Showing posts with label law. Show all posts
Showing posts with label law. Show all posts

Wednesday, January 01, 2020

Books read in 2019

Not much blogging going on here still, but here's my annual list of books read for 2019.
  • Graham T. Allison, Destined for War: Can America and China Escape Thucydides's Trap?
  • Ross Anderson, Security Engineering (3rd edition, draft chapters)
  • Herbert Asbury, The Barbary Coast: An Informal History of the San Francisco Underworld
  • Heidi Blake, From Russia with Blood: The Kremlin's Ruthless Assassination Program and Vladimir Putin's Secret War on the West
  • Rutger Bregman, Utopia for Realists: How We Can Build the Ideal World
  • Oliver Bullough, Moneyland: The Inside Story of the Crooks and Kleptocrats Who Rule the World
  • Bryan Caplan and Zach Weinersmith, Open Borders: The Science and Ethics of Immigration
  • C.J. Chivers, The Fighters: Americans in Combat
  • Sefton Delmer, Black Boomerang
  • Nina J. Easton, Gang of Five: Leaders at the Center of the Conservative Crusade (bio of Bill Kristol, Ralph Reed, Clint Bolick, Grover Norquist, and David McIntosh)
  • Ronan Farrow, Catch and Kill: Lies, Spies, and a Conspiracy to Protect Predators
  • Ronan Farrow, War on Peace: The End of Diplomacy and the Decline of American Influence
  • Ian Frisch, Magic is Dead: My Journey into the World's Most Secretive Society of Magicians
  • Anand Giridharadas, Winners Take All: The Elite Charade of Changing the World
  • Reba Wells Grandrud, Sunnyslope (Images of America series)
  • Andy Greenberg, Sandworm: A New Era of Cyberwar and the Hunt for the Kremlin's Most Dangerous Hackers
  • Jodi Kantor and Megan Twohey, She Said: Breaking the Sexual Harassment Story That Helped Ignite a Movement
  • Stephen Kinzer, Overthrow: America's Century of Regime Change From Hawaii to Iraq
  • Michael Lewis, Flash Boys: A Wall Street Revolt
  • Jonathan Lusthaus, Industry of Anonymity: Inside the Business of Cybercrime
  • Ben MacIntyre, A Spy Among Friends: Kim Philby and the Great Betrayal
  • Joseph Menn, Cult of the Dead Cow: How the Original Hacking Supergroup Might Just Save the World
  • Anna Merlan, Republic of Lies: American Conspiracy Theorists and Their Surprising Rise to Power
  • Jefferson Morley, Our Man in Mexico: Winston Scott and the Hidden History of the CIA
  • Sarah T. Roberts, Behind the Screen: Content Moderation in the Shadows of Social Media
  • Hans Rosling, with Ola Rosling and Anna Rosling Rönnlund, Factfulness: Ten Reasons We're Wrong About the World--and Why Things Are Better Than You Think
  • Russell Shorto, Amsterdam: A History of the World's Most Liberal City
  • Alexander Stille, The Sack of Rome: Media + Money + Celebrity = Power = Silvio Berlusconi
  • Jamie Susskind, Future Politics: Living Together in a World Transformed by Tech
  • Erik Van De Sandt, Deviant Security: The Technical Computer Security Practices of Cyber Criminals (Ph.D. thesis)
  • Tom Wolfe, The Right Stuff
  • Tim Wu, The Attention Merchants: The Epic Scramble to Get Inside Our Heads
Top for 2019: Bullough, Farrow (Catch and Kill), Wu, Chivers, Rosling, Greenberg, Blake, Allison, Caplan and Weinersmith, Kinzer, Delmer.

I started the following books I expect to finish in early 2020:

Myke Cole, Legion versus Phalanx: The Epic Struggle for Infantry Supremacy in the Ancient World
Walter LaFeber, Inevitable Revolutions: The United States in Central America (2nd edition)
Brad Smith and Carol Anne Browne, Tools and Weapons: The Promise and Peril of the Digital Age
Peter H. Wilson, The Holy Roman Empire: A Thousand Years of Europe's History

Two books I preordered and look forward to reading in 2020:

Anna Wiener, Uncanny Valley: A Memoir (due out January 14)
Thomas Rid, Active Measures: The Secret History of Disinformation and Political Warfare (due out April 21)

(Previously: 20182017201620152014201320122011201020092008200720062005.)

Sunday, March 12, 2017

Rep. Tom Graves' Active Cyber Defense Certainty Act

Rep. Tom Graves (R-GA14) has circulated a draft bill, the "Active Cyber Defense Certainty Act" (or ACDC Act), which amends the Computer Fraud and Abuse Act (18 USC 1030) to legalize certain forms of "hacking back" for the purposes of collecting information about an attacker in order to facilitate criminal prosecution or other countermeasures.

The bill as it currently stands is not a good bill, for the following reasons:

1. It ignores the recommendations in a recent report, "Into the Gray Zone: Active Defense by the Private Sector Against Cyber Threats," from the Center for Cyber & Homeland Security at the George Washington University. This report distinguishes between low-risk active defense activities within the boundaries of the defender's own network, such as the use of deceptive technology (honeypots, honeynets, tarpitting), the use of beaconing technology to provide notifications in case of intrusions, and research in deep and dark web underground sites, on the one hand, and higher-risk active defense activities such as botnet takedowns, sanctions and indictments, white-hat ransomware, and rescue missions to recover stolen assets, on the other. One of the report's key questions for an active defense measure is "is the active defense measure authorized, whether by an oversight body, law enforcement, or the owner of the affected network?"  This bill creates no mechanism for providing particular authorizations (also see points 2 and 3, below).

The "Into the Gray Zone" report also suggests that if a decision is made to authorize the accessing of a remote system (an attacker's system is almost always the system of another victim) for information collection purposes, it should be limited to cases in which a defender can "assert a positive identification of the hostile actor with near certainty, relying on multiple credible attribution methods." This, however, seems too strict a condition to impose.

Finally, however, this report advises that, even without a change in the law, DOJ "should exercise greater discretion in choosing when to enforce the CFAA and other relevant laws, and should provide clarity about how it intends to exercise such discretion. Companies engaging in activities that may push the limits of the law, but are intended to defend corporate data or end a malicious attack against a private server should not be prioritized for investigation or prosecution." (p. 28) The report cites active defense activity by Google in response to hacking from China as an example where there was no prosecution or sanction for accessing remote systems being used by attackers. This proposal seems to me a wiser course of action than adopting this bill. (Also see point 5, below.)

2. It disregards the recommendations from the Center for Strategic and International Studies Cyber Policy Task Force on the subject of active defense. The CSIS Cyber Policy Task Force report contains a short three-paragraph section on active defense (p. 14) which throws cold water on the idea, calling active defense "at best a stopgap measure, intended to address companies’ frustration over the seeming impunity of transborder criminals" and affirming that only governments should be authorized to engage in activities on the high-risk side, and that it is their responsibility to coordinate and engage in such activity. It does offer up a possibility for a proposal that allows accessing remote systems by private parties in its last sentence: "Additionally, the administration could consider measures, carried out with the prior approval of federal law enforcement agencies (most likely requiring a warrant to enter a third-party network) to recover or delete stolen data stored on servers or networks under U.S. jurisdiction." This bill does not require approval from federal law enforcement agencies or a warrant for accessing remote systems or networks, and jurisdiction is only implicit.

3. While the proposal in the bill resembles a proposal made in a Mercatus Center at George Mason University proposal by Anthony Glosson, it adopts the carrot element of the proposal while neglecting the stick. Glosson's proposal is that, like this bill, private parties should be permitted to access remote attacking systems in order to collect information ("observation and access"), but not to engage in "disruption and destruction." However, Glosson suggests three requirements be present to make such access and information collection permissible, and if those requirements are not present, that there be "stiff statutory damages" imposed. The bill omits any statutory damages, and imposes only one of Glosson's three requirements (though a previous version of the bill included the second). Glosson's three requirements are (1) that the defender's actions are limited to observation and access, (2) that the attacker was routing traffic through the defender's network at the time of the active defense action, and (3) that obtaining the owner of the attacking system's cooperation at the time of the attack was impractical.  This third criterion is a critical one, and a good way to observe the undesirability of this bill is to imagine that you are the owner of the intermediary system used by the attacker to go after a third party--what would you want that third party to be able to do with your system without your permission or consent?

4. The bill appears to have been somewhat hastily written and sloppily updated, failing to update a persistent typographical error ("the victim' [sic] own network") through its revisions, and the current version seems to be somewhat incoherent. In its current form it is unlikely to meet its short title objective of encouraging certainty.

The current version of the bill makes it legal for a victim of a "persistent unauthorized intrusion" to access "without authorization the computer of the attacker to the victim' [sic] own network to gather information in order to establish attribution of criminal activity to share with law enforcement or to disrupt continued unauthorized activity against the victim's own network," so long as this does not destroy information on the system, cause physical injury, or create a threat to public health or safety.

