire department, or hospital to log into the vehicle. Every vehicle would either have to be loaded with every law enforcer’s and safety officer’s credentials or, more likely, rely on a single master key. In the case of the former it would only take one careless law enforcer or safety officer posting their credentials somewhere an unauthorized party could access them, including the compromised network of a hospital, for every self-driving car to be compromised. In the case of the latter the only thing that would be required to compromise every self-driving car is the master key being leaked. Either way, the integrity of the system would be dependent on hundreds of thousands of people maintaining perfect security, which is an impossible goal.

If self-driving cars are setup to allow law enforcers and safety officers to override them then they will become useless due to being constantly compromised by malicious actors.

Having Your Surveillance Cake And Eating It Too

At one point it wasn’t uncommon for employers to issue company devices to employees. Things have changed however and now it is common for employers to expect employees to use their personal devices for work. It seems like a win-win since employees don’t have to carry two cell phones or use whatever shitty devices their company issues and employers safe money on having to buy devices. However, it leads to an interesting situation. What happens when the employer wants to surveil an employee’s personal device? That’s the battle currently being waged by Minnesota’s state colleges and their employees:

Two faculty unions are up in arms over a new rule that would allow Minnesota’s state colleges and universities to inspect employee-owned cellphones and mobile devices if they’re used for work.

The unions say the rule, which is set to take effect on Friday, would violate the privacy of thousands of faculty members, many of whom use their own cellphones and computers to do their jobs.

“[It’s] a free pass to go on a fishing expedition,” said Kevin Lindstrom, president of the Minnesota State College Faculty.

But college officials say they have an obligation under state law to protect any “government data” that may be on such devices, and that as public employees, faculty members could be disciplined if they refuse to comply.

If the universities have such a legal obligation then they damn well should be issuing devices. Data is at the mercy of the security measures implemented on whatever devices it is copied to. When businesses allow employees to use personal devices for work any data that ends up on those devices is secured primarily by whatever measure the employee has put into place. While you can require certain security measures such as mandating a lock screen password on the employee’s phone, employees are still generally free to install any application, visit any website, and add any personal accounts to the device. All of those things can compromise proprietary company data.

By issuing centrally managed devices, the universities could restrict what applications are installed, what webpages devices are willing to visit, and what accounts can be added.

There is also the issue of property rights. What right does an employer have to surveil employee devices? If so, how far does that power extend? Does an employer has the right to surveil an employee’s home if they work form home or ever take work home? Does an employer have the right to surveil an employee’s vehicle if they use that vehicle to drive to work or travel for work? When employers purchase and issue devices these questions go away because the issued devices are the employer’s property to do with as they please.

If an employer wants to surveil employee devices then they should issue devices. If an employer is unwilling to issue devices then they should accept the fact they can’t surveil employee devices. If an employer is under a legal obligation to protect data then it needs to issue devices.

FBI Heroically Saves Us From Yet Another Person It Radicalized

Without the Federal Bureau of Investigations (FBI) who would protect us from the people radicalized by the FBI? Without the heroics of the agency a lot of people might be dead today — killed by a terrorist radicalized by the FBI:

KHALIL ABU RAYYAN was a lonely young man in Detroit, eager to find a wife. Jannah Bride claimed she was a 19-year-old Sunni Muslim whose husband was killed in an airstrike in Syria. The two struck up a romantic connection through online communications.

Now, Rayyan, a 21-year-old Michigan man, is accused by federal prosecutors of supporting the Islamic State.

Documents released Tuesday show, however, that Rayyan was motivated not by religious radicalism but by the desire to impress Bride, who said she wanted to be a martyr.

Jannah Bride, not a real name, was in fact an FBI informant hired to communicate with Rayyan, who first came to the FBI’s attention when he retweeted a video from the Islamic State of people being thrown from buildings. He wrote later on Twitter: “Thanks, brother, that made my day.”

According to the FBI, the agency discovered a radicalized supporter of the Islamic State that was going to perpetrate a terrorist attack. But the attack never happened because the FBI was able to discover the individual ahead of time and intervene.

