Why brands are declining

From Brian Gibbs’ letter printed in Wired (January 2005):

The explanation that the decline of brands is due to competition, informed consumers, and constant innovation is insufficient. There’s another factor wreaking havoc. Over the years, brands have lost their meaning because advertising campaigns developed by creative types have been clever and witty, but often not relevant.

Once, brands defined the meaning and mode of civilization: fresher-smelling laundry, tastier tuna, et cetera. Tide used to “get dirt out.” Now it “works wonders,” a vacuous, unprovable claim. Do Tide customers think that getting their laundry clean is a miracle? Do they have an unmet psychological need to deify their detergent? Of course not. Creative-led marketing has wrought the empty brand.

Why brands are declining Read More »

After a stroke, he can write, but can’t read

From Oliver Sacks’ “The Case of Anna H.” (The New Yorker: 7 October 2002: 64):

I recently received a letter from Howard Engel, a Canadian novelist, who told me that he had a somewhat similar problem following a stroke: “The area affected,” he relates, “was my ability to read. I can write, but I can’t read what I’ve just written … So, I can write, but I can’t rewrite …”

After a stroke, he can write, but can’t read Read More »

Modern piracy on the high seas

From Charles Glass’ “The New Piracy: Charles Glass on the High Seas” (London Review of Books: 18 December 2003):

Ninety-five per cent of the world’s cargo travels by sea. Without the merchant marine, the free market would collapse and take Wall Street’s dream of a global economy with it. Yet no one, apart from ship owners, their crews and insurers, appears to notice that pirates are assaulting ships at a rate unprecedented since the glorious days when pirates were ‘privateers’ protected by their national governments. The 18th and 19th-century sponsors of piracy included England, Holland, France, Spain and the United States. In comparison, the famed Barbary corsairs of North Africa were an irritant. Raiding rivals’ merchant vessels went out of fashion after the Napoleonic Wars, and piracy was outlawed in the 1856 Declaration of Paris (never signed by the US). Since the end of the Cold War, it has been making a comeback. Various estimates are given of its cost to international trade. The figure quoted most often is the Asia Foundation’s $16 billion per annum lost in cargo, ships and rising insurance premiums.

The International Maritime Bureau (IMB), which collects statistics on piracy for ship owners, reports that five years ago pirates attacked 106 ships. Last year they attacked 370. This year looks worse still.

In waters where piracy flourished in the past, the tradition embodied in figures such as Captain Kidd has persisted: off the Ganges delta in Bangladesh, in the Java and South China Seas, off the Horn of Africa and in the Caribbean. Three conditions appear necessary: a tradition of piracy; political instability; and rich targets – Spanish galleons for Drake, oil tankers for his descendants. A fourth helps to explain the ease with which it happens: ‘The maritime environment,’ Gunaratna said, ‘is the least policed in the world today.’

The IMB has not been able to persuade the international community or the more powerful maritime states to take serious action. The Bureau’s director, Captain Pottengal Mukundan, believes there is nothing crews can do to protect themselves. National maritime laws are not enforced beyond national boundaries – which is to say, over more than half the earth’s surface. Beyond territorial waters, there are no laws, no police and no jurisdiction. Many countries lack the will or the resources to police even their own waters. The IMB advises all ships against putting in anywhere near states like Somalia, for instance, where there is a near certainty of attack. … Piracy is a high-profit, low-risk activity.

The IMB urges crews to take more precautions, but owners can’t afford every recommended improvement: satellite-tracking devices, closed circuit cameras, electric fencing and security officers on every ship. Owners and trade unions discourage the arming of merchant ships in the belief that firearms will put crews’ lives at greater risk. Only the Russians and the Israelis are known to keep weapons aboard. Competition in the shipping business forces owners to minimise expenditure on crews as on everything else. A commission of inquiry into the 1989 Exxon Valdez spill that nearly destroyed the Alaskan coast reported that ‘tankers in the 1950s carried a crew of 40 to 42 to manage about 6.3 million gallons of oil . . . the Exxon Valdez carried a crew of 19 to transport 53 million gallons of oil.’ [Quoted in Dangerous Waters: Modern Piracy and Terror on the High Seas by John Burnett] With the automation of many shipboard tasks, vessels today carry even fewer seamen than they did when the Exxon Valdez ran aground. That means fewer eyes to monitor the horizon and the decks for intruders.

