April 2006

Jefferson Davis, the Hill Cats, & the Butcher Cats

From Shelby Foote’s The Civil War: Fort Sumter to Perryville (396):

Nor was [Jefferson Davis] highly skilled as an arbitrator; he had too much admiration and sympathy for those who would not yield, whatever their cause, to be effective at reconciling opponents. In fact, this applied to a situation practically in his own back yard. The [Confederate] White House stood on a tall hill, surrounded by other mansions. On the plain below were the houses of the poor, whose sons had formed a gang called the Butcher Cats, sworn to eternal hatred of the Hill Cats, the children of the gentry on the hill. The two gangs had rock fights and occasional gouging matches. After one particularly severe battle, in which his oldest son was involved, Davis walked down the hill to try his hand at arbitration. He made them a speech, referring to the Butcher Cats as future leaders of the nation. One of them replied, “President, we like you. We don’t want to hurt any of your boys. But we ain’t never going to be friends with them Hill Cats.”

Davis came back up the hill.

Jefferson Davis, the Hill Cats, & the Butcher Cats Read More »

Beauregard’s dislike for Davis

From Shelby Foote’s The Civil War: Fort Sumter to Perryville (384):

Part at least of the study and reflection was devoted to composing other phrases which [Pierre Gustave Toutant de Beauregard] considered descriptive of the enemy who had wronged him. “That living specimen of gall and hatred,” he called [Jefferson] Davis now; “that Individual.”

Beauregard’s dislike for Davis Read More »

Beauregard fools Halleck & escapes

From Shelby Foote’s The Civil War: Fort Sumter to Perryville (384):

When [Pierre Gustave Toutant de Beauregard‘s men] stole out of the intrenchments [at Corinth] after nightfall, they left dummy guns in the embrasures and dummy cannoneers to serve them, fashioned by stuffing ragged uniforms with straw. A single band moved up and down the deserted works, pausing at scattered points to play retreat, tattoo, and taps. Campfires were left burning, with a supply of wood alongside each for the drummer boys who stayed behind to stoke them and beat reveille next morning. All night a train of empty cars rattled back and forth along the tracks through Corinth, stopping at frequent intervals to blow its whistle, the signal for a special detail of leather-lunged soldiers to cheer with all their might. The hope was that this would not only cover the incidental sounds of the withdrawal, but would also lead the Federals to believe that the town’s defenders were being heavily reinforced.

It worked to perfection. … Daylight showed “dense black smoke in clouds,” but no sign of the enemy Pope expected to find massed in his front. Picking his way forward he came upon dummy guns and dummy cannoneers, some with broad grins painted on. Otherwise the works were deserted. …

Seven full weeks of planning and strain, in command of the largest army ever assembled under one field general in the Western Hemisphere, had earned [Halleck] one badly smashed-up North Mississippi railroad intersection.

Beauregard fools Halleck & escapes Read More »

Troops like sugar soaked in water

From Shelby Foote’s The Civil War: Fort Sumter to Perryville (347):

[At the Battle of Shiloh,] Governor Harris, still a volunteer aide, sensed this feeling of futility in the soldiers. Shortly after 2 o’clock, he expressed his fear of a collapse to the chief of staff, who agreed and went to Beauregard with the question: “General, do you not think our troops are very much in the condition of a lump of sugar thoroughly soaked with water – preserving its original shape, though ready to dissolve? Would it not be judicious to get away with what we have?”

Troops like sugar soaked in water Read More »

Grant’s optimism

From Wikipedia’s “Battle of Shiloh“:

The evening of April 6 was a dispiriting end to the first day of one of the bloodiest battles in U.S. history. In the Civil War, medics were not sent into the field to collect and treat wounded soldiers. Hence, many soldiers were abandoned to bleed to death, or in the case of Shiloh, be eaten alive by scavenging animals as a thunderstorm went through the area. The desperate screams of soldiers could be heard in the Union and Confederate camps throughout the night. As the exhausted Confederate soldiers bedded down in the abandoned Union camps, Sherman encountered Grant under a tree, sheltering himself from the pouring rain, smoking one of his cigars, considering his losses and planning for the next day. Sherman remarked, “Well, Grant, we’ve had the devil’s own day, haven’t we?” Grant looked up. “Yes,” he replied, followed by a puff. “Yes. Lick ’em tomorrow, though.”

