Cambridge | Ian Andrew Bell https://ianbell.com Ian Bell's opinions are his own and do not necessarily reflect the opinions of Ian Bell Mon, 25 Nov 2002 19:57:33 +0000 en-US hourly 1 https://wordpress.org/?v=6.8.2 https://i0.wp.com/ianbell.com/wp-content/uploads/2017/10/cropped-electron-man.png?fit=32%2C32&ssl=1 Cambridge | Ian Andrew Bell https://ianbell.com 32 32 28174588 We Don’t Need Carriers.. https://ianbell.com/2002/11/25/we-dont-need-carriers/ Mon, 25 Nov 2002 19:57:33 +0000 https://ianbell.com/2002/11/25/we-dont-need-carriers/ What if we had our own spectrum and every new cellular phone added to that network increased its capacity, rather than diminished it? If 802.11 is any benchmark, grass roots decentralized technologies can grow quickly, especially when you take the Service Provider OUT of the loop.

Service Providers suck. They hire guys like me to figure out how to maximize the share-of-wallet while containing the growth and supporting their other, boneheaded, legacy products. Generally speaking, carriers are obstacles to the adoption of technology, rather than instigators of it.

What this article hints at is a mesh of ad-hoc mobile phone users each sharing their network capacity and organically frequency-hopping to avoid network trouble zones. Whereas it has proven impossible for mobile phone network dweebs to engineer reliable wireless services in North America, this could be the answer.

More and more spectrum will be made available to the general public around this world, or we will figure out better ways to use that which is already allocated. In the end, the Return On Investment that carriers expect for their 3G licenses, which already has an event horizon measured in decades, may never happen.

Regulatory bodies will be faced with bolstering floundering wireless carriers, which are clearly obstacles to growth, or enabling an ecosystem of radical technologies to flower into a jungle of new technologies, applications, and networks. The trend of technology and invention clearly favours the latter.

-Ian.

——— http://story.news.yahoo.com/news?tmpl=story&ncidR8&e=4&cidR8&u=/ap/ 20021125/ap_on_hi_te/the_new_spectrum

New Gadgets May Spark Deregulation Mon Nov 25, 7:38 AM ET Add Technology – AP to My Yahoo!

By BRIAN BERGSTEIN, AP Business Writer

NEW YORK (AP) – It almost sounds too “Star Trek” to be possible: A multipurpose cell phone that also serves as an FM radio, walkie-talkie, garage door opener and TV remote control.

And what if every time you made a call with that handset it increased the performance of other phones already in use — instead of competing for airwaves with them?

While such wireless wizardry remains a few years off, those days could be coming faster now, thanks to a rare confluence of technology breakthroughs and a rethinking of airwave regulation by the federal government.

“It is kind of an interesting point in time when it comes to wireless networks,” said Dallas Nash, co-founder of Mississippi-based SIGFX LLC, a player in the impending wireless revolution.

SIGFX figured out how to transmit cell phone calls in a thin part of the airwave spectrum already used by TV stations. By dramatically reducing the cost and increasing the range of wireless phone networks, the invention could bring reliable service to rural areas and developing countries.

Vanu Bose has big dreams, too: to create that new generation of radios — that’s really all that cell phones and garage-door openers are — that can move between various functions with an icon click. The trick is to replace much of the circuitry found in radios with flexible software.

Bose began working at it in a military-sponsored communications project at the Massachusetts Institute of Technology (news – web sites). After graduating in 1998, he started his own company, Vanu Inc., to further develop the technology.

Now Cambridge, Mass.-based Vanu Inc. has created an all-software base station — which relays calls from wireless phones on cellular networks. Vanu also has built a prototype handheld computer that can make calls on different kinds of wireless networks and work as a walkie-talkie, baby monitor, FM radio — “whatever you want,” Bose said.

The big challenge is that the device is limited to 10 to 20 hours of battery life. Bose — son of the stereo engineer who founded Bose Corp. — believes that with more development and improvements in low-power microprocessors, the device could be the size of a cell phone and have a much longer battery life.

At the same time, other researchers are making progress in developing “smart” radio receivers that can, on their own, determine instantaneously when and where a bit of spectrum is going unused and switch their communications accordingly to avoid interference. (A method of doing that is already employed in cellular networks and cordless phones).

In fact, advocates of an “open spectrum” or a “commons” policy believe new generations of radio receivers will routinely handle their own conversations and help relay others at the same time.

“If every radio is both a transmitter and a receiver, as you add more, you add capacity to the network,” said David P. Reed, a former chief scientist at Lotus Development Corp. and a leader of the “open spectrum” movement.

“My gut feeling,” Reed said, “is that in 10 or 20 years this will be as big as the Internet.”

That may seem a wide-eyed prediction, but ideas like this are not just grass-roots dreams.

Intel Corp. backs software-defined radio in hopes it will ignite an explosion of demand for wireless chips. The military’s Defense Advanced Research Projects Agency (DARPA) is working on several ways to “increase spectrum usage by dynamically sensing and adapting in frequency, time and space.”

Researchers at Bell Laboratories, part of Lucent Technologies Inc., recently announced a breakthrough in their BLAST technology, which takes advantage of interference on a network to increase the rates at which data can be sent.

Many technology experts say such breakthroughs should force a revolution in how we treat the airwaves. Since the 1920s, electromagnetic spectrum has been handled like real estate. The government licenses use of slices of spectrum and tightly regulates what can be done in those bands.

Much of the spectrum is tied up — largely by the military — and there’s only so much room for experimental and innovative new technologies in unlicensed bands, such as those occupied by cordless phones and the wireless networking system known as WiFi.

But in what looks like the beginning of a historic policy shift, the Federal Communications Commission (news – web sites) has been listening closely to the technology crowd — and to cellular carriers that spent tens of billions of dollars for spectrum licenses and want more freedom to use or trade them as they see fit.

“We have perhaps the most interesting debate in spectrum governance taking place in America since the 1930s,” said Adam Thierer, director of telecommunications studies at the Cato Institute, a libertarian think tank.

This month, a task force appointed by FCC (news – web sites) Chairman Michael Powell — and headed by the former leader of DARPA’s communications research — offered a framework for a spectrum policy overhaul expected to begin next year.

The group said the government should grant wireless carriers more flexibility with their expensive spectrum licenses so they may lease portions of the airwaves that go unused at certain times, for example.

It also endorsed the “commons” concept in some circumstances, saying new technologies should have more freedom to operate in regulated bands — as long as they don’t interfere with cellular conversations or radio broadcasts — and in unlicensed parts of the spectrum as well.

In essence, the FCC finally would be treating spectrum like real estate in the physical world, where the public has easements and parks alongside private property, and airplanes can fly overhead.

Such monumental changes probably will provoke some fights in Washington.

“Certain ossified licensees will inherently be resistant to change,” said Bryan Tramont, Powell’s senior legal adviser.

Even parties who are clamoring for change are circumspect. Wireless phone carriers, for example, praise the FCC’s efforts to modernize spectrum policy. But some say technologies such as software-defined radio might be too unproven to form the basis of policy changes.

They also worry that low-power transmissions by rival technologies on or near already-licensed frequencies could interfere with wireless phone conversations.

“It’s hard to oppose looking at spectrum policy anew,” said Doug Brandon, AT&T Wireless’ vice president of federal affairs. But, he added, eventually, “someone will say, `My ox just got gored.'”

———–

]]>
4028
Akamai Wins Injunction Against Cable & Wireless… https://ianbell.com/2002/08/22/akamai-wins-injunction-against-cable-wireless/ Fri, 23 Aug 2002 00:27:28 +0000 https://ianbell.com/2002/08/22/akamai-wins-injunction-against-cable-wireless/ Can anyone decode what this really is for the rest of us?

-Ian.

—- http://biz.yahoo.com/bw/020822/222386_1.html

Thursday August 22, 6:15 pm Eastern Time

Press Release SOURCE: Akamai Technologies

Court Awards Akamai Broad Permanent Injunction Against Cable & Wireless

Cable & Wireless Ordered to Immediately and Permanently Shut Down Digital Island Footprint 2.0 Service

CAMBRIDGE, Mass.–(BUSINESS WIRE)–Aug. 22, 2002–Akamai Technologies, Inc. (NASDAQ: AKAM – News) today announced that the Federal District Court in Boston has enjoined Cable & Wireless Internet Services, Inc. from making, using, selling, offering for sale, or importing into the United States, the patented inventions of Claims 1, 3, 5, and 9 of U.S. Patent No. 6,108,703, and from active inducement of infringement of these claims. The Court’s Order requires Cable & Wireless to shut down Digital Island’s Footprint 2.0 service as configured and described at trial. That service was recently rebranded under the Exodus name.

“This major victory vindicates our patent rights and the value of Akamai’s industry-leading technology,” said George Conrades, chairman and CEO of Akamai. “We will now turn our attention to seeking full compensation from Cable & Wireless for the long-standing infringement of this patent.”

“The injunction is very broad, and we do not believe that Cable & Wireless’s post-trial attempts to design around these claims have succeeded,” added David Judson, Akamai’s patent counsel. “If Cable & Wireless continues to operate its infringing content delivery service, we will seek to hold them in contempt of the Court’s Order.”

About Akamai

Akamai is the leading provider of edge computing solutions, delivering secure content and distributed applications across the Internet, intranets, and extranets. These solutions enable customers to achieve optimal results from their e-business initiatives, thereby reducing the cost of ownership, improving return on investment, and creating new revenue streams. Akamai’s globally distributed edge computing platform comprises more than 12,900 servers in more than 1,000 networks in 66 countries, ensuring the highest levels of availability, reliability, and performance. Headquartered in Cambridge, Massachusetts, Akamai provides services and world-class customer care to hundreds of successful enterprises, government entities, and leading e-businesses worldwide. For more information, visit www.akamai.com.

Akamai Statement Under the Private Securities Litigation Reform Act

The release contains information about future expectations, plans and prospects of Akamai’s management that constitute forward-looking statements for purposes of the safe harbor provisions under The Private Securities Litigation Reform Act of 1995. Actual results may differ materially from those indicated by these forward-looking statements as a result of various important factors including, but not limited to, the dependence on Akamai’s Internet content delivery service, a failure of its network infrastructure, the complexity of its service and the networks on which the service is deployed, the failure to obtain access to transmission capacity, our ability to protect our intellectual property rights and inventions from third party challenges and other factors that are discussed in the Company’s Annual Report on Form 10-K and other documents periodically filed with the SEC. * (c)2002 Akamai Technologies, Inc.

]]>
3918
Homeland Insecurity.. https://ianbell.com/2002/08/13/homeland-insecurity/ Tue, 13 Aug 2002 09:50:26 +0000 https://ianbell.com/2002/08/13/homeland-insecurity/ Homeland Insecurity: A top expert says America’s approach to protecting itself will only make matters worse. Forget “foolproof” technology—we need systems designed to fail smartly   by Charles C. Mann The Atlantic Monthly | September 2002   ….. http://www.theatlantic.com/issues/2002/09/mann.htm.