Air and land transport routes have come under tighter scrutiny since 11 September 2001, but improvements to maritime security are few. An oil tanker can carry a load that is far, far more explosive than any civil aircraft. And most piracy, including the seizure of oil tankers, takes place near countries with powerful Islamist movements – Indonesia, Malaysia, the Philippines, Yemen and Somalia. Lloyd’s List reported on 4 November that Indonesia is ‘the global black spot’ with 87 attacks in the first nine months of this year – ‘the number of attacks in the Malacca Straits leaped from 11 in 2002 to 24 this year.’ Indonesia, which consists of two thousand islands, is the world’s most populous Muslim country. It has experienced decades of repression by a kleptocratic military, communal violence and the degradation of a once vibrant economy. Radical Islamists have made it the focus of their activity and recruitment in Asia.

Modern piracy on the high seas Read More »

Language shapes thought

From Celeste Biever’s “Language may shape human thought” (New Scientist: 19 August 2004):

Language may shape human thought – suggests a counting study in a Brazilian tribe whose language does not define numbers above two.

Hunter-gatherers from the Pirahã tribe, whose language only contains words for the numbers one and two, were unable to reliably tell the difference between four objects placed in a row and five in the same configuration, revealed the study. 

For one, two and three objects, members of the tribe consistently matched Gordon’s pile correctly. But for four and five and up to ten, they could only match it approximately, deviating more from the correct number as the row got longer.

The Pirahã also failed to remember whether a box they had been shown seconds ago had four or five fish drawn on the top. When Gordon’s colleagues tapped on the floor three times, the Pirahã were able to imitate this precisely, but failed to mimic strings of four or five taps.

Language shapes thought Read More »

A cheap, easy way to obfuscate license plates

From Victor Bogado da Silva Lins’ letter in Bruce Schneier’s Crypto-Gram (15 May 2004):

You mentioned in your last crypto-gram newsletter about a cover that makes a license plate impossible to read from certain angles. Brazilian people have thought in another low-tech solution for the same “problem”, they simply tie some ribbons to the plate or the car itself; when the car is running (speeding) the ribbons fly and get in front of the plate making it difficult to read the plate.

A cheap, easy way to obfuscate license plates Read More »

What actions change MAC times on a UNIX box?

From Holt Sorenson’s “Incident Response Tools For Unix, Part Two: File-System Tools” (SecurityFocus: 17 October 2003):

Various commands change the MAC [modify, access, and change] times in different ways. The table below shows the effects that some common commands have on MAC times. These tables were created on Debian 3.0 using an ext2 file system contained in a flat file mounted on a loopback device. … Experimenting with your own system to verify the information in the tables below is encouraged. These tables can serve as a general guide, however.

How common commands change MACtimes for a directory (foo):
Action atime ctime mtime
creation (mkdir foo) X X X
directory move (mv foo bar) X X
file creation (touch foo/foo) X X
file creation (dd if=/dev/zero of=foo/foo count=1) X X
list directory (ls foo) X
change directory (cd foo)
file test (-f foo)
file move/rename (mv foo foo_mvd) X X
permissions change (chmod/chown <some_perm> foo) X
file copy (mv foo_mvd foo) X X
file edit (vim foo) X X
file edit (emacs foo) X X X
file edit (nvi/nano foo)
How common commands change MACtimes for a file (f1):
Action atime ctime mtime
creation (touch foo) X X X
creation (dd if=/dev/zero of=foo count=1) X X X
rename (mv foo bar)
permissions change (chmod <some_perm> foo) X
copy (cp foo bar) X
copy overwrite (cp bar foo) X X
append (cat >> foo) X X
overwrite (cat > foo) X X
truncate (cp /dev/null foo) X X
list file (ls foo)
edit (vim/emacs/xemacs/joe/jed foo) X X X
edit (ed/nvi/vi (sun)/vi (obsd)/nano/pico foo) X1 X1 X1
1 – all times changed, but atime is slightly older than mtime and ctime

The ls command can be used to show the modify, access or change times of files. The following table shows various ls commands that sort in reverse order by mtime, atime, or ctime. This causes ls to list the most recent times last.

displaying MACtimes using ls:
Linux (ls from GNU fileutils) OpenBSD Solaris
mtime ls -latr –full-time ls -latTr ls -latr
atime ls -laur –full-time ls -lauTr ls -laur
ctime ls -lacr –full-time ls -lacTr ls -lacr

What actions change MAC times on a UNIX box? Read More »

What in our brains invest memories with emotion?