Put into normal people lingo, the FBI found somebody with neither the motivation or means to perform a terrorist attack. The agency then provided the motivation and eventually the means. If the FBI hadn’t inserted itself into this individual’s life they still wouldn’t have perpetrated a terrorist attack.

I like to say, if it weren’t for the people radicalized by FBI agents there wouldn’t be any terrorists for the FBI to capture. When I first started saying that it was done with a modicum of sarcasm because I assumed the agency did manage to fight some actual crime once in a while. But so many of these FBI created cases exist that they literally fill a book. It’s getting to the point where seems the agency’s only job is dealing with the “terrorists” it creates.

A Lack Of Transparency Is Killer

Yesterday Hennepin County Attorney Mike Freeman announced that officers Ringgenberg and Schwarze would not be charged in the death of Jamar Clark:

No charges will be filed against the two Minneapolis officers involved in the shooting death last fall of Jamar Clark, Hennepin County Attorney Mike Freeman announced Wednesday, citing DNA and other evidence showing Clark had a hand on one officer’s gun during a struggle and was not handcuffed when shot by a second officer.

This decision has gone over about as well as anybody could have expected. Those who wanted the officers charged are angry because they don’t believe justice was served. Those on the side of the officers are happy and believe justice was served. In the end the announcement served primarily to galvanize both sides’ biases.

Which side is right? Therein lies the problem. Because of how the investigation was handled it’s hard to know. It was another case of “We investigated ourselves and determined that we did nothing wrong.” The investigation was headed by the Bureau of Criminal Apprehension (BCA) and the Federal Bureau of Investigations (FBI), both of which are law enforcement organizations. In a time when public trust in law enforcement is at a notable low the fact that both investigating organizations are involved in law enforcement cannot go without mention. But the biggest problem is that the investigation took place behind an iron curtain.

The lack of transparency is ultimately what makes the announced findings questionable. Jury trails are by no means perfect but they do take place in the public realm (members of the public can sit in and view court cases) so all evidence and arguments are not only made available but can be witnessed as they are presented. Since the investigation into Jamar Clark’s death took place entirely behind closed doors there’s no way to verify the process that lead to the findings. Without neutral witnesses to that process there is no way to verify whether the announcement was arrived to through honest analysis of the evidence at hand or through an editing process biased in favor of the officers.

Saying an investigation came to a decision is meaningless if the integrity of the investigative process cannot be verified.

How The State Makes Us Less Secure Part MLVII

The State, by claiming to provide for the common defense and declaring a monopoly on justice, has a conflict of interest. Providing for the common defense would require it to disclose any vulnerabilities it discovers but it’s reliant on those vulnerabilities to obtain evidence to prosecute individuals accused of a crime.

Adding a new chapter to this ongoing saga is the Federal Bureau of Investigation’s (FBI) decision to fight a court order to reveal a vulnerability it used to uncover the identify of Tor users:

Last month, the FBI was ordered to reveal the full malware code used to hack visitors of a dark web child pornography site. The judge behind that decision, Robert J. Bryan, said it was a “fair question” to ask how exactly the FBI caught the defendant.

But the agency is pushing back. On Monday, lawyers for the Department of Justice filed a sealed motion asking the judge to reconsider, and also provided a public declaration from an FBI agent involved in the investigation.

In short, the FBI agent says that revealing the exploit used to bypass the protections offered by the Tor Browser is not necessary for the defense and their case. The defense, in previous filings, has said they want to determine whether the network investigative technique (NIT)—the FBI’s term for a hacking tool—carried out additional functions beyond those authorised in the warrant.

People around the world rely on tor to protect themselves from tyrannical regimes. Journalists living in countries such as Iran, China, and Thailand are only able to continue reporting on human rights violations because Tor protects their identities. Sellers and consumers of verboten drugs, neither of whom are causing involuntary harm to anybody, successfully used Tor hidden services to make their trade safer. Victims of domestic abuse rely on Tor to get access to help without being discovered by their abusers. By refusing to publish the vulnerability it used, the FBI is putting all of these individuals in danger.

