Showing posts with label technology. Show all posts
Showing posts with label technology. Show all posts

Sunday, December 21, 2008

Unintended side-effects of speed cameras

In Montgomery County, Maryland, teens have found a new use for speed cameras--getting revenge on people they don't like or who have wronged them. Since the tickets from photo radar cameras are issued to the owners of the cars whose license plates are captured, they print out fake license plates on glossy photo paper, stick them over their own license plates, and then go out speeding.

This shows yet another flaw in the photo radar ticket process. I've speculated that registering your cars in the name of an LLC or trust is probably sufficient to make it difficult to assign individual responsibility to a speeding incident.

UPDATE (December 23, 2008): In Australia, an even more creative revenge against a mobile speed camera--have it issue tickets to itself! They could have just noted the plate number and followed the example of the Maryland teens, rather than stealing the actual plate... (Thanks, Adam, for the link.)

Wednesday, December 17, 2008

Jeff Jacobsen article on Anonymous protests against Scientology

Jeff Jacobsen has written a detailed article about the Anonymous protests against Scientology, which brings the reader up-to-date on Internet-supported counter-Scientology protesting since the article we wrote for Skeptic in 1995, "Scientology v. the Internet: Free Speech and Copyright Infringement on the Information Superhighway."

The new article is called "We Are Legion: Anonymous and the War on Scientology." Check it out.

Friday, November 14, 2008

White House may be forced to recover "lost" emails

Lawsuits by the National Security Archive of George Washington University and the watchdog group Citizens for Responsibility and Ethics in Washington (CREW) have won a ruling from a U.S. district court judge that the White House can be forced to recover the five million "lost" emails that were deleted between March 2003 and October 2005. Those emails were required to have been preserved under the Presidential Records Act. Another set of emails from the office of Vice President Dick Cheney from September 30, 2003 to October 6, 2003 were found to be "lost and unrecoverable" by an Office of Administration investigation.

65,000 backup tapes have been preserved as part of the litigation, and those tapes will apparently be available for review to recover some of the five million lost emails.

More details at IntelDaily.

Sunday, September 21, 2008

Google to close Arizona office

Google is closing its office in Tempe, Arizona on November 21. It's also closing offices in Denver and Dallas.

Alan Eustace, SVP of Engineering & Research, writes at Google's blog:
At Google, engineering is everything - no great engineers, no life enhancing products, no happy users. So we've spent a lot of time structuring our engineering operations to make the most of the exceptional talent that's available across America - developing local centers that give engineers the autonomy and opportunity to be truly innovative. These principles have served us well as we've grown, so when the model fails, it's doubly disappointing.

We opened our Phoenix office in 2006 and hoped that it would develop to support many of our internal engineering projects, the systems that make Google, well, Google. But we've found that despite everyone's best efforts, the projects our engineers have been working on in Arizona have been, and remain, highly fragmented. So after a lot of soul searching we have decided to incorporate work on these projects into teams elsewhere at Google. We will therefore be closing our Arizona office on November 21, 2008.

We'd like to thank everyone involved in this project for their energy and enthusiasm: our engineers; the engineering community in Arizona; Arizona State University; the city of Tempe; and the greater Phoenix area. We are now working with the Phoenix Googlers to transition them to other locations, or to identify other opportunities for them at Google.
I've been expecting to see Google start cutting back on expenses in various ways, as it seems to me that their model of business, with huge per-employee expenses, isn't sustainable for the long term. Apparently it's also the case that it's not cost-effective to put separate engineering centers in many locations--they probably need a critical mass of engineers and profitable projects that they didn't get here. This is probably good news for other high-tech companies and startups in Phoenix, as those Googlers who wish to stay in the Valley become available talent.

Saturday, September 20, 2008

Largest corporate bankruptcies in U.S. history

At Trading Markets is a story about the largest corporate bankruptcies in U.S. history, with the recent Chapter 11 filing of Lehman Brothers Holdings Inc. at the top of the list.

At #9 on the list is my employer, Global Crossing Ltd., about which the article says:

Hurt by a sluggish demand and declining prices for bandwidth capacity, and burdened by a heavy debt load, telecom company Global Crossing Ltd. filed for Chapter 11 bankruptcy on January 28, 2002. At the time of filing, Global Crossing had $30 billion in assets and $12 billion in debts.

In December 2003, Singapore Technologies Telemedia acquired a 61.5% equity share in Global Crossing for $250 million, paving way for the troubled telecom company to exit Chapter 11. In addition, Singapore Technologies Telemedia agreed to purchase $200 million in senior secured notes that were meant to be distributed to former creditors. Global Crossing used the $200 million cash to pay off its creditors.

The company emerged from bankruptcy on December 9, 2003. By the time, Global Crossing exited bankruptcy, its debt was reduced to a mere $200 million from $11 billion at the end of 2001, including $1 billion of Asia Global Crossing debt. As of the most-recent quarter ended June 30, 2008, Global Crossing's total debt was $1.45 billion and for the past 52-weeks, the shares have been trading in the range of $14.54 - $24.75.

There's much more that could be said about that. For some of the other companies, the article reports on employee layoffs. Global Crossing went from a peak of nearly 15,000 employees down to just above 3,000, a process that was painful for both those who were laid off and those who remained and had to pick up the slack. The process was much-needed, however, and forced consolidation of acquired assets that had been operating in separate silos with separate management structures, eliminated many middle management positions, saw the departures of almost all senior management, and resulted in improved network performance and customer satisfaction ratings and subsequent growth in number of customers and customer traffic on the network. Global Crossing remained a tier 1 network provider through the bankruptcy, and is now #3 on Renesys' list of the top 25 Internet service providers by customer base.

EFF sues the NSA, Bush, Cheney, Addington, etc.

The Electronic Frontier Foundation has filed Jewel v. NSA to try another tactic in stopping unconstitutional warrantless wiretapping of U.S. residents. Their previous lawsuit against AT&T, Hepting v. AT&T, is still in federal court as the EFF argues with the government over whether the telecom immunity law passed by our spineless Congress is itself constitutional or applicable to the case.

Jewel v. NSA names as defendants the National Security Agency, President George W. Bush, Vice President Dick Cheney, Cheney's chief of staff David Addington, former Attorney General Alberto Gonzales, and "other individuals who ordered or participated in warrantless domestic surveillance."

Wednesday, September 17, 2008

Sarah Palin's Yahoo account hacked

Sarah Palin has apparently been using a personal email account for State of Alaska business (perhaps following Republican precedent on how to avoid subpoenas?), and it's been compromised.

Wikileaks has the documents.

UPDATE (September 19, 2008): The screenshots used by the attacker showed that he used ctunnel as his web proxy, and contained enough information to identify his source IP in ctunnel's logs.

As pointed out by commenter Schtacky, it looks like they've identified the culprit, who used some Google research and Yahoo's password recovery feature to change the password on the account to break in.

This shows the problem with choosing "security questions" for password recovery that have answers which are easily publicly available.

I hope that this kid's actions don't sabotage the corruption case against Palin that may have been supported by evidence in her Yahoo email, evidence that is now tainted by the fact that it was compromised (and subsequently deleted).