The phrase "without authorization the computer of the attacker to the victim's own network" doesn't make sense [it should say "attacker of" or "attacker against"], and appears to be the result of poor editing from the prior version of the bill, which made permissible accessing "without authorization a computer connected to the victim' [sic] own network", with the rest of the text remaining the same. This prior wording apparently attempted to thread the needle of the GWU "Into the Gray Zone" report by defining the accessing of a remote system as being within the boundaries of the defender's own network, and thus on the low-risk side of the equation. However, the wording "connected to the victim's own network" is ambiguous and unclear--does it mean directly connected (e.g., to a WiFi access point or LAN port on a switch), in which case this is much less useful, or does it mean any active session flow of packets over the Internet into the victim's network (similar to Glosson's second requirement)? The latter is the more reasonable and charitable interpretation, but it should be made more explicit and could perhaps be too strict--what happens if the attacker disconnects just moments before the active defense activity begins?

Left unsaid in the bill is what can be done with information collected from the attacking system, which might include information belonging to other victims, the exposure of which could cause harm. Presumably other remedies from other statutes would exist if a defender engaged in such exposure, but it seems to me that this bill would be improved by making the parameters of permissible action more explicit and restrictive. Perhaps the current wording limits actions to information sharing with law enforcement and reconfiguration of one's own defensive systems based on the collected information, but "to disrupt continued unauthorized activity against the victim's own network" is a purpose that could be achieved by a much broader set of actions, which could cause harm to other victims.

5. It's not clear that the bill is necessary, given that security researchers are today (as they have been for years) taking steps to access infrastructure used by malicious cyber threat actors in order to monitor their activity and collect intelligence information. They are already making legal and regulatory risk decisions which incorporate the existing CFAA, and deciding to proceed anyway.

If this bill is to move forward, it needs some additional work.

(News story on the bill: Michael Mimoso, "Active Defense Bill Raises Concerns of Potential Consequences," ThreatPost.
Further reading: Paul Rosenzweig, "A Typology for Evaluating Active Cyber Defenses," Lawfare blog)

UPDATE (March 14, 2017): Robert Chesney wrote a good critique of the bill at the Lawfare blog, "Legislative Hackback: Notes on the Active Cyber Defense Certainty Act discussion draft," in which he points out that the word "persistent" is undefined and vague, notes that "intrusion" excludes distributed denial of service attacks from permissible cases of response under this bill, and wisely notes that there may be multiple computers in an attack chain used by the attacker, while the bill is written as though there is only one.  (It is also noteworthy that an attacking IP could be a firewall in front of an attacking machine, and a response attempting to connect to that IP could be redirected to a completely different system.)  Chesney also questions whether destroying information is the right limit on responsive activity, as opposed to altering information (such as system configurations). He also notes that the restrictions for destruction, physical injury, and threats to public health and safety are probably insufficient, noting as I did above that there could be other forms of harm from disseminating confidential information discovered on the attacking system.

I think a more interesting bill that would create incentives for companies to invest in security and to appropriately share information about attacks (rather than trying to hide it) would be a bill that created a safe harbor or liability limits for a company whose systems are used to attack third parties, if they have taken certain precautionary measures (such as having patched all known vulnerabilities more than 30 days old, and having a continuous monitoring program) and if they also share in a timely manner information about their breach.

UPDATE (May 25, 2017): Rep. Graves has released a version 2.0 of his bill which is vastly improved, addressing almost all of my concerns above. The new Sec. 2 of the bill puts the use beaconing technology on a sound legal footing, which is consistent with the recommendations of the CSIS "Into the Gray Zone" report. The new Sec. 4 of the bill requires notification of the FBI, which, while it isn't the notification of/deferral to organizations which have their own cyber defense teams to protect and investigate their own compromised infrastructure, it might effectively serve the same purpose, and it also provides a deterrent to irresponsible active defense.  The core of the former bill, Sec. 3, has been revised to limit what can be done, so that now taking or exposing content on the attacker machine belonging to other parties would not be permissible. And there is also a new Sec. 5 of the bill, which sunsets it after two years. I cautiously support the new bill as a potentially useful experiment.

UPDATE (October 14, 2017): A new version of the bill was released this week which has further improvements. Instead of just creating an exemption to the CFAA, it creates a defense to a criminal charge, and makes clear that it is not a defense for civil liability. This means if you are within the bounds of the new rules accessing the systems of a third party which is another victim of the attacker, you won't go to jail for it, but you could still be successfully sued for damages by that third party. The new version of the bill also lists a few more things which you are NOT permitted to do in order to use the defense, and it requires that the FBI create a program for receiving advance notices from individuals and organizations that intend to use these measures, as well as a requirement for an annual assessment of this legislation's effectiveness.

UPDATE (February 2, 2018): There are still a few issues with the current version of the Graves bill. (1) It doesn't require defenders to document and disclose actions taken against systems not owned by the attacker to the owners of those systems. (2) It places no limits on what vulnerabilities may be exploited on intermediary or attacker systems. (3) It allows destructive actions against information which belongs to the defender, as well as against any information or system which belongs to the attacker. (4) It does not limit the targets to systems within U.S. jurisdiction, or does it require any judicial approval. Attacks on systems outside U.S. jurisdiction could result in state-sponsored blowback. (5) The exception to permitted activity for any action which "intentionally results in intrusive or remote access into an intermediary's computer" seems at odds with the overall proposal, since 90%+ of the time the systems used by attackers will belong to an intermediary. (6) Sec. 5's requirement that the FBI be notified and presented with various pieces of information prior to the active defense seems both too strict and too loose. Too strict in that it doesn't allow pre-certification and must occur in the course of an attack, too loose in that it requires that the FBI acknowledge receipt before proceeding but no actual approval or certification, and that there's a loophole on one of the required pieces of information to be given to the FBI, which is any other information requested by the FBI for the purposes of oversight. Since all the active defender requires is acknowledgment of receipt, if the FBI doesn't request any such further information as part of that acknowledgement, the defender is good to go immediately at that point before any further information is provided. Sec. 5 is kind of a fake certification process--there is no actual certification or validation process that must occur.

Monday, July 20, 2015

Al Seckel exposed

"I believe that we are rapidly transitioning from an Age of Information to an Age of Misinformation, and in many cases, outright disinformation." -- Al Seckel, in an interview published on Jeffrey Epstein's website, "Jeffrey Epstein Talks Perception with Al Seckel"

Mark Oppenheimer's long-awaited exposé on Al Seckel, "The Illusionist," has now been published and I urge all skeptics to read it. Seckel, the former head of the Southern California Skeptics and a CSICOP Scientific and Technical Consultant who was listed as a "physicist" in every issue of the Skeptical Inquirer from vol. 11, no. 2 (Winter 1987-88) to vol. 15, no. 2 (Winter 1991) despite having no degree in physics, has long been known among skeptical insiders as a person who was misrepresenting himself and taking advantage of others. Most have remained silent over fear of litigation, which Seckel has engaged in successfully in the past.

An example of a legal threat from Seckel is this email he sent to me on May 27, 2014:
Dear Jim,
News has once again reached me that you are acting as Tom McIver's proxy in
spreading misinformation and disinformation about me. Please be aware that
I sued McIver in a Court of Law for Defamation and Slander, and after a
very lengthy discovery process, which involved showing that he fabricated
letters from my old professors (who provided notarized statements that they
did not ever state nor write the letters that McIver circulated, and the
various treasures who were in control of the financial books of the
skeptics, also came forth and testified that no money was taken, and McIver
was unable to prove any of his allegations. The presiding Judge stated that
this was the "worst case of slander and defamation" that he had ever seen.
Nevertheless, even with such a Court Order he is persisting, and using (and
I mean the term "using") you to further propagate erroneous misinformation.
Lately, he has been making his defamatory comments again various people,
and posting links to a news release article by the Courthouse News (a press
release service) that reports the allegations set forth in complaints. Just
because something is "alleged" does not mean it is True. It has to be
proven in a Court of Law. In this case, after a lengthy discovery process
(and I keep excellent records) the opposite of what was alleged was
discovered, and the opposing counsel "amicably" dismissed their charges
against me. The case was officially dismissed. In fact, the opposing
counsel has been active in trying to get the Courthouse News to actively
remove the entire article, and not just add a footnote at the end.
I note that you have been trying to add this link to my wikipedia page. I
have never met you, and am not interested in fighting with you. I am
attaching the official Court document that this case was filed for
dismissal by the opposing counsel. You can verify yourself that this is an
accurate document with the Court. So, once again, McIver has used you.
My attorneys are now preparing a Criminal Complaint against McIver for so
openly violating the Court Order (it is now a criminal offense), and will
once again open the floodgates of a slander and defamation lawsuit against
him and his family, and anyone else, who aids him willing in this process.
This time he will not have his insurance company cover his defense. This
time that axe will come down hard on him.
For now, I will just think you are victim, but please remove any and all
references to me on any of your websites, and that will be the end of it.
You don't want to be caught in the crossfire.
Yours sincerely,
Al Seckel
--
Al Seckel
Cognitive neuroscientist, author, speaker
Contrary to what Seckel writes, we have, in fact, met--I believe it was during the CSICOP conference, April 3-4, 1987, in Pasadena, California.  I am not an agent of Tom McIver, the anthropologist, librarian, and author of the wonderful reference book cataloging anti-evolution materials, Anti-Evolution, who Seckel sued for defamation in 2007, in a case that was settled out of court (see Oppenheimer's article). I have never met Tom McIver, though I hope I will be able to do so someday--he seems to me to be a man of good character, integrity, and honesty.

