The History and Meaning of Finding Kumbaya

The NYT attempts to preserve or even restore meaning for the song often known only as Kumbaya

The lyrics told of people in despair and in trouble, calling on heaven for help, and beseeching God in the refrain, “Come by here.”

[…]

Far from compromise, “Come By Here” in its original hands appealed for divine intervention on behalf of the oppressed. The people who were “crying, my Lord” were blacks suffering under the Jim Crow regime of lynch mobs and sharecropping. While the song may have originated in the Georgia Sea Islands, by the late 1930s, folklorists had made recordings as far afield as Lubbock, Tex., and the Florida women’s penitentiary.

With the emergence of the civil rights movement in the 1950s, “Come By Here” went from being an implicit expression of black liberation theology to an explicit one. The Folkways album “Freedom Songs” contains an emblematic version — deep, rolling, implacable — sung by the congregation at Zion Methodist Church in Marion., Ala., soon after the Selma march in March 1965.

Like other songs I have mentioned before here, it was an encoded message among slaves to fight against injustice such as restrictions on speech.

To sing Kumbaya was to resist, perhaps even to signal to others an event that would need more resources — calling in backup. The peculiar characteristics of this song that originated in the American south are born out of resistance to authority; simple repetition with obfuscation helped ensure the availability, integrity and confidentiality of a message.

Also Folklife Center News, Volume 32, Nos 3-4, Summer/Fall 2010, in their exhaustive research of the song origins, explains how an alleged link is problematic and… Wikipedia tends to publish garbage.

The most common claim made today about the origins of “Kumbaya” is that it is from the Gullah-Geechee people of coastal Georgia and South Carolina. (The more outlandish versions of this theory, such as the one espoused on Wikipedia on April 2, 2010, claim that “Yah” is a remnant of Aramaic, and refers to God, despite the fact that “yah” means “here” in Gullah.) While a Gullah origin is certainly closer to the truth than either of the previous theories, AFC’s archival versions also call the Gullah claim into question.

The Folklife Center News provides instead a self-dealing alternative story:

…the evidence from the American Folklife Center Archive does not fully support any of the common claims about the origin of “Kumbaya.” Instead, it suggests that “Kumbaya” is an African American spiritual which originated somewhere in the American south, and then traveled all over the world…. Although it is truly a global folksong, its earliest versions are preserved in only one place: the AFC Archive.

Coastal Georgia and South Carolina is somewhere in the American south, no? Perhaps too specific. Either way, Kumbaya is a fight song.

Facebook Malware App Builder

Websense explains how Facebook users are so often victims — they are targeted by the huge growth in inexperienced attackers due to inexpensive malware app builders.

You don’t have to be a developer, but a mere $25 can buy you a Facebook viral application toolkit and unleash all the unwanted content you want onto Facebook.

As an example, let’s look at a very similar fraudulent application that “can” allow Facebook users to know who “creeps” at their profile, called “Facebook Profile Creeper Tracker Pro”. The application asks for some permissions, shows an online survey/advertisements and tells the user at the end of the process that he/she is the one that looks at his/her own profile the most. In other words, this application should be revoked according to the terms and conditions of Facebook.

Should be revoked?

There appears to be no Facebook barrier to entry for attackers. The $25 is a nominal amount and easily recovered; victims generate revenue of at least $.20 — only 125 are needed to cover the initial expense and then it’s all profit. And that cost model is for attackers with no experience.

The burning question for regulators should be how a user can protect themselves against a Facebook scam like this permanently. In other words, why does Facebook continuously fail to provide reasonable privacy options, or offer users permanent protection?

The answer may be found in Facebook’s recent trickery with network privacy.

Two weeks ago, the social networking site proudly announced a new “secure browsing” option located under the Account Security menu which would allow people to enable HTTPS for all future visits.

However, at the moment, third-party apps don’t not work via HTTPS, because they load external content into the page.

This content cannot be signed by Facebook, therefore, the secure connection is broken each time an HTTPS client opens such an app.

Facebook prevents this from happening automatically via a dialog that reads “Sorry! We can’t display this content while you’re viewing Facebook over a secure connection (https). To use this app, you’ll need to switch to a regular connection (http).”

Pressing the continue button, however, doesn’t just remove HTTPS for that session, but clears the checkbox from the persistent “secure browsing” setting without any indication of doing so.

They take a one-time decision and turn it into a permanently insecure setting without notifying you.

Just in case you still have any doubt: Storing private information on Facebook is like putting your finances in a bank that offers partnerships to grand theft felons. You might really like working with the bank and their customers, but you need to be very wary of their business practices.

I strongly recommend to everyone they immediately delete all personal and valuable information from their account or at least only use fictitious information on Facebook including fake photos.

Even the founder himself has turned to the government to protect against Facebook-based attackers.

Scans Could Detect Liquid Explosives

An Associate Professor at UC Davis helped develop a scanner to find spoiled wine without opening the bottle.

“A Nondestructive Method of Determining Acetic Acid Spoilage in an Unopened Bottle of Wine,” A. J. Weekley, P. Bruins, and M. P. Augustine, J. Enol. Vitic., 53, 318-321 (2003).

A few years later, in 2006, the terror plot involving liquids inspired the researcher to think about another market — airline security.

Air passengers one day may be able to carry their soaps, shampoo and bottled water onto the plane again, thanks to technology originally developed at UC Davis to check the quality of wine.

The U.S. Department of Homeland Security’s Science and Technology Directorate recently awarded a contract to a Denver-based defense firm to develop a magnetic resonance scanner that could be placed in airports and used to check bottles and cans for explosives without opening them.

Might as well put this in refrigerators and pantries too. No need for improbable expiration dates any more. Have the kitchen do a daily scan and send you an email to alert you when your stocks are contaminated or spoiled.

Tweets Ruled to be Public Information

The British Press Complaints Commission (PCC) has decided in favor of the press regarding a newspaper’s report on a civil servant’s tweets.

Ms Sarah Baskerville complained to the Press Complaints Commission that an article headlined “Oh please, stop this twit from Tweeting, someone”, published in the Daily Mail on 13 November 2010, intruded into her privacy in breach of Clause 3 (Privacy) and was misleading in breach of Clause 1 (Accuracy) of the Editors’ Code of Practice.

The complaint was not upheld.

Baskerville made the argument that, although her Twitter, blog and Flickr accounts were configured as open and available to anyone on the Internet, she held a “reasonable expectation that my messages…would be published only to my followers”.

If she knowingly set an account to be open and available to anyone, and she operated it under her real name, then her expectation of privacy is curious. Hoping that someone does not look at your tweets is not equivalent to restricted access.

As a result of the newspaper’s article, she had taken the decision – reluctantly – to lock her Twitter stream so it could not be viewed by anybody apart from her followers.

The change in access shows that she realized a distinction can be made between the public and a subscriber; but the risk of re-tweets and forwarding by 700 followers still poses a challenge to any expectation of privacy.

The questions in front of the PCC thus boiled down to whether Baskerville could claim her open tweets as private and whether they were an inaccurate representation of her. It is as if she claimed that yelling a comment to 700 people in a public area is private communication and not an accurate representation of her. It seems fairly obvious why they dismissed the complaint.