crime

The tyranny of HOAs

From Ross Guberman’s “Home Is Where the Heart Is” (Legal Affairs: November/December 2004):

ABOUT 50 MILLION AMERICANS BELONG TO HOMEOWNER ASSOCIATIONS, also known as HOAs or common-interest developments, which are composed of single-family homes, condominiums, or co-ops. Four out of five new homes, ranging from starter homes to high-rise apartments to gated mansions, are in one of the nation’s 250,000 HOAs. However they look or whomever they cater to, HOAs impose the same obligations: If you want to buy a property in an HOA development, you must join the HOA, allow a board you help elect to manage shared grounds and other public spaces, pay regular dues and any “special assessments” for upkeep or other costs, and obey a host of quality-of-life rules, even if they’re added after you move in.

In return, the HOA keeps the welcome sign painted, the sidewalk cracks filled, and the flower beds fresh. It may also provide streets, parks, playgrounds, security, snow removal, and utilities that were once the province of local government. But the HOA does more than beautify the neighborhood and preserve property values. It is often the sole driving force behind the Halloween parades and holiday parties that are increasingly rare in an age of bowling alone.

Although structured as nonprofit corporations, HOAs operate as private governments. An HOA can impose fines on those who flout its quality-of-life policies, just as a municipality can penalize those who violate its zoning, antismoking, or noise-control laws. An HOA also levies dues and assessments that are as obligatory as taxes and sometimes less predictable. In exerting these quasi-political powers, HOAs represent one of the most significant privatizations of local government functions in history. …

About half the states allow “non-judicial foreclosures” if owners lapse on their dues. Typically, the HOA’s collection attorney places a lien on the property and announces its new legal status in a local newspaper. The home is then auctioned. Homeowners get none of the due-process protections they could use to ward off other creditors—no right to a hearing and no right to confront their HOA board.

Even in states that require court approval for an HOA foreclosure, the HOA nearly always wins. Under current law, any unpaid dues, no matter how small, can be grounds for foreclosure, particularly once the amount of the delinquency is swelled with interest and fines.

… According to a 2001 study of foreclosures in California by Sentinel Fair Housing, a homeowner advocacy group, when HOAs foreclose, the typical homeowner is $2,557 in arrears. When banks or municipal governments foreclose, by contrast, the typical homeowner owes $190,000 in delinquent payments or back taxes.

The tyranny of HOAs Read More »

Road rash, fender vaults, & root vaults

From Jascha Hoffman’s “Crash Course” (Legal Affairs: July/August 2004):

Typically there are two kinds of injuries [in hit-and-run cases], those from the initial impact, and the ones from hitting and sliding on the asphalt, known as “road rash.” To illustrate the different types of impact a pedestrian can suffer, Rich cued up a series of video clips on his laptop. The first one showed a well-dressed man with a briefcase in each hand caught crossing a busy Manhattan street. Suddenly, a white minivan blindsided him, causing a “fender vault” that tossed the man three feet into the air, still holding one briefcase. A taxi approaching from the opposite direction then launched him into a textbook “roof vault,” sending his remaining briefcase flying and hurling him headfirst onto the pavement. This was not a walk-away accident.

Road rash, fender vaults, & root vaults Read More »

The difficulties in establishing time of death

From Jessica Sachs’s “Expiration Date” (Legal Affairs: March/April 2004):

More than two centuries of earnest scientific research have tried to forge better clocks based on rigor, algor, and livor mortis – the progressive phenomena of postmortem muscle stiffening, body cooling, and blood pooling. But instead of honing time-of-death estimates, this research has revealed their vagaries. Two bodies that reached death within minutes of each other can, and frequently do, show marked differences in postmortem time markers. Even the method of testing eye potassium levels, which was recently hailed as the new benchmark for pinpointing time of death, has fallen into disrepute, following autopsies that showed occasional differences in levels in the left and right eye of the same cadaver. …

And the longer a body is dead, the harder it is to figure out when its owner died. In their book The Estimation of Time Since Death in the Early Postmortem Period, the world-renowned experts Claus Henssge and Bernard Knight warn pathologists to surrender any pretensions of doing science beyond the first 24 to 48 hours after death.

