Saturday, December 31, 2011

Books Read in 2011

I picked up the pace a bit in 2011, with a little help from acquiring a Kindle in July...

Books read in 2011:
  • David Allen, Getting Things Done: The Art of Stress-Free Productivity
  • Dan Ariely, The Upside of Irrationality: The Unexpected Benefits of Defying Logic
  • Kevin Behr, Gene Kim, and George Spafford, The Visible Ops Handbook: Implementing ITIL in 4 Practical and Auditable Steps
  • John W. Creswell, Research Design: Qualitative, Quantitative, and Mixed Methods Approaches, Third Edition
  • Gordon R. Dickson, The Alien Way 
  • Daniel Domscheit-Berg, Inside Wikileaks: My Time with Julian Assange at the World's Most Dangerous Website
  • John Duignan with Nicola Tallant, The Complex: An Insider Exposes the Covert World of the Church of Scientology
  • Jerry Fodor and Massimo Piatelli-Palmarini, What Darwin Got Wrong, Updated Edition 
  •  Floyd J. Fowler, Jr., Survey Research Methods, 4th Edition
  • Benjamin Franklin, The Autobiography of Benjamin Franklin 
  • Jefferson Hawkins, Counterfeit Dreams: One Man's Journey into and out of the World of Scientology
  • Alan Haworth, Anti-Libertarianism: Markets, Philosophy and Myth
  • Marc Headley, Blown for Good: Behind Scientology's Iron Curtain
  • Gene Kim, Paul Love, and George Spafford, Visible Ops Security: Achieving Common Security and IT Operations in 4 Practical Steps
  • Jon Krakauer, Under the Banner of Heaven: A Story of Violent Faith
  • Peter D. Kramer, Should You Leave?
  • Lawrence M. Krauss, Quantum Man: Richard Feynman's Life in Science
  • Patrick Lencioni, The Three Signs of a Miserable Job: A Fable for Managers (and their employees) 
  • Stephen L. Macknik and Susana Martinez-Conde, Sleights of Mind: What the Neuroscience of Magic Reveals About Our Everyday Deceptions
  • Nancy Many, My Billion Year Contract: Memoir of a Former Scientologist 
  • Robert McLuhan, Randi's Prize: What Sceptics Say About the Paranormal, Why They Are Wrong and Why It Matters
  • Ben Mezrich, The Accidental Billionaires: The Founding of Facebook: A Tale of Sex, Money, Genius and Betrayal
  • Delbert C. Miller and Neil J. Salkind, Handbook of Research Design & Social Measurement, 6th Edition
  • Kevin Mitnick with William L. Simon, Ghost in the Wires: My Adventures as the World's Most Wanted Hacker 
  • Harry Markopolos, No One Would Listen: A True Financial Thriller
  • Milton L. Mueller, Networks and States: The Global Politics of Internet Governance
  • Ronald L. Numbers, Galileo Goes to Jail and Other Myths About Science and Religion
  • Judith Pintar and Steven Jay Lynn, Hypnosis: A Brief History
  • Kevin Poulsen, Kingpin: How One Hacker Took Over the Billion-Dollar Cybercrime Underground 
  • Janet Reitman, Inside Scientology: The Story of America's Most Secretive Religion
  • Mary Roach, Packing for Mars: The Curious Science of Life in the Void
  • Jon Ronson, The Psychopath Test: A Journey Through the Madness Industry 
  • Benjamin Rosenbaum and Cory Doctorow, True Names
  • Carl Sagan, The Demon-Haunted World: Science as a Candle in the Dark
  • David Schmidtz and Robert E. Goodin, Social Welfare and Individual Responsibility: For and Against 
  • Amy Scobee, Scientology: Abuse at the Top
  • Robert Sellers, Hellraisers: The Life and Inebriated Times of Richard Burton, Richard Harris, Peter O'Toole, and Oliver Reed
  • Tom Standage, The Victorian Internet: The Remarkable Story of the Telegraph and the Nineteenth Century's On-Line Pioneers
  • John Steinbeck, Travels with Charley in Search of America 
  • Jim Steinmeyer, The Last Greatest Magician in the World: Howard Thurston versus Houdini & the Battles of the American Wizards
  • Donald Sturrock, Storyteller: The Authorized Biography of Roald Dahl
  • Nassim Nicolas Taleb, The Black Swan: The Impact of the Highly Improbable (Second Edition)
  • Mark Twain, The Adventures of Huckleberry Finn 
  • Hugh B. Urban, The Church of Scientology: A History of a New Religion
(Previously: 2010, 20092008200720062005.)

Saturday, November 26, 2011

Time and Newsweek magazine covers, U.S. vs. rest of world

This recent comparison has been making the rounds:

As have a few other recent examples:

But this has gone on for many years.  A few others from a few years back:

I suspect the weekly news magazines are simply basing their cover decisions on what sells in the U.S.  Sad.

Wednesday, September 28, 2011

Skeptics and Bayesian epistemology

A few prominent skeptics have been arguing that science and medicine should rely upon Bayesian epistemology.  Massimo Pigliucci, in his book Nonsense on Stilts, on the Rationally Speaking podcast, and in his column in the Skeptical Inquirer, has suggested that scientists should best proceed with a Bayesian approach to updating their beliefs.  Steven Novella and Kimball Atwood at the Science-Based Medicine blog (and at the Science-Based Medicine workshops at The Amazing Meeting) have similarly argued that what distinguishes Science-Based Medicine from Evidence-Based Medicine is the use of a Bayesian approach in accounting for the prior plausibility of theories is superior to simply relying upon the outcomes of randomized controlled trials to determine what's a reasonable medical treatment.  And, in the atheist community, Richard Carrier has argued for a Bayesian approach to history, and in particular for assessing claims of Christianity (though in the linked-to case, this turned out to be problematic and error-ridden).

It's worth observing that Bayesian epistemology has some serious unresolved problems, including among them the problem of prior probabilities and the problem of considering new evidence to have a probability of 1 [in simple conditionalization].  The former problem is that the prior assessment of the probability of a hypothesis plays a huge factor in the outcome of whether a hypothesis is accepted, and whether that prior probability is based on subjective probability, "gut feel," old evidence, or arbitrarily selected to be 0.5 can produce different outcomes and doesn't necessarily lead to concurrence even over a large amount of agreement on evidence. So, for example, Stephen Unwin has argued using Bayes' theorem for the existence of God (starting with a prior probability of 0.5), and there was a lengthy debate between William Jefferys and York Dobyns in the Journal of Scientific Exploration about what the Bayesian approach yields regarding the reality of psi which didn't yield agreement. The latter problem, of new evidence, is that a Bayesian approach considers new evidence to have a probability of 1, but evidence can itself be uncertain.