On another point, I must also emphasize that that the FBI is claiming the defense doesn’t need to know this information, which speaks volumes to the egotistical nature of the agency. Who is the FBI to decide what the defense needs to know and doesn’t need to know? Being the prosecuting party should already disqualify the FBI’s opinion on the matter due to its obvious conflict of interest.

Civil Forfeiture Is Back

In December of last year the Department of Justice (DoJ) announced that would be suspending payments under the Equitable Sharing Program. There was much rejoice. But anybody familiar with statism knows that rules can change at the whim of a bureaucrat to no victories are permanent. The DoJ has just announced that it will resume payments again:

The Justice Department had suspended payments under this program in December, due to budget cuts included in last year’s spending bill.

“In the months since we made the difficult decision to defer equitable sharing payments because of the $1.2 billion rescinded from the Asset Forfeiture Fund, the financial solvency of the fund has improved to the point where it is no longer necessary to continue deferring equitable sharing payments,” spokesman Peter J. Carr said in an email Monday.

While he didn’t specify exactly where the new funding came from, Carr noted that the program is partly funded by the cash and other property seized under the program.

Civil forfeiture is one of the most brazen efforts by the State to redistribute wealth from the people to itself. Usually the State wraps its theft in justifications of providing services and due process. But civil forfeiture isn’t used to build roads or fund schools and spits in the face of due process by presuming guilt instead of innocence.

Due to the massive amount of pushback it wasn’t surprising to hear the DoJ announce it was suspending the program. The State likes people to believe its theft isn’t theft and public opinion was going against that fiction with civil forfeiture. It’s also not surprising to see the decision reversed, especially now that the media attention has died down, since civil forfeiture is one of the DoJ’s favorite tools to enhance the power of its law enforcers. And as we all know, a heavily armed law enforcer is a happy law enforcer and a happy law enforcer is much more willing to steal for their employer.

Innocent Until Proven Guilty

The second worst casualty of a major attack is the presumption of innocence. Too often people are demanding heads to role and assume anybody questioned, arrested, or charged because of an attack should be hanged. This leads to a lot of stupidity such as the xenophobia that began running rampant immediately after the attack in Brussels. Investigations take time and a lot of initial judgements based on preliminary evidence are proven wrong as this story illustrates so perfectly:

BRUSSELS — The Belgian authorities on Monday conceded another enormous blunder in their investigation into the attacks last week on Brussels. They freed a man they had charged with terrorism and murder, acknowledging that a witness had mistakenly identified as a bomber in a dark hat and white coat in an airport surveillance photo.

The man, who was arrested on Thursday and charged on Friday, was released after three days in custody, during which some officials publicly vilified him as a terrorist. On Monday, the police said that the real attacker, one of the men who blew up a departure hall at Brussels Airport, remained at large, and they issued a new plea to the public to help identify him.

The release of the man — who has been identified by the Belgian news media and Belgian officials as Fayçal Cheffou, who has called himself a freelance journalist — is a stunning setback for the Belgian authorities, who have struggled for more than a year to get a handle on the growing threat of Islamic State militants.

A lot of people were demanding gallows be built so Cheffou could be immediately executed. Had they gotten their way an innocent man would have been dead and nobody would have been any closer to determining who else was connected to the attack in Brussels. This is why the presumption of innocence is important, especially in high profile event such as this one.

I know everybody hates to hear it but the only appropriate way to respond to the aftermath of an attack is to have patience. Nothing is gained by rash responses. In fact rash responses often cause the same thing as the initial attacks: innocent people being injured or killed.

For Statists The Only Response Is Attacking Individual Freedom

When a problem, perceived or real, arises there is only one response for statists: attacking individual freedom. As I noted last week, the knowledge that the Paris attackers used burner phones instead of encrypted communications would likely inspire useless legislation aimed at prohibiting burner phones. Jackie Speier seems hellbent on proving me right because she has introduced legislation to do exactly that:

Congresswoman Jackie Speier, a Democrat representing California’s 14th district, has introduced a the “Closing the Pre-Paid Mobile Device Security Gap Act of 2016,” or HR 4886, which will require people who purchase a prepaid device to provide proper identification.