To stop the rampant theft of expensive cars, manufacturers in the 1990s began to make ignitions very difficult to hot-wire. This reduced the likelihood that cars would be stolen from parking lots— but apparently contributed to the sudden appearance of a new and more dangerous crime, carjacking. After a vote against management Vivendi Universal announced earlier this year that its electronic shareholder-voting system, which it had adopted to tabulate votes efficiently and securely, had been broken into by hackers. Because the new system eliminated the old paper ballots, recounting the votes—or even independently verifying that the attack had occurred—was impossible. To help merchants verify and protect the identity of their customers, marketing firms and financial institutions have created large computerized databases of personal information: Social Security numbers, credit-card numbers, telephone numbers, home addresses, and the like. With these databases being increasingly interconnected by means of the Internet, they have become irresistible targets for criminals. From 1995 to 2000 the incidence of identity theft tripled. s was often the case, Bruce Schneier was thinking about a really terrible idea. We were driving around the suburban-industrial wasteland south of San Francisco, on our way to a corporate presentation, while Schneier looked for something to eat not purveyed by a chain restaurant. This was important to Schneier, who in addition to being America’s best-known ex-cryptographer is a food writer for an alternative newspaper in Minneapolis, where he lives. Initially he had been sure that in the crazy ethnic salad of Silicon Valley it would be impossible not to find someplace of culinary interest—a Libyan burger stop, a Hmong bagelry, a Szechuan taco stand. But as the rented car swept toward the vast, amoeboid office complex that was our destination, his faith slowly crumbled. Bowing to reality, he parked in front of a nondescript sandwich shop, disappointment evident on his face. Schneier is a slight, busy man with a dark, full, closely cropped beard. Until a few years ago he was best known as a prominent creator of codes and ciphers; his book Applied Cryptography (1993) is a classic in the field. But despite his success he virtually abandoned cryptography in 1999 and co-founded a company named Counterpane Internet Security. Counterpane has spent considerable sums on advanced engineering, but at heart the company is dedicated to bringing one of the oldest forms of policing—the cop on the beat— to the digital realm. Aided by high-tech sensors, human guards at Counterpane patrol computer networks, helping corporations and governments to keep their secrets secret. In a world that is both ever more interconnected and full of malice, this is a task of considerable difficulty and great importance. It is also what Schneier long believed cryptography would do—which brings us back to his terrible idea. “Pornography!” he exclaimed. If the rise of the Internet has shown anything, it is that huge numbers of middle-class, middle-management types like to look at dirty pictures on computer screens. A good way to steal the corporate or government secrets these middle managers are privy to, Schneier said, would be to set up a pornographic Web site. The Web site would be free, but visitors would have to register to download the naughty bits. Registration would involve creating a password—and here Schneier’s deep-set blue eyes widened mischievously. People have trouble with passwords. The idea is to have a random string of letters, numbers, and symbols that is easy to remember. Alas, random strings are by their nature hard to remember, so people use bad but easy-to-remember passwords, such as “hello” and “password.” (A survey last year of 1,200 British office workers found that almost half chose their own name, the name of a pet, or that of a family member as a password; others based their passwords on the names Darth Vader and Homer Simpson.) Moreover, computer users can’t keep different passwords straight, so they use the same bad passwords for all their accounts. Many of his corporate porn surfers, Schneier predicted, would use for the dirty Web site the same password they used at work. Not only that, many users would surf to the porn site on the fast Internet connection at the office. The operators of Schneier’s nefarious site would thus learn that, say, “Joesmith,” who accessed the Web site from Anybusiness.com, used the password “JoeS.” By trying to log on at Anybusiness.com as “Joesmith,” they could learn whether “JoeS” was also the password into Joesmith’s corporate account. Often it would be. “In six months you’d be able to break into Fortune 500 companies and government agencies all over the world,” Schneier said, chewing his nondescript meal. “It would work! It would work—that’s the awful thing.” uring the 1990s Schneier was a field marshal in the disheveled army of computer geeks, mathematicians, civil-liberties activists, and libertarian wackos that—in a series of bitter lawsuits that came to be known as the Crypto Wars—asserted the right of the U.S. citizenry to use the cryptographic equivalent of kryptonite: ciphers so powerful they cannot be broken by any government, no matter how long and hard it tries. Like his fellows, he believed that “strong crypto,” as these ciphers are known, would forever guarantee the privacy and security of information—something that in the Information Age would be vital to people’s lives. “It is insufficient to protect ourselves with laws,” he wrote in Applied Cryptography. “We need to protect ourselves with mathematics.” Schneier’s side won the battle as the nineties came to a close. But by that time he had realized that he was fighting the wrong war. Crypto was not enough to guarantee privacy and security. Failures occurred all the time—which was what Schneier’s terrible idea demonstrated. No matter what kind of technological safeguards an organization uses, its secrets will never be safe while its employees are sending their passwords, however unwittingly, to pornographers—or to anyone else outside the organization. The Parable of the Dirty Web Site illustrates part of what became the thesis of Schneier’s most recent book, Secrets and Lies (2000): The way people think about security, especially security on computer networks, is almost always wrong. All too often planners seek technological cure-alls, when such security measures at best limit risks to acceptable levels. In particular, the consequences of going wrong—and all these systems go wrong sometimes—are rarely considered. For these reasons Schneier believes that most of the security measures envisioned after September 11 will be ineffective, and that some will make Americans less safe. It is now a year since the World Trade Center was destroyed. Legislators, the law-enforcement community, and the Bush Administration are embroiled in an essential debate over the measures necessary to prevent future attacks. To armor-plate the nation’s security they increasingly look to the most powerful technology available: retina, iris, and fingerprint scanners; “smart” driver’s licenses and visas that incorporate anti-counterfeiting chips; digital surveillance of public places with face-recognition software; huge centralized databases that use data-mining routines to sniff out hidden terrorists. Some of these measures have already been mandated by Congress, and others are in the pipeline. State and local agencies around the nation are adopting their own schemes. More mandates and more schemes will surely follow. Schneier is hardly against technology—he’s the sort of person who immediately cases public areas for outlets to recharge the batteries in his laptop, phone, and other electronic prostheses. “But if you think technology can solve your security problems,” he says, “then you don’t understand the problems and you don’t understand the technology.” Indeed, he regards the national push for a high-tech salve for security anxieties as a reprise of his own early and erroneous beliefs about the transforming power of strong crypto. The new technologies have enormous capacities, but their advocates have not realized that the most critical aspect of a security measure is not how well it works but how well it fails. The Crypto Wars f mathematicians from the 1970s were suddenly transported through time to the present, they would be happily surprised by developments such as the proofs to Kepler’s conjecture (proposed in 1611, confirmed in 1998) and to Fermat’s last theorem (1637, 1994). But they would be absolutely astonished by the RSA Conference, the world’s biggest trade show for cryptographers. Sponsored by the cryptography firm RSA Security, the conferences are attended by as many as 10,000 cryptographers, computer scientists, network managers, and digital-security professionals. What would amaze past mathematicians is not just the number of conferences but that they exist at all. Sidebar: Why the Maginot Line Failed “In fact, the Maginot Line, the chain of fortifications on France’s border with Germany, was indicative neither of despair about defeating Germany nor of thought mired in the past….” Cryptology is a specialized branch of mathematics with some computer science thrown in. As recently as the 1970s there were no cryptology courses in university mathematics or computer-science departments; nor were there crypto textbooks, crypto journals, or crypto software. There was no private crypto industry, let alone venture-capitalized crypto start-ups giving away key rings at trade shows (crypto key rings—techno-humor). Cryptography, the practice of cryptology, was the province of a tiny cadre of obsessed amateurs, the National Security Agency, and the NSA’s counterparts abroad. Now it is a multibillion-dollar field with applications in almost every commercial arena. As one of the people who helped to bring this change about, Schneier is always invited to speak at RSA conferences. Every time, the room is too small, and overflow crowds, eager to hear their favorite guru, force the session into a larger venue, which is what happened when I saw him speak at an RSA conference in San Francisco’s Moscone Center last year. There was applause from the hundreds of seated cryptophiles when Schneier mounted the stage, and more applause from the throng standing in the aisles and exits when he apologized for the lack of seating capacity. He was there to talk about the state of computer security, he said. It was as bad as ever, maybe getting worse. In the past security officers were usually terse ex-military types who wore holsters and brush cuts. But as computers have become both attackers’ chief targets and their chief weapons, a new generation of security professionals has emerged, drawn from the ranks of engineering and computer science. Many of the new guys look like people the old guard would have wanted to arrest, and Schneier is no exception. Although he is a co-founder of a successful company, he sometimes wears scuffed black shoes and pants with a wavering press line; he gathers his thinning hair into a straggly ponytail. Ties, for the most part, are not an issue. Schneier’s style marks him as a true nerd—someone who knows the potential, both good and bad, of technology, which in our technocentric era is an asset. Schneier was raised in Brooklyn. He got a B.S. in physics from the University of Rochester in 1985 and an M.S. in computer science from American University two years later. Until 1991 he worked for the Department of Defense, where he did things he won’t discuss. Lots of kids are intrigued by codes and ciphers, but Schneier was surely one of the few to ask his father, a lawyer and a judge, to write secret messages for him to analyze. On his first visit to a voting booth, with his mother, he tried to figure out how she could cheat and vote twice. He didn’t actually want her to vote twice—he just wanted, as he says, to “game the system.” Unsurprisingly, someone so interested in figuring out the secrets of manipulating the system fell in love with the systems for manipulating secrets. Schneier’s childhood years, as it happened, were a good time to become intrigued by cryptography—the best time in history, in fact. In 1976 two researchers at Stanford University invented an entirely new type of encryption, public-key encryption, which abruptly woke up the entire field. Public-key encryption is complicated in detail but simple in outline. All ciphers employ mathematical procedures called algorithms to transform messages from their original form into an unreadable jumble. (Cryptographers work with ciphers and not codes, which are spy-movie-style lists of prearranged substitutes for letters, words, or phrases—”meet at the theater” for “attack at nightfall.”) Most ciphers use secret keys: mathematical values that plug into the algorithm. Breaking a cipher means figuring out the key. In a kind of mathematical sleight of hand, public-key encryption encodes messages with keys that can be published openly and decodes them with different keys that stay secret and are effectively impossible to break using today’s technology. (A more complete explanation of public-key encryption will soon be available on The Atlantic’s Web site, www.theatlantic.com.) The best-known public-key algorithm is the RSA algorithm, whose name comes from the initials of the three mathematicians who invented it. RSA keys are created by manipulating big prime numbers. If the private decoding RSA key is properly chosen, guessing it necessarily involves factoring a very large number into its constituent primes, something for which no mathematician has ever devised an adequate shortcut. Even if demented government agents spent a trillion dollars on custom factoring computers, Schneier has estimated, the sun would likely go nova before they cracked a message enciphered with a public key of sufficient length. Schneier and other technophiles grasped early how important computer networks would become to daily life. They also understood that those networks were dreadfully insecure. Strong crypto, in their view, was an answer of almost magical efficacy. Even federal officials believed that strong crypto would Change Everything Forever—except they thought the change would be for the worse. Strong encryption “jeopardizes the public safety and national security of this country,” Louis Freeh, then the director of the (famously computer-challenged) Federal Bureau of Investigation, told Congress in 1995. “Drug cartels, terrorists, and kidnappers will use telephones and other communications media with impunity knowing that their conversations are immune” from wiretaps. The Crypto Wars erupted in 1991, when Washington attempted to limit the