Grant’s optimism Read More »

Wearing the wrong color to a battle

From Shelby Foote’s The Civil War: Fort Sumter to Perryville (337, 347):

[At the Battle of Shiloh, also known as the Battle of Pittsburg Landing,] The Orleans Guard battalion, the elite organization with Beauregard’s name on its muster roll, came into battle wearing dress-blue uniforms, which drew the fire of the Confederates they were marching to support. Promptly they returned the volley, and when a horrified staff officer came galloping up to tell them they were shooting at their friends: “I know it,” the Creole colonel replied. “But dammit, sir, we fire on everybody who fires on us!”

[A day later, Beauregard] received a shock … He noticed in some woods along his front a body of troops dressed in what appeared to be shiny white silk uniforms. At first he thought they were Federals who had breached his line … Presently, though, a staff officer, sent to investigate, returned with the explanation. There were the general’s own Orleans Guard battalion, who had turned their dress blue jackets wrong side out to put an end to be being fired on by their friends. Yesterday they had startled the defenders of the Hornets Nest by charging thus with the while silk linings of their coats exposed; “graveyard clothes,” the Federals had called them.

Wearing the wrong color to a battle Read More »

Walke describes the Battle of Island Number 10

From “Operations of the Western Flotilla” by Henry A. Walke, Commander of the Carondelet, describing the Battle of Island Number Ten:

Having received written orders from the flag-officer, under date of March 30th, I at once began to prepare the Carondelet for the ordeal. All the loose material at hand was collected, and on the 4th of April the decks were covered with it, to protect them against plunging shot. Hawsers and chain cables were placed around the pilot-house and other vulnerable parts of the vessel, and every precaution was adopted to prevent disaster. A coal-barge laden with hay and coal was lashed to the part of the port side on which there was no iron plating, to protect the magazine. And it was truly said that the old Carondelet at that time resembled a farmer’s wagon prepared for market. The engineers led the escape-steam, through the pipes aft, into the wheel-house, to avoid the puffing sound it made when blown through the smoke-stacks.

All the necessary preparations having been made, I informed the flag-officer of my intention to run the gauntlet that night, and received his approval. Colonel Buford, who commanded the land forces temporarily with the flotilla, assisted me in preparing for the trip, and on the night of the 4th brought on board Captain Hollenstein, of the Forty-second Illinois, and twenty-three sharp-shooters of his command, who volunteered their services, which were gratefully accepted. Colonel Buford remained on board until the last moment to encourage us. I informed the officers and crew of the character of the undertaking, and all expressed a readiness to make the venture. In order to resist boarding parties in case we should be disabled, the sailors were well armed, and pistols, cutlasses, muskets, boarding-pikes, and hand-grenades were within reach. Hose was attached to the boilers for throwing scalding water over any who might attempt to board. If it should be found impossible to save the vessel, it was designed to sink rather than burn her, as the loss of life would probably be greater in the latter case by the explosion of her magazine. During the afternoon there was promise of a clear, moonlight night, and it was determined to wait until the moon was down, and then to make the attempt, whatever the chances. …

At ten o’clock the moon had gone down, and the sky, the earth, and the river were alike hidden in the black shadow of a thunder-storm, which had now spread itself over all the heavens. As the time seemed favorable, I ordered the first master to cast off. Dark clouds now rose rapidly over us, and enveloped us in almost total darkness, except when the sky was lighted up by the welcome flashes of vivid lightning, to show us the perilous way we were to take. Now and then the dim outline of the landscape could be seen, and the forest bending under the roaring storm that came rushing up the river.