Friday, September 12, 2008

Virginia Supreme Court strikes down anti-spam law

Spammer Julian Jaynes now gets off as a result of a bad decision from the Virginia Supreme Court, reversing its own previous decision from six months ago.

The court ruled that the Virginia anti-spam law's prohibition of header falsification constitutes an unconstitutional infringement of the right to anonymous political and religious speech, suggesting that it would have been acceptable of it was limited to commercial speech.

The court's decision was predicated on the assumption that header falsification is a necessary requirement for anonymity, but this is a faulty assumption. All that is needed for anonymity is the omission of identity information that leads back to an individual, not the falsification of headers or identity information. That can be done with remailers, proxies, and anonymously-obtained email accounts, with no header falsification required. I previously made this argument in more detail in response to the arguments given by Jaynes' attorney in the press.

I also disagree with the court's apparent assumption that commercial speech is deserving of less protection than religious or political speech. What makes spam a problem is its unsolicited bulk nature, not its specific content.

Wednesday, September 03, 2008

Misinformation about Google's Chrome EULA

Adam Frucci at Gizmodo writes:
So, are you enjoying the snappy, clean performance of Google Chrome since downloading yesterday? If so, you might want to take a closer peek at the end user license agreement you didn't pay any attention to when downloading and installing it. Because according to what you agreed to, Google owns everything you publish and create while using Chrome. Ah-whaaa?
This is false. The EULA doesn't transfer ownership of anything. The provision that has everyone upset is the rather broadly worded provision 11.1:
11.1 You retain copyright and any other rights you already hold in Content which you submit, post or display on or through, the Services. By submitting, posting or displaying the content you give Google a perpetual, irrevocable, worldwide, royalty-free, and non-exclusive license to reproduce, adapt, modify, translate, publish, publicly perform, publicly display and distribute any Content which you submit, post or display on or through, the Services. This license is for the sole purpose of enabling Google to display, distribute and promote the Services and may be revoked for certain Services as defined in the Additional Terms of those Services.
Note that the very first sentence says that you retain all intellectual property rights. This gives Google the rights to do the things it already does--let other people play YouTube videos you upload, syndicate your Blogger content, store cached versions of your web pages, allow people to see versions of your web pages translated into other languages, display thumbnails of images on your web pages in Google Images search, and so forth. The last sentence appears to limit it solely for the purpose "to display, distribute and promote the Services" and not allow them to, say, use your content in order to compete with you, undermine your intellectual property rights, etc.

An earlier provision in the EULA also makes this explicit:
9.4 Other than the limited license set forth in Section 11, Google acknowledges and agrees that it obtains no right, title or interest from you (or your licensors) under these Terms in or to any Content that you submit, post, transmit or display on, or through, the Services, including any intellectual property rights which subsist in that Content (whether those rights happen to be registered or not, and wherever in the world those rights may exist). Unless you have agreed otherwise in writing with Google, you agree that you are responsible for protecting and enforcing those rights and that Google has no obligation to do so on your behalf.
So even if 11.1 is a bit too broad, there's this provision to fall back on if you feel your intellectual property rights are being infringed.

Some commenters at Gizmodo said that they didn't agree with this provision and therefore have uninstalled the software, but that's not sufficient to terminate this agreement. Terminating the agreement requires you to give notice to Google in writing and close all of your accounts with them:
13.2 If you want to terminate your legal agreement with Google, you may do so by (a) notifying Google at any time and (b) closing your accounts for all of the Services which you use, where Google has made this option available to you. Your notice should be sent, in writing, to Google’s address which is set out at the beginning of these Terms.
One thing that is clear from these terms is that Google definitely wants to interpose itself between user and content in a manner similar to what Microsoft has done for years with Windows, and in a much stickier way than telecom providers are between user and content. If you have network neutrality concerns about telecom providers or had antitrust concerns about Microsoft's bundling of the Internet Explorer web browser with Windows, you should probably have similar concerns about Google, given the way use of its browser is bundled with an EULA covering all of its services. Shouldn't I be able to discontinue this EULA by getting rid of the browser, and not by terminating all of my accounts with Google? Will there be a lawsuit about unbundling the Google Chrome browser from the rest of its services?

UPDATE: Ars Technica reports that Google says this was an error and they will be correcting the license, which was borrowed from other Google services, apparently without careful review. It also notes that since Chrome is distributed under an open license, users can download the source code and compile it themselves without being bound by the agreement.

The major flaw in the 11.1 language is that it gives Google the right to publish content you merely "display" in the browser, even if it's private content on a local server or restricted content from a secured website. That clearly wasn't their intent, but that's an implication of how it was written.

Thursday, August 28, 2008

Military botnets article

I'm quoted in Peter Buxbaum's "Battling Botnets" article in the August 20, 2008 Military Information Technology. It didn't really fully capture the points I made in the interview, and I don't remember saying the statement at the end about using botnets as an offensive measure as "a nuclear option." I said that nullrouting is a much better method of denial of service for network service providers than flooding attacks, and made a point similar to Schneier's about military attacks on the infrastructure of another nation that the U.S. is at war with--it would be more useful to obtain access to their systems, monitor, and disrupt than to just shut off access completely, but those points weren't reflected in the article.

I've written more about military use of botnets at this blog.

Tuesday, August 12, 2008

The dangers of digital drugs

Kim Komando (who at least used to be based here in Phoenix) is promoting nonsense about "digital drugs":

But websites are targeting your children with so-called digital drugs. These are audio files designed to induce drug-like effects.

All your child needs is a music player and headphones.

Digital drugs supposedly synchronize your brain waves with the sound. Hence, they allegedly alter your mental state.

Binaural beats create a beating sound. Other noises may be included with binaural beats. This is intended to mask their unpleasant sound.

Some sites provide binaural beats that have innocuous effects. For example, some claim to help you develop extrasensory powers like telepathy and psychokinesis.

Other sites offer therapeutic binaural beats. They help you relax or meditate. Some allegedly help you overcome addiction or anxiety. Others purport to help you lose weight or eliminate gray hair.

However, most sites are more sinister. They sell audio files ("doses") that supposedly mimic the effects of alcohol and marijuana.

But it doesn't end there. You'll find doses that purportedly mimic the effects of LSD, crack, heroin and other hard drugs. There are also doses of a sexual nature. I even found ones that supposedly simulate heaven and hell.

Many are skeptical about the effects of digital drugs. Few scientific studies have been conducted on binaural beats. However, a Duke University study suggests that they can affect mood and motor performance.

Dr. Nicholas Theodore, a brain surgeon at Barrow Neurological Institute in Phoenix, said there is no real evidence that idosers work. [emphasis added] But he noted that musical preference is indicative of emotional vulnerability. Trying idosers could indicate a willingness to experiment with drugs and other dangerous behavior.

Theodore added that idosers are another reason to monitor kids' Internet usage. And, he said, kids need frank talks with their parents about correct choices.

...

Let's think about this for a moment. The sites claim binaural beats cause the same effects as illegal drugs. These drugs impair coordination and can cause hallucinations. They've caused countless fatal accidents, like traffic collisions.

If binaural beats work as promised, they are not safe. They could also create a placebo effect. The expectation elicits the response. Again, this is unsafe.

At the very least, digital drugs promote drug use. Some sites say binaural beats can be used with illegal drugs.