spread of strong crypto. Schneier testified before Congress against restrictions on encryption, campaigned for crypto freedom on the Internet, co-wrote an influential report on the technical snarls awaiting federal plans to control cryptographic protocols, and rallied 75,000 crypto fans to the cause in his free monthly e-mail newsletter, Crypto-Gram. Most important, he wrote Applied Cryptography, the first-ever comprehensive guide to the practice of cryptology. Washington lost the wars in 1999, when an appellate court ruled that restrictions on cryptography were illegal, because crypto algorithms were a form of speech and thus covered by the First Amendment. After the ruling the FBI and the NSA more or less surrendered. In the sudden silence the dazed combatants surveyed the battleground. Crypto had become widely available, and it had indeed fallen into unsavory hands. But the results were different from what either side had expected. As the crypto aficionados had envisioned, software companies inserted crypto into their products. On the “Tools” menu in Microsoft Outlook, for example, “encrypt” is an option. And encryption became big business, as part of the infrastructure for e-commerce—it is the little padlock that appears in the corner of Net surfers’ browsers when they buy books at Amazon.com, signifying that credit-card numbers are being enciphered. But encryption is rarely used by the citizenry it was supposed to protect and empower. Cryptophiles, Schneier among them, had been so enraptured by the possibilities of uncrackable ciphers that they forgot they were living in a world in which people can’t program VCRs. Inescapably, an encrypted message is harder to send than an unencrypted one, if only because of the effort involved in using all the extra software. So few people use encryption software that most companies have stopped selling it to individuals. Sidebar: The Worm in the Machine “Buffer overflows (sometimes called stack smashing) are the most common form of security vulnerability in the last ten years….” Among the few who do use crypto are human-rights activists living under dictatorships. But, just as the FBI feared, terrorists, child pornographers, and the Mafia use it too. Yet crypto has not protected any of them. As an example, Schneier points to the case of Nicodemo Scarfo, who the FBI believed was being groomed to take over a gambling operation in New Jersey. Agents surreptitiously searched his office in 1999 and discovered that he was that rarity, a gangster nerd. On his computer was the long-awaited nightmare for law enforcement: a crucial document scrambled by strong encryption software. Rather than sit by, the FBI installed a “keystroke logger” on Scarfo’s machine. The logger recorded the decrypting key— or, more precisely, the passphrase Scarfo used to generate that key— as he typed it in, and gained access to his incriminating files. Scarfo pleaded guilty to charges of running an illegal gambling business on February 28 of this year. Schneier was not surprised by this demonstration of the impotence of cryptography. Just after the Crypto Wars ended, he had begun writing a follow-up to Applied Cryptography. But this time Schneier, a fluent writer, was blocked—he couldn’t make himself extol strong crypto as a security panacea. As Schneier put it in Secrets and Lies, the very different book he eventually did write, he had been portraying cryptography—in his speeches, in his congressional testimony, in Applied Cryptography—as “a kind of magic security dust that [people] could sprinkle over their software and make it secure.” It was not. Nothing could be. Humiliatingly, Schneier discovered that, as a friend wrote him, “the world was full of bad security systems designed by people who read Applied Cryptography.” In retrospect he says, “Crypto solved the wrong problem.” Ciphers scramble messages and documents, preventing them from being read while, say, they are transmitted on the Internet. But the strongest crypto is gossamer protection if malevolent people have access to the computers on the other end. Encrypting transactions on the Internet, the Purdue computer scientist Eugene Spafford has remarked, “is the equivalent of arranging an armored car to deliver credit-card information from someone living in a cardboard box to someone living on a park bench.” To effectively seize control of Scarfo’s computer, FBI agents had to break into his office and physically alter his machine. Such black-bag jobs are ever less necessary, because the rise of networks and the Internet means that computers can be controlled remotely, without their operators’ knowledge. Huge computer databases may be useful, but they also become tempting targets for criminals and terrorists. So do home computers, even if they are connected only intermittently to the Web. Hackers look for vulnerable machines, using software that scans thousands of Net connections at once. This vulnerability, Schneier came to think, is the real security issue. With this realization he closed Counterpane Systems, his five-person crypto-consulting company in Chicago, in 1999. He revamped it and reopened immediately in Silicon Valley with a new name, Counterpane Internet Security, and a new idea—one that relied on old-fashioned methods. Counterpane would still keep data secret. But the lessons of the Crypto Wars had given Schneier a different vision of how to do that—a vision that has considerable relevance for a nation attempting to prevent terrorist crimes. here Schneier had sought one overarching technical fix, hard experience had taught him the quest was illusory. Indeed, yielding to the American penchant for all-in-one high-tech solutions can make us less safe—especially when it leads to enormous databases full of confidential information. Secrecy is important, of course, but it is also a trap. The more secrets necessary to a security system, the more vulnerable it becomes. To forestall attacks, security systems need to be small-scale, redundant, and compartmentalized. Rather than large, sweeping programs, they should be carefully crafted mosaics, each piece aimed at a specific weakness. The federal government and the airlines are spending millions of dollars, Schneier points out, on systems that screen every passenger to keep knives and weapons out of planes. But what matters most is keeping dangerous passengers out of airline cockpits, which can be accomplished by reinforcing the door. Similarly, it is seldom necessary to gather large amounts of additional information, because in modern societies people leave wide audit trails. The problem is sifting through the already existing mountain of data. Calls for heavy monitoring and record-keeping are thus usually a mistake. (“Broad surveillance is a mark of bad security,” Schneier wrote in a recent Crypto-Gram.) To halt attacks once they start, security measures must avoid being subject to single points of failure. Computer networks are particularly vulnerable: once hackers bypass the firewall, the whole system is often open for exploitation. Because every security measure in every system can be broken or gotten around, failure must be incorporated into the design. No single failure should compromise the normal functioning of the entire system or, worse, add to the gravity of the initial breach. Finally, and most important, decisions need to be made by people at close range—and the responsibility needs to be given explicitly to people, not computers. Unfortunately, there is little evidence that these principles are playing any role in the debate in the Administration, Congress, and the media about how to protect the nation. Indeed, in the argument over policy and principle almost no one seems to be paying attention to the practicalities of security—a lapse that Schneier, like other security professionals, finds as incomprehensible as it is dangerous. Stealing Your Thumb couple of months after September 11, I flew from Seattle to Los Angeles to meet Schneier. As I was checking in at Sea-Tac Airport, someone ran through the metal detector and disappeared onto the little subway that runs among the terminals. Although the authorities quickly identified the miscreant, a concession stand worker, they still had to empty all the terminals and re-screen everyone in the airport, including passengers who had already boarded planes. Masses of unhappy passengers stretched back hundreds of feet from the checkpoints. Planes by the dozen sat waiting at the gates. I called Schneier on a cell phone to report my delay. I had to shout over the noise of all the other people on their cell phones making similar calls. “What a mess,” Schneier said. “The problem with airport security, you know, is that it fails badly.” For a moment I couldn’t make sense of this gnomic utterance. Then I realized he meant that when something goes wrong with security, the system should recover well. In Seattle a single slip-up shut down the entire airport, which delayed flights across the nation. Sea-Tac, Schneier told me on the phone, had no adequate way to contain the damage from a breakdown—such as a button installed near the x-ray machines to stop the subway, so that idiots who bolt from checkpoints cannot disappear into another terminal. The shutdown would inconvenience subway riders, but not as much as being forced to go through security again after a wait of several hours. An even better idea would be to place the x-ray machines at the departure gates, as some are in Europe, in order to scan each group of passengers closely and minimize inconvenience to the whole airport if a risk is detected—or if a machine or a guard fails. Schneier was in Los Angeles for two reasons. He was to speak to ICANN, the Internet Corporation for Assigned Names and Numbers, which controls the “domain name system” of Internet addresses. It is Schneier’s belief that attacks on the address database are the best means of taking down the Internet. He also wanted to review Ginza Sushi-Ko, perhaps the nation’s most exclusive restaurant, for the food column he writes with his wife, Karen Cooper. Minutes after my delayed arrival Schneier had with characteristic celerity packed himself and me into a taxi. The restaurant was in a shopping mall in Beverly Hills that was disguised to look like a collection of nineteenth-century Italian villas. By the time Schneier strode into the tiny lobby, he had picked up the thread of our airport discussion. Failing badly, he told me, was something he had been forced to spend time thinking about. In his technophilic exuberance he had been seduced by the promise of public-key encryption. But ultimately Schneier observed that even strong crypto fails badly. When something bypasses it, as the keystroke logger did with Nicodemo Scarfo’s encryption, it provides no protection at all. The moral, Schneier came to believe, is that security measures are characterized less by their manner of success than by their manner of failure. All security systems eventually miscarry. But when this happens to the good ones, they stretch and sag before breaking, each component failure leaving the whole as unaffected as possible. Engineers call such failure-tolerant systems “ductile.” One way to capture much of what Schneier told me is to say that he believes that when possible, security schemes should be designed to maximize ductility, whereas they often maximize strength. Since September 11 the government has been calling for a new security infrastructure—one that employs advanced technology to protect the citizenry and track down malefactors. Already the USA PATRIOT Act, which Congress passed in October, mandates the establishment of a “cross-agency, cross-platform electronic system … to confirm the identity” of visa applicants, along with a “highly secure network” for financial-crime data and “secure information sharing systems” to link other, previously separate databases. Pending legislation demands that the Attorney General employ “technology including, but not limited to, electronic fingerprinting, face recognition, and retinal scan technology.” The proposed Department of Homeland Security is intended to oversee a “national research and development enterprise for homeland security comparable in emphasis and scope to that which has supported the national security community for more than fifty years”—a domestic version of the high-tech R&D juggernaut that produced stealth bombers, smart weapons, and anti-missile defense. Iris, retina, and fingerprint scanners; hand-geometry assayers; remote video-network surveillance; face-recognition software; smart cards with custom identification chips; decompressive baggage checkers that vacuum-extract minute chemical samples from inside suitcases; tiny radio implants beneath the skin that continually broadcast people’s identification codes; pulsed fast-neutron analysis of shipping containers (“so precise,” according to one manufacturer, “it can determine within inches the location of the concealed target”); a vast national network of interconnected databases—the list goes on and on. In the first five months after the terrorist attacks the Pentagon liaison office that works with technology companies received more than 12,000 proposals for high-tech security measures. Credit-card companies expertly manage credit risks with advanced information-sorting algorithms, Larry Ellison, the head of Oracle, the world’s biggest database firm, told The New York Times in April; “We should be managing security risks in exactly the same way.” To “win the war on terrorism,” a former deputy undersecretary of commerce, David J. Rothkopf, explained in the May/June issue of Foreign Policy, the nation will need “regiments of geeks”—”pocket-protector brigades” who “will provide the software, systems, and analytical resources” to “close the gaps Mohammed Atta and his associates revealed.” Such ideas have provoked the ire of civil-liberties groups, which fear that governments, corporations, and the police will misuse the new technology. Schneier’s concerns are more basic. In his view, these measures can be useful, but their large-scale application will have little effect against terrorism. Worse, their use may make Americans less safe, because many of these tools fail badly— they’re “brittle,” in engineering jargon. Meanwhile, simple, effective, ductile measures are being overlooked or even rejected. he distinction between ductile and brittle security dates back, Schneier has argued, to the nineteenth-century linguist and cryptographer Auguste Kerckhoffs, who set down what is now known as Kerckhoffs’s principle. In good crypto systems, Kerckhoffs wrote, “the system should not depend on secrecy, and it should be able to fall into the enemy’s hands without disadvantage.” In other words, it