The news release Seckel mentions is regarding a lawsuit filed by Ensign Consulting Ltd. in 2011 against Seckel charging him with fraud, which is summarized online on the Courthouse News Service website. I wrote a brief account of the case based on that news article on Seckel's Wikipedia page in an edit on March 13, 2011, but it was deleted by another editor in less than an hour.  Seckel is correct that just because something is alleged does not mean that it is true; my summary was clear that these were accusations made in a legal filing.

Seckel and his wife, Isabel Maxwell (daughter of the deceased British-Czech media mogul, Robert Maxwell), rather than fighting the suit or showing up for depositions, filed for bankruptcy.  Ensign filed a motion in their bankruptcy case on December 2, 2011, repeating the fraud allegations.  But as Seckel notes, Ensign did dismiss their case in 2014 prior to his sending me the above email.

So why should anyone care?  Who is Al Seckel, and what was he worried that I might be saying about him? This is mostly answered by the Oppenheimer article, but there is quite a bit more that could be said, and more than what I will say here to complement "The Illusionist."

Al Seckel was the founder and executive director of the Southern California Skeptics, a Los Angeles area skeptics group that met at Caltech.  This was one of the earliest local skeptical groups, with a large membership and prominent scientists on its advisory board.  Seckel has published numerous works including editing two collections of Bertrand Russell's writings for Prometheus Books (both reviewed negatively in the Journal of Bertrand Russell Studies, see here and here).  He has given a TED talk on optical illusions and authored a book with the interesting title, Masters of Deception, which has a forward by Douglas R. Hofstadter.  Seckel was an undergraduate at Cornell University, and developed an association with a couple of cognitive psychology labs at Caltech--in 1998 the New York Times referred to him as a "research associate at the Shimojo Psychophysics Laboratory." His author bios have described him as author of the monthly Neuroquest column at Discover magazine ("About the Author" on Masters of Deception; Seckel has never written that column), as "a physicist and molecular biologist" (first page of Seckel's contribution, "A New Age of Obfuscation and Manipulation" in Robert Basil, editor, Not Necessarily the New Age, 1988, Prometheus Books, pp. 386-395; Seckel is neither a physicist nor a molecular biologist), and, in his TED talk bio, as having left Caltech to continue his work "in spatial imagery with psychology researchers as Harvard" (see Oppenheimer's exchanges with Kosslyn, who has never met or spoken with him and Ganis, who says he has exchanged email with him but not worked with him).

At Cornell, Seckel associated with L. Pearce Williams, a professor of history of science, who had interesting things to say when McIver asked him about their relationship. While in at least one conference bio, Seckel is listed as having been Carl Sagan's teaching assistant, I do not believe that was the case. The Cornell registrar reported in 1991 in response to a query from Pat Linse that Seckel only attended for two semesters and a summer session, though a few places on the web list him as a Cornell alumnus.

Seckel used to hang out at Caltech with Richard Feynman. As the late Helen Tuck, Feyman's administrative assistant, wrote in 1991, Seckel "latched on to Feynman like a leach [sic]." Tuck wrote that she became suspicious of Seckel, and contacted Cornell to find that he did not have a degree from that institution. You can see her full letter, written in response to a query from Tom McIver, here.

As the head of the Southern California Skeptics, Seckel managed to get a column in the Los Angeles Times, titled "Skeptical Eye." Most of his columns were at least partially plagiarized from the work of others, including his column on Sunny the counting dalmation (plagiarized from Robert Sheaffer), his column on tabloid psychics' predictions for 1987 (also plagiarized from Sheaffer), and his column about Martin Reiser's tests of psychic detectives (plagiarized directly from Reiser's work). When Seckel plagiarized Sheaffer, it was brought to the attention of Kent Harker, editor of the Bay Area Skeptics Information Sheet (BASIS), who contacted Seckel about it. Seckel apparently told Harker that Sheaffer had given his permission to allow publication of his work under Seckel's name, which Sheaffer denied when Harker asked. This led to Harker writing to Seckel in 1988 to tell him about Sheaffer's denial, and inform him that he, Seckel, was no longer welcome to reprint any material from BASIS in LASER, the Southern California Skeptics' newsletter. While most skeptical groups gave each other blanket permission to reprint each others' material with attribution, Harker explicitly retracted this permission for Seckel.

This is, I think, a good case study in how the problem of "affiliate fraud"--being taken in by deception by a member of a group you self-identify with--can be possible for skeptics, scientists, and other educated people, just as it is for the more commonly publicized cases of affiliate fraud within religious organizations.

This just scratches the surface of the Seckel story. I hope that those who have been fearful of litigation from Seckel will realize that, given the Oppenheimer story, now is an opportune time for multiple people to come forward and offer each other mutual support that was unhappily unavailable for Tom McIver eight years ago.

(BTW, one apparent error in the Oppenheimer piece--I am unaware of Richard Feynman lending his name for use by a skeptical group. He was never, for example, a CSICOP Fellow, though I'm sure they asked him just as they asked Murray Gell-Mann, who has been listed as a CSICOP Fellow since Skeptical Inquirer vol. 9, no. 3, Spring 1985.)

"Oh, like everyone else, I used to parrot, and on occasion, still do." -- Al Seckel (interview with Jeffrey Epstein)

Corrected 22 July 2015--original mistakenly said Maxwell was Australian.

Update 22 September 2015--an obituary has been published for Al Seckel, stating that he died in France on an unspecified date earlier this year, but there are as yet no online French death records nor French news stories reporting his death. The obituary largely mirrors content put up on alseckel.net, a domain that was registered on September 18 by a user using Perfect Privacy LLC (domaindiscreet.com) to hide their information. (That in itself is not suspicious, it is generally a good practice for individuals who own domain names to protect their privacy with such mechanisms and I do it myself.)

Update 24 September 2015: French police, via the U.S. consulate, confirmed the death of Al Seckel on July 1, 2015. His body was found at the bottom of a cliff in the village of Saint-Cirq-Lapopie.

Update 21 December 2015: A timeline of Al Seckel's activities may be found here.

Update 14 April 2022: Al Seckel's death has been declared a suicide.

Friday, August 10, 2012

The myth of fingerprints

I've been reading Ross Anderson's epic tome, Security Engineering: A Guide to Building Dependable Distributed Systems (2nd edition, 2008, Wiley), and have just gotten into the chapter on biometrics (ch. 15).  Section 15.5.2, on Crime Scene Forensics, points out three major criminal cases where fingerprint matches have been in error, including the Brandon Mayfield case which I wrote about at this blog back in 2007.  Anderson points out that law enforcement agencies have claimed to juries "that forensic results are error-free when FBI proficiency exams have long had an error rate of about one percent, and misleading contextual information can push this up to ten percent or more" (pp. 470-471).  It's probability at work:
Even if the probability of a false match on sixteen points [the UK standard, the U.S. has no minimum] were one in ten billion (10-10) as claimed by police optimists, once many prints are compared against each other, probability theory starts to bite. A system that worked fine in the old days as a crime scene print would be compared manually with the records of a hundred and fifty-seven known local burglars, breaks down once thousands of prints are compared every year with an online database of millions. (p. 471)
One of the other two cases Anderson discusses is that of Scottish policewoman Shirley McKie, who was prosecuted on the basis of a 16-point fingerprint match found at a murder scene and could not find any fingerprint examiner in Britain to defend her.  She found two Americans who testified on her behalf that it was not a match (Anderson shows the crime scene print and her inked print on p. 469; the crime scene print is heavily smudged).  McKie's own fellow officers tried to convince her to give false testimony about her presence at the crime scene, which she refused to do.  She was acquitted, but lost her job and was unable to get reinstated.

The third case Anderson mentions is Stephan Cowans, who was convicted of shooting a police officer after a robbery in 1997.  He was convicted, but argued it was not his fingerprint.  After Cowans was able to get crime scene evidence tested for DNA which was found not to match, a re-examination of the fingerprint also found that there was no match.  So six years after his conviction, he was acquitted on appeal.