At least she doesn't call for new laws. I'd endorse consumer civil complaints, if not fraud charges, against sellers of bogus products, which would include the so-called "therapeutic" binaural beats just as much as the allegedly "sinister" ones.

(Via The Agitator.)

Monday, August 11, 2008

"In our corporate DNA"

Yesterday while getting my car serviced, I noticed that Toyota's brochure about its latest vehicles says on the back that "Moving Forward is in our DNA," and became annoyed. "X is in our corporate DNA" has become an incredibly popular marketing buzzphrase lately, and I've heard it said for some value of X in almost every vendor presentation I've heard this year. My thought yesterday was that I don't really care if X is in the genotype if it isn't expressed in the phenotype. If the company really wants to make the point that X is a core competency or value, saying "it's in our DNA" isn't really an accurate way of putting it.

So this morning I did a search to see if any biologists have commented on this buzzphrase, and was pleased to see that Keith Robison commented on it last December:
The question posed is this: what do companies asking this really mean, or more specifically what might it mean that they don't intend (very Dilbert-esque). Presumably they are trying to make a statement about deeply embedded values, but what does it really mean to have something in your DNA? For example, do they mean to imply:
  • A lot of our company is unfathomable to the human mind
  • There's a lot of redundancy here
  • Often we often repeat ourselves often repeatedly, often repeating repetitiously.
  • We retain bits of those who invade our corporate DNA, though with not much rhyme or reason
  • A lot of pieces of the organization resemble decayed portions of other pieces of our organization
  • Some pieces of our organization are non-functional, though they closely resemble functional pieces of related organizations
  • Most of our organization has no immediate impact on routine operations, or emergency ones
  • Most of our organization has no immediate obvious purpose, if any
  • Our corporate practices are not the best designable, but rather reflect an accumulation of historical accidents
Now, many of these statements may well be true about a given company, but is that what you really want to project?
This gives me some great ideas on how to respond the next time I hear a vendor use the phrase.

Monday, August 04, 2008

Is online journal publication shrinking the long tail?

Chris Anderson's book, The Long Tail, showed how the Internet has made it possible for business models that focus on small niche markets rather than mass markets to be successful. While a bricks-and-mortar bookstore will typically have at most a couple hundred thousand titles and make most of its money from bestsellers, Amazon.com can list millions of titles and makes a quarter to a third of its revenue from the "long tail" of books that are not in the top 100,000 sellers.

One might think that putting science journals online would mean that more obscure articles would get greater readership, but a study by James Evans published in Science argues that as more journals are published online, fewer articles are being cited, and those that are tend to be more recently published. While the ability to search online by keywords means that an author of a scientific paper is unlikely to overlook any published paper containing those keywords, it also means that authors are less likely to look at other articles published in the same issues or run into articles that may be related in the big picture but don't contain the selected keywords. Evans found that for each additional year of back issues available online, the average age of articles cited in that journal fell by a month. He predicts that for the average journal, adding five years of back issues online results in a drop in the number of articles cited per year from 600 to 200.

The concern here is similar to the concern about online social networks that become narrowly focused--that people are missing exposure to ideas that they might have previously come across, now that they can select more specifically the items they want. I'm not sure how seriously to take this concern. In my own case, I don't feel like the Internet is causing me to overspecialize, rather it's providing me with access to all sorts of information I wouldn't previously have run into. I don't feel like the Internet is in danger of subdividing into sections of compartmentalized information the way that Bill Bishop's book, The Big Sort, suggests people are forming physical like-minded clusters of neighborhoods. I wonder if Evans would have found different results if, instead of looking at journal citations, he looked at the role being played by electronic publications such as blogs and mailing lists, where I suspect there is increasing interdisciplinary cross-pollination.

(Via The Economist, July 19, 2008, p. 89.)

Friday, August 01, 2008

Expert tells China visitors to encrypt data as U.S. announces policy of laptop seizure

I saw two articles this morning which I think invite comparison. First, Phil Dunkelberger, CEO of PGP Corporation, says people visiting China should take laptops with no data, or encrypt what data they have:

Travelers carrying smart cell phones, blackberries or laptop computers could unwittingly be offering up sensitive personal or business information to officials who monitor state-controlled telecommunications carriers, Dunkelberger said.

He said that without data encryption, executives could have business plans or designs pilfered, while journalists' lists of contacts could be exposed, putting sources at risk.

Dunkelberger said that during unrest in Tibet in March, overseas Tibetan activists found their computer systems under heavy pressure from Chinese security agencies trying to trace digital communications.

"What the Chinese tried to do was infiltrate their security to see who in China the Tibet movement was talking to," he said.

...

Dunkelberger, whose firm serves many multinational corporations operating in China, said, "A lot of places in the world, including China, don't have the same view of personal space and privacy that we do in the United States."

"You've got to suspect that every place you're doing work is being monitored and being watched," he said.

Dunkelberger's advice is good as far as it goes. Of course, PGP Whole Disk Encryption won't help protect data in transit, and while PGP Email will protect the content of email messages, it won't conceal the source and destination. The threat described is one where traffic analysis enough can reveal a lot, and so you'd want to make use of a corporate VPN, some kind of proxy, or a system like TOR if you want to protect information about where your Internet traffic is ultimately going. PGP is a good company that makes great products; my employer uses PGP Whole Disk Encryption and Email products.

The second article, however, casts some doubt on the last part of what Dunkelberger says. It looks like the U.S., where the NSA engages in warrantless wiretapping with the assistance of the large incumbent telecoms (and a spineless Congress gives them immunity for violations of the law), the CIA spies on foreign visitors within the borders of the U.S. in conjunction with the FBI's counterintelligence division, isn't so different from other countries. It's now publicly admitted by DHS that Immigrations and Customs Enforcement officers have the right to seize laptops and other electronic devices from people entering the U.S. and hang on to them indefinitely in order to search them. Therefore Dunkelberger's advice should be taken by anyone coming into the U.S., as well--use blank laptops or laptops with encryption only. Some companies have begun to only allow employees to have a web browser and a VPN client on their laptops, and keep all data in the corporation, which can completely eliminate this particular governmental risk.

Sunday, July 20, 2008

Did Diebold tamper with Georgia's 2002 elections?

Former McCain advisor and security researcher Stephen Spoonamore suggested at a press conference on Thursday that Diebold tampered with Georgia's 2002 elections for Governor and Senator, in which Republican Sen. Saxby Chambliss defeated incumbent Democrat Sen. Max Cleland. Spoonamore was given a copy of a patch applied to Diebold machines in two strongly Democratic counties, DeKalb and Fulton, by Diebold CEO Bob Urosevich, allegedly in order to fix a clock-related problem. Spoonamore found that the patch did nothing to correct the clock problem, and contained two copies of the same program, but was unable to determine exactly what it did without access to the Diebold hardware. He has supplied a copy of the patch, which he obtained from a whistleblower in the Georgia Secretary of State's office, to the Department of Justice.