should permit people to keep messages secret even if outsiders find out exactly how the encryption algorithm works. At first blush this idea seems ludicrous. But contemporary cryptography follows Kerckhoffs’s principle closely. The algorithms— the scrambling methods—are openly revealed; the only secret is the key. Indeed, Schneier says, Kerckhoffs’s principle applies beyond codes and ciphers to security systems in general: every secret creates a potential failure point. Secrecy, in other words, is a prime cause of brittleness—and therefore something likely to make a system prone to catastrophic collapse. Conversely, openness provides ductility. From this can be drawn several corollaries. One is that plans to add new layers of secrecy to security systems should automatically be viewed with suspicion. Another is that security systems that utterly depend on keeping secrets tend not to work very well. Alas, airport security is among these. Procedures for screening passengers, for examining luggage, for allowing people on the tarmac, for entering the cockpit, for running the autopilot software—all must be concealed, and all seriously compromise the system if they become known. As a result, Schneier wrote in the May issue of Crypto-Gram, brittleness “is an inherent property of airline security.” Few of the new airport-security proposals address this problem. Instead, Schneier told me in Los Angeles, they address problems that don’t exist. “The idea that to stop bombings cars have to park three hundred feet away from the terminal, but meanwhile they can drop off passengers right up front like they always have …” He laughed. “The only ideas I’ve heard that make any sense are reinforcing the cockpit door and getting the passengers to fight back.” Both measures test well against Kerckhoffs’s principle: knowing ahead of time that law-abiding passengers may forcefully resist a hijacking en masse, for example, doesn’t help hijackers to fend off their assault. Both are small-scale, compartmentalized measures that make the system more ductile, because no matter how hijackers get aboard, beefed-up doors and resistant passengers will make it harder for them to fly into a nuclear plant. And neither measure has any adverse effect on civil liberties. valuations of a security proposal’s merits, in Schneier’s view, should not be much different from the ordinary cost-benefit calculations we make in daily life. The first question to ask of any new security proposal is, What problem does it solve? The second: What problems does it cause, especially when it fails? Sidebar: Gummi Fingers “Tsutomu Matsumoto, a Japanese cryptographer, recently decided to look at biometric fingerprint devices. These are security systems that attempt to identify people based on their fingerprint….” Failure comes in many kinds, but two of the more important are simple failure (the security measure is ineffective) and what might be called subtractive failure (the security measure makes people less secure than before). An example of simple failure is face-recognition technology. In basic terms, face-recognition devices photograph people; break down their features into “facial building elements”; convert these into numbers that, like fingerprints, uniquely identify individuals; and compare the results with those stored in a database. If someone’s facial score matches that of a criminal in the database, the person is detained. Since September 11 face-recognition technology has been placed in an increasing number of public spaces: airports, beaches, nightlife districts. Even visitors to the Statue of Liberty now have their faces scanned. Face-recognition software could be useful. If an airline employee has to type in an identifying number to enter a secure area, for example, it can help to confirm that someone claiming to be that specific employee is indeed that person. But it cannot pick random terrorists out of the mob in an airline terminal. That much-larger-scale task requires comparing many sets of features with the many other sets of features in a database of people on a “watch list.” Identix, of Minnesota, one of the largest face-recognition-technology companies, contends that in independent tests its FaceIt software has a success rate of 99.32 percent—that is, when the software matches a passenger’s face with a face on a list of terrorists, it is mistaken only 0.68 percent of the time. Assume for the moment that this claim is credible; assume, too, that good pictures of suspected terrorists are readily available. About 25 million passengers used Boston’s Logan Airport in 2001. Had face-recognition software been used on 25 million faces, it would have wrongly picked out just 0.68 percent of them—but that would have been enough, given the large number of passengers, to flag as many as 170,000 innocent people as terrorists. With almost 500 false alarms a day, the face-recognition system would quickly become something to ignore. The potential for subtractive failure, different and more troublesome, is raised by recent calls to deploy biometric identification tools across the nation. Biometrics—”the only way to prevent identity fraud,” according to the former senator Alan K. Simpson, of Wyoming—identifies people by precisely measuring their physical characteristics and matching them up against a database. The photographs on driver’s licenses are an early example, but engineers have developed many high-tech alternatives, some of them already mentioned: fingerprint readers, voiceprint recorders, retina or iris scanners, face-recognition devices, hand-geometry assayers, even signature-geometry analyzers, which register pen pressure and writing speed as well as the appearance of a signature. ppealingly, biometrics lets people be their own ID cards—no more pass words to forget! Unhappily, biometric measures are often implemented poorly. This past spring three reporters at c’t, a German digital-culture magazine, tested a face-recognition system, an iris scanner, and nine fingerprint readers. All proved easy to outsmart. Even at the highest security setting, Cognitec’s FaceVACS-Logon could be fooled by showing the sensor a short digital movie of someone known to the system—the president of a company, say—on a laptop screen. To beat Panasonic’s Authenticam iris scanner, the German journalists photographed an authorized user, took the photo and created a detailed, life-size image of his eyes, cut out the pupils, and held the image up before their faces like a mask. The scanner read the iris, detected the presence of a human pupil—and accepted the imposture. Many of the fingerprint readers could be tricked simply by breathing on them, reactivating the last user’s fingerprint. Beating the more sophisticated Identix Bio-Touch fingerprint reader required a trip to a hobby shop. The journalists used graphite powder to dust the latent fingerprint—the kind left on glass—of a previous, authorized user; picked up the image on adhesive tape; and pressed the tape on the reader. The Identix reader, too, was fooled. Not all biometric devices are so poorly put together, of course. But all of them fail badly. Consider the legislation introduced in May by Congressmen Jim Moran and Tom Davis, both of Virginia, that would mandate biometric data chips in driver’s licenses—a sweeping, nationwide data-collection program, in essence. (Senator Dick Durbin, of Illinois, is proposing measures to force states to use a “single identifying designation unique to the individual on all driver’s licenses”; President George W. Bush has already signed into law a requirement for biometric student visas.) Although Moran and Davis tied their proposal to the need for tighter security after last year’s attacks, they also contended that the nation could combat fraud by using smart licenses with bank, credit, and Social Security cards, and for voter registration and airport identification. Maybe so, Schneier says. “But think about screw-ups, because the system will screw up.” Smart cards that store non-biometric data have been routinely cracked in the past, often with inexpensive oscilloscope-like devices that detect and interpret the timing and power fluctuations as the chip operates. An even cheaper method, announced in May by two Cambridge security researchers, requires only a bright light, a standard microscope, and duct tape. Biometric ID cards are equally vulnerable. Indeed, as a recent National Research Council study points out, the extra security supposedly provided by biometric ID cards will raise the economic incentive to counterfeit or steal them, with potentially disastrous consequences to the victims. “Okay, somebody steals your thumbprint,” Schneier says. “Because we’ve centralized all the functions, the thief can tap your credit, open your medical records, start your car, any number of things. Now what do you do? With a credit card, the bank can issue you a new card with a new number. But this is your thumb—you can’t get a new one.” The consequences of identity fraud might be offset if biometric licenses and visas helped to prevent terrorism. Yet smart cards would not have stopped the terrorists who attacked the World Trade Center and the Pentagon. According to the FBI, all the hijackers seem to have been who they said they were; their intentions, not their identities, were the issue. Each entered the country with a valid visa, and each had a photo ID in his real name (some obtained their IDs fraudulently, but the fakes correctly identified them). “What problem is being solved here?” Schneier asks. Good security is built in overlapping, cross-checking layers, to slow down attacks; it reacts limberly to the unexpected. Its most important components are almost always human. “Governments have been relying on intelligent, trained guards for centuries,” Schneier says. “They spot people doing bad things and then use laws to arrest them. All in all, I have to say, it’s not a bad system.” The Human Touch ne of the first times I met with Schneier was at the Cato Institute, a libertarian think tank in Washington, D.C., that had asked him to speak about security. Afterward I wondered how the Cato people had reacted to the speech. Libertarians love cryptography, because they believe that it will let people keep their secrets forever, no matter what a government wants. To them, Schneier was a kind of hero, someone who fought the good fight. As a cryptographer, he had tremendous street cred: he had developed some of the world’s coolest ciphers, including the first rigorous encryption algorithm ever published in a best-selling novel (Cryptonomicon, by Neal Stephenson) and the encryption for the “virtual box tops” on Kellogg’s cereals (children type a code from the box top into a Web site to win prizes), and had been one of the finalists in the competition to write algorithms for the federal government’s new encryption standard, which it adopted last year. Now, in the nicest possible way, he had just told the libertarians the bad news: he still loved cryptography for the intellectual challenge, but it was not all that relevant to protecting the privacy and security of real people. In security terms, he explained, cryptography is classed as a protective counter-measure. No such measure can foil every attack, and all attacks must still be both detected and responded to. This is particularly true for digital security, and Schneier spent most of his speech evoking the staggering insecurity of networked computers. Countless numbers are broken into every year, including machines in people’s homes. Taking over computers is simple with the right tools, because software is so often misconfigured or flawed. In the first five months of this year, for example, Microsoft released five “critical” security patches for Internet Explorer, each intended to rectify lapses in the original code. Computer crime statistics are notoriously sketchy, but the best of a bad lot come from an annual survey of corporations and other institutions by the FBI and the Computer Security Institute, a research and training organization in San Francisco. In the most recent survey, released in April, 90 percent of the respondents had detected one or more computer-security breaches within the previous twelve months—a figure that Schneier calls “almost certainly an underestimate.” His own experience suggests that a typical corporate network suffers a serious security breach four to six times a year—more often if the network is especially large or its operator is politically controversial. Luckily for the victims, this digital mayhem is mostly wreaked not by the master hackers depicted in Hollywood techno-thrillers but by “script kiddies”—youths who know just enough about computers to download and run automated break-in programs. Twenty-four hours a day, seven days a week, script kiddies poke and prod at computer networks, searching for any of the thousands of known security vulnerabilities that administrators have not yet patched. A typical corporate network, Schneier says, is hit by such doorknob-rattling several times an hour. The great majority of these attacks achieve nothing, but eventually any existing security holes will be found and exploited. “It’s very hard to communicate how bad the situation is,” Schneier says, “because it doesn’t correspond to our normal intuition of the world. To a first approximation, bank vaults are secure. Most of them don’t get broken into, because it takes real skill. Computers are the opposite. Most of them get broken into all the time, and it takes practically no skill.” Indeed, as automated cracking software improves, it takes ever less knowledge to mount ever more sophisticated attacks. Given the pervasive insecurity of networked computers, it is striking that nearly every proposal for “homeland security” entails the creation of large national databases. The Moran-Davis proposal, like other biometric schemes, envisions storing smart-card information in one such database; the USA PATRIOT Act effectively creates another; the proposed Department of Homeland Security would “fuse and analyze” information from more than a hundred agencies, and would “merge under one roof” scores or hundreds of previously separate databases. (A representative of the new department told me no one had a real idea of the number. “It’s a lot,” he said.) Better coordination of data could have obvious utility, as was made clear by recent headlines about the failure of the FBI and the CIA to communicate. But carefully linking selected fields of data is different from creating huge national repositories of information about the citizenry, as is being proposed. Larry Ellison, the CEO of Oracle, has dismissed cautions about such databases as whiny cavils that don’t take into account the existence