Further evidence of the errors which can arise from fingerprint examination comes from two studies by psychologist Itiel Dror which Anderson describes.  In one study, five fingerprint examiners were each shown a pair of prints, allegedly the falsely matched prints from the Mayfield case, and asked to point out the errors.  Three examiners gave explanations for the non-matches, one said that they did, in fact, match, and one was uncertain.  In fact, the pairs of prints were each purported matches by the corresponding examiner from a recent criminal case, so only one of the five was still certain that a match testified to in court was in fact a match upon re-examination with a skeptical mindset.  In a second study, Dror gave each of six experts eight prints that they had matched in previous cases, and four of the six gave inconsistent results.

Anderson points out that belief in the infallibility of fingerprint evidence has the effect of promoting carelessness by examiners, not giving proper critical scrutiny to the method or its assumptions in changing conditions (e.g., the increase in the number of fingerprints to match against in the age of the computer), and increasing the negative consequences of cases of failure.  In the McKie case, Anderson points out, "there appears to have arisen a hierarchical risk-averse culture in which no one wanted to rock the boat, so examiners were predisposed to confirm identifications made by colleagues (especially senior colleagues).  This risk aversion backfired when four of them were tried for perjury." (p. 472)

Itiel Dror's two papers (references from Anderson, p. 923):

IE Dror, D Charlton, AE Péron, "Contextual information renders experts vulnerable to making erroneous identifications," in Forensic Science International 156 (2006) 74-78

IE Dror, D Charlton, "Why Experts Make Errors," in Journal of Forensic Identification v 56 no 4 (2006) pp 600-616; at http://users.ecs.soton.ac.uk/id/biometrics.html

(Previously, which includes reference to Simon Cole's book on fingerprint evidence which shares the title of this post.)

Saturday, February 11, 2012

Work-at-home scams

I was asked earlier today if I could give my opinion on whether the work-from-home opportunity advertised at the domain onlineprofitmasterssystem.com is a scam.  A quick bit of research produced some interesting results, my conclusion is that it is almost definitely a scam, by people with a history of promoting scams.

First, the domain registration:


Registrant:
   Phillip Gannuscia
   1780 W. 9000 South
   #315
   West Jordan, Utah 84088
   United States

   Registered through: Go Daddy
   Domain Name: ONLINEPROFITMASTERSSYSTEM.COM
      Created on: 04-Nov-11
      Expires on: 04-Nov-12
      Last Updated on: 29-Nov-11

   Administrative Contact:
      Gannuscia, Phillip  nate@essentmedia.com
      1780 W. 9000 South
      #315
      West Jordan, Utah 84088
      United States
      (801) 803-5769      Fax --

The very domain and URL and web content of the page are already screaming red flags, and there are more to be found in the above data.  It's a recently registered domain, and the contact physical address appears to be a private mail drop service.  Both the address and telephone number listed are associated with multiple other companies (e.g., BBB F-rated eVenture International, run by Richard Scott Nemrow, who was cited multiple times by the Utah Division of Consumer Protection in 2009) and domain names (e.g., makerichesfromhome.com, educationtrainingsonline.com, executivelearningonline.com, learningresourceontheweb.com, and lightlifemaster.com) which also look like scams,.  This particular company, Online Profit Masters, has an F rating from the BBB.  The named contact, Phillip Gannuscia, has an email address with someone else's name, nate@essentmedia.com, apparently Essent VP Nathan L. Kozlowski, a former Mormon missionary.  Does Gannuscia even exist, or is the name just an alias for Kozlowski?  The company whose domain is used here for the contact email address, Essent Media LLC, another Richard Scott Nemrow company, has a corporate registration which expired in 2010.

I'd steer clear of any business with these guys.  And if you come across this blog post because you've already been ripped off by them (like this guy reports), I suggest you file a complaint with the Internet Crime Complaint Center as well as contacting your local law enforcement agency.


Saturday, July 02, 2011

Cory Maye to be released from prison

As a result of the investigative reporting of Radley Balko, Cory Maye is about to be released from prison after ten years of incarceration and seven years after being sentenced to death on the basis of a terrible defense and kooky testimony from a now discredited and removed medical examiner.  Maye shot and killed a police officer during a no-knock drug raid against a duplex property in which Maye resided, on the basis of a report of unusual traffic at the other unit of the duplex by an unreliable informant.  Maye was defending his daughter from an unknown intruder kicking his door in.

Through the efforts of Balko and a legal team from Covington & Burling, Maye was removed from death row in 2006.

Monday, June 27, 2011

5-4 bad decision against Arizona Clean Elections law

The decision in Arizona Free Enterprise Club's Freedom Club PAC v. Bennett came out today (PDF), a 5-4 decision ruling Arizona's Clean Election laws unconstitutional.  The dissent, it seems to me, has a much better case than the majority:
the program does not discriminate against any candidate or point of view, and it does not restrict any person's ability to speak.  In fact, by providing resources to many candidates, the program creates more speech and thereby broadens public debate. ...
At every turn, the majority tries to convey the impression that Arizona's matching fund statute is of a piece with laws prohibiting electoral speech. The majority invokes the language of "limits," "bar[s]," and "restraints." ... It equates the law to a "restrictio[n] on the amount of money a person or group can spend on political communication during a campaign." ...

There is just one problem. Arizona's matching funds provision does not restrict, but instead subsidizes, speech. The law "impose[s] no ceiling on [speech] and do[es] not prevent anyone from speaking." ... The statute does not tell candidates or their supporters how much money they can spend to convey their message, when they can spend it, or what they can spend it on. ...

In the usual First Amendment subsidy case, a person complains that the government declined to finance his speech, while financing someone else's; we must then decide whether the government differentiated between these speakers on a prohibited basis--because it preferred one speaker's ideas to another's. ... But the speakers bringing this case do not make that claim--because they were never denied a subsidy. ... Petitioners have refused that assistance. So they are making a novel argument: that Arizona violated their First Amendment rights by disbursing funds to other speakers even though they could have received (but chose to spurn) the same financial assistance. Some people might call that chutzpah.

Indeed, what petitioners demand is essentially a right to quash others' speech through the prohibition of a (universally available) subsidy program. Petitioners are able to convey their ideas without public financing--and they would prefer the field to themselves, so that they can speak free from response. To attain that goal, they ask this court to prevent Arizona from funding electoral speech--even though that assistance is offered to every state candidate, on the same (entirely unobjectionable) basis. And this court gladly obliges.
(See my previous argument against the Institute for Justice's position on this, with some subsequent clarifications on other aspects of the law.)

The majority position on this issue is that the unconstitutionality arises from the way that the subsidy to clean elections candidates is tied to campaign spending by the non-clean-elections candidates; I take it that had the subsidy been a fixed amount the argument would not have worked at all.

There's a good overview of the issues at the SCOTUS blog.

Wednesday, April 07, 2010

Many Species of Animal Law

Today I went to hear Bruce Wagman speak on the subject of "Many Species of Animal Law" at ASU's Sandra Day O'Connor College of Law.  Wagman, an attorney with Schiff Hardin who is also an outside litigator for the Animal Legal Defense Fund, has litigated cases involving animals for 18 years, written a case book on animal law, and teaches animal law courses at several law schools as an adjunct faculty member.  He was introduced by ASU Law School Dean Paul Berman and Arizona Court of Appeals Judge Pat Norris.

Wagman began by defining "animal law" as any law where the status of an animal matters--psychological, biological, welfare, etc. status of the animal, as opposed to its value as property.  He suggested that animal law attorneys "may be the only lawyers on earth whose clients are all innocent."

He divided his talk up into multiple "species" of animal law.

Species 1: Companion Animal Issues

He said this makes up the majority of his cases, and includes injuries by or to animals, including veterinary malpractice.  The challenge is to get courts to recognize that animals are not merely property, since historically companion animals have been viewed as property with low or even zero market value.  In cases where an animal is injured or killed, the market value doesn't recognize the interests of the animal or other kinds of value that companion animals give.  Under the American Law Institute's Restatements of the Law, however, there is a notion of "special property" (or "peculiar property" in California's statutes) which allows quantification of other kinds of worth to an animal owner, for instance if the animal is a therapy dog.  There are no emotional stress damages available.

Other sorts of companion animal cases include custody disputes, which often occur as a result of one partner just trying to inflict distress on another rather than having actual interest in the animal.  Wagman said that courts are beginning to take a better look at the interests of the animal in such cases, and be willing to appoint a guardian ad litem, as occurred in the Michael Vick case and in another case in Tennessee where there was a dispute over custody of a dog between a dead man's girlfriend and parents.

There are dangerous dog issues, where an attorney may be fighting against the classification of a dog as a dangerous or vicious animal, or against its euthanasia--what he called "capital cases" for animals.  In three counties surrounding San Francisco, what happens in the case of a dog biting another dog that requires stitches varies dramatically.  In one county, the dog gets a period of probation.  In another, the dog gets labeled as a dangerous or vicious dog, which requires the owner to meet various conditions of housing the dog, having a certain height of fence, carry additional insurance, and so forth.  And in Santa Clara County, the dog gets euthanized.  He pointed out that that county's statute has an exemption for "mitigating circumstances" which he's successfully used to prevent dogs from being euthanized.