The difficulties in establishing time of death Read More »

Court acceptance of forensic & biometric evidence

From Brendan I. Koerner’s “Under the Microscope” (Legal Affairs: July/August 2002):

The mantra of forensic evidence examination is “ACE-V.” The acronym stands for Analysis, Comparison, Evaluation, and Verification, which forensic scientists compare with the step-by-step method drilled into countless chemistry students. “Instead of hypothesis, data collection, conclusion, we have ACE-V,” says Elaine Pagliaro, an expert at the Connecticut lab who specializes in biochemical analysis. “It’s essentially the same process. It’s just that it grew out of people who didn’t come from a background in the scientific method.” …

Yet for most of the 20th century, courts seldom set limits on what experts could say to juries. The 1923 case Frye v. United States mandated that expert witnesses could discuss any technique that had “gained general acceptance in the particular field in which it belongs.” Courts treated forensic science as if it were as well-founded as biology or physics. …

In 1993, the Supreme Court set a new standard for evidence that took into account the accelerated pace of scientific progress. In a case called Daubert v. Merrell Dow Pharmaceuticals, the plaintiffs wanted to show the jury some novel epidemiological studies to bolster their claim that Merrell Dow’s anti-nausea drug Bendectin caused birth defects. The trial judge didn’t let them. The plaintiff’s evidence, he reasoned, was simply too futuristic to have gained general acceptance.

When the case got to the Supreme Court, the justices seized the opportunity to revolutionize the judiciary’s role in supervising expert testimony. Writing for a unanimous court, Justice Harry Blackmun instructed judges to “ensure that any and all scientific testimony or evidence admitted is not only relevant, but reliable.” Daubert turned judges into “gatekeepers” responsible for discerning good science from junk before an expert takes the stand. Blackmun suggested that good science must be testable, subject to peer review, and feature a “known or potential rate of error.” …

There are a few exceptions, though. In 1999, Judge Nancy Gertner of the Federal District Court in Massachusetts set limits on the kinds of conclusions a handwriting expert could draw before a jury in United States v. Hines. The expert could point out similarities between the defendant’s handwriting and the writing on a stick-up note, the judge said, but she could not “make any ultimate conclusions on the actual authorship.” The judge questioned “the validity of the field” of handwriting analysis, noting that “one’s handwriting is not at all unique in the sense that it remains the same over time, or unique[ly] separates one individual from another.”

Early this year, Judge Pollak stunned the legal world by similarly reining in fingerprint experts in the murder-for-hire case United States v. Plaza. Pollak was disturbed by a proficiency test finding that 26 percent of the crime labs surveyed in different states did not correctly identify a set of latent prints on the first try. “Even 100 years of ‘adversarial’ testing in court cannot substitute for scientific testing,” he said. He ruled that the experts could show the jury similarities between the defendants’ prints and latent prints found at the crime scenes, but could not say the prints matched. …

… the University of West Virginia recently offered the nation’s first-ever four-year degree in biometrics …

Court acceptance of forensic & biometric evidence Read More »

In Search of Lost Crime

From Caleb Crain’s “In Search Of Lost Crime” (Legal Affairs: July/August 2002):

… the 1860 Brooklyn divorce case of Beardsley v. Beardsley. …

Richard Busteed, the lawyer for Mrs. Beardsley’s aggrieved husband, denounced her in his closing arguments as “the harlot of the nineteenth century,” and his showy performance brought tears to the eyes of many in the courtroom. In a final flourish, Busteed appealed to whatever yearning the jurors might have had for literary immortality:

If the record of this case shall be preserved in some substantial form, men and women of other generations will recur to it when they tire of Dombey and Copperfield, and drop to sleep over Kenilworth and Ivanhoe. In the glow of this extraordinary drama of real life, the highly wrought pictures of the novelist will pale their intellectual fires. Long after the romance of Bardell against Pickwick shall be musty with forgetfulness, the sad truths of Beardsley against Beardsley will rise up as sorrowing witnesses of the frailty of a woman who deliberately sacrificed the holiest relations of life upon the altar of a roving and unhallowed lust. …