And there are other problems as well--a Bayesian approach to epistemology seems to give special privilege to classical logic, not properly account for old evidence [(or its reduction in probability due to new evidence)] or the introduction of new theories, and not be a proper standard for judgment of rational belief change of human beings for the same reason on-the-spot act utilitarian calculations aren't a proper standard for human moral decision making--it's not a method that is practically psychologically realizable.

The Bayesian approach has certainly been historically useful, as Desiree Schell's interview with Sharon Bertsch McGrane, author of The Theory That Would Not Die: How Bayes’ Rule Cracked the Enigma Code, Hunted Down Russian Submarines, and Emerged Triumphant from Two Centuries of Controversy, demonstrates.  But before concluding that Bayesianism is the objective rational way for individuals or groups to determine what's true, it's worth taking a look at the problems philosophers have pointed out for making it the central thesis of epistemology.  (Also see John L. Pollock and Joseph Cruz, Contemporary Theories of Knowledge, 2nd edition, Rowman & Littlefield, 1999, which includes a critique of Bayesian epistemology.)

UPDATE (August 6, 2013): Just came across this paper by Brandon Fitelson (PDF) defending Bayesian epistemology against some of Pollock's critiques (in Pollock's Nomic Probability book, which I've read, and in his later Thinking About Acting, which I've not read).  A critique of how Bayesianism (and not really Bayesian epistemology in the sense defended by Fitelson) is being used by skeptics is here.

Monday, September 12, 2011

Rarely-used cliche on the Token Skeptic podcast

My favorite part of the Token Skeptic podcast #76's interview with Sara Mayhew and Jack Scanlan is 28:30-28:42, where Scanlan says "everyone hates pop songs."  That's a self-annihilating sentence along the lines of "No one goes there anymore; it's too crowded."

That reminds me of Saul Gorn's compendium, "Self-Annihilating Sentences: Saul Gorn's Compendium of Rarely Used Cliches," which I have in the original hardcopy but is now available online for everyone's enjoyment.

Saturday, September 03, 2011

The origins of Screaming Trees?

Here's a famous photograph of pulp fiction author and Scientology creator L. Ron Hubbard holding a tomato plant connected to an E-Meter.  Hubbard claimed in 1968 that tomatoes would "scream when sliced," as detected by the E-Meter. [UPDATE: The photo appeared in "30 Dumb Inventions" on Life magazine's website, attributed to the Evening Standard of January 1, 1968, but the claims and the photo appear to be from 1959, see below.]

Hubbard was likely inspired by Cleve Backster, who had made similar claims based on connecting plants to a polygraph starting in 1966.  Backster published his claims in the Journal of Parapsychology in 1968, and his work was subsequently popularized in the 1973 book, The Secret Life of Plants.

I wonder, however, whether the inspiration for both of these crackpots came from a piece of fiction in the September 17, 1949 issue of The New Yorker--Roald Dahl's "The Sound Machine," which is reprinted in numerous short story collections, including his volume Someone Like You (1973). In this tale, a man named Klausner, obsessed with sounds beyond the ability of human beings to hear, builds a machine to convert higher pitches into human-audible sounds.  He discovers, to his horror, that plants and trees shriek with pain when cut.

Does anyone know of any documented references from Hubbard or Backster to Dahl?  Or is there another common ancestor I've missed?

My title includes a reference to the Seattle-area grunge band, Screaming Trees, whose Wikipedia entry doesn't comment on the origin of their name--but Dahl's story seems a likely inspiration there, too.

UPDATE (6 February 2013): It looks like the Hubbard photo pre-dates Backster, and was likely taken in 1959 or 1960!  It prompted a feature titled "PLANTS DO WORRY AND FEEL PAIN." in the December 18, 1959 Garden News.

UPDATE (10 February 2013): David Hambling's "The Secret Life of Plants" in the December 2012 issue of Fortean Times (p. 18) points out that Charles Darwin's 1880 The Power of Movement in Plants suggested that plants have something like a nervous system, and that Jagadish Chandra Bose published a 1907 paper on the electrophysiology of plants.  He puts Backster before Hubbard, making the same mistake of dating Hubbard's claims by the Life magazine photo caption.

Backster, by the way, was inspired by Bose's work.  He says that he started his work with plants on February 2, 1966, as reported in the introduction of his "Evidence of a Primary Perception in Plant Life," International Journal of Parapsychology, Vol. X, No. 4, Winter 1968, pp. 329-348.

Thursday, September 01, 2011

Scott Atran on violent extremism and sacred values

Chris Mooney has a very interesting interview with anthropologist Scott Atran on the Point of Inquiry podcast, in which Atran argues that terrorism is not the product of top-down, radical religious extremist organizations recruiting the poor and ignorant, but of groups of educated (and often educated in secular institutions) individuals who become disaffected, isolated, and radicalized.  Much U.S. counterterrorism and "homeland security" activity assumes the former and thus is attacking the wrong problem.

He also argues that reason and rationalism are the wrong tools for attacking religion, defends a view of religion as a natural by-product of the sorts of minds we've evolved to have (very similar to Pascal Boyer's account, which I think is largely correct), and throws in a few digs at the new atheists for making claims about religion that are contrary to empirical evidence.

Some of the commenters at the Point of Inquiry/Center for Inquiry forums site seem to be under the misapprehension that Atran is a post-modernist.  I don't see it--he's not making the argument that reason doesn't work to find out things about the world, he's making the argument that the tools of science and reason are human constructions that work well at finding things out about the world, but not so much for persuading people of things, or as the basis for long-term institutions for the sort of creatures we are.  Atran shows up in the comments to elaborate on his positions and respond to criticism.

My compliments to Chris Mooney for having consistently high-quality, interesting guests who are not the same voices we always hear at skeptical conferences.

Wednesday, August 31, 2011

Obama conspiracy theories debunked

Yesterday I received an email that contained yet another argument that Obama's birth certificate (the PDF'd scan of the "long form" certificate) was a fake, based on erroneous claims about the name of Kenya in 1961 and the name of the hospital which were already debunked at four months ago.  But this prompted me to see if there were any more advocates of wild claims about the birth certificate, and I came across Douglas Vogt's alleged analysis of the birth certificate and, more importantly, a very well-done, detailed debunking of that analysis by Kevin Davidson (known on his blog as "Dr. Conspiracy"), who has done a great job of responding to numerous Obama conspiracy claims.

Check out his "The Debunker's Guide to Obama Conspiracy Theories."