Saturday, July 19, 2008

Netroots and telecom

There's a telecom panel at the Netroots Nation conference today on the subject of "Big Telecom: An Emerging Threat to Our Democracy?" The implied answer is yes, and it appears that every participant on the panel will be making that case. Here's the description of the panel:
Massive telecom companies control virtually all of our voice and internet communications these days—and new evidence shows a near-total lack of commitment to our democracy. AT&T has proposed filtering all content traveling on its network. Verizon tried initially to block NARAL's pro-choice text messages. Most telecom companies are fighting net neutrality. Can democracy survive an assault by those who control the tubes?
The panel members don't include anyone with any experience managing or operating an actual telecom network, but instead includes two people who have repeatedly demonstrated not only an ignorance of telecom law, technology, and policy, but who have misrepresented facts and failed to engage with the arguments of their critics, Matt Stoller and Timothy Karr (see posts on this blog in the "net neutrality" category). The closest person to a representative of a telecom is Michael Kieschnick of Working Assets, a company that is a reseller of long distance and wireless service on Sprint's network.

I agree with many of their positions--I don't think ISPs should be allowed to block websites on the basis of disagreement with content. I think ISPs should be transparent about their network management processes and filtering. Where I disagree with them is that they advocate that the FCC step in to regulate the Internet in a way that it has never had authority to do so before, and demand that network operators not be allowed to implement classes of service with different rates of charges, or even usage caps. Art Brodsky expresses the point which has also been made by Robb Topolsky of Public Knowledge, Timothy Karr of Free Press, and Matt Stoller:
In the name of "network management," some companies want to throttle down the use of legal applications, like BitTorrent which may, coincidentally, provide competition in entertainment programming. They want to impose usage caps across the board on all customers which would stifle innovation and curb the use of video (there's that anti-competitive meme again) without actually solving the problem of the so-called "bandwidth hogs." The way caps are being discussed now, they would only lead to higher prices and less usage for an industry that already charges more for less than most broadband providers around the world. Parts of our broadband industry may be the only sector in the world that wants to cut down the amount of its product it wants customers to use.
Brodsky's last sentence is clearly false--broadband is like a fixed-price all-you-can-eat buffet. All businesses want to maximize their profits by maximizing revenue and minimizing costs. When bandwidth is sold at a fixed cost in unlimited amounts, where a small number of users are consuming the majority of the service, it's in the business's interest to restrict those users or charge them more for what they consume in order to satisfy the rest in a cost-effective manner. The options are few--you can either restrict the "bandwidth hogs" in some way, charge them more so that they pay for what they use, or raise the price for everyone. These guys seem to advocate the latter approach, while I'm in favor of allowing all the options to be used in a competitive market. Where I disagree with Comcast's approach in issuing RST packets to block BitTorrent traffic is not that they did it, but that they were not transparent about what they were doing (and apparently didn't quite get it quite right--it should not have completely broken BitTorrent, but only slowed it down).

Brodsky's suggestion that Comcast has an interest in blocking BitTorrent because it provides competition in the entertainment space is absurd--they have an interest in blocking it because it's a very popular application which itself exploits Internet protocols in a way not anticipated by the designers in order to consume more bandwidth, getting around the congestion controls in TCP/IP by using multiple TCP streams. If BitTorrent traffic wasn't filling up the majority of Comcast's bandwidth, they'd have no interest in it, except when the MPAA and RIAA issue them subpoenas about their users infringing copyrights.

If the government prohibits the use of differential classes of service (which is already heavily used by private companies to give priority to applications within their enterprise which have requirements for low latency and jitter, such as real-time streaming audio and video, including Voice over IP) and requires that congestion be dealt with by building out infrastructure sufficiently that there will never be congestion no matter how many users max out their connectivity with BitTorrent, that will reduce competition by culling smaller companies out of the picture and making market entry more difficult. In any environment where a provider's upstream capacity is less than the sum of the capacity to every customer (and that's everywhere, today, and always has been), all-you-can-eat bandwidth is like a commons. The more that is available, the more the heavy users will consume, to the detriment of each other and the light users. Without setting caps and having tiered pricing or implementing technology that prioritizes packets and drops from the heavy users and from less-realtime-sensitive applications first (like BitTorrent), there are no incentives against consuming everything that is available.

I also think it's a huge mistake to have the FCC start regulating the Internet. FCC chairman Kevin Martin would no doubt love to place indecency standards and filtering requirements on Internet content. Once you open the door to FCC regulation of the Internet, that becomes more likely. And the FCC has been completely ineffectual at dealing with existing abuses like fraudulent telemarketing, illegal prerecord calls to residences and cell phones, caller ID spoofing, etc., already covered by statute and regulation. I'd rather see clear statutes that include private rights of action than entrust control of the Internet to the FCC. The FCC is a slow-moving bureaucracy, and AT&T and Verizon have the deepest pockets, the most lawyers, and the most personnel who have shuffled back and forth between government (including the NSA) and industry. That gives AT&T and Verizon the tactical advantage, and leads to less competition rather than more.

Which brings me to the warrantless wiretapping and telecom immunity issues, which Cindy Cohn of the EFF no doubt addressed on the Netroots Nation panel. I suspect I have little if any disagreement with her. I've long been a supporter of the EFF, as are many people involved in the management of ISPs. I strongly oppose telecom immunity for warrantless wiretapping, a complete abdication of Congress' responsibility to support the U.S. Constitution. But this shows the power of AT&T and Verizon. Not only did they get what they wanted, but the very infrastructure which was built to do this massive interception of traffic for the NSA and for law enforcement interception under the CALEA laws was built for them with assistance from government funds. All telecoms have to be compliant with CALEA (now including VoIP and broadband Internet providers), but the big incumbents who were most capable of affording it on their own got it at the lowest costs, while their competition was required to build it out at their own expense even if it never gets used.

But there are legitimate uses for deep packet inspection, for understanding the nature of the traffic on a network for management purposes, including tracking down security and abuse issues. Since it is in the hands of the end user to use encryption to protect sensitive content, I think use of DPI by network providers is reasonable for the purposes of providing better service in the same way that it's reasonable for a voice provider to intercept traffic for quality measurement purposes. It's also reasonable for interception to occur for "lawful intercept," but it should always require a court order (i.e., both executive and judicial branch approval) on reasonable grounds. The difficulty of obtaining wiretaps depicted in the television program "The Wire" is how it should be.

I've written a lot on these issues, much which can be found in this blog's Network Neutrality Index.

If any reader of this blog happens to have attended the Netroots Nation telecom panel or comes across a description of its content, please point me to it, as I'd like to see what was said. I don't have high hopes for the accuracy or reasonability of statements from Stoller and Karr, but I could be surprised, and the other panelists probably had interesting and important things to say.

(See my Blogger profile for the disclosure of my employment by Global Crossing, which is currently listed by Renesys as the #3 network provider on the Internet in terms of number of customers, ahead of AT&T and Verizon, behind Sprint and Level 3.)

UPDATE: The "Big Telecom" panel was live-blogged (dead, unarchived link: http://openleft.com/showDiary.do;jsessionid=C865142FFB85E14AAD27045B9A342B15?diaryId=7032"). Stoller's anecdote about the Bill of Rights on metal is referring to Dean Cameron's "security edition" of the Bill of Rights, which was also promoted by Penn Jillette.

San Francisco's city network held hostage

The mainstream media has reported the arrest of the City of San Francisco's network administrator, being held on $5 million bond, as though he had secretly taken control of the city's network and servers and held them hostage, and implies that he has access to data stored on servers on the network. The reality, however, appears to be somewhat different.