With our bow pointing to the island, we passed the lowest point of land without being observed, it appears, by the enemy. All speed was given to the vessel to drive her through the tempest. The flashes of lightning continued with frightful brilliancy, and “almost every second” wrote a correspondent, “every brace, post, and outline could be seen with startling distinctness, enshrouded by a bluish white, glare of light, and then her form for the next minute would become merged in the intense darkness.” When opposite Battery No. 2, on the mainland, the smoke-stacks blazed up, but the fire was soon subdued. It was caused by the soot becoming dry, as the escape-steam, which usually kept the stacks wet, had been sent into the wheel-house, as already mentioned, to prevent noise. With such vivid lightning as prevailed during the whole passage, there was no prospect of escaping the vigilance of the enemy, but there was good reason to hope that he would be unable to point his guns accurately. Again the smoke-stacks took fire, and were soon put out; and then the roar of the enemy’s guns began, and from Batteries Nos. 2, 3, and 4 came almost incessantly the sharp crack and screaming sound of their rifle-shells, which seemed to unite with the electric batteries of the clouds to annihilate us.

While nearing the island or some shoal point, during a few minutes of total darkness, we were startled by the loud, sharp order, “Hard a-port!” from our brave and skillful pilot, First Master Hoel. We almost grazed the island, and it appears were not observed through the storm until we were close in, and the enemy, having no time to point his guns, fired at random. In fact, we ran so near that the enemy did not, probably could not depress his guns sufficiently. While close under the lee of the island and during a lull in the storm and in the firing, one of our pilots heard a Confederate officer shout, “Elevate your guns!” “Yes, confound you,” said the pilot, in a much lower key, “elevate.” It is probable that the muzzles of those guns had been depressed to keep the rain out of them, and the officers, not expecting another night attack in such a storm, and arriving late, ordered the guns elevated just in time to save us from the direct fire of the enemy’s heaviest fort; and this, no doubt, was the cause of our remarkable escape. Nearly all the enemy’s shot went over us.

Having passed the principal batteries, we were greatly relieved from suspense, patiently endured, however, by the officers and crew. But there was another formidable obstacle in the way — a floating battery, which was the great “war elephant” of the Confederates, built to blockade the Mississippi permanently. As we passed her she fired six or eight shots at us, but without effect. One ball struck the coal-barge and one was found in a bale of hay; we found also one or two musket-bullets. We arrived at New Madrid about midnight with no one hurt, and were most joyfully received by our army. At the suggestion of Paymaster Nixon, all hands “spliced the main brace.”

Walke describes the Battle of Island Number 10 Read More »

A burning quilt brings revenge

From Shelby Foote’s The Civil War: Fort Sumter to Perryville (287-288):

[At the Battle of Pea Ridge,] they saw the rebels coming, yelling and firing as they came, hundreds of them bearing down to complete the wreckage their artillery had begun. As the Federals fell back from their shattered pieces an Iowa cannoneer paused to toss a smoldering quilt across a caisson, then ran hard to catch up with his friends. Still running, he heard a tremendous explosion and looked back in time to see a column of fire and smoke standing tall above the place where he had fuzed the vanished caisson. Stark against the twilight sky, it silhouetted the lazy-seeming rise and fall of blown-off arms and legs and heads and mangled trunks of men who just now had been whooping victoriously around the captured battery position.

A burning quilt brings revenge Read More »

Recognizing futility

From Shelby Foote’s The Civil War: Fort Sumter to Perryville (261):

[On 9 March 1862, the world’s first battle between ironclad warships took place. The smaller and nimbler Monitor was able to outmaneuver Virginia, but neither ship proved able to do significant damage to the other. Catesby Jones, commander of the Virginia] gave the Monitor everything he had given the wooden warships yesterday, and more: to no avail. When he tried to ram her, she drew aside like a skillful boxer and pounded him hard as he passed. After a few such exchanges, the crews of his after-guns, deafened by the concussion of 180-pound balls against the cracking railroad iron, were bleeding from their noses and ears. Descending once to the gundeck and observing that some of the pieces were not engaged, Jones shouted: “Why are you not firing. Mr. Eggleston?” The gun captain shrugged. “Why, our powder is very precious,” he replied, “and after two hours incessant firing I find that I can do her just about as much damage by snapping my thumb at her every two minutes and a half.”