Vogt, the author of the analysis which Dr. Conspiracy debunks, is also an example of "crank magnetism"--he is the author of Reality Revealed: The Theory of Multidimensional Reality, a 1978 book which looks like a classic work of crackpottery.  Vogt bills himself as a "geologist and science philosopher" who:
has funded and directed three expeditions to the Sinai desert where he was the first person since Baruch (Jeremiah’s grandson) to discover the real Mount Sinai. He discovered all the altars that Moses describes in the Torah. In addition he was the first person since Moses to see the real Abraham’s altar also located at Mount Sinai and not in Jerusalem. He has discovered the code systems used by Moses when writing the surface story of the Torah, which enabled him to decode the Torah and other earlier books of the Hebrew Scriptures.
His book features:
The first information theory of existence. explains many of the hardest phenomena in the Universe such as: the causes of the ice ages, polar reversals, mass extinctions, gravity, light, pyramid energy, kirlian photography, psychic phenomena, and more!
So in addition to a self-proclaimed expert on typography, conspiracy theorist, and "birther," Vogt is apparently a creationist, pseudo-archaeologist, Bible code advocate, and promoter of a wide variety of pseudoscience claims.

Monday, August 22, 2011

Counterfeit Dreams

Jeff Hawkins was a Scientologist and member of the Sea Org from 1967 to 2005.  He was responsible for 1980s marketing campaigns that brought L. Ron Hubbard's book Dianetics back to the New York Times bestseller lists.  Beginning in 2008, he wrote a book-length series of blog posts about his experiences which has led to many further defections from the Church of Scientology. The blog posts have been edited into a hardback book, one of several by long-time high-ranking recent defectors (others include Nancy Many's My Billion-Year Contract, Marc Headley's Blown For Good, and Amy Scobee's Abuse at the Top).

I've read the first few chapters at his blog--it's quite well-written and the comments from others who have shared some of his experiences are fascinating.

Tuesday, July 12, 2011

Bowlarama Fundraising Time!

I have just a few more weeks (until July 31st) to reach my fundraising goal. Please donate any amount you can - just as RESCUE saves one life at a time, we reach our goal one dollar at a time. If you are unable to make a donation, please reach out to another animal loving friend, family member or co-worker and ask them to support our efforts.

Just this morning Maricopa County Animal Care & Control announced that:

"there are more than 1,000 animals at [their] shelter. MCACC is doing everything we can to save as many lives as possible. Adoptable dogs and cats are stacked three+ deep in every available space."

Also today, RESCUE saved 6 dogs from MCACC. I've posted some of their pictures here. Helping RESCUE helps dogs and cats leave MCACC through the front door, not in a body bag.

As an incentive, a friend has made some cute dog & cat themed cards for me to give as a thank you for any donation of $25 or more. You'll get a four pack of cute cards you can use for any occasion! Please click here to donate and let me know if you'd like a pack of cards in the message section. Donations are 100% tax deductible and your donation goes directly to the animals!

Here's a few of the things your donation can do:

  • $5 - will buy a martingale collar or a leash
  • $10 - will buy a container of cat litter
  • $20 - will buy a month supply of medication for RESCUE cat Nico
  • $25 - will buy two cases of wet food for RESCUE cat Benny
  • $30 - will buy a 30 lb. bag of dog food
  • $60 - will buy five days of boarding for one RESCUE dog
  • $100 - will pay for medications for RESCUE dog Zeke
  • $150 - will pay for two weeks of boarding for one RESCUE dog

Sunday, July 10, 2011

Desert Air podcast

A group of Tucson atheists and skeptics have started the Desert Air podcast, available via iTunes.  Three episodes available so far.

Skeptics and "backward masking"

Below these two videos is a post I made (perhaps to the Kate Bush fans' "love-hounds" mailing list, I don't recall) back in 1986 regarding a 1985 Christian "rock music seminar" about alleged Satanic backwards messages in rock music.  I was familiar with the claims of supposed "backwards masking" where the sounds of ordinary lyrics were interpreted to have different messages when reversed, as well as actual examples of recordings that were put into songs in reverse.  The former seemed to me to be examples of subjective validation, and I tested it myself by closing my eyes and covering my ears when the presenter gave their claims about what we were supposed to hear prior to playing the samples.  Subsequently, this became one of the first tests the Phoenix Skeptics conducted as a student group at Arizona State University in October 1985.  We invited the speaker to give his demonstrations before our group, but required him to play the samples first without explanation and have everyone write down what they heard.  The result was that on the first pass, those unfamiliar with the samples had a wide variety of responses; on a second pass, once the expectation was set, everybody heard what they were supposed to hear.

It's interesting that this demonstration, the key example of which was a sample from Led Zeppelin's "Stairway to Heaven," made a comeback two decades later--being used by skeptics to show the power of suggestion and expectation, as these two videos from Simon Singh and Michael Shermer demonstrate.

Simon Singh, 2006:

Michael Shermer, 2006 TED Talk:

Date:  Wed, 5 Feb 86 15:35 MST
From: "James J. Lippard" 
Subject:  Christian Death/rock seminar
Reply-To:  Lippard@MIT-MULTICS.ARPA

Yes, I've heard of Christian Death, though I haven't heard much by them.  That
reminds me of an article I wrote in October for ASU's "Campus Weekly"
(alternative campus newspaper) about a rock seminar I went to, and here it is.
The article was never printed, as the newspaper folded.  (Note: There was
originally an additional paragraph about a fourth type of backwards
message--the kind that's at the end of the first side of "The Dreaming".)

      Druids were Satanists.
      Van Morrison reads Celtic literature.
      Therefore, Van Morrison's music is evil.

   I had hoped this kind of feeble guilt-by-association reasoning applied to
rock music by religious fanatics had died off.  No such luck.  The above was
typical of the reasoning presented at a seminar on rock music on October 21 by
Christian Life.  Not only is the first premise false, the conclusion is a non

   Things looked promising enough at first.  A quote from the Confucian
philosopher Mencius about how the multitudes "act without clear understanding"
was projected on the large screen in Neeb Hall before the presentation began.
When the show finally started, the speaker gave some facts about the size of
the music industry and its influence on society.

   For a while things were rational.  Since the seminar was focusing on the
seamy side of rock, it seemed reasonable to show slides of Lou Reed shooting
heroin on stage, Sid Vicious, Kiss, and so forth.  Still, the impression was
given that this was representative of the majority of rock music.  Obscure
groups such as Demon, Lucifer's Friend, and the Flesh Eaters say nothing about
rock in general.

   Apparently the writers of the seminar were aware of this, because it then
shifted to analyzing album covers of fairly popular groups.  But this analysis
was taken to a ridiculous extreme, pulling interpretations out of a hat.  If
an album cover had a cross on it, it was automatically blasphemous.  Any other
religious symbols on an album along with a cross were putting down
Christianity by calling it "just another religion."

Other symbols also drew criticism.  From the following Bible verse, Luke
10:18, it was concluded that lightning bolts are a demonic symbol:
  And He  said to them,  "I was watching  Satan fall from  heaven
     like lightning."