Paul Venezia at InfoWorld has dug a little deeper, and found that Terry Childs, a Cisco Certified Internetwork Expert (CCIE, Cisco's top certification), was responsible for managing San Francisco's "FiberWAN" MPLS network, which he, though not the top network architect, built and managed himself. He has always been the only one with access, which he protected vigorously for fear that no one else around him was competent to do so. His paranoia seems to me excessive and misplaced--the risk of no one else having access is itself a single point of failure, and the fact that he originally refused to write remote configuration to flash, meaning that in the event of power failure the devices would not come back up and function properly without intervention, shows him to be a bit off.

Childs never "tampered" with any system or network device to take it hostage, he simply maintained control of what he built and refused to give others access to it. He never has had control of any servers or databases apart from the ones directly involved in managing the network, such as the authentication servers for the network. So the talk of data being stored on the network including "officials' e-mails, city payroll files, confidential law enforcement documents and jail bookings" appears to be irrelevant. Nothing has been done to prevent anyone from accessing any of those things or to gain unauthorized access to them; the network is still up and functioning normally, and Childs didn't have any special access to or manage or control the host-level access to the servers with that data. Now, he was probably able to intercept data transmitted on the network (necessary for troubleshooting), but if sensitive data was only accessed via encrypted sessions, even that risk wouldn't exist.

Childs' problem appears to be that he was overprotective, untrusting of the competence of his peers and management (perhaps with some justification), and placed technological purity and security over business requirements. Not unusual features for people with a very high level of technical skill.

Check out Venezia's article--it looks to me like he's got the goods on this story.

UPDATE (July 23, 2008): Childs gave up the passwords to San Francisco Mayor Gavin Newsom, after a secret visit arranged by his attorney, Erin Crane, with the mayor. Childs' attorney's statements are consistent with Venezia's article:

In her motion to reduce bail, Crane said Childs had been the victim of a "bad faith" effort to force him out of his post by incompetent city officials whose meddling was jeopardizing the network Childs had built. At one point, she said, Childs discovered that the network was at risk of being infected with a computer virus introduced by a colleague.

"Mr. Childs had good reason to be protective of the password," Crane said. "His co-workers and supervisors had in the past maliciously damaged the system themselves, hindered his ability to maintain it ... and shown complete indifference to maintaining it themselves.

"He was the only person in that department capable of running that system," Crane said. "There have been no established policies in place to even dictate who would be the appropriate person to hand over the password to."

The defense attorney added that "to the extent that Mr. Childs refused to turn over the password ... this was not a danger to the public."

Childs intends to fight the computer tampering charges:
Referring to the felony computer-tampering counts, Crane said, "Mr. Childs intends to not only disprove those charges, but also expose the utter mismanagement, negligence and corruption at (the Technology Department) which, if left unchecked, will in fact place the city of San Francisco in danger."
UPDATE (September 11, 2008): Venezia has a new story about the latest round of motions in the Childs case, where the prosecution has filed some apparently technically inept documents. I've also come across an affidavit supporting Childs' arrest from SFPD Inspector James Ramsey (PDF), which presents a very strong case that Childs was up to no good--he had set up his own racks of equipment including modems in a training room, was running his own mail servers and intrusion detection systems, and connecting his own personal equipment to the network. He had cut holes in a locked cabinet next to his cubicle to run cables into them, where he had placed a dialup modem and a computer to allow himself unauthorized access to the city network. The guy seems like a bit of a nut who was engaged in some highly inappropriate behavior meriting termination and criminal prosecution.

UPDATE (August 22, 2009): The judge in the Childs case, Superior Court Judge Kevin McCarthy, has dismissed three charges of tampering, leaving one count related to his initial refusal to give up the passwords, which has a maximum sentence of five years. Childs has served over a year in jail, due to his inability to raise $5 million in bail. He will appear in court on Monday regarding the final charge. Childs gave up the passwords to San Francisco mayor Gavin Newsom after spending eight days in jail.

Wednesday, July 02, 2008

The Amazing Meeting 6 summarized, part five

This is part five of my summary of The Amazing Meeting 6 (intro, part one, part two, part three, part four).

Continuing my descriptions of Sunday's paper presentations...

Lee Graham on "Artificial Creatures, Real Evolution": Lee Graham, a Ph.D. student in computer science and member of the Ottawa Skeptics, gave a fascinating presentation about his 3D virtual creature evolution program (3DVCE), which he said was inspired by and based on 1994 work by Karl Sims of Thinking Machines Corporation on "Evolved Virtual Creatures." He developed software to evolve simulated creatures. The simulated creatures have perceptual sensors that detect surface inclines, contact, and proprioception (position of body parts), he measured fitness in terms of distance traveled, jump height, etc., and then engaged in selection of parents and reproduction based on that fitness, producing new offspring with both mutations and crossover (mixing of genes from the parents). While it is far from a complete model of evolution--lacking such features as food and environmental threats such as predators--it is sufficient to show that new complexity can evolve.

He showed a video of various creatures that evolved in the world, such as an interesting worm-like creature he called an "end-over-end worm," and then asked where does the complexity and information come from? There's the fitness function, the choice of primitive components, and the environment, each of which have counterparts in reality. But the real answer is from the process of variation plus selection. The development of complexity simply does not require top-down design.

Christopher French on anomalistic psychology: French, founder of the Anomalistic Psychology Research Unit at Goldsmiths College, University of London, gave a talk that was supposed to be about his own research, but there was a mixup with presentations and it was an earlier version of his talk. APRU does research, teaching, and public education on anomalistic psychology, a field that I believe was first named by Leonard Zusne and Warren Jones' book, Anomalistic Psychology: A Study of Magical Thinking (the second edition from 1989 now sells for $129.45, I wonder what my first edition is worth?).

Tim Farley of whatstheharm.net on "Building Internet Tools for Skeptics": Tim Farley gave an excellent talk about developing new technological tools using the web in order to promote skepticism and critical thinking. His talk used a minimalist approach on his presentation, with slides containing individual words and phrases about each point he discussed (a technique promoted by Larry Lessig and known as the "Lessig Method" or the "Takahashi Method"). Farley spoke about the battle on the Internet between information and misinformation. Skeptics are using blogs, social networks, social linking, and search engines (e.g., Google bombing), but these methods are ad hoc and tend to promote preaching to the choir. We need to extend our reach and be more systematic, making use of new Web 2.0 methods for community, specialization, programmability, and mashups. Farley suggested the following steps to apply Web 2.0 to skepticism: work smarter, not harder--use services like Yahoo Pipes to filter RSS feeds to present on web pages. Specialize--find and fill a niche. Open up your data, so that others can make use of it in their web pages. Mash up data--combine geocoded data with Google Maps, for example. Appeal to people who are neutral.

He's working on creating a filter that searches just believer sites, which will allow the ability to search the entire web minus the believer sites. whatstheharm.net is a collection of victim reports, and a useful rhetorical tool for answering the question when people ask, "What's the harm in believing X?"

He suggested that all sites should publish their data using RSS, use iCal for calendar information, and use microformats like hReview so that you can show approval or disapproval of the things you link to.