… the popular 1846 trial of Albert John Tirrell … Tirrell’s case was a particularly hot item: A young man from a respectable family, he murdered a prostitute in Boston and set her brothel on fire, but his ingenious lawyer convinced the jury that he had been sleepwalking. …

Consider the prolixly titled 1871 pamphlet Life, Trial and Execution of Edward H. Ruloff, The Perpetrator of Eight Murders, Numerous Burglaries and Other Crimes; Who Was Recently Hanged at Binghamton, N.Y. A Man Shrouded in Mystery! A Learned Ruffian! Was He Man or Fiend, published by E.E. Barclay of Philadelphia.

In Search of Lost Crime Read More »

Gender, murder, & knots

From Caleb Crain’s “In Search Of Lost Crime” (Legal Affairs: July/August 2002):

… the 1833 trial of Rev. Ephraim K. Avery … discovered Sarah Maria Cornell’s body hanging from a stake among his haystacks …

Consider, as a final example of the pleasures to be had in trial pamphlets, the knot in the rope around Sarah Maria Cornell’s neck.

A coroner’s jury inspected Cornell’s body the day after its discovery. “At first I did not observe the cord about her neck, it was so imbedded,” testified Williams Durfee, who served on the jury. “On looking closer, I observed the knot under her right ear. The cord passed twice round the neck. It was what farmers call two half hitches, and sailors, a clove hitch…. To tighten a clove hitch, the ends must be drawn apart horizontally. If the ends be drawn upwards it will not tighten.” If Durfee was correct about the kind of the knot and the way it tightened, Cornell could not have hanged herself unassisted.

The witness Benjamin Manchester also considered this knot to be a damning clue. Cornell had been a weaver. And yet the knot at her neck seemed to be an unusual one-more typical of a sailor, in Manchester’s opinion. According to Durfee’s testimony, a farmer would also have been familiar with the knot. But in both men’s comments, the implication is that a woman would not have known how to tie it.

The implication stood, unchallenged, until the defense called Louisa M. Whitney, its final witness before the rebuttal phase. Like the late Cornell, Whitney worked in a textile factory, and she performed a remarkable demonstration in the courtroom. She showed “the jury a harness knot and how it is made.” As the impressed stenographer noted in brackets, “It proves to be the same as a clove hitch”-the kind of knot around Cornell’s neck. Whitney testified that weavers tied such knots routinely in the course of mending their harnesses: “We call them harness knots. I never heard any other name.”

In other words, factory women knew how to tie the same knots that farmers and sailors did, but because men and women used different terms and did not work together, the men had underestimated the women’s rope-handling knowledge. The prosecution scrambled to find weavers who mended their harnesses with simpler knots and were willing to swear ignorance of clove hitches, but the damage was done. The moment a woman tied a clove hitch before the jury’s eyes, an important part of the case against Avery unraveled.

The clove-hitch testimony hardly proved Avery’s innocence. While it was easy for his lawyers to discredit much of the evidence against him, the note in Cornell’s bandbox and a few letters she received from him cast a long shadow. Not guilty? In the best trial pamphlets, the lapse of a century and a half has done nothing but sharpen the doubts.

Gender, murder, & knots Read More »

When newspapers began to cover trials

From Caleb Crain’s “In Search Of Lost Crime” (Legal Affairs: July/August 2002):

In American cities in the 1830s, 1- and 2-cent newspapers for the working class abruptly challenged 6-cent newspapers published for merchants and political parties. As Patricia Cline Cohen explains in The Murder of Helen Jewett, an account of the 1836 killing of a New York City prostitute, the penny papers transformed the reporting of murder trials. To satisfy their unsqueamish readers, editors for the first time actively investigated crimes. James Gordon Bennett of The New York Herald pioneered by visiting Jewett’s brothel and tracking down witnesses who had not yet found their way to the police station or the courtroom. While the Herald was running the Jewett story on its front page, circulation tripled.