From Steven Pinker’s “What the F***?” (The New Republic: 9 Octobert 2007):

The mammalian brain contains, among other things, the limbic system, an ancient network that regulates motivation and emotion, and the neocortex, the crinkled surface of the brain that ballooned in human evolution and which is the seat of perception, knowledge, reason, and planning. The two systems are interconnected and work together, but it seems likely that words’ denotations are concentrated in the neocortex, especially in the left hemisphere, whereas their connotations are spread across connections between the neocortex and the limbic system, especially in the right hemisphere.

A likely suspect within the limbic system is the amygdala, an almond-shaped organ buried at the front of the temporal lobe of the brain (one on each side) that helps invest memories with emotion. A monkey whose amygdalas have been removed can learn to recognize a new shape, like a striped triangle, but has trouble learning that the shape foreshadows an unpleasant event like an electric shock. In humans, the amygdala “lights up”–it shows greater metabolic activity in brain scans–when the person sees an angry face or an unpleasant word, especially a taboo word.

What in our brains invest memories with emotion? Read More »

Do’s and don’ts for open source software development

From Jono DiCarlo’s “Ten Ways to Make More Humane Open Source Software” (5 October 2007):

Do

  1. Get a Benevolent Dictator
    Someone who has a vision for the UI. Someone who can and will say “no” to features that don’t fit the vision.
  2. Make the Program Usable In Its Default State
    Don’t rely on configurable behavior. It adds complexity, solves little, and most users will never touch it anyway. Usable default behavior is required.
  3. Design Around Tasks
    Figure out the tasks that people want to do with your software. Make those tasks as easy as possible. Kill any feature that gets in the way.
  4. Write a Plug-In Architecture
    It’s the only good solution I’ve seen to the dilemma of providing a complete feature set without bloating the application.
  5. User Testing, User Testing, User Testing!!
    Without user testing, you are designing by guesswork and superstition.

Do Not

  1. Develop Without A Vision
    “When someone suggests another feature, we’ll find a place to cram it in!”
  2. Join the Clone Wars
    “Closed-source program X is popular. Let’s just duplicate its interface!”
  3. Leave the UI Design Up To The End User
    “I’m not sure how that should work. I’ll make it a check box on the preferences screen.”
  4. Make the Interface a Thin Veneer over the Underlying Implementation
    “But it’s got a GUI now! That makes it user-friendly, right?”
  5. Treat UI Design as Babysitting Idiots
    “They should all quit whining and read the manual already.”

Do’s and don’ts for open source software development Read More »

Scarcities and the music, movie, and publishing businesses

In Clay Shirky’s response to R.U. Sirius’ “Is The Net Good For Writers?” (10 Zen Monkeys: 5 October 2007), he takes on the persona of someone talking about what new changes are coming with the Gutenberg movable type press. At one point, he says, “Such a change would also create enormous economic hardship for anyone whose living was tied to earlier scarcities.”

It’s not just writing and writers and publishers that now face that change. Scarcities drove the music and movie businesses, and those scarcities are disappearing. When music is no longer tightly controlled in terms of creation, availability, manufacture, and distribution, when it’s possible to download or listen to anything at any time, those businesses face rapid, discombobulating change.

Is it the government’s – or society’s – duty, however, to put those scarcities back into place, either through technologies or law?

Scarcities and the music, movie, and publishing businesses Read More »

Like music, authors will make more money from personal appearances

From Douglas Rushkoff’s response to R.U. Sirius’ “Is The Net Good For Writers?” (10 Zen Monkeys: 5 October 2007):

But I think many writers – even good ones – will have to accept the fact that books can be loss-leaders or break-even propositions in a highly mediated world where showing up in person generates the most income.