Farley strongly advocated the use of geocoding and geoRSS, as well as KML (like RSS for maps, used by Google Earth) in order to put links on maps. He gave the example of the Church of Scientology in Boston on Beacon Street, where there are links to YouTube videos of protests in the intersection near the facility on Google Earth.

He gave the examples of disbeliefnet.com, promoting Bill Maher's new film "Religulous," which has a section called The Heretic Press which uses Yahoo Pipes to automatically pull in crazy religious stories.

Farley's new site of tools for skeptics is called skeptools.com, and you can find a version of his presentation there. Check it out.

Brian Dunning of the "Skeptoid" podcast, on "The Skeptologists": Brian Dunning, executive producer of "The Skeptologists," showed the whole pilot episode, which had some over-the-top music. He brought on stage his fellow executive producer and director Ryan Johnson, and they described the show. Where most pilots are kept secret, they are making theirs widely known in order to promote skeptical interest. He took questions from the audience, one of the most interesting was, "Do you have any plans to show things that turn out to be true?" Unfortunately, the answer was no, though that they will try to show real science for things "that have some similarity to the bogus claims." This makes it more of a preconceived debunking show rather than promotion of science and critical thinking.

Conclusion
At the end of the conference, Hal Bidlack suggested that next year's TAM may have a panel discussion on who's been sued and for what, along with a lawyer, on steps to take to avoid lawsuits.

There may have been a bit more after that, but things were a bit behind schedule and I had to rush off to catch a shuttle to the airport, so that was the end of the conference for me.

Tuesday, July 01, 2008

David Byrne's singing robot

David Byrne has collaborated with David Hanson, the guy who made the Philip K. Dick robot at NextFest in 2005, to make a robot named Julio that sings, for a show titled "Machines and Souls: Digital Art" at the Museo de Arta Reina Sofia in Madrid.

Byrne writes:
I love where this is going. It brings to mind an image of someone sitting in a comfortable chair, maybe with friends, and maybe they’re having drinks—and at the same time Jentsch posits that layered over or under this image is the profoundly creepy, the deeply strange and disturbing. We’re in the land of David Lynch and Hitchcock. ET landing in the familiar U.S. suburbs could be viewed this way, or the various living dead and vampire movies.

More recently Japanese roboticist Masahiro Mori proposed the existence of something called the uncanny valley. This “valley” is an area of emotional uncertainty and often revulsion experienced by an observer when a robot or computer animation (for example) approaches being human, is almost believable, but not quite.

He suggests that our emotional empathy with animations and robots increases as they get closer and closer to being human (or animal)—but then, at a certain point, they fall into the valley, and our empathy turns to disgust. In his view they switch from being a cute thing approaching humanity to a bad or faulty version of humanity. It is at this point that we see them as not merely slightly strange, but as a human with serious problems. If the creation can succeed in being a little bit better as a believable creature the feeling of revulsion disappears. For some viewers, recent films like Beowulf fall into this valley, while others find the almost humans acceptable.

Mori further suggests that this reaction might be innate—that it might be linked to our biological reactions to people who are physically or mentally ill—or to corpses. Evolution would have ingrained this reaction as a way of weeding out sick people from the social group. Hanson and others dispute the scientific veracity of the uncanny valley, but I think no one can doubt the strange and weird emotions that well up when confronted by one of these entities.

The point about disgust brings to mind Antonio Damasio's work on emotions, as well as Pascal Boyer's comments about religious rituals for corpse disposal in Religion Explained.

In a subsequent post, as Julio nears completion, Byrne writes:
Like many animals, humans sing for pleasure, for sex, for attention, to express pain, to relieve angst and to join and participate in a social group. All of these urges seem, if not uniquely human, at least not at all machine like. To see machines mimic these aspects of human life, is to watch some part of our imagined souls being appropriated.
To see and hear video of Julio singing, check out Byrne's blog. The show "Máquinas y Almas: Arte digital" ("Machines and Souls: Digital Art") opened on June 25.

The Amazing Meeting 6 summarized, part four

This is part four of my summary of The Amazing Meeting 6 (intro, part one, part two, part three, part five).

Phil Plait

Astronomer Phil Plait of the Bad Astronomy blog began by saying that the Internet is "a system for rapidly distributing sewage," but also for distributing astronomy. His talk went through the solar system from Mercury to KBO 2004 XR 190 a/k/a "Buffy," with interesting photographs and facts about various planets and moons along the way.

Mercury: The 2004 MESSENGER probe took photographs of the Caloris basin, the single biggest feature on Mercury, originally thought to be 1300 km in diameter but revised upward to 1550 km based on those photos. Because Mercury spins twice for every three times it revolves around the sun, this basin is directly under the sun, every other orbit. It's a gigantic impact crater that's 3.8 to 3.9 billion years old.

Venus: The hottest planet, a hell hole about the size of earth and with about the same amount of carbon and just a little bit closer to the sun, but it suffers from a runaway greenhouse effect. It's been photographed by the Russian Venera probes from 1962 to 1982 and by Magellan in 1990.

Earth: Plait spoke of an HD movie of Earth shrinking into the distance as MESSENGER departed.

Phobos: This moon of Mars has a giant crater--had it been hit by anything bigger, Phobos would have disintegrated. Phobos is apparently a captured asteroid, which orbits backward from other moons in the solar system. Unlike Earth's moon, it is gradually getting closer to Mars, and will collide with it in about the next 50 million years, causing an impact greater than the asteroid that created the Yucatan basin.

Jupiter's acne: The Great Red Spot (Cassini, named after Jean-Dominique Cassini, who first observed it in 1655), a 400-year-old hurricane, has now been joined in 2000 by another little spot. The new spot was white but has now turned red and is known as Oval BA (or Red Jr.)--it is as large as the Earth.

Iapetus: This moon of Saturn has one light hemisphere and one dark, and was recently discovered to have a 20 km high ridge almost perfectly around its equator. (I remarked that it looks like a Death Star.)

Uranus: It's tipped 98 degrees on its side in its orbit, likely as a result of an impact from something very large, perhaps Earth-sized.

Neptune: The other blue planet, it contains lots of methane and emanates 1.6 times the heat it receives from the Sun. It has 2,200 kph winds. Where is that energy coming from?

Pluto: It's not a planet, so we don't care about it.

KBO 2004 XR 190 a/k/a "Buffy": This is an odd trans-Neptunian object--where almost all objects in the solar system have very elliptical orbits, it is an object 8.5 billion km from the Sun--twice the distance from the Sun of Neptune--yet its orbit is circular.

Plait concluded by noting that he hasn't even talked about the Sun, Milleomeda (what the galaxy will be after Andromeda and the Milky Way collide), or countless other things that we don't understand. But this lack of understanding doesn't mean we know nothing. "The universe is cool enough without making up crap about it. That's why I'm a skeptic."