Finally, there are wills and trusts--he said he doesn't do that sort of work, but that 48 states now have mechanisms for having trusts for animals.

He said he considers companion animals to be a sort of "gateway animal" for getting recognition of animals in the law, and noted that we tend to be "speciesists" who would feel very different about snakes vs. Labrador Retrievers.  [IMO, this is rational to the extent that animals differ in cognitive capacities, and I note that at no point did he discuss litigating on behalf of cockroaches against pest control companies.]

Species 2: Farm animal issues--legislation and litigation.

His second species of animal law was about animals killed for food--about 10 billion per year in the United States.  He said the goal here is not to stop the killing, but just to improve the living conditions of animals before they're killed for food.  This is problematic, however, because the animal cruelty statutes are criminal rather than civil (with an exception in North Carolina that will be discussed with regard to Species 3 of animal law), and that the criminal law for animal cruelty excludes farm animals in 35 states.  He discussed a few of the more abusive methods of animal treatment in factory farming--calf crates, in which calves are placed for about the first 60 days of life, gestation crates for pigs (outlawed in Arizona since 2006, as well as illegal in Florida, Oregon, Colorado, and California), and battery cages for chickens.

He also discussed downer animals--animals which are either so seriously injured or ill that they are unable to move, which the meat industry wants to drag in that condition to slaughter.  Wagman raised the concern that such animals, if sick, could potentially spread illness to humans, and listed a bunch of diseases that could potentially so spread, with BSE (mad cow) at the top of the list along with avian flu.  Of these, only BSE has been documented to spread to humans, and the industry position is that there should be no restrictions on downer pigs unless and until a human actually gets sick.  The state of California passed a law that said that all downer animals must be euthanized on the spot; the meat industry sued and overturned the statute in federal district court, but the 9th Circuit just reversed it last week (National Meat Association v. Brown).

Species 3: Animal hoarding--private ownership, breeders, and the sanctuary that is not

Wagman said that there have been 250,000 documented cases of animal hoarding, and that they are difficult cases to work with in multiple ways.  He said he believes such cases involve mental illness, but while the APA has a diagnosis for "hoarding" behavior, it excludes animal hoarding which is considered to be different.  How many animals constitutes hoarding?  He said he likes to say "more than eight," because he has eight animals at home.  Hoarders characteristics include possessing more animals than they can care for, having a sense of being persecuted, and living in deplorable conditions.

He discussed two cases that he litigated, ALDF v. Barbara & Robert Woodley, and ALDF v. Janie Conyers, which involved over 500 animals between them.  The former case, in North Carolina, was able to use North Carolina statute 19a, which allows a civil cause of action for animal cruelty.  Wagman had some horrifying photos from the Woodley case.  They had hundreds of dogs in their home living in their own feces, where ammonia levels were 20 times the USDA maximum allowed in a pig facility.  These ammonia levels caused blindness in the dogs, as well as chemical burns to bare skin that contacted the floor, such as dogs' scrotums.  Multiple dogs were kept in wooden boxes with lids on them, and never let out.  Mrs. Woodley's favorite dog, Buddy, not only had his eyes burned to blindness from ammonia, but the bone in the dog's jaw deteriorated from malnutrition.  Local officials had known of Woodley's problem for 20 years, but considered themselves powerless to do anything about it, since the scale of the problem was so large--the local shelter had only eight kennels, while the Woodleys had about 450 animals.  The ALDF had to coordinate a massive effort to manage the rescue of the animals through their case.

Conyers was an AKC poodle breeder who had 106 poodles living in their own feces.

Wagman said that animal psychological suffering is difficult to show, but it can be done; demonstrating physiological suffering is easier, with objective criteria like the ammonia levels and physical injuries to animals.

There is no law against hoarding (except in Hawaii), just the criminal abuse statutes (and civil in NC).  In the hoarding cases the abuse is typically neglect rather than active abuse.

Species 4: Exotic animal ownership

Wagman has handled about 10 chimpanzee cases.  One was a case involving a couple in West Covina, California who had a chimp named Moe for 35 years that bit two people.  He argued for a guardian ad litem to determine what was in the best interests of the chimp, and arranged to get Jane Goodall and Roger Fouts for that role.  The court looked upon it favorably, but the couple came to an out-of-court settlement.

He also briefly discussed the Stamford, Connecticut case of Travis, the 200-pound chimpanzee who attacked a woman that was in the news last year.

He argued that there should be a legislative fix to ban exotic animal ownership completely--they're wild animals.  [A complete ban seems to me too much--there should be exceptions for research, conservation, breeding programs for endangered species, and so forth.  And shouldn't it be possible to domesticate other wild animals?]  Connecticut has taken the step of banning chimp ownership.

Species 5: Shelter practices - euthanasia, veterinary care, adequate food, water, and sanitation, and hold periods

Animal shelters have an overwhelming job, said Wagman.  The County of Los Angeles, which he sued, operates seven shelters which handle tens of thousands of animals per year.  California law says that all animals must get veterinary care and be held for five days, and allowing animal suffering without treatment is not permissible.  The shelters' own records showed that they weren't meeting that standard for thousands of animals, but they're now working to meet them and having their activity monitored for compliance.  A similar set of cases occurred in Kentucky, when the state transferred all shelter responsibility to the counties.  Although the standards of care were minimal, they weren't meeting it, and there were nutrition, veterinary care, and euthanasia issues.  Upon getting notice, they quickly took action to remedy.

In Georgia, by contrast, there is a statute that prohibits the use of gas chambers for euthanization at shelters, but the Commissioner of Agriculture sent out letters to the shelters asking that they purchase gas chambers for euthanization.  Gas chambers apparently have very ugly results in some cases, such as with unhealthy dogs.  A lawsuit against the state of Georgia for its failure to comply with its own statute resulted an an injunction, which they then immediately violated by sending out more letters asking for gas chamber purchases.  After obtaining a contempt ruling from the court, they finally got compliance.

Species 6: Entertainment

Wagman called this category both the most obvious and the most hidden.  The use of animals in entertainment is obvious, but what is not obvious is what goes on behind the scenes, the knowledge of which drains the fun out of the entertainment.

Circuses, zoos, film and TV ads, animal fighting, public appearances, racing and rodeos, and hunting and fishing are all cases of animals used for entertainment.  Wagman first discussed elephants in circuses, commenting on a recent Ringling Brothers case which was tossed out on an issue of standing.  The case involved the use of bullhooks for elephant training, which injures the animals.  The defense didn't deny use of bullhooks, but claimed that they only use them as "guides."

Elephant treatment in zoos is also problematic, since standing around on hard surfaces causes painful arthritis.  In the wild, elephants are awake 21 hours a day and may move 35 miles per day.

Wagman discussed dog fighting, and said that the Michael Vick case was a wakeup call for America to the reality of dog fighting, which exists in every state and most major cities.

He argued that the use of great apes in film and television should be banned, because of how the training process works.  He said that while trainers claim to use only positive reinforcement training, an undercover person who volunteered for a year and a half with trainer Sid Yost found otherwise.  A young chimpanzee is immediately treated to beating and punching to get them to comply.  Their performance lifetime is about 3-5 years, after which they become to strong to conrol, and end up in private homes, in research, or in zoos, often all alone in barren cases.  Wagman pointed out that the common use of a "smiling" chimpanzee is actually a fear grimace.  He does lots of work for sanctuaries, of which there are nine in the U.S. for chimpanzees (including chimpsanctuarynw.org).

Regarding hunting, he distinguished traditional hunting from canned hunting and Internet hunting.  Hunting is protected in most states, including in many state constitutions.  Canned hunting ranches, where animals are fed by hand by humans before they are flushed out into open areas to be shot, are not considered to be hunting by most traditional hunters.  [But is considered hunting by our former Vice President, Dick Cheney.]  Internet hunting, where a rifle can be fired at live animals over the Internet, has been banned in 30 states.

He mentioned mountain lion hunting in the Black Hills of South Dakota, where mountain lions have become fairly scarce.  A lawsuit was filed to try to stop the hunting on grounds of near-extinction of the animals, but the injunction was denied on the grounds that there were unlikely to be any mountain lions even found and killed.  Two mountain lions were killed shortly thereafter in fairly quick succession, and even though there was a law that prohibited killing female mountain lions with cubs, the second one killed had a cub, and there was no prosecution.

Some Adidas shoes are made with kangaroo skin, and the state of California has banned the importation of kangaroo skin, which Adidas ignored.  Adidas was sued as a result, and they lost at the California Supreme Court--but they responded by persuading the legislature to repeal the ban rather than changing their practices.

Species 7: Species and breed-specific legislation and ADA breedism case.

