Americans fail math test on fuel consumption

Reuters reports on a novel concept — adopting a measure of consumption that people could easily understand for fuel:

When presented with a series of car choices in which fuel efficiency was defined in miles per gallon, the students could not easily identify the choice that would result in the greatest gains in fuel efficiency, he said.

People had a much easier time when fuel efficiency was expressed in gallons per 100 miles. In that case, a car that gets 18 miles per gallon uses 5.5 gallons of gas per 100 miles, and a car that gets 28 miles per gallon uses just 3.6 gallons per 100 miles. With gasoline prices over $4 a gallon, that’s a difference of about $8 per 100 miles.

“If we just turn everything around, you can see where are the large savings in gallons of gas,” Larrick said in a telephone interview. The idea is not new. Many other countries, especially in Europe, already use a standard that compares gas used per trip.

Uh-oh. Does he realize that comparing the US to Europe is likely to create discontent among those in America who refuse to acknowledge progress can happen anywhere else in the world?

To translate miles per gallon into gallons per 10,000, Larrick said people can simply divide 10,000 by miles per gallon. Cars with the highest miles per gallon are always the most fuel efficient, he said. It is when people are trying to replace a car that they may be misled.

That’s how he became interested in this problem.

“We were trying to decide whether to get rid of a minivan and go for a station wagon versus getting rid of a sedan and going for a really high-mileage hybrid car,” Larrick said.

“We realized in the end we were better off trading in the minivan and only gaining 10 miles per gallon then we would be trying to swap out the sedan for a highly efficient car.”

Excellent article. The fact that it highlights a real measure instead of searching for the most effective marketing campaign or the creation of feelings about better consumption…it’s practically un-American.

California cancels aerial spray plans

The AP writes that plans to blanket urban areas with pesticides have been canceled due to advances in technology. A.G. Kawamura, state secretary of food and agriculture, claimed the shift to other plans was a natural progression, but the abruptness of the change seems linked to public protest:

Two counties and a Carmel-based environmental group sued the state, saying Kawamura broke state law by authorizing the aerial campaign without the benefit of environmental review.

Judges in Santa Cruz and Monterey counties this year halted the program until the state studied the spray’s effect on people and the environment.

In April, state environmental health experts said the illnesses reported after the first round of spraying couldn’t conclusively be linked to efforts to eradicate the dime-size Australian pest.

The race is on to control the moths without damaging the humans. Reminds me of all the usual debates about implementing security in ways that will not impact or impose restrictions on business. Strange that it took public protests and lawsuits to make this a meaningful issue for Kawamura.

Citibank admits breach of debit card server

Wired tells a sad tale of bank security in America:

A computer intrusion into a Citibank server that processes ATM withdrawals led to two Brooklyn men making hundreds of fraudulent withdrawals from New York City cash machines in February, pocketing at least $750,000 in cash, according to federal prosecutors.

The ATM crime spree is apparently the first to be publicly linked to the breach of a major U.S. bank’s systems, experts say.

“We’ve never heard of PINs coming out of the bank environment,” says Dan Clements, CEO of the fraud watchdog company CardCops, who monitors crime forums for stolen information.

They say this is a new page in security risks. However, when you read the Citibank brief there was a breach of a server that was most likely exposed to a partner’s security (7-Eleven). Accessing systems peripheral and partnered to the bank’s network is definitely a classic move. The rising number of interconnected systems (Wired points to this as real cyber-crime instead of traditional social engineering and physical attacks) means this risk is ever more present. Perhaps what is new is that the same guys who in the past might have just been satisfied to attack individual users now know how to target larger assets.

Encrypted Voice Breaks When Compressed

A security log entry by Schneier on eavesdropping compelled me to write a haiku:

Compress your bitrate
And expose the key to sound;
VoIP flows insecure.

I really like the attack vector he points us to. In short, when you compress voice on phone systems it creates a predictable key of sounds that can be used to unlock the encryption. In other words, sounds have patterns that the encryption does not hide. Even though the sounds themselves might be encrypted, they still have the appearance of known words and can therefore be guessed. For example “cow” will appear different, due to the length of the word when spoken, compared with “cat”. It might look something like ASDFADSFADSF versus ASDF.

Ok, second attempt:

Compress your bitrate
Hear the keys to sound exposed;
VoIP flows insecure.