Adam Savage
Adam Savage of "Mythbusters" brought a box of about 1,000 ping pong balls which were used to raise a boat from the bottom of Monterey Bay, and gave them out to members of the audience, and signed his autograph on many of them. He then gave a talk entitled "My Maltese Falcon," about his obsession with recreating a precise replica of one of the two lead sculptures from the movie of the same name. He did extensive research into its measurements, even paying to purchase used auction catalogs from Christie's to examine photographs. Joseph Warner gave one of the two lead ones to Joseph Conrad, one which Humphrey Bogart dropped and put a dent in. He sculpted one based on photographs, sprayed it with 75 coats of auto primer, then buffed and sanded it. He freeze framed every still from the original film in a scene where the statue was rotated. Someone offered to cast it in bronze for him, and he had two made--but the casting process caused it to lose size, and so his bronze model is 3/4" shorter in height at the beak, with the result that he hates it. At a conference he met the man who purchased William Conrad's lead statue, which he hopes to be able to scan and use to make the most accurate replica ever, which he'll report back on next year.

He showed a couple of world premiere viral videos--one in which he and Jamie simultaneously solved Rubik's cubes, one while blindfolded and the other with his feet. The footage was actually reversed--they started with solved cubes and then just messed them up. In a second video, he inhaled some helium and spoke with a high voice, then inhaled some sulfur hexafluoride (which he informed us is very expensive) and spoke with a deep voice, and everyone laughed. He said that someone (a producer?) thought that the cube video was cool, but that the balloon stunt was obviously faked.

He took questions and answers from the audience; a few highlights were that they want to do a full 60 minute show on the JFK assassination, Discovery has said no to "21 grams" (do we lose weight when we die), the Cheney shooting, vinyl vs. CD, and speaker cable vs. coat hanger.

His segment concluded with some footage of "explosion porn" from the show.

Matthew Chapman
Matthew Chapman, great-great grandson of Charles Darwin, screenwriter ("The Runaway Jury" and nine other films), and author (Trials of the Monkey and 40 Days and 40 Nights, the latter of which, about the Dover trial, I am currently reading), spoke about three things: Science Debate 2008, his love of America, and "Darwin, creationism, etc." He began with his love of America, noting that he had grown up in the 1950s and 1960s, raised by parents who read the New Yorker and were fans of Woody Allen, Mort Sahl, and Lenny Bruce, and so he always wanted to be an American. He moved to the U.S. to get into the film business, and went to L.A. A woman he knew to be educated asked him what his sign was--he thought she was kidding, but she was not. Ever since he has been fascinated with Americans' fondness for pseudoscience. He was invited to a "shack" (of the $5 million variety) in Malibu to see someone channel "Basha," and he couldn't help but laugh out loud. A woman present asked the channeler, "I have a potential development deal at Warner Brothers. What is Basha's advice?"

When he expressed indignation at such expressions of irrationality, he was told, "Oh, you're so rational" or "you're so British." He felt alone until he came across the Skeptical Inquirer magazine, and he promptly purchased and read every back issue. (I had a similar experience in my life--I read Skeptical Inquirer while still a religious believer, and also ended up purchasing and reading every back issue from cover to cover.) He became enraged by Scientology, UFOs, spontaneous human combustion, crystals, telepathy, Shirley MacLaine (who he's met), Nostradamus, pyramid power, etc. etc. While in an elevator with James Randi at an event in UCLA, he asked Randi if he'd heard of some Brazilian paranormalist (a psychic surgeon?), and Randi responded by pulling a pen out of his ear.

Despite the far more voluminous "loony bullshit" in the U.S. than in Europe, he still loves it here, and became an American citizen.

He next spoke about creationism. His book Trials of the Monkey was about his visit to Dayton, Tennessee to learn about the Scopes Trial, and he found that the people there today are much the same as they were back then. His newer book, 40 Days and 40 Nights, was written during and after his observation of the entirety of the Kitzmiller v. Dover trial, which he witnessed from the jury box (where the press sat, since it was a non-jury trial). Through the Dover trial, he learned that it is possible to make science interesting to non-scientists.

Finally, he talked about Science Debate 2008. As the political debate season began, he watched all the debates, expecting to see questions about ozone, ocean health, climate change, etc., but only saw questions about lapel pins, religion, etc. There were more questions about UFOs than about global warming. He suggested the idea of a debate on science at the Atheist Alliance confernece, and Chris Mooney, who he had met earlier, got on board, along with his fellow Intersection Science Blogger Sheril Kirshenbaum. Soon thereafter, John Rennie of Scientific American became a backer, and Lawrence Krauss of The Physics of Star Trek (Chapman inadvertently said "Star Wars") also joined. They ended up starting an organization and collecting over 50,000 signatures, including the support of 51 colleges, 5 museums, 10 magazines, 112 science organizations, 14 Congresspeople, 7 presidential science advisors, 143 CEOs of science and technology companies, 28 Nobelists, 102 college and university presidents, PBS, Nova, the Franklin Institute, the National Academy of Sciences, the American Association for the Advancement of Science, and even Newt Gingrich. A Harris poll says that 85% of voters would like to see a science debate.

But so far, all of the candidates have said no or failed to respond at all. Chapman said that McCain was the most polite in saying no, and seemed to leave the door open.

They've now developed 14 questions and are preparing a new invitation to be sent to Obama and McCain.

Chapman then took questions, and someone asked if there was any opposition from scientists on the grounds that this is politicizing science. Chapman said he's had negative reactions from about three scientists, one of whom was present at this conference.

After Chapman's talk, I had a chance to speak with him briefly (he noticed the NCSE Grand Canyon trip T-shirt I was wearing, and commented on what great people Genie Scott and Nick Matzke are), as well as with his wife, Denise, who was also present at the conference. Denise Chapman, a Brazilian who has acted in television and film (including "Kiss of the Spider Woman" and Woody Allen's "Radio Days"), is the daughter of composer and musician Humberto Teixeira, started Baiao music and was the composer of the popular Brazilian song "Asa Branca" ("White Wing"). She was pleased to hear that some friends of mine named their African grey parrot "Asa Cinza" ("Grey Wing") in honor of that song. She has been working on a documentary film about her father that will be premiering later this month at MoMA.

Richard Wiseman
British psychologist Richard Wiseman spoke a little bit about his book Quirkology, presented a few optical illusions, and commented about his obtaining a videotape of Indian "God-man" Sai Baba in which he was caught engaging in sleight of hand, which he then showed to us. (Sai Baba was debunked well in a book by Dale Beyerstein titled Sai Baba's Miracles: An Overview, which describes some other instances of Sai Baba being caught in trickery.

He then showed his now-famous viral video of the "colour changing card trick," and followed it up showing a video of how it was made (it took many takes to get it right; he showed some amusing failures). This video, which has had over 2.5 million views, demonstrates the phenomena of "change blindness," and they've used eye-tracking to study viewers of the video to see if they are not looking in the right place or simply failing to register the changes, and it seems to be the latter. This video has apparently now inspired a routine in Penn & Teller's show.

This was followed up by a spoon-bending lesson from an expert--Teller. Teller explained that there is a method, the trick that deceives the eye, and there is misdirection, the trick that deceives the mind. The spoon-bending trick is based on a pre-stressed spoon, but to allay suspicion he only does the trick about once every five times he creates a pre-stressed spoon, because he waits for an opportunity to swap the spoon with a neighbor, and then only does the trick if the conversation happens to turn in a direction that makes it seem appropriate. He told the story of how Danny Hillis (of Connection Machine and Long Now Foundation fame) was invited to a posh party at the home of Courtney Ross (widow of Steve Ross, CEO of Time Warner). At dinner, the conversation turned to Rupert Sheldrake. Hillis had pre-stressed his neighbor's spoon, and put his own spoon on a plate so that the waiter took it away. Hillis borrowed his neighbor's spoon and did the trick, bending and breaking the spoon and dropping it into his wine. His hostess said, "I can't believe you did that." He made a comment to the effect that it was a trick, and she said, "No, I can't believe you did that." She was horrified that he had destroyed one of a fixed number of identical place settings by some famous designer which she had painstakingly collected over the years. And that, said Teller, made it funny.