Like music, authors will make more money from personal appearances Read More »

The Internet makes (sloppy) writers of nearly everyone

From Adam Parfrey’s response to R.U. Sirius’ “Is The Net Good For Writers?” (10 Zen Monkeys: 5 October 2007):

I like the internet and computers for their ability to make writers of nearly everyone. I don’t like the internet and computers for their ability to make sloppy and thoughtless writers of nearly everyone.

The Internet makes (sloppy) writers of nearly everyone Read More »

The shift from interior to exterior lives

From Mark Dery’s response to R.U. Sirius’ “Is The Net Good For Writers?” (10 Zen Monkeys: 5 October 2007):

But we live in times of chaos and complexity, and the future of writing and reading is deeply uncertain. Reading and writing are solitary activities. The web enables us to write in public and, maybe one day, strike off the shackles of cubicle hell and get rich living by our wits. Sometimes I think we’re just about to turn that cultural corner. Then I step onto the New York subway, where most of the car is talking nonstop on cellphones. Time was when people would have occupied their idle hours between the covers of a book. No more. We’ve turned the psyche inside out, exteriorizing our egos, extruding our selves into public space and filling our inner vacuums with white noise.

The shift from interior to exterior lives Read More »

People being rescued run from their rescuers

From Les Jones’s email in Bruce Schneier’s “Crypto-Gram” (15 August 2005):

Avoiding rescuers is a common reaction in people who have been lost in the woods. See Dwight McCarter’s book, “Lost,” an account of search and rescue operations in the Great Smoky Mountains National Park. In one chapter McCarter tells the story of two backpackers in the park who got separated while traveling off-trail in the vicinity of Thunderhead. The less-experienced hiker quickly got lost.

After a day or two wandering around he was going through his pack and found a backpacking how-to book that explained what to do in case you got lost in the woods. Following the advice, he went to a clearing and built a signal fire. A rescue helicopter saw the smoke and hovered overhead above the tree tops as he waved his arms to attract their attention. The helicopter dropped a sleeping bag and food, with a note saying they couldn’t land in the clearing, but that they would send in a rescue party on foot.

The lost hiker sat down, tended his fire, and waited for rescue. When the rescuers appeared at the edge of the clearing, he panicked, jumped up, and ran in the other direction. They had to chase him down to rescue him. This despite the fact that he wanted to be rescued, had taken active steps to attract rescuers, and knew that rescuers were coming to him. Odd but true.

People being rescued run from their rescuers Read More »

World distance reading WiFi and RFID

From Bruce Schneier’s “Crypto-Gram” (15 August 2005):

At DefCon earlier this month, a group was able to set up an unamplified 802.11 network at a distance of 124.9 miles.

http://www.enterpriseitplanet.com/networking/news/…

http://pasadena.net/shootout05/

Even more important, the world record for communicating with a passive RFID device was set at 69 feet. Remember that the next time someone tells you that it’s impossible to read RFID identity cards at a distance.

http://www.makezine.com/blog/archive/2005/07/…

Whenever you hear a manufacturer talk about a distance limitation for any wireless technology — wireless LANs, RFID, Bluetooth, anything — assume he’s wrong. If he’s not wrong today, he will be in a couple of years. Assume that someone who spends some money and effort building more sensitive technology can do much better, and that it will take less money and effort over the years. Technology always gets better; it never gets worse. If something is difficult and expensive now, it will get easier and cheaper in the future.

World distance reading WiFi and RFID Read More »

Micro-nations

From George Pendle’s “New Foundlands” (Cabinet: Summer 2005):

Call them micro-nations, model countries, ephemeral states, or new country projects, the world is surprisingly full of entities that display all the trappings of established independent states, yet garner none of the respect. The Republic of Counani, Furstentum Castellania, Palmyra, the Hutt River Province, and the Empire of Randania may sound fantastical, but they are a far cry from authorial inventions, like C.S. Lewis’s Narnia or Swift’s Laputa. …

Such idiosyncratic nation-building can trace its roots back to the early nineteenth century, when even the mightiest empire had yet to consolidate its grip on the more far-flung regions of the world. The swampland of the Mosquito Coast was just such an untouched area, and it was here that the Scottish adventurer Gregor MacGregor decided to found his new kingdom – the Territory of Poyais.

