Saturday, February 17, 2007

NFL abuses Digital Millennium Copyright Act

The broadcast of the Super Bowl contained this announcement: "This telecast is copyrighted by the NFL for the private use of our audience. Any other use of this telecast or of any pictures, descriptions, or accounts of the game without the NFL's consent, is prohibited."

Brooklyn Law School professor Wendy Seltzer, who founded the Chilling Effects clearinghouse of DMCA abuse, posted this piece of the Super Bowl broadcast as an example of a copyright holder exaggerating its rights--clearly the NFL does not own all pictures, descriptions, or accounts of the Super Bowl game.

The response--the NFL issued a DMCA takedown notice against her site for the posting, demonstrating that they not only exaggerate their rights, but are willing to abuse the law.

Thayer Verschoor's latest attempt at censoring academia

Arizona Senate Majority Leader Thayer Verschoor (R-Gilbert) is at it again, with a bill that prohibits any public school or college instructor from advocating or opposing a political candidate or issue. This is the same legislator who last year proposed a bill that would have required colleges and universities to "provide a student with alternative coursework if the student deems regular coursework to be personally offensive" where "a course, coursework, learning material or activity is personally offensive if it conflicts with the student’s beliefs or practices in sex, morality or religion."

While it is appropriate to define limits on partisan advocacy in public primary and secondary schools (where state educational standards define the curriculum and individual school districts set policy on appropriate classroom behavior), it doesn't make sense to do it at the college level, where professors have much broader freedom to create their own course curricula.

Verschoor was also one of several legislators accepting gifts from the Church of Scientology and sponsoring legislation for Scientology's Citizens Commission on Human Rights last year.

Painfully Unfunny

Are neo-conservatives really this humor-impaired?

This show comes off like something Kevin Trudeau should be involved with, somehow.

Friday, February 16, 2007

Ed Brayton fisks Jack Cashill on the Sternberg Affair

Jack Cashill has produced an error-ridden column at WorldNetDaily on the Sternberg affair, which Ed Brayton has ably debunked. I predict Cashill will not correct himself, and may even continue to repeat the same errors.

Thursday, February 15, 2007

How the invasion of Iraq was supposed to go

A Freedom of Information Act request has yielded a 2002 plan from U.S. Central Command about the invasion of Iraq.

A planning group convened by Gen. Tommy Franks under the coded compartment POLO STEP (a coded compartment created under Clinton for counter-terrorism plans including the targeting of Osama bin Laden) produced this PowerPoint of briefing slides.

The slides show that "key planning assumptions" included that "a broad-based, credible provisional government" would be in place "prior to D-Day," that "Iraqi regime has WMD capability," that "co-opted Iraqi units will occupy garrisons and not fight either U.S. forces or other Iraqi units," and that "Operations in Afghanistan transition to phase III (minimal air support over Afghanistan."

According to the plan, there would only be 5,000 U.S. troops left in Iraq as of December 2006.

(Hat tip to Jacob Sullum at the Reason Blog.)

Wednesday, February 14, 2007

Bush attempting to mislead on Iran

The Bush administration is trying to use innuendo and statements carefully crafted to imply falsehoods (or at least, things not known to be true) in order to justify war against Iran. Where the Department of Defense presented evidence that explosively formed penetrators (EFPs) used in Iraq were manufactured in Iran, Bush has made statements designed to imply, without explicitly stating, that the Iranian government is behind them. Reporters are also being told that the U.S. government has some solid evidence, but that it cannot be shared.

For specific details and criticisms, see:

Talking Points Memo (February 14, 2007)
TPM Muckraker (February 14, 2007)
Outside the Beltway (February 12, 2007)

The Pentagon's briefing PowerPoint on the EFPs can be found here. Interesting that the labels on the weapons shown in photographs include English wording, but that's not a sign that they weren't made in Iran, but only a consequence of the fact that English is the lingua franca of the arms trade.

UPDATE (February 27, 2007): A factory producing EFPs has been captured in Southern Iraq--and the parts that have identifiable origins did not come from Iran.

Jeff Han multitouch demo

Jeff Han (who gave a very interesting demo at the TED conference last year) has formed a company called Perceptive Pixel which makes even larger touch screens. This video is a demo of some of the interesting user interfaces that multitouch provides.

Tuesday, February 13, 2007

Three lottery stories

Sex offender wins $14 million in lottery (Jensen Beach, Florida).
Man with year to live wins $50,000 a year (Rochester, New York).
Bill would refuse lottery wins for sex offenders (Jefferson City, Missouri).

And Jamie Zawinski suggests a fourth:
Bill would refuse lottery wins for cancer victims.

The economics of information security

Ross Anderson and Tyler Moore have published a nice paper that gives an overview of recent research in the economics of information security and some open questions (PDF). The paper begins with an overview of the relevance of economic factors to information security and a discussion of "foundational concepts." The concept of misaligned incentives is described with the now-standard example of how UK and U.S. regulations took opposite positions on liability for ATM fraud is given--the UK held customers liable for loss, while the U.S. held banks liable for loss. This led to U.S. banks having incentives to make their systems secure, while UK banks had no such incentives (and the UK has now reversed its position after this led to "an epidemic of fraud"). other examples are given involving anti-virus deployment (where individuals may not have incentives to purchase software if the major benefit is preventing denial of service attacks on corporations), LoJack systems (where auto theft plummets after a threshold number of auto owners in a locality install the system), and the use of peer-to-peer networks for censorship resistance.

The authors examine the economics of vulnerabilities, of privacy, of the deployment of security mechanisms including digital rights management, how regulation and certification can affect system security (and sometimes have counterintuitive adverse effects, such as Ben Edelman's finding that TRUSTe certified sites are more likely to contain malicious content than websites as a whole).

They end the paper with some open issues--attempts to develop network protocols that are "strategy-proof" to prevent cheating/free-riding/bad behavior, how network topologies have different abilities to withstand different types of attacks (and differing vulnerabilities), and how the software development process has a very high failure rate for large projects, especially in public-sector organizations (e.g., as many as 30% are death-march projects).

There are lots of interesting tidbits in this paper--insurance for vulnerabilities, vulnerability markets, the efficacy of spam on stock touting, the negligible effect of music downloads on music sales, and how DRM has moved power from record labels to platform owners (with Apple being the most notable beneficiary), to name a few.

(Hat tip to Bruce Schneier's blog, where you can find links to a slide presentation that covers the highlights of this paper.)

Monday, February 12, 2007

I've won a Thinking Blogger award!


I've been awarded a Thinking Blogger award, courtesy of Larry Moran at Sandwalk: Strolling with a Skeptical Biochemist. Thanks, Larry!

As per the rules of this award-meme, I must tag five other blogs that make me think:

1. Glen Whitman and Tom W. Bell at Agoraphilia
2. The Technology Liberation Front
3. Martin Geddes at Telepocalypse
4. Ed Felten at Freedom-to-Tinker
5. Kevin Carson at the Mutualist blog