of murderous adversaries. But murderous adversaries are exactly why we should ensure that new security measures actually make American life safer. ny new database must be protected, which automatically entails a new layer of secrecy. As Kerckhoffs’s principle suggests, the new secrecy introduces a new failure point. Government information is now scattered through scores of databases; however inadvertently, it has been compartmentalized—a basic security practice. (Following this practice, tourists divide their money between their wallets and hidden pouches; pickpockets are less likely to steal it all.) Many new proposals would change that. An example is Attorney General John Ashcroft’s plan, announced in June, to fingerprint and photograph foreign visitors “who fall into categories of elevated national security concern” when they enter the United States (“approximately 100,000” will be tracked this way in the first year). The fingerprints and photographs will be compared with those of “known or suspected terrorists” and “wanted criminals.” Alas, no such database of terrorist fingerprints and photographs exists. Most terrorists are outside the country, and thus hard to fingerprint, and latent fingerprints rarely survive bomb blasts. The databases of “wanted criminals” in Ashcroft’s plan seem to be those maintained by the FBI and the Immigration and Naturalization Service. But using them for this purpose would presumably involve merging computer networks in these two agencies with the visa procedure in the State Department—a security nightmare, because no one entity will fully control access to the system. Sidebar: How Insurance Improves Security “Eventually, the insurance industry will subsume the computer security industry….” Equivalents of the big, centralized databases under discussion already exist in the private sector: corporate warehouses of customer information, especially credit-card numbers. The record there is not reassuring. “Millions upon millions of credit-card numbers have been stolen from computer networks,” Schneier says. So many, in fact, that Schneier believes that everyone reading this article “has, in his or her wallet right now, a credit card with a number that has been stolen,” even if no criminal has yet used it. Number thieves, many of whom operate out of the former Soviet Union, sell them in bulk: $1,000 for 5,000 credit-card numbers, or twenty cents apiece. In a way, the sheer volume of theft is fortunate: so many numbers are floating around that the odds are small that any one will be heavily used by bad guys. Large-scale federal databases would undergo similar assaults. The prospect is worrying, given the government’s long-standing reputation for poor information security. Since September 11 at least forty government networks have been publicly cracked by typographically challenged vandals with names like “CriminalS,” “S4t4n1c S0uls,” “cr1m3 0rg4n1z4d0,” and “Discordian Dodgers.” Summing up the problem, a House subcommittee last November awarded federal agencies a collective computer-security grade of F. According to representatives of Oracle, the federal government has been talking with the company about employing its software for the new central databases. But judging from the past, involving the private sector will not greatly improve security. In March, CERT/CC, a computer-security watchdog based at Carnegie Mellon University, warned of thirty-eight vulnerabilities in Oracle’s database software. Meanwhile, a centerpiece of the company’s international advertising is the claim that its software is “unbreakable.” Other software vendors fare no better: CERT/CC issues a constant stream of vulnerability warnings about every major software firm. Schneier, like most security experts I spoke to, does not oppose consolidating and modernizing federal databases per se. To avoid creating vast new opportunities for adversaries, the overhaul should be incremental and small-scale. Even so, it would need to be planned with extreme care—something that shows little sign of happening. ne key to the success of digital revamping will be a little-mentioned, even prosaic feature: training the users not to circumvent secure systems. The federal government already has several computer networks—INTELINK, SIPRNET, and NIPRNET among them— that are fully encrypted, accessible only from secure rooms and buildings, and never connected to the Internet. Yet despite their lack of Net access the secure networks have been infected by e-mail perils such as the Melissa and I Love You viruses, probably because some official checked e-mail on a laptop, got infected, and then plugged the same laptop into the classified network. Because secure networks are unavoidably harder to work with, people are frequently tempted to bypass them—one reason that researchers at weapons labs sometimes transfer their files to insecure but more convenient machines. Sidebar: Remember Pearl Harbor “Surprise, when it happens to a government, is likely to be a complicated, diffuse, bureaucratic thing….” Schneier has long argued that the best way to improve the very bad situation in computer security is to change software licenses. If software is blatantly unsafe, owners have no such recourse, because it is licensed rather than bought, and the licenses forbid litigation. It is unclear whether the licenses can legally do this (courts currently disagree), but as a practical matter it is next to impossible to win a lawsuit against a software firm. If some big software companies lose product-liability suits, Schneier believes, their confreres will begin to take security seriously. Computer networks are difficult to keep secure in part because they have so many functions, each of which must be accounted for. For that reason Schneier and other experts tend to favor narrowly focused security measures—more of them physical than digital—that target a few precisely identified problems. For air travel, along with reinforcing cockpit doors and teaching passengers to fight back, examples include armed uniformed—not plainclothes—guards on select flights; “dead-man” switches that in the event of a pilot’s incapacitation force planes to land by autopilot at the nearest airport; positive bag matching (ensuring that luggage does not get on a plane unless its owner also boards); and separate decompression facilities that detonate any altitude bombs in cargo before takeoff. None of these is completely effective; bag matching, for instance, would not stop suicide bombers. But all are well tested, known to at least impede hijackers, not intrusive to passengers, and unlikely to make planes less secure if they fail. From Atlantic Unbound: Flashbacks: “Pearl Harbor in Retrospect” (May 25, 2001) Atlantic articles from 1948, 1999, and 1991 look back at Pearl Harbor from American and Japanese perspectives. It is impossible to guard all potential targets, because anything and everything can be subject to attack. Palestinian suicide bombers have shown this by murdering at random the occupants of pool halls and hotel meeting rooms. Horrible as these incidents are, they do not risk the lives of thousands of people, as would attacks on critical parts of the national infrastructure: nuclear-power plants, hydroelectric dams, reservoirs, gas and chemical facilities. Here a classic defense is available: tall fences and armed guards. Yet this past spring the Bush Administration cut by 93 percent the funds requested by the Energy Department to bolster security for nuclear weapons and waste; it denied completely the funds requested by the Army Corps of Engineers for guarding 200 reservoirs, dams, and canals, leaving fourteen large public-works projects with no budget for protection. A recommendation by the American Association of Port Authorities that the nation spend a total of $700 million to inspect and control ship cargo (today less than two percent of container traffic is inspected) has so far resulted in grants of just $92 million. In all three proposals most of the money would have been spent on guards and fences. The most important element of any security measure, Schneier argues, is people, not technology—and the people need to be at the scene. Recall the German journalists who fooled the fingerprint readers and iris scanners. None of their tricks would have worked if a reasonably attentive guard had been watching. Conversely, legitimate employees with bandaged fingers or scratched corneas will never make it through security unless a guard at the scene is authorized to overrule the machinery. Giving guards increased authority provides more opportunities for abuse, Schneier says, so the guards must be supervised carefully. But a system with more people who have more responsibility “is more robust,” he observed in the June Crypto-Gram, “and the best way to make things work. (The U.S. Marine Corps understands this principle; it’s the heart of their chain of command rules.)” “The trick is to remember that technology can’t save you,” Schneier says. “We know this in our own lives. We realize that there’s no magic anti-burglary dust we can sprinkle on our cars to prevent them from being stolen. We know that car alarms don’t offer much protection. The Club at best makes burglars steal the car next to you. For real safety we park on nice streets where people notice if somebody smashes the window. Or we park in garages, where somebody watches the car. In both cases people are the essential security element. You always build the system around people.” Looking for Trouble fter meeting Schneier at the Cato Institute, I drove with him to the Washington command post of Counterpane Internet Security. It was the first time in many months that he had visited either of his company’s two operating centers (the other is in Silicon Valley). His absence had been due not to inattentiveness but to his determination to avoid the classic high-tech mistake of involving the alpha geek in day-to-day management. Besides, he lives in Minneapolis, and the company headquarters are in Cupertino, California. (Why Minneapolis? I asked. “My wife lives there,” he said. “It seemed polite.”) With his partner, Tom Rowley, supervising day-to-day operations, Schneier constantly travels in Counterpane’s behalf, explaining how the company manages computer security for hundreds of large and medium-sized companies. It does this mainly by installing human beings. The command post was nondescript even by the bland architectural standards of exurban office complexes. Gaining access was like a pop quiz in security: How would the operations center recognize and admit its boss, who was there only once or twice a year? In this country requests for identification are commonly answered with a driver’s license. A few years ago Schneier devoted considerable effort to persuading the State of Illinois to issue him a driver’s license that showed no picture, signature, or Social Security number. But Schneier’s license serves as identification just as well as a license showing a picture and a signature—which is to say, not all that well. With or without a picture, with or without a biometric chip, licenses cannot be more than state-issued cards with people’s names on them: good enough for social purposes, but never enough to assure identification when it is important. Authentication, Schneier says, involves something a person knows (a password or a PIN, say), has (a physical token, such as a driver’s license or an ID bracelet), or is (biometric data). Security systems should use at least two of these; the Counterpane center employs all three. At the front door Schneier typed in a PIN and waved an iButton on his key chain at a sensor (iButtons, made by Dallas Semiconductor, are programmable chips embedded in stainless-steel discs about the size and shape of a camera battery). We entered a waiting room, where Schneier completed the identification trinity by placing his palm on a hand-geometry reader. Sidebar: Further Reading Brief descriptions of recommended books. Beyond the waiting room, after a purposely long corridor studded with cameras, was a conference room with many electrical outlets, some of which Schneier commandeered for his cell phone, laptop, BlackBerry, and battery packs. One side of the room was a dark glass wall. Schneier flicked a switch, shifting the light and theatrically revealing the scene behind the glass. It was a Luddite nightmare: an auditorium-like space full of desks, each with two computer monitors; all the desks faced a wall of high-resolution screens. One displayed streams of data from the “sentry” machines that Counterpane installs in its clients’ networks. Another displayed images from the video cameras scattered around both this command post and the one in Silicon Valley. On a visual level the gadgetry overwhelmed the people sitting at the desks and watching over the data. Nonetheless, the people were the most important part of the operation. Networks record so much data about their usage that overwhelmed managers frequently turn off most of the logging programs and ignore the others. Among Counterpane’s primary functions is to help companies make sense of the data they already have. “We turn the logs back on and monitor them,” Schneier says. Counterpane researchers developed software to measure activity on client networks, but no software by itself can determine whether an unusual signal is a meaningless blip or an indication of trouble. That was the job of the people at the desks. Highly trained and well paid, these people brought to the task a quality not yet found in any technology: human judgment, which is at the heart of most good security. Human beings do make mistakes, of course. But they can recover from failure in ways that machines and software cannot. The well-trained mind is ductile. It can understand surprises and overcome them. It fails well. When I asked Schneier why Counterpane had such Darth Vaderish command centers, he laughed and said it helped to reassure potential clients that the company had mastered the technology. I asked if clients ever inquired how Counterpane trains the guards and analysts in the command centers. “Not often,” he said, although that training is in fact the center of the whole system. Mixing long stretches of inactivity with short bursts of frenzy, the work rhythm of the Counterpane guards would have been familiar to police officers and firefighters everywhere. As I watched the guards, they were slurping soft drinks, listening to techno-death metal, and waiting for something to go wrong. They were in a protected space, looking out at a dangerous world. Sentries around Neolithic campfires did the same thing. Nothing better has been discovered since. Thinking otherwise, in Schneier’s view, is a really terrible idea.