Wiseman then came back and said that we would now make the world's largest spoonbending video for YouTube. We were given one run-through of the simple script, and then did it on video, all 900 of us (though there were only 800 pre-stressed spoons, so the 100 in the back had to mime). The video will make its debut at www.spoonscience.com (which as of this moment still says "coming soon").

Panel discussion on the limits of skepticism
Goldacre, Daniel Loxton, Radford, Savage, Novella, Hrab, Randi, Banachek, and Saunders assembled on stage for this panel discussion, which I don't recall actually addressing a subject that I'd characterize as the limits of skepticism. Instead, it seemed to be pretty much a free-for-all Q&A about skepticism.

At one point, someone spoke of "winning the war" against irrationality, and Banachek said he preferred to think in terms of making a mark rather than winning a war.

Randi commented on the famous quotation attributed to him by Dennis Rawlins' "sTARBABY" that "I always have an out," suggesting that his then-$10,000 and now $1 million reward for the successful demonstration of a paranormal event is not fair. He stated that this quotation was out-of-context, and that what he actually said was "I always have an out--I'm right." Dennis Rawlins, however, says that this is untrue, and that Randi has only recently started appending "I'm right" to this quotation. In 2000, when Matt Kriebel made his "sTARBABY mini-FAQ," Randi had a different explanation, stating that the "out" was about his stage act rather than his challenge.

Adam Savage observed that at the last TAM he mentioned that he was an atheist, and now that's appeared on his Wiki page.

In answer to a question about what's the worst thing you've ever been called, Richard Saunders said he had been accused of being "a mouseketeer of evil."

Savage made the statement that "You might think the world has color before critical thinking, but when you start thinking critically, it goes to HD."

It was mentioned that skeptical materials are appearing in other languages--"Mythbusters" is now in 145 countries and 9 languages, and Benjamin Radford is editor of the Spanish-language skeptical magazine, Pensar, along with the Skeptical Inquirer.

Sunday conference papers
The final session of the conference, Sunday morning until noon, was for presentation of conference papers.

John Janks on the Marfa Lights: I regret that I missed this, since I published two papers on the Marfa lights in The Arizona Skeptic when I was editor, but I made the mistake of assuming the session would begin at 9 a.m. like previous days--nope, it was 8:30 a.m.

Don Nyberg on "What Every Student Needs to Hear from Every Science Teacher": Nyberg, a physics professor who apparently plays a mean game of poker, said that he attacks pseudoscience, and especially "religious pseudoscience," in his classroom. Unfortunately, his talk didn't bother to define what he meant by this term, and his talk was a series of arguments by assertion, arguments from authority, and ad hominem that I thought was embarrassingly badly argued. He seemed to be arguing that anyone with a degree in science who expressed support for religion should have their degrees revoked, which prompted the moderator Ray Hall to ask Nyberg whether he thought that biologist Kenneth Miller, whose testimony helped produce the proper outcome in the Kitzmiller v. Dover case, should have his degrees revoked. Nyberg responded that yes, he should, if he's promoting his religious beliefs in the science classroom (a qualifier which hadn't been included in his earlier statement). I'd like to obtain a copy of Nyberg's actual materials to review, to see how they compare to his talk.

Steve Cuno: The head of an "evidence-based marketing company," he gave an excellent talk about myths in marketing. Such myths include:
  • We control your mind.
  • Creativity is magi.
  • No one reads long ads.
  • Awareness creates sales.
  • Focus groups are predictive.
  • Sales went up because of ads.
He gave some examples associated with each of these, and described some of the tests that his company had performed to test marketing campaigns to find what causes responses to direct mailings and what leads to conversions to sales. He suggested the classic book Tested Advertising Methods, and pointed out that he has his own book coming out in December, with an intro by Michael Shermer, titled Prove It Before You Promote It.

One of the questions asked was "is Seth Godin full of shit?" Cuno tactfully said that no doubt some of what Godin says is speculative.

Tracy King: She gave a talk on "The Most Popular Science Video in the World - How to Make Your Message Famous." She talked about Wiseman's "colour changing card trick" video, which got 80,000 views in the first two weeks and 2 million views by 18 weeks, and has now been seen by 80 million people on South American Globo TV, used in classrooms, and recreated by students.

She looked at other science videos that have been viral hits, such as the Diet Coke and Mentos videos, the first of which was uploaded in 2006 by Fritz Grobe, a juggler, and Stephen Voltz, a lawyer. They chose Diet Coke for its strong brand, and when it became a viral hit they received funding from Mentos to make more, and ultimately got a sponsorship deal from Coca Cola.

King pointed out that a lot of viral techniques are now illegal in the UK--you must be explicit about being paid to produce videos, for example.

She talked about the bogus popcorn/mobile phone video, which is one that would be in violation of the UK law today. It was created in multiple versions--English (where they're drinking orange juice), French (where they're drinking beer), and Japanese (where they have miso soup). These videos were made for Cardo Systems, a bluetooth headset manufacturer, and are clearly designed to encourage the idea that cell phones are dangerous to hold near your head. (Someone should make a viral video about bluetooth headsets.)

So what makes a successful viral video? There is no formula, but there are common themes--humor, surprise, fear/scaremongering, emotion, skill, embarrassment. One thing she didn't mention which I think was a factor in the success of the "colour changing card trick" video is that there were already multiple videos spreading widely with the exact same name, where the focus really was on that card trick. The Wiseman video was an interesting twist on what was already spreading virally, with the element of surprise and humor at the end. In essence, that video caught the wave of the other card trick videos, and then took it much farther. When I first saw the Wiseman video, I thought I was just seeing another version of that same trick.

And why do we pass on viral videos?
  • Reflected glory.
  • Being the first to know.
  • Being part of a crowd with similar tastes.
  • Being part of a shared cultural experience.
  • (Participating in the formation of) the language of your generation.
She mentioned Ray Comfort's "The Atheist's Nightmare" as something which has effectively spread virally, but didn't exactly get the desired message across.

She ended by encouraging everyone to make videos promoting skepticism and critical thinking, and offered the following suggestions:
  • Identify what your message is--don't be preachy or superior, which is a turnoff.
  • Determine what your objectives are--to build website traffic, tell friend, etc.? If you don't have a call to action, your message may be lost.
  • Find a creative concept--it may be explicit, subtle, or obscure.
  • Make the video.
  • Promote the video--it's not going to circulate itself, and professional seeding (e.g., making use of a company like hers that has relationships with bloggers, forum participants, etc. to promote things in a subtle, unobtrusive, and unspammy way).
  • And finally, she explicitly listed: don't spam.
She ended by saying that while she can't recommend or encourage a "Jackass" approach to skepticism, it's something she'd certainly like to see.

On to TAM6 summary, part five.