“This bill would close one of the most significant gaps in our ability to track and prevent acts of terror, drug trafficking, and modern-day slavery,” Speier said in a blog post. “The ‘burner phone’ loophole is an egregious gap in our legal framework that allows actors like the 9/11 hijackers and the Times Square bomber to evade law enforcement while they plot to take innocent lives. The Paris attackers also used ‘burner phones.’ As we’ve seen so vividly over the past few days, we cannot afford to take these kinds of risks. It’s time to close this ‘burner phone’ loophole for good.”

Regardless of Speier’s claims, burner phones are not a significant gap in the State’s ability to prevent acts of terror, drug trafficking, or modern-day slavery. Setting aside the fact that most acts of terror, negative aspects of drug trafficking, and modern-day slavery are created by the State, we’re still left having to accept the fact that pervasive communication technology has rendered any ability to control communications practically impossible.

Burner phones are just one method of communicating in a way that’s difficult to surveil. The same effect can be achieved with cloned subscriber identity module (SIM) cards. Furthermore, registrations are easy to bypass. The firearm community is well aware of the term straw purchase. It’s a term that describes having somebody who isn’t prohibited from purchasing firearms to purchase one for somebody who is prohibited. By having somebody else purchase a phone for you you can avoid having that phone tied to your person. Getting somebody to purchase a cell phone for you would be even easier than a firearm since few people see a cell phone as a destructive device. There is also the fact that burner phones from overseas can be smuggled into the country and sold for cash.

Legislation aimed at prohibiting something only accomplish one thing: creating a black market. Not a single piece of legislation aimed at prohibiting something has been successful. This bill will be no different.

German Gun Laws

Regardless of what the opponents of self-defense claim, buying a gun in the United States is subject to numerous regulations. But even we have it easy compared to people living in other countries. Jörg Sprave has a fascinating channel on YouTube where he devises some of the craziest slingshots known to man. He’s also an avid gun enthusiast. That being the case, I was glad to see him record a video explaining exactly what the gun laws in Germany are. While they’re far more draconian than here in the United States, they’re also not nearly as bad as in many other countries.

Checkpoints All The Way Down

The investigation into the Brussels attack hasn’t concluded yet but politicians are already calling for actions to be taken to prevent such an attack from happening here:

Security experts, politicians and travelers alike say the Brussels bombings exposed a weak spot in airport security, between the terminal entrance and the screening checkpoint.

“If you think about the way things were done in Brussels — and have been done in other places — literally people only have to only walk in, and they can attack at will,” said Daniel Wagner, CEO of security consulting firm Country Risk Solutions.

These idiots will be putting security checkpoints before the security checkpoints if we let them:

Wagner suggests U.S. airports establish pre-terminal screening before travelers enter the facility.

“That is a common approach in many countries around the world — you cannot even get in the terminal until your bags and your person have been pre-screened,” he said. “That is, through an X-ray machine both for the bags and for the individual.”

It’ll be checkpoints all the way down. What none of these stooges have stopped to consider is that the checkpoints themselves are attractive targets. Checkpoints are chokepoints. They forces large numbers of people to gather in a single place so they can slowly (very slowly in the case of Minneapolis’ airport) be filtered through by security. If a suicide bomber wants to kill a lot of people they need only step in the checkpoint line.

Adding an additional chokepoint or moving the current one doesn’t fix the problem. Reducing the amount of damage a terrorist can cause in an airport requires dispersing people, which means making major changes to current airport security practices. The long security lines have to go. This can be done by simplifying the screening process, making it consistent (anybody who travels frequently knows that the orders barked by the Transportation Security Administration (TSA) goons can change drastically from day to day), and increasing the number of checkpoints. None of those measures will be taken though because the idiots who make the policies know nothing about security.