———–

]]>
3897
Holy Shit. https://ianbell.com/2002/03/26/holy-shit/ Tue, 26 Mar 2002 19:03:29 +0000 https://ianbell.com/2002/03/26/holy-shit/ Blame Ray for this one…

—— Forwarded Message From: Ray Le Maistre Date: Tue, 26 Mar 2002 09:45:49 -0000 To: ‘Ian Andrew Bell’ Subject: RE: What would you do without your phone or e-mail?

======================================================== http://www.guardian.co.uk/Archive/Article/0,4273,4369605,00.html

THE ENEMA WITHIN

Ian Belcher took some persuading to go on a colonic irrigation holiday, even at a Thai beach resort. It is, he discovered, quite astonishing what gets flushed out in the course of a week’s treatment. But did he feel the better for it?

Ian Belcher Guardian

Saturday March 9, 2002

When photographer Anthony Cullen heard the clank of glass on porcelain, he didn’t need to examine the contents of the toilet bowl between his legs. He instinctively knew he had just passed the marble he had swallowed as a five-year-old; the small coloured sphere – “I think it was a bluey” – had lodged in his colon for 22 years. His nonchalance was understandable. Having flushed 400 pints of coffee and vinegar solution around his large intestine through 10 enemas, and taken 100 herbal laxatives, he had become hardened to extraordinary sights. He had already excreted yards of long stringy mucus “with a strange yellow glaze”, several hard black pellets and numerous pieces of undigested rump steak. Like an iceberg breaking away from a glacier, the marble was simply the latest object to drop off the furred up wall of his colon.

Within 30 minutes it had become a burning topic of conversation among guests at The Spa resort on the Thai island of Koh Samui. Most listened, nodded earnestly and smiled, a flicker of mutual support, before describing their own bowel movements in unnervingly graphic detail. It was just another day at the tropical health farm where conversations that would be deemed unpleasant, if not obscene, in any place outside a gastro-intestinal ward, are mere idle chit-chat among the sun-soaked clientele.

They may have travelled across the world to The Spa’s thatched beach huts, encircling its renowned restaurant whose Pod Ka Pow Nam Many Hoy – prawns and chilli, stir-fried in oyster sauce – is a house speciality, but not a morsel of food, nor a single calorie, will pass their lips. Instead they order around 70-odd gallons of coffee and vinegar, lemon or garlic solution – lightly warmed, please waiter – to be squirted up their anus. You are unlikely to find this particular dish on Masterchef.

The roots of their truly alternative activity holiday lie in our modern lifestyle. Some doctors, such as Richard Anderson, inventor of the Clean-Me-Out Programme, claim our high stress existences and over-processed diets – chips, pizzas, burgers – have left us with clogged-up digestive systems. And that, according to advocates of intestinal cleansing, makes us disease time bombs, at increased risk from cancer, heart trouble, infertility, diabetes, premature ageing and, pass the smelling salts this instant, wrinkles.

Their solution is to fast: to put nothing in one end, while simultaneously purifying yourself by propelling significant amounts of liquid up the other. “It’s like changing the oil in your car,” says Guy Hopkins, the 60-year-old owner of The Spa, whose eyes glint with evangelical zeal when he talks about colonic irrigation. “If you don’t do it every so often [your body] isn’t going to run that well. We constantly put the wrong fuel in our bodies and, sure, they keep on going, but cleanse yourself and you’ll be amazed how much better you’ll feel.”

A tempting sales pitch, yet when my editor suggested a first-person report, I had grave reservations. As someone whose only concessions to healthy eating had involved switching from butter to olive oil and occasionally cutting the fat off my steak, the fast sounded frankly insane. Then I began hearing about the “lifestyle benefits” of the cleanse, of the 90-degree heat and tropical beaches. Words such as “de-stressing” and “life-changing” were tossed around.

I weakened, dithered and finally relented. The photographer, Anthony, it was agreed, must also fast.

Our preparation began well before we spotted our first palm tree. The Spa recommended we prepared with a fortnight of abstinence from meat, processed foods (adios my daily staples, pasta and bread), milk, cheese, booze, coffee or soft drinks. Instead, our gastric juices were stimulated by salads, fruit, slightly cooked vegetables, herb teas and water.

It wasn’t easy. Both Anthony and myself are what might charitably be termed “stocky”, enjoying cooking and, more importantly, eating. Within days, food, or lack of it, had become an obsession. We had long phone discussions about interesting ways to grill aubergine; Anthony bragged about his spicy ratatouille. Life was changing.

As the first toxins were expelled and severe caffeine withdrawal set in, I experienced headaches, aching muscles, a lack of energy, and an increasingly short temper. I also faced a new menace: the liver flush drink. Designed to sluice out your system, it’s a vile mix of olive oil, raw garlic, and cayenne pepper blended with orange juice. I’ve no idea if it worked, but my urine turned clear and I always got standing space on the tube.

We stuck rigidly to the diet until disaster struck: an upgrade on the flight to Bangkok. Our willpower collapsed and over the next “lost” 12 hours we demolished peanuts, smoked salmon and oyster mushrooms, roast goose, cheese, port, champagne, Baileys and chocolates.

We had four more days before the fast, but while I got back on track, the photographer went totally off the detox rails. He consumed beer, Pringles, coffee and, as we waited for the Koh Samui connection at the airport, slipped in two Burger King chicken sandwiches, a huge pile of fried onion rings, a large Coke, followed by a chicken dinner on the plane. He was clearly heading for a remarkable first enema.

By the eve of the cleanse, I’d already lost over 2kg, weighing in at 86kg. Anthony was a little heavier, at 91kg. After demolishing an emotional last supper, we met our fellow fasters. They appeared a cosmopolitan crowd, confounding fears of being stranded among the sandals and lentil brigade.

There was Derek James, an engineer from Leeds, and Margaret Barrett, a sales rep from Cambridge, both in their mid-20s and aiming to clean up their acts after “caning it” while working in clubs in Tokyo. Nicky McCulloch, a 27-year-old Australian teacher, hoped to sort out a range of allergies, including wheat and alcohol. She was travelling with Mez Hay, a worm farmer with a shock of blond hair and strident ocker accent. Passionate about Italian food, along with steak, chops and sausages from her parents’ farm, Mez admitted she was keeping her friend company and hadn’t put in a single second’s preparation. “I didn’t know about it,” she snapped. “Who the hell are you, the bloody fast police?”

Others also had tangible goals, including tackling stomach complaints, severe constipation and mystery lumps. Most were keen to stress – a cynic might say too keen – that losing weight was not the goal. “It’s a bit extreme to travel half way round the world just for a diet,” argued Mez. “You’d be a bit superficial. Mind you, I wouldn’t mind shedding a few pounds.”

That didn’t promise to be a problem. After checking our pH levels – too low and the fast isn’t advisable – we immediately learned that while we wouldn’t be eating, a great deal would still pass our lips. The relaxed, stress-free week on the beach would involve a Stalinist adherence to a pill-popping timetable. Each day started with a charming 7am detox cocktail of psyllium husk and bentonite clay. It had the texture of liquid cotton wool, but would be crucial for pushing toxins and garbage through my system.

Ninety minutes later, we had to swallow eight tablets. They looked like rabbit droppings, tasted like rabbit droppings but were, in fact, a mix of chompers (herbal laxatives and cleansers to attack the accumulated gunge in our colons) and herbal nutrients to help compensate for those missed during starvation. We had to repeat these two doses every three hours, every day, with a final handful of pills at 8.30 each night. There was just one more lesson, the small matter of the self-administered enema. Our teacher was the sickeningly lean, tanned resident alternative health expert, Chris Gaya, who appeared to have stepped straight out of a Californian aerobic video. He made the colonic irrigation equipment – bucket, piece of wood, plastic tube, bulldog clip and nozzle – sound like straightforward DIY, although it’s unlikely to feature on Blue Peter in the near future.

All we had to do, he informed us, was to lie on the wooden board between a stool (stop giggling at the back) and the toilet basin. There’s a hole at one end of the board over the loo; above it a nozzle connects to a tube, which in turn leads to a five-gallon bucket of liquid hanging from the ceiling. We would liberally coat the nozzle, which was the width of a Biro ink tube, with KY jelly, lie back, think of profiteroles with chocolate sauce, and slide on.