The Territory of Poyais displayed many of the themes that would appear in micro-nations for the next century-and-a-half: Firstly, that the love of money is usually a significant incentive in a micro-nation’s foundation. Secondly, that a micro-nation’s founders will always bestow upon themselves thoroughly dramatic titles. Thirdly, that since all the world’s good spots have been taken, micro-nations are usually gifted with dire and hazardous geography. And finally, should any other country enquire into the status of a micro-nation, it is liable to collapse.

For example, take the Republic of Indian Stream, a self-declared republic in North America that existed from 1832 to 1835. An ambiguous border treaty between Britain and the U.S. had created a 500-square mile legal loophole between Canada and the state of New Hampshire. Three hundred enterprising American citizens, all hoping to avoid federal taxes, quickly established a government and constitution and declared Indian Stream a sovereign state. The Republic went unchallenged, but when one of its members was arrested for unpaid debts and taken to serve time in a debtors’ prison in Canada, the Republic of Indian Stream swiftly planned a counterstrike. Crossing the border into Canada, they shot up a local judge’s house, broke their fellow “Streamer” out of prison, and returned triumphantly home. This bravado did not last for long. By the next morning, doubts about the attack were mustering, British retaliation was feared, and before long the Republic voted to be annexed by the New Hampshire militia. Indian Stream was soon incorporated into the state where its libertarian longing would continue to be nurtured for years to come.

One of the major problems in founding a new country, second only to being ignored, is the threat of invasion by a more legitimate nation. As a result, when a group of Ayn Rand disciples tried, in 1969, to set up a new country named Oceana, defense of the realm was paramount. Even though the exact location for Oceana had not been definitely fixed, boot camps were organized for all those who wanted to live there. Most ominously of all, plans were made to steal a nuclear missile, the ultimate deterrent should another country come knocking on their door. Fortunately the group was disorganized and lacking in funds, and when the ringleaders decided to rob a bar to fund their project, the hapless group was promptly arrested and their startling story discovered.

The United States Office of the Geographer stresses that five factors are needed to become a country: space, population, economic activity, government structure, and recognition from other countries. Of these, it is the last factor that has always been the hardest to attain. However, one micro-nation has perhaps come closer to fulfilling these requirements than any other. Founded by a former “pirate” radio operator, Paddy Roy Bates, Sealand is situated on an abandoned World War II anti-aircraft tower, seven miles off the British coast. Consisting of 550 square meters of solid steel, it was declared independent by “Prince” Roy in 1967. (The country’s initial economic activity consisted largely of selling passports and minted coins – both common practices amongst modern micro-nations out to make a quick buck).

Just as Sealand now plays host to the Internet, it is the Internet that has revealed itself as the host for a whole new generation of fictional state projects. As the libertarian fetish for micro-nations weakens, the virtual geography of the Internet grants a modicum of affordable tangibility to new micro-nations, without any of the traditional perils associated with abandoned anti-aircraft platforms or disputed South Pacific atolls.

In comparison, the Royal Kingdom of Elgaland-Vargaland (KREV) has no pull on believability. Although it claims physical territory, it insanely suggests that this consists of all the border frontier areas between all countries on earth. In doing so, the joint kings of KREV (for even these post-modern micro-nations can rarely resist the traditional attraction of a royal title) seem to be taking the artist Gordon Matta-Clark’s “Fake Estates” project – in which Matta-Clark bought small, inaccessible, and unusable lots of land, situated between buildings – to its furthest logical extension. KREV is a country made up of the intersections between real countries, a nation of negative space – a micro-nation that is best to debate rather than to visit.