   Since all lightning bolts are evil, the lightning bolts in the logos of
Kiss and AC/DC show that they are in league with the devil.  Interestingly, on
the backs of many electrical appliances is a symbol which serves as a warning
of potential shock hazard--a yellow triangle containing a lightning bolt
exactly like the one in AC/DC's logo.  Surely this is a more obvious source
than the Bible for AC/DC's lightning bolt, given the electrical symbolism in
their name and many of their album titles.

   As the Jesuits knew, if you teach a child your ways early, he will likely
follow them for the rest of his life.  But to conclude from this that Led
Zeppelin is trying to influence children because there are children on the
cover of their _Houses of the Holy_ album is absurd.

   In the interest of "fair play", quotes from several artists denying any
involvement with the occult were given.  But these were shrugged off,
including the disclaimer at the beginning of Michael Jackson's _Thriller_
video which says, in part, "this film in no way endorses belief in the
occult." Michael Jackson is a devout Seventh Day Adventist, so I seriously
doubt he had any more intent in promoting the occult through _Thriller_ than
the creators of Caspar the Friendly Ghost.

   Finally, the seminar got to its most entertaining subject: backwards
messages on rock albums.  There are several types of messages commonly
referred to as "backmasking," most of which were covered.  The first is a
message recorded normally, then placed on an album in reverse.  The example
given was from ELO's Face the Music album, which says "The music is
reversible, but time is not.  Turn back, turn back..." There is little doubt
about the content of such messages.

   The second type of backwards message is where words are sung backwards,
phonetically.  On Black Oak Arkansas' live album _Raunch and Roll_, there is
no question about what they are trying to do when the singer shouts "Natas!"
The conference speaker seemed to imply that this message was unintentional,
however, when he gave an example of a song by Christian Death.  The words are
sung backwards (as seen on the lyrics sheet), but pronounced in reverse
letter-by-letter rather than phonetically.  He seemed surprised that this
resulted in nonsense when reversed.

   The third type of backwards message is where a perfectly ordinary record
album is played in reverse to produce gibberish and creative imaginations
supply the translations for supposed messages.  According to the speaker, this
must occur in one of three ways.  Either they are intentional, accidental, or
spiritual.  They can't be intentional, because creating such a message is
unimaginably complex.  They can't be accidental, otherwise we would hear
messages saying such things as "God is love" or "the elephant is on the back
burner" as often as we hear messages about Satan.  Therefore, the messages
must be spiritual (i.e., Satan caused them to occur).

   This completely ignores what has already been well-established as the
source of these messages.  Someone person plays his records backwards,
listening for evil messages, and hears something that sounds like the word
"Satan".  He then tells his friends to listen for the message, and plays it
for them.  Since they have been told what to hear, their mind fills in the
difference between the noises on the album and the alleged message.

   This explanation was mentioned, but was dismissed out of hand because, the
speaker claimed, the backwards messages are as clear as most rock lyrics are
forwards.  He played the first message, in Queen's "Another One Bites the
Dust", without telling the audience what to hear.  I heard no message, but he
told us that we clearly heard "start to smoke marijuana".  When the tape was
played again, I could hear it.

   The rest of the messages of this type played at the seminar were
accompanied by text on the movie screen telling the audience what to listen
for.  I closed my eyes to ignore the hints, and was unable to hear anything
but gibberish.  The same method was used and the same results obtained by
several other audience members I questioned after the presentation.

   In addition, an anti-rock program aired a few years ago on the Trinity
Broadcasting Network stated that there were several messages on Led Zeppelin's
"Stairway to Heaven", including "here's to my sweet Satan" and "there is power
in Satan".  The rock conference, on the other hand, combined these two into
one large message which began "my sweet Satan" and ended "whose power is in
Satan".  Having heard the TBN version first, those were what I heard when they
were played at the conference.  If the words "there is" can be mistaken for
"whose", isn't it possible that the same is true for the rest of these

   Even the transcriber of the backwards messages had problems coming up with
words to fit the message.  The slide for Rush's live version of "Anthem"
played backwards read:
  Oh, Satan, you--you are the one who is shining, walls of Satan,
     walls of (sacrifice?)  I know.

   As any ventriloquist knows, many sounds can be mistaken for many other
sounds.  An m for an n, a t for a d, a c, a z, or a th for an s.  Given that
the most frequent letters in the English language are ETAOINSHRDLU, it is no
surprise that something sounding like "Satan" is quite common.

   With enough effort, evil symbolism and backwards messages can be found
anywhere.  Try visiting a record store and finding satanic symbols on
Christian album covers, or listening to some Christian albums backwards.  I'm
sure much can be found with little difficulty.

   It is true that most rock is not Christian.  It is even true that much of
it conflicts with the Christian faith in some way.  But to bury these points
in a mire of fuzzy logic and fanaticism by engaging in a witch hunt is
counter-productive.  Before the conference, I commented to a friend that if
"Stairway to Heaven" was played backwards, the presenters would have destroyed
any credibility they had.  That, unfortunately, was the case.

    Jim (Lippard at MIT-MULTICS.ARPA)

Additional information: has a good overview with scientific references on the subject.

Sunday, July 03, 2011

TSA security loophole exploited

As this blog has reported on multiple prior occasions (in 2006, 2008, and 2009, at the very least), the fact that U.S. airport security separates the checking of the boarding pass by TSA from the use of a boarding pass to check in to board makes it easy to get through security with a boarding pass that matches your ID while flying under a boarding pass on a ticket purchased in a different name.

Now, as The Economist (July 2, 2011) reports, Olajide Oluwaseun Noibi, a 24-year-old Nigerian American, has been arrested after successfully doing something along these lines to fly around the country, apparently on multiple occasions.  Only Noibi wasn't even using boarding passes valid for the flights he was on--he was caught with a boarding pass in another person's name for a flight from a day prior.  And he wasn't caught because the boarding pass was detected at check-in--he had already successfully boarded the flight and was seated.  He was only caught because of his extreme body odor and a fellow passenger complained, which led to his boarding pass being checked and found to be invalid.

Saturday, July 02, 2011

Cory Maye to be released from prison

As a result of the investigative reporting of Radley Balko, Cory Maye is about to be released from prison after ten years of incarceration and seven years after being sentenced to death on the basis of a terrible defense and kooky testimony from a now discredited and removed medical examiner.  Maye shot and killed a police officer during a no-knock drug raid against a duplex property in which Maye resided, on the basis of a report of unusual traffic at the other unit of the duplex by an unreliable informant.  Maye was defending his daughter from an unknown intruder kicking his door in.

Through the efforts of Balko and a legal team from Covington & Burling, Maye was removed from death row in 2006.