Recognizing futility Read More »

Stanton the uber-lawyer

From Shelby Foote’s The Civil War: Fort Sumter to Perryville (244):

[Lincoln’s Secretary of War Edwin McMasters] Stanton had done devious things in his time. A corporation lawyer, he delighted also in taking criminal cases when these were challenging and profitable enough. His fees were large and when one prospective client protested, Stanton asked, “Do you I would argue the wrong side for less?” For a murder defense he once took as his fee the accused man’s only possession, the house he lived in. When he had won the case and was about to convert the mortgage into cash, the man tried to persuade him to hold off, saying that he would be ruined by the foreclosure. “You deserve to be ruined,” Stanton told him, “for you were guilty.”

Stanton the uber-lawyer Read More »

Users know how to create good passwords, but they don’t

From Usability News’ “Password Security: What Users Know and What They Actually Do“:

A total of 328 undergraduate and graduate level college students from Wichita State University volunteered to participate in the survey, and were regular users of the Internet with one or more password protected accounts. Ages of the participants ranged from 18 to 58 years (M = 25.34). Thirteen cases were deleted due to missing data, resulting in 315 participants in the final data analysis. …

When asked what practices should be used in the creation and usage of passwords, the majority of respondents, 50.8% (160), were able to identify most of the password practices that are recommended for creating secure passwords (Tufts University, 2005), although 62.9% (198) failed to identify a practice that would result in the most secure password; using numbers and special characters in place of letters.

Differences between password practices users reported and the passwords practices they believe they should use included:

  • 73% (230) of respondents reported that they should change their passwords for accounts every three to six months, but 52.7% (166) responded that they “Never” change their password when not required.
  • 50.8% (160) of respondents reported that they should use special characters in their passwords, but only 4.8% (12) reported doing so.
  • 63.5% (200) of respondents reported that they should use seven or more characters in their passwords, but only 35.5% (112) indicated that they use this number of characters with any regularity.
  • 70.5% (222) of respondents indicated that personally meaningful words should not be used, but 49.8% (156) reported that they use this practice.
  • 68.3% (215) of respondents report that personally meaningful numbers should not be used in passwords, but 54.9% (173) reported using this practice. …

The majority of participants in the current study most commonly reported password generation practices that are simplistic and hence very insecure. Particular practices reported include using lowercase letters, numbers or digits, personally meaningful words and numbers (e.g., dates). It is widely known that users typically use birthdates, anniversary dates, telephone numbers, license plate numbers, social security numbers, street addresses, apartment numbers, etc. Likewise, personally meaningful words are typically derived from predictable areas and interests in the person’s life and could be guessed through basic knowledge of his or her interests. …

It would seem to be a logical assumption that the practices and behaviors users engage in would be related to what they think they should do in order to create secure passwords. This does not seem to be the case as participants in the current study were able to identify many of the recommended practices, despite the fact that they did not use the practices themselves.

Users know how to create good passwords, but they don’t Read More »

The Sumitomo Mitsuibank bank heist

From Richard Stiennon’s “Lessons Learned from Biggest Bank Heist in History“:

Last year’s news that thieves had managed to break in to Sumitomo Mitsui Bank’s branch in London and attempt to transfer almost $440 million to accounts in other countries should give CIO’s cause for concern. …

First a recap. Last year it came to light that U.K. authorities had put the kibosh on what would have been the largest bank heist in history.

The story is still developing but this is what we know: Thieves masquerading as cleaning staff with the help of a security guard installed hardware keystroke loggers on computers within the London branch of Sumitomo Mitsui, a huge Japanese bank.

These computers evidently belonged to help desk personnel. The keystroke loggers captured everything typed into the computer including, of course, administrative passwords for remote access.

By installing software keystroke loggers on the PCs that belonged to the bank personnel responsible for wire transfers over the SWIFT (Society for Worldwide Interbank Financial Telecommunication) network, the thieves captured credentials that were then used to transfer 220 million pounds (call it half-a-billion dollars).

Luckily the police were involved by that time and were able to stymie the attack.

From Richard Stiennon’s “Super-Glue: Best practice for countering key stroke loggers“:

… it is reported that Sumitomo Bank’s best practice for avoiding a repeat attack is that they now super-glue the keyboard connections into the backs of their PCs.

The Sumitomo Mitsuibank bank heist Read More »

10 early choices that helped make the Internet successful

From Dan Gillmor’s “10 choices that were critical to the Net’s success“:

1) Make it all work on top of existing networks.