A variety of dog breeds have been considered at various times and places to be "bad dogs" that create a special danger.  After WWII, it was German Shepherds and Dobermans.  All cases to stop such breed-specific legislation have failed, because the "rational relation" standard is met by only a single case of harm.  A case in progress right now in Concord, California involves Theresa Huerta, a woman suing under the Americans with Disabilities Act to keep her pit bull therapy dog from being euthanized.

Wagman concluded by saying that his overall objective is to keep the public and the courts focused on the real issue, which is ending blatant cases of animal abuse.  Animal law is a growing field, and there's an annual animal law conference in Portland that's now in its fifth year.

Wednesday, February 24, 2010

Science as performance

The success of science in the public sphere is determined not just by the quality of research but by the ability to persuade. Stephen Hilgartner’s Science on Stage: Expert Advice as Public Drama uses a theatrical metaphor, drawing on the work of Erving Goffman, to shed light on and explain the outcomes associated with three successive reports on diet and nutrition issued by the National Academies of Science, one of which was widely criticized by scientists, one of which was criticized by food industry groups, and one of which was never published. They differed in “backstage” features such as how they coordinated their work and what sources they drew upon, in “onstage” features such as the composition of experts on their committees and how they communicated their results, and how they responded to criticism.

The kinds of features and techniques that Hilgartner identifies as used to enhance perceptions of credibility--features of rhetoric and performance--are the sorts of features relied upon by con artists. If there is no way to distinguish such features as used by con artists from those used by genuine practitioners, if all purported experts are on equal footing and only the on-stage performances are visible, then we have a bit of a problem. All purported experts of comparable performing ability are on equal footing, and we may as well flip coins to distinguish between them. But part of a performance includes the propositional content of the performance--the arguments and evidence deployed--and these are evaluated not just on aesthetic grounds but with respect to logical coherence and compatibility with what the audience already knows. Further, the performance itself includes an interaction with the audience that strains the stage metaphor. Hilgartner describes this as members of the audience themselves taking the stage, yet audience members in his metaphor also interact with each other, individually and in groups, through complex webs of social relationships.

The problem of expert-layman interaction is that the layman in most cases lacks the interactional expertise to even be able to communicate about the details of the evidence supporting a scientific position, and must rely upon other markers of credibility which may be rhetorical flourishes. This is the problem of Plato’s “Charmides,” in which Socrates asserts that only a genuine doctor can distinguish a sufficiently persuasive quack from a genuine doctor. A similar position is endorsed by philosopher John Hardwig, in his paper “Epistemic Dependence,” (PDF) and by law professor Scott Brewer in “Scientific Expert Testimony and Intellectual Due Process,” which points out that the problem faces judges and juries. There are some features which enable successful distinctions between genuine and fake experts in at least the more extreme circumstances--examination of track records, credentials, evaluations by other experts or meta-experts (e.g., experts in methods used across multiple domains, such as logic and mathematics). Brewer enumerates four strategies of nonexperts in evaluating expert claims: (1) “substantive second-guessing,” (2) “using general canons of rational evidentiary support,” (3) “evaluating demeanor,” and (4) “evaluating credentials.” Of these, only (3) is an examination of the merely surface appearances of the performance (which is not to say that it can’t be a reliable, though fallible, mechanism). But when the evaluation is directed not at distinguishing genuine expert from fake, but conflicting claims between two genuine experts, the nonexpert may be stuck in a situation where none of these is effective and only time (if anything) will tell--but in some domains, such as the legal arena, a decision may need to be reached much more quickly than a resolution might become available.

One novel suggestion for institutionalizing a form of expertise that fits into Hilgartner’s metaphor is philosopher Don Ihde’s proposal of “science critics”, in which individuals with at least interactional expertise within the domain they criticize serve a role similar to art and literary critics in evaluating a performance, including its content and not just its rhetorical flourishes.

[A slightly different version of the above was written as a comment for my Human and Social Dimensions of Science and Technology core seminar. The Hardwig and Brewer articles are both reprinted in Evan Selinger and Robert P. Crease, editors, The Philosophy of Expertise. NY: Columbia University Press, 2006, along with an excellent paper I didn't mention above, Alvin I. Goldman's "Experts: Which Ones Should You Trust?" (PDF). The term "interactional expertise" comes from Harry M. Collins and Robert Evans, "The Third Wave of Science Studies: Studies of Expertise and Experience," also reprinted in the Selinger & Crease volume; a case study of such expertise is in Steven Epstein's Impure Science: AIDS, Activism, and the Politics of Knowledge, Berkeley: University of California Press, 1996. Thanks to Tim K. for his comments on the above.]

Tuesday, November 24, 2009

Wikileaks to release over 500K text pager intercepts from 9/11

Wikileaks is releasing over 500,000 U.S. national text pager intercepts from September 11, 2001, over the next two days:
From 3AM on Wednesday November 25, 2009, until 3AM the following day (New York Time), WikiLeaks will release over half a million US national text pager intercepts. The intercepts cover a 24 hour period surrounding the September 11, 2001 terrorist attacks in New York and Washington.

The first message, corresponding to 3AM September 11, 2001, five hours before the first attack, will be released at 3AM November 25, 2009 and the last, corresponding to 3AM September 12, 2001 at 3AM November 26, 2009.

Text pagers are mostly carried by persons operating in an official capacity. Messages in the collection range from Pentagon and New York Police Department exchanges, to computers reporting faults to their operators as the World Trade Center collapsed.
This is a significant and completely objective record of the defining moment of our time. We hope that its entry into the historical record will lead to a deeper and more nuanced understanding of how this tragedy and its aftermath may have been prevented.

While we are obligated by to protect our sources, it is clear that the information comes from an organization which has been intercepting and archiving national US telecommunications since prior to 9/11.
The Transparent Society getting closer, it appears...

Thursday, November 19, 2009

Joel Garreau on radical evolution

Yesterday I heard Joel Garreau speak again at ASU, as part of a workshop on Plausibility put on by the Consortium for Science, Policy, and Outcomes (CSPO). I previously posted a summary of his talk back in August on the future of cities. This talk was based on his book, Radical Evolution: The Promise and Peril of Enhancing Our Minds, Our Bodies--and What It Means to Be Human.

Garreau was introduced by Paul Berman, Dean of the Sandra Day O'Connor School of Law at ASU, who also announced that Garreau will be joining the law school faculty beginning this spring, as the Lincoln Professor for Law, Culture, and Values.

He began by saying that we're at a turning point in history [has there ever been a time when we haven't thought that, though?], and he's going to present some possible scenarios for the next 2, 3, 5, 10, or 20 years, and that his book is a roadmap. The main feature of this turning point is that rather than transforming our environment, we'll be increasingly transforming ourselves, and we're the first species to take control of its own evolution, and it's happening now.

At some point in the not-too-distant future, he said, your kid may come home from school in tears about how he can't compete with the other kids who are more intelligent, more athletic, more attractive, more attentive, and so forth--because you haven't invested in the human enhancement technologies coming on the market. Your possible reactions will be to suck it up [somebody's still gotta do the dirty jobs in society?], remortgage the house again to make your kid competitive, or try to get the enhanced kids thrown out of school. What you can't do is ignore it.

He then asked people to raise their hands who could remember when things were still prevalent:
  • The Sony Walkman
  • When computer screens were black and white. (An audience member said "green and black!")
  • Rotary dial phones
  • Mimeograph machines and the smell of their fluid
  • Polio
This shows, he said, that we're going through a period of exponential change.

His talk then had a small amount of overlap with his previous talk, in his explanation of Moore's Law--that we've had 32 doublings of computer firepower since 1959, so that $1 of computing power is about 2 billion times more than it was then, and an iPhone has more computing power than all of NORAD had in 1965. Such doublings change our expectations of the future, so that the last 20 years isn't a guide to the next 20, but to the next 8; the last 50 years is a guide to the next 14. He pulled out a handkerchief and said this is essentially the sort of display we'll have in the future for reading a book or newspaper.

He then followed Ray Kurzweil in presenting some data points to argue that exponential change has been going on since the beginning of life on earth (see P.Z. Myers' "Singularly Silly Singularity" for a critique):

It took 400 million years (My) to go from organisms to mammals, and
  • 150My to monkeys
  • 30My to chimps
  • 16My to bipedality
  • 4My to cave paintings
  • 10,000 years to first settlements
  • 4,000 years to first writing
At this point, culture comes into the picture, which causes even more rapid change (a point also made by Daniel Dennett in his talk at ASU last February).
  • 4,000 years to Roman empire
  • 1800 years to industrial revolution
  • 100 years to first flight
  • 66 years to landing on the moon
And now we're in the information age, which Garreau identified as a third kind of evolution, engineered or radical evolution, where we're in control. [It seems to me that such planned changes are subject to the limits of human minds, unless we can build either AI or enhancement technologies that improve our minds, and I think the evidence for that possibility really has yet to be demonstrated--I see it as possible, but I place no bets on its probability and think there are reasons for skepticism.]