Monday, June 27, 2011

5-4 bad decision against Arizona Clean Elections law

The decision in Arizona Free Enterprise Club's Freedom Club PAC v. Bennett came out today (PDF), a 5-4 decision ruling Arizona's Clean Election laws unconstitutional.  The dissent, it seems to me, has a much better case than the majority:
the program does not discriminate against any candidate or point of view, and it does not restrict any person's ability to speak.  In fact, by providing resources to many candidates, the program creates more speech and thereby broadens public debate. ...
At every turn, the majority tries to convey the impression that Arizona's matching fund statute is of a piece with laws prohibiting electoral speech. The majority invokes the language of "limits," "bar[s]," and "restraints." ... It equates the law to a "restrictio[n] on the amount of money a person or group can spend on political communication during a campaign." ...

There is just one problem. Arizona's matching funds provision does not restrict, but instead subsidizes, speech. The law "impose[s] no ceiling on [speech] and do[es] not prevent anyone from speaking." ... The statute does not tell candidates or their supporters how much money they can spend to convey their message, when they can spend it, or what they can spend it on. ...

In the usual First Amendment subsidy case, a person complains that the government declined to finance his speech, while financing someone else's; we must then decide whether the government differentiated between these speakers on a prohibited basis--because it preferred one speaker's ideas to another's. ... But the speakers bringing this case do not make that claim--because they were never denied a subsidy. ... Petitioners have refused that assistance. So they are making a novel argument: that Arizona violated their First Amendment rights by disbursing funds to other speakers even though they could have received (but chose to spurn) the same financial assistance. Some people might call that chutzpah.

Indeed, what petitioners demand is essentially a right to quash others' speech through the prohibition of a (universally available) subsidy program. Petitioners are able to convey their ideas without public financing--and they would prefer the field to themselves, so that they can speak free from response. To attain that goal, they ask this court to prevent Arizona from funding electoral speech--even though that assistance is offered to every state candidate, on the same (entirely unobjectionable) basis. And this court gladly obliges.
(See my previous argument against the Institute for Justice's position on this, with some subsequent clarifications on other aspects of the law.)

The majority position on this issue is that the unconstitutionality arises from the way that the subsidy to clean elections candidates is tied to campaign spending by the non-clean-elections candidates; I take it that had the subsidy been a fixed amount the argument would not have worked at all.

There's a good overview of the issues at the SCOTUS blog.

Saturday, June 25, 2011

Arizona Department of Public Service's security breach

LulzSec breached the security of the Arizona Department of Public Service (DPS) at some point in the past, and on June 23 around 4 p.m. Arizona time, posted some or all of what they had acquired.  This included the names, email addresses, and passwords of several DPS officers as well as a number of internal documents which appeared to have been obtained from email attachments or perhaps from the compromise of end user systems.  The documents included a PowerPoint presentation on gang tattoos that purported to be a way of identifying Islamic radicals, which was reminiscent of similar ludicrous law enforcement presentations from the 1980s about identifying Satanic cult members by their black clothing and occult symbols. (Some police departments still promote such nonsense, citing exposed fraud "Lauren Stratford" as a source).  The documents also included a bulletin which expresses concern about the "Cop Recorder" iPhone application.

On June 24, DPS posted a press release responding to the attacks, accusing LulSec of being a "cyber terrorist group"--a term better reserved for the use of criminally disruptive activities intended to cause physical harm or disruption of critical infrastructure, not embarrassing organizations that haven't properly secured themselves.  In the press release, DPS enumerates the steps they've taken to secure themselves and the safeguards they've put in place. It's an embarrassing list which suggests they've had poor information security and continue to have poor information security.

First, their press release has a paragraph suggesting that the damage is limited, before they're probably had time to really determine that's the case.  They write:

There is no evidence the attack has breached the servers or computer systems of DPS, nor the larger state network. Likewise, there is no evidence that DPS records related to ongoing investigations or other sensitive matters have been compromised.

Just because they have "no evidence" of something doesn't mean it didn't happen--what records did they review to make this determination?  Were they doing appropriate logging?  Have logs been preserved, or were they deleted in the breach?  Do they have centralized logging that is still secure?  When did the compromise take place, and when did DPS detect it?  The appearance is that they didn't detect the breach until it was exposed by the perpetrators.  What was the nature of the vulnerability exploited, and why wasn't it detected by DPS in a penetration test or vulnerability assessment?  LulzSec has complained about the number of SQL injection vulnerabilities they've found--was there one in DPS's web mail application?

Next, they report what they've done in response, and again make statements about how "limited" the breach was:

Upon learning that a limited number of agency e-mails had been disclosed, DPS took action. In addition to contacting other law enforcement agencies, the Arizona Counter Terrorism Information Center (ACTIC) has been activated. Remote e-mail access for DPS employees remains frozen for the time-being. The security of the seven DPS officers in question remains the agency’s top priority and, since a limited amount of personal information was publicly disclosed as part of this breach. Steps are being taken to ensure the officers’ safety and that of their families. 

They've disabled the e-mail access that they believe was used in the breach--that's good.  Presumably the exposed officer passwords were discovered to be from this system.  Perhaps they will not re-enable the system until they have a more secure mechanism that requires VPN access and two-factor authentication--or at least intrusion prevention, a web application firewall, and effective security monitoring.  They've notified ACTIC--presumably in part because of their overblown claim that this breach constitutes "terrorism" and in part because there are some ACTIC personnel who have good knowledge of information security.  And they're doing something to protect the safety of officers whose personal information (including some home addresses) was exposed.

In the final paragraph of the press release, they list some of the safeguards they have in place:

- 24/7 monitoring of the state’s Internet gateway.
- Industry-standard firewalls, anti-virus software and other capabilities.
- IT security staff employed at each major state agency.
- Close coordination between the State of Arizona and state, federal and private-sector authorities regarding cyber-security issues.

This sounds like a less-than-minimal set of security controls.  Is that 24/7 monitoring just network monitoring for availability, or does it include security monitoring?  Do they have intrusion detection and prevention systems in place?  Do they have web application firewalls in front of web servers?  Do they have centralized logging and are those logs being monitored?  Are they doing event correlation?  How many full-time information security staff are there at DPS?  Are there any security incident response staff? Is there a CISO, and if so, why isn't that person being heard from?  Does DPS have an incident response plan?  Are they reviewing policy, process, and control gaps as part of their investigation of this incident?  Have they had any third-party assessments of their information security?  Have any past assessments, internal or external, recommended improvements that were not made?

These are questions journalists should be asking, which DPS should certainly be asking itself internally, and which organizations that haven't had a publicized breach yet should be asking themselves.  Breaches are becoming inevitable (a recent Ponemon Institute survey says 90% of surveyed businesses have had a security breach in the last 12 months; CNet charts the recent major publicly known breaches), so having in place the capacities to respond and recover quickly is key.