Controlling the flow of liquid with a bulldog clip, we were to let it flow until we felt full, before massaging it round the colon (roughly following three sides of a square around the lower belly) and releasing. Fluid would, apparently, be flowing in and out of our backside at the same time. “We’ll be on the board for around 40 minutes,” cooed Chris. “So let’s make ourselves as relaxed as possible. Put on some soft music, light a candle, create a romantic atmosphere.”

We clearly took different approaches to seduction. But mastering the enema, once I’d got over muscle-clenching nervousness, really wasn’t difficult. I somehow ended up with my right foot half way up the wall, but five gallons went in and out without major trauma. By that night I’d shed another kilo, and although light-headed after 24 hours without food, felt strangely satisfied with the mix of supplements and detox drinks.

Next morning, my first enema of the day down the pan, I sat in the restaurant staring longingly at the menu, and found inspiration in the shape of two women nibbling their post-fast fruit. They exuded some of the rudest health I’d ever seen.

Carol Beauclerk, a “global nomad” with a mop of curly black hair, was a vegetarian, practised yoga, meditated and warmed up for her fast with a 17-day hike in Nepal. At 54, she had the energy and enthusiasm of someone half her age. “This place is really jumping,” she enthused. “I’m now hoping to do a week-long fast each year.”

Two tables away, scribbling in a diary, was Claire Lyons, a 32-year-old British journalist who had recently completed 21 days without eating. Having not gone near a set of scales, she had no idea how much weight she’d lost, but told me, “I feel great. Once I got past day 10, over the hump, it was surprisingly easy.” Claire oozed serenity, but three weeks without food is unlikely to leave anyone hyperactive.

By mid-afternoon, their shining example was all but forgotten. I was feeling awful. Tired, lethargic, simply lousy. Having not eaten for 36 hours my body was apparently going into detox mode. Margaret, who had felt nauseous since waking, had actually thrown up, and was questioning her motivation. Nicky, meanwhile, had produced “something about nine inches long, it was very dark, very scary”.

Things were no better for Mez. Already ravenous, she was spending an inordinate amount of time sniffing around plates of steaming Thai curry in the restaurant. She had also failed to grasp the basics of colonic irrigation. Instead of letting the liquid flow out, she had taken a massive amount in – until she was about to burst – before struggling to sit on the toilet and release it. “I had a huge stomach,” she gasped. “I was thinking, this must be wrong. If anyone can take the whole bucket in one go, they’re sensational.” I made a mental note to watch out for spectacular explosions from chalet six.

It wasn’t all bad news, however. I discovered we were allowed the luxury of a daily bowl of vegetable broth. It made me pathetically happy, savouring every drop as if it were a Gordon Ramsay creation. Filling perhaps, but it did little to halt the weight loss, and by the end of day two, a further two kilos had vanished.

By next morning, tiredness had been added to my hunger. I seemed to have been up half the night on the loo, the result of drinking a copious amount of fluid. My bodily functions had also taken a turn for the truly bizarre. I experienced flu-like symptoms as I started to expel 36 years’ worth of toxins with headaches and aching muscles; my nose ran constantly, my eyes were sore and weepy, my ears waxy. I felt like something out of The Omen. I had also plucked up the nerve to put a colander down the toilet. Close examination showed I had passed several feet of long brown string that shimmered as if subtly illuminated by a photographer’s light.

And I wasn’t alone. Margaret had picked through her colander with chopsticks to reveal yellow fatty chunks, Mez had filled hers to the brim with brown stringy “chicken skin” mucus (“We’re talking litres”), as had Derek, whose output included a strip about eight inches long, while Anthony described his as “patchy, like rabbit droppings”. Similar surreal conversations with virtual strangers became the norm, achieving levels of intimacy beyond the range of couples who have been together for years. Perhaps avoiding frank discussion of bowel movements is one secret of a long-lasting relationship. That night, as I escaped the dense tropical warmth, and flicked through books on diet and nutrition in The Spa’s library, I discovered a remarkable document: The Healthview Newsletter. Inside, octogenarian bowel specialist, V E Irons, attempted the Herculean task of selling colonic irrigation on its erotic potential. I would lose my frigidity, he promised, my sex life would go stratospheric.

“How could anyone fully enjoy sex when he has up to 15 years of encrusted fecal matter and mucus in his colon?” asked Irons. “HE CAN’T – and HE WON’T. If you want to remain sexually potent for your entire life, start cleaning your colon today. I’m 87, and I still enjoy sex. And if I can at my age, I know you can at your age… so get on with it!” It was of little consolation to Mez, whose hunger had now assumed epic proportions. She was considering eating her apricot moisturiser, she told me.

That night produced the most vivid dreams of my life, a typical symptom of detox, with blockages disappearing from the mind as well as the body: I’d attacked Vietcong gun positions in a hot air balloon, I’d played golf with exploding balls, I’d been savaged by a grizzly bear. Other guests’ dreams were more grounded in reality: Anthony and Mez had raided their parents’ fridges, with the worm farmer devouring steak, potatoes and cheese sauce. And some simply begged for the psychiatrist’s couch. Nicky, who in reality sees her divorced father only sporadically, dreamed he had turned into her boyfriend. Freud would have enjoyed that. Indeed, in private conversations with guests, well away from my notebook, many fasters admitted to having recently split up, or having travelled to Koh Samui to get a long-distance perspective on relationships. I had unwittingly stumbled on Relate-On-Sea. There was further physical fall-out, too. Day four was supposedly the worst of the week, with toxins expelled through the skin and lungs, as well as the kidney and colon. I didn’t disappoint. My nose, ears and eyes deteriorated, my sinuses throbbed, I was yet more sluggish. It felt like a beer, wine and whisky hangover. Increasingly strange things appeared in our colanders. Derek was shocked to find rubbery nuggets, Mez had found black oval shapes “up to five inches long”, my offering had an almost luminous green tint.

As if to celebrate crossing the halfway point of the week, many of us switched enema solutions. Abandoning coffee and vinegar, I flamboyantly opted for garlic, claimed to get rid of parasites. It seemed as natural as ordering gin and tonic instead of margarita, but when I casually told my girlfriend in a telephone call to London, there was a long silence. “Are you aware how tenuous your grip is on reality?” she asked. “Are you with a cult?”

I clearly needed to get out more. Many people hadn’t left The Spa for days, it was developing its own micro-culture. But when I summoned up the energy to sip mineral water in a bar in nearby Lamai town, I felt instant paranoia. The lights, the noise, the crowds, the smell of food. It was a world in which I didn’t belong.

I returned to the womb to find new guests. John Twigg, a burly 37-year-old Kiwi, had prepared by drinking more wine. “It’s made of grapes,” he argued. “Grapes are vegetables, so what’s the problem?” He was joined by the Lycra-clad Mimi and Dave Hatherley from Fairbanks, Alaska, who had an unnerving habit of finishing each other’s sentences. Forty-two-year-old Mimi ran, biked and did step classes five times a week; Dave, 43, ran, skied, hiked, climbed and mountain biked. They were both “into vitamins and nutrition” and while fasting were also exercising hard because “the results will be better”. After talking to them, I felt strangely giddy.

My mood and physical condition, however, were about to go through a dramatic change. By lunch – sorry, by the second dose of herbal laxatives – on day five, my nose, eyes and ears had cleared, and I had more energy. Remarkably, without nibbling a single shred of food for 120 hours, the irrigation still washed out huge amounts of gunk. I passed six-inch strips of gristle and what appeared to be large chunks of fillet steak. I don’t know how I ever afforded them, let alone swallowed them.

At least I could contribute to the increasingly competitive enema discussions. Someone had always passed something harder, brighter, more bizarre. Margaret’s chopsticks had unearthed some gristle, about a foot long, and hard, black pellets. She was so impressed she took a photograph. A few chalets away, Mez had passed “rubbery brown, fat worms” with a strange purple glaze, which she insisted on showing to me in her bathroom. But the clear winner was Anthony’s 22-year-old marble. Perhaps the most bizarre thing, which I didn’t appreciate until days later, is that it all seemed perfectly normal at the time.

When I next bumped into Alaska Dave, he was jogging rapidly between the restaurant and his chalet. As panpipe music played in the background and he told me about today’s three-mile hike, I noticed he wore a strange electrical device. It was a zapper that emitted an electrical current to kill parasites, and carried the printed warning: “For research only. Not approved for use on humans.” Even for The Spa, that clearly wasn’t normal. The improvement continued into day six. A nearly detoxified brain and bloodstream meant I awoke clear-headed, and full of energy. The enemas now produced less, but it was darker and harder as the fast broke away the older, more ingrained plaque.

It was the same story the next day. Our bodies seemed to reflect a mood of demob happiness. I had rarely felt so healthy, so energised, in my adult life. That didn’t, however, mean the end of the bizarre revelations. John passed “something from an alien movie” into his colander – and then videoed it for his office colleagues. He was joined by an outsized oil worker, Pipeline Pete, embarking on his 10th fast. “The first time I came,” he boasted, “they needed to dig three cesspits.”

And there were more. Early that evening, I found Mez huddled over a well-thumbed tome in the library. “Jesus, have you read some of these?” she groaned, handing me a book of ex-guests’ awed testaments. “I’d have bet £1,000 my bowels were clean,” wrote Chris Markvert, 67, “seldom have I been so surprised.” “Great pooing,” said Roy from San Francisco, “the best month of my young life.” And RTM contributed seven pages of increasingly manic scrawl, which included interesting facts about the Vikings.

It also contained graphic photographs of people’s enemas, footnotes in The Spa’s history to go alongside stories of legendary guests, such as the alcoholic whose detox included hiding whisky bottles and wandering naked into neighbouring resorts; and “Kathmandu Joan”, who fasted for 140 days over two and a half years, passing over 70 green and black “buttons” and clearing up an abdominal disorder.

We couldn’t compete with that, but by the morning of day eight, the fast was being credited with impressive results. It had, people claimed, got rid of allergies; removed worrying lumps that had necessitated appointments with gynaecologists; eased severe period pains and sinus problems; helped people lose kilograms while improving their skin and strengthening their nails. I’d lost well over 6kg, had an indecent amount of energy and, as people kept observing, had developed unnaturally bright eyes. I wasn’t aware they were cloudy before, but felt I had earned some flattery after 14 enemas and no food for roughly 170 hours, 35 minutes and four seconds. The cost of the seven-day programme, by the way, is £184, and accommodation in a chalet for the week adds another £60 or so.