2) Use packets, not circuits.

3) Create a ‘routing’ function.

4) Split the Transmission Control Protocol (TCP) and Internet Protocol (IP) …

5) The National Science Foundation (NSF) funds the University of California-Berkeley, to put TCP/IP into the Unix operating system originally developed by AT&T.

6) CSNET, an early network used by universities, connects with the ARPANET … The connection was for e-mail only, but it led to much more university research on networks and a more general understanding among students, faculty and staff of the value of internetworking.

7) The NSF requires users of the NSFNET to use TCP/IP, not competing protocols.

8) International telecommunications standards bodies reject TCP/IP, then create a separate standard called OSI.

9) The NSF creates an “Acceptable Use Policy” restricting NSFNET use to noncommercial activities.

10) Once things start to build, government stays mostly out of the way.

10 early choices that helped make the Internet successful Read More »

Early attempts to control phone usage

From R. W. Kostal’s Law and English Railway Capitalism, 1825-1875 (quoted in Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“):

In Britain in 1889, postal officials reprimanded a Leicester subscriber for using his phone to notify the fire brigade of a nearby conflagration. The fire was not on his premises, and his contract directed him to confine his telephone “to his own business and private affairs.” The Leicester Town Council, Chamber of Commerce, and Trade Protection Society all appealed to the postmaster-general, who ruled that the use of the telephone to convey intelligence of fires and riots would be permitted thenceforth.

Early attempts to control phone usage Read More »

Flat local calling rates in US helped grow the Net

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

Moreover, flat rates for local calling played a key role in the rise of the Internet, by promoting much faster spread of this technology in the U.S. than in other countries. (This, as well as the FCC decisions about keeping Internet calls free from access charges, should surely be added to the list of “the 10 key choices that were critical to the Net’s success,” that were compiled by Scott Bradner [28].)

Flat local calling rates in US helped grow the Net Read More »

Monopolies & Internet innovation

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

The power to price discriminate, especially for a monopolist, is like the power of taxation, something that can be used to destroy. There are many governments that are interested in controlling Internet traffic for political or other reasons, and are interfering (with various degrees of success) with the end-to-end principle. However, in most democratic societies, the pressure to change the architecture of the Internet is coming primarily from economic concerns, trying to extract more revenues from users. This does not necessarily threaten political liberty, but it does impede innovation. If some new protocol or service is invented, gains from its use could be appropriated by the carriers if they could impose special charges for it.

The power of price discrimination was well understood in ancient times, even if the economic concept was not defined. As the many historical vignettes presented before show, differential pricing was frequently allowed, but only to a controlled degree. The main con- cern in the early days was about general fairness and about service providers leveraging their control of a key facility into control over other businesses. Personal discrimination was particularly hated, and preference was given to general rules applying to broad classes (such as student or senior citizen discounts today). Very often bounds on charges were imposed to limit price discrimination. …

Openness, non-discrimination, and the end-to-end principle have contributed greatly to the success of the Internet, by allowing innovation to flourish. Service providers have traditionally been very poor in introducing services that mattered and even in forecasting where their profits would come from. Sometimes this was because of ignorance, as in the failure of WAP and success of SMS, both of which came as great surprises to the wireless industry, even though this should have been the easiest thing to predict [55]. Sometimes it was because the industry tried to control usage excessively. For example, services such as Minitel have turned out to be disappointments for their proponents largely because of the built-in limitations. We can also recall the attempts by the local telephone monopolies in the mid-to late-1990s to impose special fees on Internet access calls. Various studies were trotted out about the harm that long Internet calls were causing to the network. In retrospect, though, Internet access was a key source of the increased revenues and profits at the local telcos in the late 1990s. Since the main value of the phone was its accessibility at any time, long Internet calls led to installation of second lines that were highly profitable for service providers. (The average length of time that a phone line was in use remained remarkably constant during that period [49].)

Much of the progress in telecommunications over the last couple of decades was due to innovations by users. The “killer apps” on the Internet, email, Web, browser, search engines, and Napster, were all invented by end users, not by carriers. (Even email was specifically not designed into the ARPANET, the progenitor of the Internet, and its dominance came as a surprise [55].)