Here's how NOT to prepare:
Depth Security, "How to Get Properly Owned"

Here's how NOT to respond to a breach or vulnerability disclosure:
SANS ISC, "How Not to Respond to a Security Incident"

How to publicly disclose a breach:
Technologizer, "How to Tell Me You Let Somebody Steal My Personal Information"

Friday, June 24, 2011

Help Talk Origins bid for "Expelled"?

The assets of Premise Media, including rights to "Expelled," are going up for auction.  The Talk Origins Foundation plans to bid for the film, which includes production materials.  Their stated plan seems to be just to determine what interesting information might be in the production materials or raw footage and make that known, not, as I've suggested, make an "MST3K"-style version, or a version that points out and corrects the errors.

UPDATE (June 28, 2011): The winning bid for "Expelled" was $201,000.  My guess is that the film would only be worth that much to somebody who plans to promote it as-is without any significant re-editing, and thinks they can extract at least that much value out of it--perhaps via charitable deduction by giving it to a creationist organization.  There was a bidding war at the end between two bidders that drove the price up this morning from $43,000 (last night's high bid) to $201,000, which caused the bid to be extended 10 minutes beyond it's scheduled end time in one or two minute extension increments.  It was at $122,000 at the original auction end time, so that last $79,000 increase occurred in the last 10 minutes.

Monday, June 06, 2011

Expelled up for auction

Premise Media Holdings LP is in bankruptcy, and its assets are going up for auction online between June 23 and 28.  Those assets include the film "Expelled."  Perhaps a few of us should get together and buy it, and reissue it in a "Mystery Science Theatre 3000" format?

UPDATE:  As Damian Howard and Bob Vogel pointed out on Facebook, this adds financial bankruptcy to the moral and intellectual bankruptcy of the film.

Sunday, May 15, 2011

Challenge for Harold Camping followers

On May 22, 2011, we will either see that many Christians have disappeared and we've been left behind, or that the claims of billboards like this are completely false.  If any individual or group of Camping followers have a strong belief that the former is the case, I challenge you to sign an agreement to transfer to me $100,000, effective May 22, 2011, in return for one of two things.  In the case that you have, in fact, been raptured, I promise to use those funds to evangelize in support of your beliefs to try to save as many of those left behind as possible.  In the far more likely case that you remain behind, I promise not to engage in public ridicule and humiliation of your nonsense for a year.  So it's a win-win.  Any takers?

UPDATE (May 20, 2011):  Via Tom McIver:  "Camping has a very idiosyncratic scheme: basically amillennial, and a hybrid of his own Bible numerology and a variant of the World Week (world lasts 6,000 yrs after Creation) framework. Camping puts Creation at 11,013 BC, Flood at 6,000 + 23 yrs later at 4,990 BC, Christ's birth 7 BC, and end of Church Age / beginning of Tribulation 13,000 yrs after Creation. 7,000 yrs after Flood (13,000 + 23 yrs after Creation) is 2011. 1988--13,000 yrs after Creation--was beginning of Tribulation (and also the year Camping left the established church, deciding it was heretical and that all churches had been taken over by Antichrist). 2011 is 23 yrs after 1988 (previously, Camping had predicted a shorter Tribulation ending in 1994). May 21 is Rapture and Judgment Day, world is destroyed Oct 21." And: "Camping also made much of 1948 (founding of Israel), with next Jubilee supposedly 1994. He has much more numerology as well. Interestingly, he doesn't focus on political leaders or natural disasters (although I think the news reports of catastrophes and wars has increased his following)."

Saturday, May 14, 2011

My lousy Android experience

I've been a holdout on upgrading to a smart phone, in part because I haven't paid over $100 for a mobile phone since they were the size of a brick.  But after finding that I could get a Droid 2 Global on Verizon for $20 via Amazon Wireless a couple of months ago, I made the leap.

My initial experience was negative--Amazon sent me a phone with instructions to go to Verizon's web site to activate.  Verizon's website wanted me to enter a code from a Verizon invoice.  No such invoice was included, and none of the numbers from the Amazon invoice worked.  So I had to talk get through to a human being, at which point activation was fairly simple.  But one more hurdle arose when I had to login to a Google account, which was an obstacle of my own creation--I use very long randomly generated passwords with special characters, and have independent Google accounts for different services, so I had to choose which one to use with the phone before I knew what all the implications would be.  (I chose my GMail account, which has worked out OK.)

I wanted to set the phone up to use my own email servers, and to connect over VPN to gain access.  This proved to be an obstacle that took a few days to resolve, due to inadequacies and bugs in Droid applications.  The default VPN client doesn't support OpenVPN, so I had to gain root access to install an OpenVPN client.  This turned out to be the only reason I needed root access on the phone, and I managed to get that working without much difficulty.

The Email application, however, refused to send outbound mail through my mail server, which allows outbound port 25 client connections from internal hosts with no authentication but requiring TLS.  This combination simply doesn't work--I ended up setting up port 587 (submission port) with username/password authentication via Dovecot.  Though I would have preferred using client certificate authentication, I couldn't get it to work.  I still run into periodic problems with Email refusing to send outbound messages for no apparent reason--and the server shows no attempts being made.  There doesn't seem to be a way to select an individual message in the outbox for an attempt to re-send.

I managed to get contact and calendar synchronization working with my Mac, but I ended up exporting my iCal calendars to Google Calendar and using them as my primary calendars.  Most of the correlation of contacts in the phone from multiple sources (e.g., Facebook, LinkedIn, and my Address Book) worked fairly well, but some contacts are duplicated due to name variations.  Synchronization with LinkedIn is somewhat buggy, with first and last names showing up in contacts as "null null."  The Calendar app is even more buggy--I've created events on the phone that disappear, I've seen error messages in Portuguese and events with names that appear to be leftover debugging messages. I was also surprised to see that spelling correction was performed, without any prompts, on events I imported into the Calendar app from GMail (it incorrectly turned an acronym, "JAD," into the word "HAD").

I've received an SMS text message from one person which was identified as being from another person--looking at the specific contact information showed that the telephone number of the sender was associated with the correct contact, yet the name and photo displayed on the phone was of a different contact that had no association with that telephone number.

The phone's camera capability is pretty good, but when I connect the phone to my Mac, it launches iPhoto but doesn't find any photographs.  I have to import them manually by pointing iPhoto to the correct location on the SD card.