Garreau spent a year at DARPA (the Defense Advanced Research Projects Agency), the organization that invented the Internet (then the ARPANet), which is now in the business of creating better humans, better war fighters. [DARPA was also a subject of yesterday's Law, Science, and Technology class. It's a highly funded organization that doesn't accept grant proposals, rather, it seeks out people that it thinks are qualified to give funding to for its projects. It has become rather more secretive as a result of embarrassment about its Total Information Awareness and terrorism futures ideas that got negative press in 2003.]

Via DARPA, Garreau learned about their project at Duke University with an owl monkey named Belle, that he described as a monkey that can control physical objects at long distances with her mind. Belle was trained to play a video game with a joystick, initially for a juice reward and then because she enjoyed it. They then drilled a hole in her head and attached fine electrodes (single-unit recording electrodes like the sort used to discover mirror neurons), identified the active regions of her brain when she operated the joystick, and then disconnected the joystick. She became proficient and playing the game with the direct control of her brain. They then connected the system to a robotic arm at MIT which duplicated the movements of her arm with the joystick.

Why did they do this? Garreau said there's an official reason and a real reason. The official reason is that an F-35 jet fighter is difficult to control with a joystick, and wouldn't it be better to control it with your mind, and send information sensed by the equipment directly into the mind? The real reason is that the DARPA defense sciences office is run by Michael Goldblatt, whose daughter Gina Marie (who recently graduated from the University of Arizona) has cerebral palsy and is supposed to spend the rest of her life in a wheelchair. If machines can be controlled with the mind, machines in her legs could be controlled with her mind, and there's the possibility that she could walk.

Belle first moved the robotic arm 9 years ago, Garreau said, and this Christmas you'll be able to buy the first toy mind-machine interface from Mattel at Walmart for about $100. It's just a cheap EEG device and not much of a game--it lets you levitate a ping pong ball with your mind--but there's obviously more to come.

Garreau said that Matthew Nagel was the first person to send emails using his thoughts (back in 2006), and DARPA is interested in moving this technology out to people who want to control robots. [This, by the way, is the subject of the recent film "Sleep Dealer," which postulates a future in which labor is outsourced to robots operated by Mexicans, so that they can do work in the U.S. without immigrating.]

This exposure to DARPA was how Garreau got interested in these topics, which he called the GRIN technologies--Genetics, Robotics, Information science, and Nanotechnology, which he identified as technologies enabled by Moore's Law.

He showed a slide of Barry Bonds, and said that steroids are sort of a primitive first-generation human enhancement, and noted that the first uses of human enhancement tend to occur in sports and the military, areas where you have the most competition.

Garreau went over a few examples of each of the GRIN technologies that already exist or are likely on the way.

Genetics
Dolly the cloned sheep. "Manipulating and understanding life at the most primitive and basic level."

"Within three years, memory pills, originally aimed at Alzheimer's patients, will then move out to the needy well, like 78 million baby boomers who can't remember where they left their car, then out to the merely ambitious." He said there's already a $36.5 billion grey market for drugs like Ritalin and Provigil (midafonil), and asked, "Are our elite schools already filling up with the enhanced?" [There's some evidence, however, that the enhancement of cognitive function (as opposed to staying awake) is minimal for people who already operate at high ability, with the greatest enhancement effect for those who don't--i.e., it may have something of an egalitarian equalizing effect.]

He said DARPA is looking at ways to end the need for sleep--whales and dolphins don't sleep, or they'd drown, but they do something like sleeping with one half of the brain at a time.

DARPA is also looking at ways to turn off hunger signals. Special forces troops burn 12,000 calories per day, but can't carry huge amounts of food. The body carries extra calories in fat that are ordinarily inaccessible unless you're starving, at which point they get burned. If that switch to start burning fat could be turned on and off at will, that could be handy for military use. He observed that DARPA says "the civilian implications of this have not eluded us."

Sirtris Pharmaceuticals, started by David Sinclair of the Harvard Medical School, aims to have a drug to reverse aging based on resveratrol, an ingredient from grapes found in red wine. [Though Quackwatch offers some skepticism.]

Garreau looks forward to cures for obesity and addiction. He mentioned Craig Venter's plan to create an organism that "eats CO2 and poops gasoline" by the end of this year, that will simultaneously "end [the problems in] the Middle East and climate change." [That seems overly optimistic to me, but ExxonMobil has given Venter $600 million for this project.]

He said there are people at ASU in the hunt, trying to create life forms like this as well. [Though for some reason ASU doesn't participate in the iGEM synthetic biology competition.]

Robotics
Garreau showed a photo of a Predator drone, and said, "Ten years ago, flying robots were science fiction, now it's the only game in town for the Air Force." He said this is the first year that more Air Force personnel were being trained to operate drones than to be pilots. 2002 was the first year that a robot killed a human being, when a Predator drone launched a Hellfire missile to kill al Qaeda members in an SUV in Yemen. He said, "while there's still a human in the loop, philosophical discussions about homicidal robots could be seen as overly fine if you were one of the guys in the SUV."

"We're acquiring the superpowers of the 1930s comic book superheroes," he said, and went on to talk about a Berkeley exoskeleton that allows you to carry a 180-pound pack like it weighs four pounds, like Iron Man's suit. He asked the engineers who built it, "Could you leap over a tall building in a single bound?" They answered, "yes, but landing is still a problem."

Functional MRI (fMRI) is being used at the University of Pennsylvania to try to determine when people are lying. Garreau: "Then you're like the Shadow who knows what evil lurks in the hearts of men."

Cochlear implants to give hearing to people for whom hearing aids do nothing, connecting directly to the auditory nerve. Ocular implants to allow the blind to have some vision. Brain implants to improve memory and cognition. Garreau asked, "If you could buy an implant that would allow you to be fluent in Mandarin Chinese, would you do it?" About half the room raised their hands. [I didn't hear a price or safety information, so didn't raise my hand.]

Information
He showed a photo of a camera phone and said, "Fifteen years ago, a machine like this that can fit in your pocket, with a camera, GPS, and MP3 player, and can send email, was science fiction. Now it's a bottom-of-the-line $30 Nokia."

He asked, "Does anyone remember when music players were three big boxes that you put on your bookshelves? Now they're jewelry. Soon they'll be earrings, then implants."

Close behind, he said, are universal translators. "Google has pretty good universal translation on the web, and see it as moving out to their Droid phones." He observed that Sergey Brin was talking in 2004 about having all of the world's information directly attached to your brain, or having a version of Google on a chip implanted in your brain. [I won't get one unless they address network security issues...]

Nanotechnology
Garreau said, "Imagine anything you want, one atom or molecule at a time. Diamonds, molecularly accurate T-bone steaks." He said this is the least developed of the four GRIN technologies, "so you can say anything you want about it, it might be true." It's estimated to become a $1 trillion/year market in the next 10 years. There may be nanobots you can inject into your bloodstream by the thousands to monitor for things about to go wrong [see this video for the scenario I think he's describing], hunter-killers that kill cancer cells. "When you control matter at a fundamental level, you get a feedback loop between the [four] technologies."

At this point, Garreau said he's really not all that interested in the "boys and their toys" so much as he is the implications--"where does this take culture and society and values?" He presented three possible scenarios, emphasizing that he's not making predictions. He called his three scenarios Heaven, Hell, and Prevail.

Heaven
He showed a chart of an exponential curve going up (presumably something like technological capacity on the y axis and time on the x axis).

He said that at the NIH Institute on Aging, there's a bet that the first person to live to 150 is already alive today. He mentioned Ray Kurzweil, said that he pops 250 pills a day and is convinced that he's immortal, and is "not entirely nuts." [I am very skeptical that 250 pills a day is remotely sensible or useful.]

For the last 160 years, human life expectancy has increased at about 1/4 of a year every year. He asked us to imagine that that rate improves to one year per year, or more--at that point, "if you have a good medical plan you're effectively immortal." [I questioned this in the Q&A, below.]

Hell
He showed a chart that was an x-axis mirror of the Heaven one, and described this as a case where technology "gets into the hands of madmen or fools." He described the Australian mousepox incident, where researchers in Australia found a way to genetically alter mousepox so that it becomes 100% fatal, destroying the immune system, so that there's no possible vaccine or prevention. This was published in a paper available to anyone, and the same thing could be done to smallpox to wipe out human beings with no defense. He said the optimistic version is something that wipes out all human life; the pessimistic version is something that wipes out all life on earth. [In my law school class, we discussed this same topic yesterday in more detail, along with a similar U.S. paper that showed how to reconstruct the polio virus.]

The problem with both of these scenarios for Garreau is that they are both "techno-deterministic," assuming that technology is in control and we're "just along for the ride."

Prevail
He showed a chart that showed a line going in a wacky, twisty pattern. The y-axis may have been technological capacity of some sort, but the x-axis in this case couldn't have been time, unless there's time travel involved.

