Category Archives: History

Schroedinger’s Cat: Another Look at American Conspiracy Theory

I used the word terror because I am working from a simple and common definition:

calculated use of violence (or threat of violence) against civilians in order to attain goals that are political or religious

The attack by Loughner therefore seems to me a form of terrorism. With that in mind…

Foreign Policy has an article called “A Very American Conspiracy Theory” that says Loughner was a student who succumbed to extremist rhetoric, which has a long history in America.

Arizona has, by some measures, become a ground zero for anti-government conspiracy theories. Loughner lived in a politically polarized state in which the federal government’s policies, from health care to immigration, were excoriated by mainstream politicians as evidence of a tyrannical plot against liberty. And these theories took root beyond Arizona’s borders. Throughout the United States, conspiracists rage against the alleged subversion of their country by “un-American” forces that reside in the U.S. government itself.

Conspiracy theories may seem to thrive on the margins of American politics: When historian Richard Hofstadter diagnosed a “paranoid style” in American politics in the 1960s, these views were easily characterized as fringe. But they become central when they gain powerful sponsors in the media and politics who inject their paranoid theories into the body politic. These conspiracy theories can be ridiculed in pop culture, but they will eventually lash out against reality — as they tragically did last Saturday.

A blog editorial in the Broward Palm Beach New Times goes even further and criticizes several people for a conspiracy theory linked to “un-Americans”:

The right wing has no monopoly on hyperbole, but it has very nearly cornered the market on the weaponizing of difference, on the insistence that a political opponent is not a citizen with ideological differences, but an enemy, immoral and un-American. Joyce Kaufman does this. Allen West does this. In Loughner’s back yard, Jan Brewer does this. These individuals do not merely craft the occasional martial metaphor; they are in the business of articulating a whole, martial political philosophy.

Another take on the same issue of semantics and persuasion is found on the Lawyers Guns Money Blog, which defines and explains “violent rhetoric”

The more pernicious rhetoric here is the conspiratorial variety being mainstreamed by the likes of Glenn Beck: rabid and ahistorical anti-federalism feeds into the beliefs of those who believe they’re being persecuted by vast faceless conspiracies.

The tragic attack in Tucson obviously is bringing forward a whole new look at conspiracy theorists in America. This, of course, will further alarm the conspiracy theorists. Like the dilemma of Schroedinger’s Cat, America has a need to assess a culture of violence without increasing the culture of violence by trying to assess it.

Take the reaction after California passed a law limiting the online sale of handgun ammunition (AB 962), for example. Conspiracy theorists worried that their supply of bullets was being limited, which only helped to push up demand and reduce supply, which increased conspiracy theorists fear of government control and demand for bullets increased, reducing availability12 billion rounds of ammunition were apparently sold in 2009, up from 7-10 billion in “a normal year”. And therein lies the paradox of the box with Schroedinger’s Cat — can Americans find a reliable way to renounce terror as an undesirable state, or will some remain so fearful of judgment that they will try to maintain superposition (duality and the unknown)?

The Governor of California’s signature on the handgun bullet limit law explains how he decided:

I am signing Assembly Bill 962. This measure would require vendors of handgun ammunition to keep a log of information on handgun ammunition sales, store ammunition in a safe and secure manner, and require the face-to-face transfer of ammunition sales.

Although I have previously vetoed legislation similar to this measure, local governments have demonstrated that requiring ammunition vendors to keep records on ammunition sales improves public safety. These records have allowed law enforcement to arrest and prosecute persons who have no business possessing firearms and ammunition: gang members, violent parolees, second and third strikers, and even people previously serving time in state prison for murder. Utilized properly, this type of information is invaluable for keeping communities safe and preventing dangerous felons from committing crimes with firearms.

Moreover, this type of record-keeping is no more intrusive for law abiding citizens than similar laws governing pawnshops or the sale of cold medicine. Unfortunately, even the most successful local program is flawed; without a statewide law, felons can easily skirt the record keeping requirements of one city by visiting another. Assembly Bill 962 will fix this problem by mandating that all ammunition vendors in the state keep records on ammunition sales. As Governor, I have sought the appropriate balance between public safety and the right to keep and bear arms. I have signed important public safety measures to regulate the sale and transfer of .50 caliber rifles, instituted the California Firearms License Check program, and promoted the use of micro-stamping technology in handguns. I have also vetoed many pieces of legislation that sought to place unreasonable restrictions and burdens on firearms dealers and ammunition vendors. Assembly Bill 962 reasonably regulates access to ammunition and improves public safety without placing undue burdens on consumers. For these reasons, I am pleased to sign this bill.