I've seen the phone crash repeatedly, especially when using location services (Google Navigation, Maps, and Yelp have been repeat offenders).  There also seems to be some caching of location information that gets out of sync with other location information.  For example, I saw Yelp correctly show me nearby restaurants, but refuse to allow me to check in to the one I was sitting in because I was "too far away"--and Maps showed my location being somewhere else I had been earlier.  In one case, thousands of miles away--an attempted Yelp check-in after returning from a vacation in Hawaii showed my location on the map as still being in Hawaii.  In at least one case, I was unable to get my location to update for Yelp until I rebooted the phone.

I've had issues doing things as simple as copying and pasting a URL from Firefox to Facebook or Twitter.  I copy the URL, verify that it's in the clipboard correctly, but when I go into Facebook or Twitter to paste it, it is truncated.

The number of bugs I run into seems awfully high for very basic applications.  The problem is no doubt in part due to the way development occurs between Google, Motorola, and Verizon, and Linux development, which also seems to be an obstacle to fixing security vulnerabilities.  The May 2011 issue of CSO magazine reports that Coverity has done two scans of Android source code for the HTC Incredible, finding 359 defects (88 critical) on the first scan last November and 149 defects (106 unfixed from the previous scan) on a more recent scan.  Accountability for the code is distributed across the aforementioned groups.  (Also see this CNet story, or the Coverity report itself.)

I wonder if I would run into problems like this with an iPhone.

UPDATE (May 19, 2011): And now there's a security vulnerability identified in version 2.3.3 of Android and earlier (I'm on 2.2, and can't update until Verizon pushes an update), which potentially exposes contacts, calendar events, pictures, and other items stored in Google-hosted services, if users access those services via unencrypted WiFi.  Although the connections to those services are over SSL-encrypted HTTP, there is a returned authToken that can be intercepted and used for subsequent logins to those services.  I've never used my Droid on unencrypted WiFi networks, but I'll now take extra care to make sure that I don't.  Version 2.3.4 fixes the problem for contacts and calendars but not for Picasa photos.

UPDATE (November 16, 2011): It's still been a horrible experience, and I still see regular crashes, particularly when using map and location-related applications.  A new discovery today while traveling is that the World Clock widget does not know when Daylight Saving Time occurs--the option labeled "Daylight Savings[sic] Time: Adjust displayed time for Daylight Savings" appears to just set the clock forward one hour, not display the correct current time taking into account the date and whether Daylight Saving Time is in effect in the given location.  I traveled to the east coast and saw that my World Clock widget time for New York was one hour ahead of the actual time in New York.  It's utterly ridiculous that this widget requires the user to check and uncheck this option manually when Daylight Saving Time is in effect or not--that's exactly sort of simple task that computers are equipped to do on our behalf.

Sunday, May 08, 2011

Chris Rodda's Liars for Jesus available free online

After witnessing the despicable pseudo-historian David Barton on "The Daily Show," inadequately rebutted by Jon Stewart, author Chris Rodda decided to take action.  She's giving away her book, Liars for Jesus, which carefully documents the historical revisionism of Barton and others, online as a PDF.

You can download Rodda's book here.  You can also purchase a paper or Kindle copy of the book from

Rodda depends on income from her book, but felt it was important enough to give it away.  I suspect she'll see an increase in sales along with the free distribution.

Rodda's book seems to be selling well:



Friday, April 29, 2011

Salt therapy: Where's the evidence?

Today there was a Groupon offer for salt therapy from the "Salt Chalet Arizona."  Sufferers of respiratory illnesses are offered the chance to sit in a room containing salt for claimed relief of symptoms.  I posted the following at the Salt Chalet Arizona's blog, which is awaiting moderation:
“Although there have been few clinical studies” — are there any that provide any empirical support for the claims made on this site? It seems to me that solid empirical support for safety and efficacy are absolutely essential requirements for any medical claim. What is the mechanism of relief, is that relief more than would be expected from a placebo effect, does it last, and are there any harmful short or long term consequences?
To its credit, the blog's repost of a newspaper article about a similar service offered via a Pakistani salt mine includes the following skeptical passage:
But Shahid Abbas, a doctor who runs the private Allergy and Asthma Centre in Islamabad, said that although an asthma or allergy sufferer may get temporary relief, there is no quick-fix cure.

“There is no scientific proof that a person can permanently get rid of asthma by breathing in a salt mine or in a particular environment,” he said.

Wednesday, March 30, 2011

Information security threat models, folk & expert

I've written a pair of blog posts for Global Crossing's "Defense in Depth Security" blog based on recent work by Rick Wash and by multiple people at Intel including Timothy Casey about modeling the agents behind information security threats. The first post is about non-expert home computer users' "folk models" of the threats from viruses and hackers,which makes the point that seemingly irrational decisions about security may in fact be completely rational based on their conceptual understanding of the threat they believe they are combatting.  Only by changing their understanding of the threat, which requires not just information but appropriately salient information and the right incentives, are we likely to see changes in user behavior.  I point out an example of a recent news story that might help provide both elements with regard to one type of vulnerability, open wireless access points.

The second blog post, which will appear tomorrow, is about expert models of threat agents--the Intel Threat Agent Library.  Intel created a large set of attacker personas and identified their attributes, for use in matching against vulnerabilities and prioritizing controls as part of a broader risk assessment process.

I'm happy to discuss these further either here or at the Global Crossing blogs.

Saturday, January 08, 2011

Rep. Gabrielle Giffords shot at Tucson grocery store event

Rep. Gabrielle Giffords (D-AZ CD8) was shot this morning at an event at a Tucson grocery store, along with several other people.  The Tucson Citizen reports that she was "shot point blank in the head."  This brings to mind a previous gun incident at another Tucson event at a grocery store in August 2009.

The image below is from Sarah Palin's website, "Take Back the 20."  The lower right target sight image on Arizona is Congressional District 8, which was one of the "targets" for candidates who supported the Health Care Reform bill to be defeated.

UPDATE: CNN reports that an employee of a nearby business reported "15 to 20 gunshots" and 12 victims.

UPDATE: The Arizona Republic reports that at least four of the victims are dead.

UPDATE: NPR reports that Rep. Giffords is one of the dead and that the killer, a male in his teens or twenties, was apprehended at the scene.  The death toll is up to seven.

UPDATE: KOLD News-13 in Tucson says Giffords is not dead but is in surgery at University Medical Center.

UPDATE: Another version of Palin's "target map" explicitly called out Giffords as a target:

UPDATE (1 p.m. Arizona time): The Palin gunsight map has been removed.

UPDATE: In an MSNBC interview after her office was vandalized after her vote for Health Care Reform, Rep. Giffords said:
We need to realize that the rhetoric, and the firing people up and … for example, we’re on Sarah Palin’s ‘targeted’ list, but the thing is, the way she has it depicted, we’re in the crosshairs of a gun sight over our district. When people do that, they’ve gotta realize that there are consequences to that action.