Garreau said, if you were in the Dark Ages, surrounding by marauding hordes and plagues, you'd think there wasn't a good future. But in 1450 came the printing press--"a new way of storing, sharing, collecting, and distributing information," which led to the Renaissance, enlightenment, science, democracy, etc. [Some of those things were rediscoveries of advancements previously made, as Richard Carrier has pointed out. And the up-and-down of this chart and example of the Dark Ages seems to be in tension, if not in conflict, with his earlier exponential curve, though perhaps it's just a matter of scale. At the very least, however, they are reason to doubt continued growth in the short term, as is our current economic climate.]

Garreau called the Prevail scenario more of a co-evolution scenario, where we face challenges hitting us in rapid succession, to which we quickly respond, which creates new challenges. He expressed skepticism of top-down organizations having any capacity to deal with such challenges, and instead suggested that bottom-up group behavior by humans not relying on leaders is where everything interesting will happen. He gave examples of eBay ("100 million people doing complex things without leaders"), YouTube ("no leaders there"), and Twitter ("I have no idea what it's good for, but if it flips out the Iranian government, I'm for it.") [These are all cases of bottom-up behavior facilitated by technologies that are operated by top-down corporations and subject to co-option by other top-down institutions in various ways. I'm not sure how good the YouTube example is considering that it is less profitable per dollar spent than Hulu--while some amateur content bubbles to the top and goes viral, there still seems to be more willingness to pay for professional content. Though it does get cheaper to produce professional content and there are amateurs that produce professional-quality content. And I'll probably offer to help him "get" Twitter.]

The Prevail scenario, he said, is "a bet on humans being surprising, coming together in unpredicted ways and being unpredictably clever."

He ended by asking, "Why have we been looking for intelligent life in the universe for decades with no success? I wonder if every intelligent species gets to the point where they start controlling their own destiny and what it means to be as good as they can get. What if everybody else has flunked. Let's not flunk. Thanks."

Q&A
I asked the first question, which was whether there is really so much grounds for optimism on extending human lifespan when our gains have increased the median lifespan but not made recent progress on the top end--the oldest woman in the world, Jeanne Calment, died at 122 in 1997 and no one else has reached that age. He answered that this was correct, that past improvements have come from nutrition, sanitation, reducing infant mortality, and so forth, but now that we spent $15 billion to sequence the first human genome and the cost of sequencing a complete human genome is approaching $1,000 and personalized medicine is coming along, he suspects we'll find the causes of aging and have the ability to reverse it through genetic engineering.

Prof. David Guston of CSPO asked "What's the relation between your Prevail scenario and the distribution of the success of the good stuff from GRIN technologies?" Looking at subgroups like males in post-Soviet Russia and adults in Africa, he said, things seem to be going in the wrong direction. Garreau answered that this is one of the nightmare scenarios--that humans split into multiple species, such as enhanced, naturals, and the rest. The enhanced are those that keep upgrading every six months. The naturals are those with access to enhancements that "choose not to indulge, like today's vegetarians who are so because of ethical or aesthetic reasons." The rest are those who don't have access to enhancements, and have envy for and despise those who do. "When you have more than one species competing for the same ecological niche," he said, "that ends up badly for somebody." But, he said, that's assuming a rich-get-richer, poor-get-poorer belief, "a hallmark of the industrial age." Suppose that instead of distributing scarcity, we are distributing abundance. He said that transplanted hearts haven't become cheap because they aren't abundant, but if we can create new organs in the body or in the lab in a manner that would benefit from mass production, it could become cheap. He pointed out that cell phones represent "the fastest update of technology in human history," going from zero to one phone for every two people in 26 years, and adapted to new uses in the developing world faster than in the developed world. He brought up the possibility of the developing world "leapfrogging" the developed world, "the way Europeans leapfrogged the Arab world a thousand years ago, when they were the leaders in science, math, and everything else." [I think this is a very interesting possibility--the lack of sunk costs in existing out-of-date infrastructure, the lack of stable, firmly established institutions are, I think, likely to make the developing world a chaotic experimental laboratory for emerging technologies.]

Prof. Gary Marchant of the Center for the Study of Law, Science, and Technology then said, "I'm worried about the bottom-up--it also gave us witch trials, Girls Gone Wild, and the Teabaggers." Garreau said his Prevail scenario shows "a shocking faith in human nature--a belief in millions of small miracles," but again said "I'm not predicting it, but I'm rooting for it."

Prof. Farzad Mahootian and Prof. Cynthia Selin of CSPO asked a pair of related questions about work on public deliberations and trying to extend decision-making to broader audiences, asking what Garreau thought about "DARPA driving this or being porous to any kind of public deliberation or extended decision-making?" Garreau responded that "The last thing in the world that I want to do is leave this up to DARPA. The Hell scenario could happen. Top-down hierarchical decision-making is too slow. Anyone waiting for the chairman of the House finance committe to save us is pathetic. Humans in general have been pulling ashes out of the fire by the skin of their teeth for quite a while; and Americans in particular have been at the forefront of change for 400 years and have cultural optimism about change." [I think these questions seemed to presuppose top-down thinking in a way that Garreau is challenging.]

He said he had reported a few years ago about the maquiladoras in Mexico and called it a "revolution," to which he got responses from Mexicans saying, "we're not very fond of revolutions, it was very messy and we didn't like it," and asking him to use a different word. By contrast, he said, "Americans view revolutions fondly, and think they're cool, and look forward to it." [Though there's also a strange conservatism that looks fondly upon a nonexistent ideal past here, as well.] With respect to governance, he said he's interested in looking for alternate forms of governance because "Washington D.C. can't conceivably respond fast enough. We've got a long way to go and a short time to get there." [Quoting the 'Smokey and the Bandit' theme song.]

He went on to say, "I don't necessarily think that all wisdom is based here in America. Other places will come up with dramatically different governance." He talked about the possibility of India, which wants to get cheaper drugs out to the masses, taking an approach different from FDA-style regulation (he called the FDA "a hopelessly dysfunctional organization that takes forever to produce abysmal results"). "Let's say the people of India were willing to accept a few casualties to produce a faster, better, cheaper cure for malaria, on the Microsoft model--get a 'good enough' version, send it out and see how many computers die. Suppose you did that with drugs, and were willing to accept 10,000 or 100,000 casualties if the payoff was curing malaria once and for all among a billion people. That would be an interesting development." By contrast, he said, "The French are convinced they can do it the opposite way, with top-down governance. Glad to see somebody's trying that. I'll be amazed if it works." His view, he said, was "try everything, see what sticks, and fast." [This has historically been the intent of the U.S. federal system, to allow the individual states to experiment with different rules to see what works before or in lieu of federal rules. Large corporations that operate across states, however, which have extensive lobbying power, push for federal regulations to pre-empt state rules, so that they don't have to deal with the complexity.]

There were a few more questions, one of which was whether anyone besides DARPA was doing things like this. Garreau said certainly, and pointed to both conventional pharmaceutical companies and startups working to try to cure addiction and obesity, as well as do memory enhancement, like Eric Kandel's Memory Pharmaceuticals. He talked about an Israeli company that has built a robotic arm which provides touch feedback, with the goal of being able to replace whatever functionality someone has lost, including abilities like throwing a Major League fastball or playing the piano professionally.

Prof. Selin reported a conversation she had with people at the law school about enhancement and whether it would affect application procedures. They indicated that it wouldn't, that enhancement was no different to them than giving piano lessons to children or their having the benefit of a good upbringing. Garreau commented that his latest client is the NFL, and observed that body building has already divided into two leagues, the tested and the untested. The tested have to be free of drugs, untested is anything goes. He asked, "can you imagine this bifurcation in other sports? How far back do you want to back out technology to get to 'natural'? Imagine a shoeless football league." He noted that one person suggested that football minus technology is rugby. [This reminded me of the old Saturday Night Live skit about the "All Drug Olympics."]

All-in-all, it was an interesting talk that had some overlap with things that I'm very interested in pursuing in my program, especially regarding top-down vs. bottom-up organizational structures. Afterward, I spoke briefly with Garreau about how bottom-up skeptical organizations are proliferating and top-down skeptical organizations are trying to capitalize on it, and I wondered to what extent the new creations of bottom-up organizations tend to get co-opted and controlled by top-down organizations in the end. In that regard, I also talked to him a bit about Robert Neuwirth's work on "shadow cities" and the Kowloon Walled City, where new forms of regulatory order arise in jurisdictional no-man's-lands (I could also have mentioned pirate codes). Those cases fall between the cracks for geographical reasons, while the cases that are occurring with regard to GRIN technologies fall between the cracks for temporal reasons, but it seems to me there's still the possibility of the old-style institutions to catch up and take control.

UPDATE: As a postscript, I recently listened to the episode of the Philosophy Bites podcast on human enhancement with philosopher Allen Buchanan, who was at the University of Arizona when I went to grad school there. Good stuff.