Micro-nations listed in the article:

  •   the Republic of Counani  
  •   Furstentum Castellania  
  •   Palmyra  
  •   the Hutt River Province  
  •   the Empire of Randania  
  •   the Territory of Poyais  
  •   the Territory of Poyais  
  •   the Republic of Indian Stream  
  •   the Principality of Outer Baldonia  
  •   Oceana  
  •   Sealand  
  •   the Republic of Howland, Baker and Jarvis  
  •   the Royal Kingdom of Elgaland-Vargaland (KREV)  

Micro-nations Read More »

Chinese attacks on government and business networks

From Foreign Policy‘s interview with Richard A. Clarke, “Seven Questions: Richard Clarke on the Next Cyber Pearl Harbor” (April 2008):

I think the Chinese government has been behind many, many attacks—penetrations. “Attacks” sounds like they’re destroying something. They’re penetrations; they’re unauthorized penetrations. And what they are trying to do is espionage. They’re engaged in massive espionage, not only in the U.S. government, in the U.S. private sector as well, but also around the world. The British security service, MI5, sent a note to the 300 largest corporations in England a few months ago, telling them that the Chinese government had probably penetrated their networks.

What’s happening every day is that all of our information is being stolen. So, we pay billions of dollars for research and development, both in the government and the private sector, for engineering, for pharmaceuticals, for bioengineering, genetic stuff—all sorts of proprietary, valuable information that is the result of spending a lot of money on R&D—and all that information gets stolen for one one-thousandth of the cost that it took to develop it.

I’m also concerned about penetrations of U.S. research-and-development firms, everything from pharmaceuticals to genetics to aerospace engineering—all the things we have to sell in our knowledge-based economy. We are a post-industrial, knowledge-based society. That’s what we sell to the world. If other people can steal it readily, then we won’t have much of a margin.

Chinese attacks on government and business networks Read More »

The NSA’s cryptographic backdoor

From Bruce Schneier’s “The Strange Story of Dual_EC_DRBG” (Crypto-Gram: 15 November 2007):

This year, the U.S. government released a new official standard for random number generators, which will likely be followed by software and hardware developers around the world. Called NIST Special Publication 800-90, the 130-page document contains four different approved techniques, called DRBGs, or “Deterministic Random Bit Generators.” All four are based on existing cryptographic primitives. One is based on hash functions, one on HMAC, one on block ciphers, and one on elliptic curves. It’s smart cryptographic design to use only a few well-trusted cryptographic primitives, so building a random number generator out of existing parts is a good thing.

But one of those generators — the one based on elliptic curves — is not like the others. Called Dual_EC_DRBG, not only is it a mouthful to say, it’s also three orders of magnitude slower than its peers. It’s in the standard only because it’s been championed by the NSA, which first proposed it years ago in a related standardization project at the American National Standards Institute.

Problems with Dual_EC_DBRG were first described in early 2006. The math is complicated, but the general point is that the random numbers it produces have a small bias. The problem isn’t large enough to make the algorithm unusable — and Appendix E of the NIST standard describes an optional workaround to avoid the issue — but it’s cause for concern. Cryptographers are a conservative bunch; we don’t like to use algorithms that have even a whiff of a problem.

But today there’s an even bigger stink brewing around Dual_EC_DRBG. In an informal presentation at the CRYPTO 2007 conference this past August, Dan Shumow and Niels Ferguson showed that the algorithm contains a weakness that can only be described as a backdoor.

What Shumow and Ferguson showed is that these numbers have a relationship with a second, secret set of numbers that can act as a kind of skeleton key. If you know the secret numbers, you can predict the output of the random number generator after collecting just 32 bytes of its output. To put that in real terms, you only need to monitor one TLS internet encryption connection in order to crack the security of that protocol. If you know the secret numbers, you can completely break any instantiation of Dual_EC_DRBG.

My recommendation, if you’re in need of a random number generator, is not to use Dual_EC_DRBG under any circumstances. If you have to use something in SP 800-90, use CTR_DRBG or Hash_DRBG. Or Fortuna or Yarrow, for that matter.

The NSA’s cryptographic backdoor Read More »

Graveyard shifts and torpedo coffins

From Atul Gawande’s “Final Cut: Medical arrogance and the decline of the autopsy” (The New Yorker: 19 March 2001):

… in the nineteenth century … [some doctors] waited until burial and then robbed the graves, either personally or through accomplices, an activity that continued into the twentieth century. To deter such autopsies, some families would post nighttime guards at the grave site – hence the term “graveyard shift.” Others placed heavey stones on the coffins. In 1878, one company in Columbus, Ohio, even sold “torpedo cofins,” equipped with pipe bombs designed to blow up if they were tampered with.

Graveyard shifts and torpedo coffins Read More »