UPDATE (1:29 p.m.): Talking Points Memo reports that a federal judge was also one of the shooting victims. There will be a UMC press briefing at 1:30 p.m.

UPDATE: NBC reports that the federal judge is one of the dead.  That judge, John Roll, was chief judge  of the U.S. District Court for Arizona and received death threats last year over an immigration case.

Sarah Palin has deleted her tweet from March, below:

UPDATE: Correction, the tweet above has NOT been deleted from Sarah Palin's tweetstream.

UPDATE (1:54 p.m.): The shooter suspect in custody is named Jared Loughner. The Pima County Sheriff's Office reports 6 dead, 18 wounded.

UPDATE: A YouTube video from Jared Lee Loughner.  He was a student at Pima Community College and apparently a disturbed individual.  Here's an apparent sample of his writing:

Hello, and welcome my classified leak of information that's of the United States Military to the student body and you. Firstly, I want you to understand this from the start. Did you know grammar is double blind, listener? Secondly, if you want to understand the start of revelatory thoughts then listen to this video. I'll look at you mother fuckin Anarchists who have a problem with them illegal illiterate pigs. :-D If you're a citizen in the United States as of now, then your constitution is the United States. You're a citizen in the United States as of now. Thus, your constitution is the United States. Laugh. I'll let you in on their little cruel joke that's genocidal. They're argument is appeal to force on their jurisdiction with lack of proof of evidence. Each subject is in question for the location! The police don't quite get paid correctly with them dirty front runners under section 10? Their country's alliances are able to make illegal trades under section 10. Eh! I'm a Nihilist, not someone who put who put trust in god! What is section 10 you ask? If you make a purchase then it's illegal under section 10 and amendment 1 of the United States constitution. You make a purchase. Therefore, it's illegal under section 10 and amendment 1 of the United States constitution. We need a drum roll for those front runners in the election; those illegal teachers, pigs, and politicians of yours are under illegal authority of their constitution. Those dirty pigs think they know the damn year. Thirdly, tell them mother fuckers to count from 0 to whenever they feel a threat to stop their count. We can all hope they add new numbers and letters to their count down. Did you run out of breath around the trillions, listener? Well, B.C.E is yet to start for Ad to begin! What does this mean for a citizen in any country? Those illegal military personal are able to sign into a country that they can't find with an impossible date! How did you trust your child with them fraud teachers and front runners, listener? Did you now know that the teachers, pigs, and front runners are treasonous! You shouldn't jump to conclusion with your education plan. The constitution as of now, which is in use by the current power pigs, aren't able to protect the bill of rights! Do you now have enough information to know the two wars are illegal! What is your date of time, listener? Fourthly, those applications that are with background checks break the United States constitution! What's your riot name? I'll catch you! Top secret: Why don't people control the money system? Their Current Currency(1/1) / Your new infinite currency (1/~infinte) This is a selcte information of revoluntary thoughts! Section 10 - Powers prohibited of States No State shall enter into any Treaty, Alliance, or Confederation; grant Letters of Marque and Reprisal; coin Money; emit Bills of Credit; make any Thing but gold and silver Coin a Tender in Payment of Debts; pass any Bill of Attainder, ex post facto Law, or Law impairing the Obligation of Contracts, or grant any Title of Nobility. No State shall, without the Consent of the Congress, lay any Imposts or Duties on Imports or Exports, except what may be absolutely necessary for executing it's inspection Laws: and the net Produce of all Duties and Imposts, laid by any State on Imports or Exports, shall be for the Use of the Treasury of the United States; and all such Laws shall be subject to the Revision and Controul of the Congress. No State shall, without the Consent of Congress, lay any duty of Tonnage, keep Troops, or Ships of War in time of Peace, enter into any Agreement or Compact with another State, or with a foreign Power, or engage in War, unless actually invaded, or in such imminent Danger as will not admit of delay. Each subject is unlocatible!

UPDATE: Another video shows someone, apparently Loughner, burning a U.S. flag.  His YouTube profile says:

Name: Jared Lee Loughner
Channel Views: 271
Joined: October 25, 2010
Hometown: Tucson
Country: United States
Schools: I attended school: Thornydale elementary,Tortolita Middle School, Mountain View Highschool, Northwest Aztec Middle College, and Pima Community College.Interests: My favorite interest was reading, and I studied grammar. Conscience dreams were a great study in college!
Movies: (*My idiom: I could coin the moment!*)
Music: Pass me the strings!
I had favorite books: Animal Farm, Brave New World, The Wizard Of OZ, Aesop Fables, The Odyssey, Alice Adventures Into Wonderland, Fahrenheit 451, Peter Pan, To Kill A Mockingbird, We The Living, Phantom Toll Booth, One Flew Over The Cuckoo's Nest, Pulp,Through The Looking Glass, The Communist Manifesto, Siddhartha, The Old Man And The Sea, Gulliver's Travels, Mein Kampf, The Republic, and Meno.

UPDATE: Someone who knew him in 2007 says his politics then were left-wing.  Looks like a flag-burning nihilist kook, perhaps schizophrenic.

UPDATE: The Arizona Daily Star has fairly detailed background on Loughner, who would interrupt his pre-algebra class with "nonsensical outbursts" and was barred from class.

UPDATE: A New York Times profile of Rep. Gabrielle Giffords, titled "A Passionate Politician with a Long List of Friends."

UPDATE (January 9): The federal complaint against Loughner.  Loughner was good enough to leave clear evidence of premeditation at his home.

UPDATE: A "second suspect" turned out to be the cab driver who drove Loughner to the Safeway, who came inside as Loughner had to get change to pay him.  He has been cleared as to any involvement in the shooting.

UPDATE (January 10): The Daily Beast points out, via the Southern Poverty Law Center, that Loughner's rants closely resemble the writings of Milwaukee-based David Wynn Miller, in talk about grammar and mind control--which brings us back to right-wing nutcases.

UPDATE (January 11): CNN is still saying it can find no link between Loughner and any groups, while Boingboing has posted further comparison to the insanity of David Wynn Miller.  It's amazing that this guy has people buying into his nonsense and trying to use it in court (always unsuccessfully, of course).

UPDATE: The DC points out that Loughner was a commenter at the UFO/conspiracy website AboveTopSecret--where his fellow commenters found him difficult to understand, considered him to be crazy, and asked him to get help before he hurt himself or someone else.  Despite mental health programs in Arizona that allowed anyone in contact with him to report him, and Pima Community College's recognition that he had mental problems, no one reported him to the state for evaluation.

Thursday, January 06, 2011

Global Crossing blogging

I've joined the team of Global Crossing bloggers--please check out my initial post at Global Crossing blogs, "Forget passwords!"

(BTW, my friend and colleague Glen Walker independently wrote a blog post making a very similar recommendation.)