The law goes into effect Feb 1, 2011.

It was based upon limits that were studied in Los Angeles and Sacramento (LA, California, Code Chapter V, article 5 $ 55.11; Sacramento, California, Code $$ 5.66.010 – 5.66.090), as presented to the Sacramento City Council in 2008.

Women will rule the world

I read a history exhibit at the Museum of the African Diaspora that showed how Calypso had been used by slaves to circumvent heavy censorship. Despite efforts by American and British authorities to restrict speech, encrypted messages were found in the open within popular songs. Artists and musicians managed to spread news and opinions about current affairs and even international events. See if you can decipher this one from 1935 by a calypsonian called Atilla:

I’m offering a warning to men to take care
Of Modern women beware
Of Modern women beware
Even the flappers we cannot trust
For they’re taking our jobs from us
And if you men don’t assert control
Women will rule the world.

Now different are the ladies of the long ago
To the modern women we know
If you’ve observed you have bound to see
The sex has changed entirely.
Long ago their one ambition in life
Was to be a mother and wife
But now they mean to (?) the males
Smoking cigarettes and drinking cocktails.

Long ago the girls used to be school teachers
Then they became stenographers.
We next hear of them as lecturers
Authors and engineers
There is no limit to their ambition
They’ve gone in for aviation
And if you men don’t assert control
Women will rule the world.

They say anything that man can do
They also can achieve too
And they’ve openly boasted to do their part
In literature and art
We will next hear of them as candidates
For the President of the United States
So I’m warning you men to assert control
Or women will rule the world.

If women ever get the ascendancy
They will show us no sympathy
They will make us strange things, goodness knows
Scrub floors, even wash clothes
If these tyrants speak as our masters
We’ll have to push perambulator,
And in the night as they go to roam
We’ll have to mind the baby at home.

Top 5 Most Dangerous Malwares, or Not

SecTechno caught my attention with their title of “2010 Top 5 Most Dangerous Malwares”, and then I read this line at the start:

1-STUXNET…it is for the first time in the history that a malware bypass the cyberspace to get directly to the physical environment

Whoa! Stop right there. Not true.

Malware existed on removable media first. It started with boot-sector viruses on floppy disks. Malware spreading in the 1980s depended on “get directly to the physical environment”. The only real exception was the Morris Worm on UNIX in 1988. There was a slow transition to malware on the network through the 1990s (Ivar on MacOS System 7 was my personal favorite) but it was the mid-1990s before malware started to take full advantage of network infection vectors instead of removable media, as explained in a paper by Peter Bergen.

In retrospect we can confidently state that malware writers adapted more quickly to the changed circumstances than Microsoft did. The combination of network connectivity, powerful macro languages and applications which were network aware on one level but had not really incorporated any important security concepts and, of course, the sheer number of targets available proved quite impossible to resist.

So don’t believe the hype. Stuxnet is not dangerous because of how it works. That is the same old story. It is dangerous because it was highly targeted. In addition the malware was directed to achieve a consequence of social or even political significance, instead of just financial gain.

In other words, when you look at a breached castle wall you should ask whether it was from a special and unknown type of attack (very unlikely) or because the attacking army did their research and targeted the weakest spot (very likely). Likewise, you can ask whether the defending forces had done their research and responded with sufficient resources in time, or whether they were caught off-guard or unready.


Inside the main gate of Chepstow Castle, Wales. The curtain wall on the right was breached 25 May 1648 by Isaac Ewer’s cannons and the site where Royalist commander Sir Nicholas Kemeys was killed. Photo by me.