Monopolies & Internet innovation Read More »

Railroads & tolls

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

Railroads were the dominant industry of the 19th century. … Early railroad charters, in both England and the U.S., were modeled after canal and turnpike charters, and almost uniformly envisaged that railroad companies would not be carriers themselves. Instead, they were expected to offer their facilities for use by carriers that would carry goods and passengers in their own wagons over the rails. Still, these charters specified tolls that varied greatly depending on the nature of the cargo. … For example, the very first parliamentary act for a railway was enacted in 1801. (Previous railways had been on private property, but in this case, as in subsequent ones, promoters were asking for the right of eminent domain to acquire the necessary land.) Between the endpoints of the railway, “chalk, lime and other manures were charged at the rate of three-pence per ton per mile; coals, corn, potatoes, iron and other metals, fourpence; and all goods not specified, sixpence” (p. 45 of [13]). …

Although some railroads did operate with other companies’ equipment on their rails for decades (and modern ones do so extensively), there was a relatively quick shift in the 1830s and 1840s towards railroads being exclusive carriers. There were technical reasons promot- ing such a shift (safety was jeopardized with multiple operators and primitive technology), but there is evidence that desire for greater control over pricing by railroads was also a major consideration [64]. Once railroads became carriers, they could engage in much more extensive price discrimination than allowed by the toll structure in their charters. And, propelled by the economics of their industry, with high fixed costs, railroads did engage in massive price discrimination, including personal discrimination. The result was massive political movements leading to government regulation [62,65].

Railroads & tolls Read More »

Turnpikes, roads, & tolls

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

British turnpikes were a controversial response to a serious problem. Traditionally, the King’s Highway was open to all. The problem was how to keep it in good condition. As commerce grew, the need to maintain roads became acute. At first, in Elizabethan times, laws were enacted compelling all able-bodied commoner males to devote several days a year to labor on the highways. (See [1,66,80] for references for the background information as well as other items below that are not attributed otherwise.) The inequitable distribution of the burden this imposed and the lack of effective control mechanisms by the central government led to many complaints. As a result, in 1663, the first turnpike was authorized. A local group was authorized to create a turnpike trust that would borrow money to improve a section of a road, and then collect tolls from travelers for passage over that section of the road. This venture was set up (as were all subsequent turnpikes) as an ostensibly non-profit trust. (There were opportunities for profits there, for example in payment of above-market fees and other abuses, but those were illicit, and in any case were not the high profits that other, more private, enterprises, such as lighthouses and canals, offered.) The reason for the non-profit nature of turnpikes was presumably to allay concerns about a violation of the ancient principle that the King’s Highway was open to all. Still, this turnpike was very controversial (as were many later ones). Apparently largely for that reason, it took until 1695 before the next turnpike was set up [2].

In the early 18th century, the turnpike movement took off in earnest. Although there were frequent protests (sometimes violent, as in the burning of the toll gates around Bristol in 1727 and 1735), by mid-1830s there were over 20,000 miles of turnpikes in England. …

Tolls were usually doubled on Sundays for ordinary commercial traffic, but were eliminated for travel to or from church. They also “were never levied on foot passengers, and were thus unfelt by the labouring poor” (p. 124 of [80]). There were also options in many cases for a flat fee for annual access. Still, there were countless controversies about the toll, “the collection of which led to endless evasions, inequalities and favouritisms of all kinds, arbitrary exactions, and systematic petty embezzlements” (p. 136 of [80]). …

… road tolls are coming back as a result of growing congestion and improved technology. Unlike telecommunications, where technology is increasing capacity of fiber, coax, and radio transmissions, building new roads is increasingly difficult, and making existing ones carry more traffic can only be done to a limited extent. At the same time, electronic means for monitoring traffic and collecting tolls are improving, and we see central business districts in Norway, Singapore, and London imposing tolls. Most of these systems do raise privacy issues, too, since they are centralized ones with information about users, or at least cars. Still, there is a strong tendency to introduce ever more detailed monitoring of traffic, often with the explicit goal of charging users according to their level of activity (whether by governments or by insurance companies).

Turnpikes, roads, & tolls Read More »