The first post-fast meal of papaya made my toes curl with pleasure, but, as George Bernard Shaw observed, “Any fool can fast, but it takes a wise man to break a fast properly.” Raw fruit and vegetables should be the order of the next three days, but within hours Anthony had consumed two Snickers bars and a fish supper. It appeared to have no ill effects. They came 24 hours later. After demolishing piles of local prawns, we unwisely sipped a shot of Mekong whisky. Toxins tasted good, very good indeed. So good in fact, that by midnight, we had drunk a bottle each. The next morning, on the beach, my glasses were smashed, toxins pulsing around my bloodstream, the hangover indescribable.

But the week was not wasted. As a nutritional Philistine, I was inspired to read more, to learn some basic lessons. It’s hardly double-blind scientific research, but I defy anyone to examine a post-irrigation colander with its chunks of apparently undigested family roast and not make some small changes to their diet. I love meat; the smell, the taste, the texture, but now it only makes a rare appearance on my plate.

Frankly, even that’s too much for the gurus of cleansing, who believe a truly health diet revolves around fruit, vegetables, nuts and pulses – the more that’s raw or steamed the better. Along with fish, they’ve become the staples of my diet. If I occasionally lapse – and nothing will make me give up Christmas turkey or goose – a flashback to The Spa reins me in.

While I’ll take caffeine, alcohol and chocolate to the grave, I’ve also cut back on most dairy and wheat products. It might make me the dining companion from hell, but I do, at least, have the stories. People are constantly appalled yet fascinated by the idea of cleansing, and for some masochistic reason, demand the grim details between starter and main course. As they wait for their medium rare fillet or pork Dijonnaise, they crane forward to hear more about the decaying contents of people’s colons.

As for Anthony, he never considered giving up meat. Or cream sauces. Certainly not Snickers. Life, as he sees it, is too short. And who am I to argue? But remember, this is the man who has lost his marble.

Ray Le Maistre Editor/Online producer Total Telecom – www.totaltele.com ray.lemaistre [at] total.emap [dot] com Fixed Tel: +44 (0)20 7505 8630 Mobile Tel: +44 (0)7718 966448

Alternative e-mail: ray_le_maistre [at] hotmail [dot] com

Total Telecom: The home of global communications

—–Original Message—– From: Ian Andrew Bell [mailto:hello [at] ianbell [dot] com] Sent: Friday, March 22, 2002 3:28 PM To: Ray Le Maistre Subject: Re: What would you do without your phone or e-mail?

On 3/22/02 1:40 AM, “Ray Le Maistre” wrote:

>
> It’s not a new idea, and has probably been written about before. Countless
> times during the past 25 years I have read newspaper articles about
families

Ray, this article ROCKS! Entirely the type of stuff I love for people to find. Next time, can you please paste the text as well as the URL so that it gets archived on FOIB?

Keep ’em coming!

-Ian.

** For great Emap magazine subscription & gift offers visit http://www.emapmagazines.co.uk **

]]>
3748
Spam: How do I hate thee… https://ianbell.com/2002/02/05/spam-how-do-i-hate-thee/ Tue, 05 Feb 2002 23:40:02 +0000 https://ianbell.com/2002/02/05/spam-how-do-i-hate-thee/ Tuesday February 05 04:00 PM EST

Only worthy of forwarding because of the JMM statistic: 1,400 pieces of spam per day!

-Ian.

—-

http://dailynews.yahoo.com/htx/cn/20020205/tc/net_surfers_set_out_to_squelch _spam_1.html Net surfers set out to squelch spam By Stefanie Olsen CNET News.com

Larry Kilgallen got so fed up with junk e-mail that he finally decided to do something about it.

Kilgallen, a Cambridge, Mass., business owner, says he takes about five minutes each day to fire off e-mail complaints to spammers and Internet service providers that relay their payload to his in-box.

“It’s civic duty,” said Kilgallen, who uses a free online reporting service called SpamCop to help filter the junk and identify the culprits. “It probably takes me 10 seconds to report a spam. But the only reason the filtering is good is through the people who report it.”

The battle against junk e-mail, or spam, has numerous allies: Legislators have enacted laws targeting it, trade groups have crafted voluntary guidelines to govern it, and software developers have created weapons of mass deletion to thwart it.

Last week, the Federal Trade Commission said it plans to launch a “systematic attack” on deceptive e-mail, including law enforcement action against spammers.

But as is often the case, the last line of defense lies with consumers like Kilgallen, who are increasingly using spam filters supplied by ISPs, Web-based mail programs and software developers.

Their self-appointed task is daunting. Last year, the number of spam attacks to mailboxes increased by nearly 200 percent, according to filtering company BrightMail. Spiritual-related e-mail was the fastest-growing form of junk to consumer in-boxes.

Looking ahead, experts predict junk e-mail will soon grow to incomprehensible volumes. Within four years, consumers can expect to receive an average of 1,400 pieces of junk e-mail per day, according to Net researcher Jupiter Media Metrix.

So what’s a Web surfer to do until the federal government outlaws the practice? One option is to grin and bear it; another is to embrace a growing range of desktop anti-spam tools.

Either way, spam veterans say Net surfers shouldn’t expect much relief, noting that even the best filters have vulnerabilities.

“With every advance in spam filter technology, spammers constantly invent ever more ways to circumvent filters,” said Steve Linford, director of the London-based Spamhaus Project.

Sisyphean task That hasn’t stopped software developers from trying.

The onslaught of unwanted e-mail has inspired many types of filter tools, including e-mail forwarding services, software plug-ins, and built-in filters for Web-based mail such as Yahoo Mail or for applications such as Microsoft Outlook.

Emailias, launched last fall, is designed to shield a consumer’s primary e-mail address from spammers. Emailias or other services, such as SpamMotel or Mailshell, allot an unlimited number of fake, or alias, addresses for the consumer to use when filling out forms, posting to newsgroups or signing up to mailing lists, where they can subsequently be “harvested” by spammers.

For $4.95 per month or $19.95 per year, Emailias’ plug-in sits in a browser’s “favorite links” or on its task bar. When consumers are asked for an e-mail address, they can click on the link to retrieve a pop-up window with an address specialized for that page.

E-mail sent to that address is forwarded to the consumer’s primary account. Subscribers can discontinue the address at any time–for example, when an e-commerce company sends unsolicited mail from “partners.”

Another tool, Novasoft’s SpamKiller, costs $29.95 and is one of the most popular tools at Download.com, a site run by CNET Networks, publisher of News.com.

Among other filtering techniques, the software lets consumers block messages by the sender’s address, message subject or headers, and message text. For example, customers can dump all e-mail with the words “make money from home” within it.

SpamCop, Kilgallen’s choice, costs $3 monthly, with a free service for reporting spammers. It filters mailboxes based on “whitelists,” or a list of acceptable addresses to receive mail from, and “blacklists,” unacceptable sources of mail. The service filters the IP addresses used by rogue marketers in real time so complaints may help improve the filters. With the account, subscribers also get an alias address.

Even with regular filter updates or new blocking inventions for consumers, however, spammers often find a way to infiltrate the most guarded in-boxes.

A method called “harvesting” involves scraping e-mail addresses posted in newsgroups or message boards, from which the spammer compiles a bulk-mailing list.

“Nefarious people have created robots to go and harvest your e-mail address from discussion groups and then spam you,” said Paul MacIntosh, chief technology officer of New Jersey-based Emailias. “Normally, an address will get tainted, and there’s no way to take back that address or stop the spam other than changing that address.”

Spammers may also use what’s known as a “dictionary attack” in which they guess every possible user name in a domain.

On the opposite extreme, spam filters are frequently accused of being overly zealous in weeding out e-mail, capturing good messages along with the bad. Filters have been known to redirect e-mail from a company’s help desk from the in-box into a “killed” e-mail box, for example.

Thor Ivar Ekle, creator of SpamKiller, admitted that his system is designed to catch 97 percent of mass e-mails, including help-desk mail.

Some consumers say that this is reason enough to declare spam filters a failure.

“I have plenty of client filters, and I still see lots of spam slip right through…and lots get trashed. It’s a losing battle from the consumer side. It’s in the hands of the ISPs,” said one woman who is a self-professed spam fighter.

A higher-level solution Three years ago, most ISPs saw spam filters as dangerous or censorious because they could block valid e-mail. But in the last two years a dramatic rise in spam and complaints from customers has prompted a shift.

Now, behind the scenes, many Net access providers and anti-spam agents are laboring to block spam from moving through Internet pipelines. The all-hours battle is costing ISPs an enormous amount of time and resources. Last year, the European Union estimated the global cost of spam at $8 billion annually.

“The ISP industry attitude changed from ‘We won’t filter spam’ to ‘Which filters shall we use?'” Spamhaus’ Linford said.

America Online calls junk e-mail “public enemy No. 1” on behalf of its 34 million subscribers. Despite its in-house spam team working to block known bulk mailers and the plethora of filtering options it gives consumers to manage e-mail, AOL spokesman Nicholas Graham said commercial e-mail still manages to creep into mailboxes.

ISPs such as EarthLink, MSN, AT&T WorldNet and Verizon Communications (NYSE:VZ – news) have enlisted spam-filtering software from San Francisco-based BrightMail to help shield consumers from bulk mail. About a third of ISPs also use block lists based on the worldwide DNS (domain name system) to refuse spam at their mail servers before it gets into subscriber mailboxes.

Well-known blocklists from groups such as the Mail Abuse Prevention System and Spamhaus work to keep track of IP addresses used to send spam, in an effort to block them altogether.

BrightMail’s service, which operates a spam-detection center called BLOC, works by updating “mail rules,” or filtering guidelines for the newest spam senders, every five minutes to seven minutes and sending them to customers.

Such systems are focused on trying to pinpoint patterns in incoming mail and filter based on repetitions and keywords.

But filtering systems that let consumers block e-mail based on the wording contained within the message often fail because spammers are always tweaking language. For example, a consumer may set up a filter on “win a free car.” But after using that terminology, the spammer might tweak the language to say “won a free car.”

Some state laws, including those in California and Washington, give consumers some legal recourse against junk mailers, but many anti-spam advocates say they don’t root out the problem. Because the laws require consumers to “opt out” of receiving junk mail, advocates say the action costs people more time than they have.

In some states, marketers are required by law to add the prefix “ADV:” to commercial e-mail. But spammers are learning to beat the system. They get around filters by using variations such as “[Ad V]” or “.”

Marketers use such tactics because e-mail is quickly becoming the lifeblood of sales.

Jerry Cerasale, senior vice president of government affairs at the Direct Marketing Association, said his organization is trying to define spam and set guidelines for its 5,000 members to avoid bringing government regulations into the fold.

“It wouldn’t be spam if the sender has had a prior business relationship with the consumer or he has joined a list” to receive sales pitches, Cerasale said.

Still, anti-spam advocates say such policies won’t solve the problem anytime soon.

“The filter war is an arms race which neither spammers nor consumers can win and which can only be stopped by outlawing spam,” Spamhaus’ Linford said.

]]>
3702