What does a system ready to defend against malware look like? History tells us that this is a pretty good list to monitor, and would have detected Stuxnet:

  1. Alternate Data Streams (ADS)
  2. Audit Policy status
  3. System file checksums
  4. Local User activity, dumps
  5. Open file handles
  6. Modified, Access, Created times of files on system drive
  7. Hidden files on the system drives
  8. Temporary files and cookies
  9. Associated DLLs of running processes
  10. System, application, and security logs
  11. Interface configuration
  12. Transmission Control Protocol (TCP) and User Datagram Protocol (UDP) activity — ports opened by processes
  13. Local registry hive changes
  14. Rootkit detection
  15. Services running
  16. System information about hardware, OS, and installed software

UK Marine Park May Block Diego Garcia Resettlement

Wikileaks has now resurfaced a debate over the fate of the indigenous Chagos population. It suggests the UK intended to use a marine park as a measure to prevent the resettlement of these islanders. Mauritius has now sued the UK:

A US cable from May 2009 quotes a discussion about the park with Foreign Office official Colin Roberts. “He asserted that establishing a marine park would, in effect, put paid to resettlement claims of the archipelago’s former residents,” the cable said. The Mauritian Prime Minister Navinchandra Ramgoolam said his government had filed a case before the International Tribunal for the Law of the Sea in Hamburg.

It is no surprise that the UK is politically opposed to resettlement claims. This is long-standing and bitter fight that has had some high-profile court cases already. Mauritius has even started to make a more aggressive sovereignty claim over Chagos, ironically. What is notable about the Wikileaks documents is how they frame the marine park and discuss ending resettlement claims a year after those claims already were struck down.

In 2008 I quoted a news article that said the UK courts ruled against allowing Chagos Islanders the right to resettle their home land. The reason given then was international security (e.g. an air base for strikes against Iraq, Iran; laundering controversial military equipment shipments to embargoed countries).

By a ruling of 3-2, the lords backed a government appeal that argued that allowing the islanders to return could have a detrimental effect on defence and international security.

The Chagos islanders were forced to leave in the first place because they lived on an island known as Diego Garcia, which I explained in 2007 had been appropriated by the US and UK when the West lost its political influence in Ethiopia.

A surveillance base and listening-post located in the highlands of the Horn of Africa, to “monitor” Soviet influence in the Middle East, was transitioned in a hurry to the small island in the Indian Ocean. The island was cleared so it could be a military installation and supply port. The risk of interference from indigenous residents was resolved by forcibly removing them and any claims to their property.

Diego Garcia was not just a lone desolate spot in the sea that the US developed to protect the free world from the Red threat, as most reports used to say. It really was a place thousands of people called home before American soldiers landed and stripped them of their property, identity and livelihood.

A year earlier, in 2007, I referenced a film called Stealing a Nation and an article in The Guardian called Paradise cleansed. Both give a detailed look at the UK foreign policy attitude towards the Chagos population and their claims.

To get rid of the [Diego Garcia] population, the Foreign Office invented the fiction that the islanders were merely transient contract workers who could be “returned” to Mauritius, 1,000 miles away. In fact, many islanders traced their ancestry back five generations, as their cemeteries bore witness. The aim, wrote a Foreign Office official in January 1966, “is to convert all the existing residents…into short-term, temporary residents.”

What the files also reveal is an imperious attitude of brutality. In August 1966, Sir Paul Gore-Booth, permanent under-secretary at the Foreign Office, wrote: “We must surely be very tough about this. The object of the exercise was to get some rocks that will remain ours. There will be no indigenous population except seagulls.” At the end of this is a handwritten note by DH Greenhill, later Baron Greenhill: “Along with the Birds go some Tarzans or Men Fridays…” Under the heading, “Maintaining the fiction”, another official urges his colleagues to reclassify the islanders as “a floating population and to “make up the rules as we go along”.

They certainly have a way with words.

Thus the recent news, spurred by Wikileaks, is a new tactic for this same old fight. A marine park is clearly an easier pitch to the international community than claims of UK defense and international security. But I do not see why the park must be mutually exclusive to resettlement of the indigenous population. The whole idea of a park should use concepts of security to allow coexistence. Risks are reduced through study in order to prevent long-term negative impact. An area is set aside to ensure that the native species are not harmed or lost while new and old visitors are allowed to live there too.

“We are interested in the preservation of our homeland and we are backing the British Government on this,” said Allen Vincatassin, chairman of the Crawley-based Diego Garcian Society, the main islanders’ group in the UK. “We support the MPA and we believe the issue is separate from resettlement.”

The question then becomes whether the UK can accept a marine park operated for interests other than just their foreign office and military.