For a sensational trial, the penny papers sent reporters to the courtroom every day. During the trial they published daily installments, which they collected and issued as a pamphlet once it was over. The trial pamphlet blossomed. The most vivid and novelistic pamphlets are of trials that took place between 1830 and 1875: the trial of Richard P. Robinson for the murder of Helen Jewett, the court-martial of Alexander Slidell Mackenzie for his role in the so-called Somers mutiny (1843), the trial of the Harvard professor John Webster for the murder of a Harvard benefactor named George Parkman (1849), and the trial of the Lincoln assassination conspirators (1865), among others.

When newspapers began to cover trials Read More »

CCTV in the UK deters crime

From Technology Review‘s “Big Brother Logs On“:

In many ways, the drama of pervasive surveillance is being played out first in Orwell’s native land, the United Kingdom, which operates more closed-circuit cameras per capita than any other country in the world. This very public surveillance began in 1986 on an industrial estate near the town of King’s Lynn, approximately 100 kilometers north of London. Prior to the installation of three video cameras, a total of 58 crimes had been reported on the estate. None was reported over the next two years. In 1995, buoyed by that success, the government made matching grants available to other cities and towns that wanted to install public surveillance cameras – and things took off from there. …

And not many argue about surveillance’s ability to deter crime. Recent British government reports cite closed-circuit TV as a major reason for declining crime rates. After these systems were put in place, the town of Berwick reported that burglaries fell by 69 percent; in Northampton overall crime decreased by 57 percent; and in Glasgow, Scotland, crime slumped by 68 percent. Public reaction in England has been mixed, but many embrace the technology. …

CCTV in the UK deters crime Read More »

Malware focused on theft above all

From AFP’s “70 percent of malicious software aimed at theft: survey“:

Seventy percent of malicious software being circulated is linked to various types of cybercrime, a study by security firms Panda Software showed. …

The survey confirms a shift from several years ago, when malicious software was often aimed at garnering attention or exposing security flaws.

“Malware has become a took for generating financial returns,” the report said. …

About 40 percent of the problems detected by Panda was spyware, a type of malicious code designed for financial gain, primarily through collecting data on users’ Internet activities.

Another 17 percent was trojans, including “banker trojans” that steal confidential data related to bank services, others that download malicious applications onto systems.

Eight percent of the problems detected were “dialers,” malicious code that dials up premium-rate numbers without users’ knowledge; “bots,” a scheme involving the sale or rental of networks of infected computers, accounted for four percent of the total.

The e-mail worm, which was recently considered a major Internet threat, made up only four percent of the total.

Malware focused on theft above all Read More »

Smart World of Warcraft Trojan

From Information Week‘s’ “ Trojan Snags World Of Warcraft Passwords To Cash Out Accounts“:

A new password-stealing Trojan targeting players of the popular online game “World of Warcraft” hopes to make money off secondary sales of gamer goods, a security company warned Tuesday.

MicroWorld, an Indian-based anti-virus and security software maker with offices in the U.S., Germany, and Malaysia, said that the PWS.Win32.WOW.x Trojan horse was spreading fast, and attacking World of Warcraft players.

If the attacker managed to hijack a password, he could transfer in-game goods — personal items, including weapons — that the player had accumulated to his own account, then later sell them for real-world cash on “gray market” Web sites. Unlike some rival multiplayer online games, Warcraft’s publisher, Blizzard Entertainment, bans the practice of trading virtual items for real cash.

Smart World of Warcraft Trojan Read More »

Projecting a murdered woman’s image on a building

From BBC News’ “Police go big with victim picture“:

Murdered Prostitute A 60ft high picture of a murdered prostitute has been projected onto a derelict block of flats in Glasgow.

Detectives hope it will help to turn up clues about the death of Emma Caldwell, whose body was found in woods in South Lanarkshire on 8 May.

The image was displayed for four hours on the multi-storey flats in Cumberland Street, Hutchesontown on Monday night.

Police said the site had been chosen as it was visible across areas frequented by Emma and other prostitutes.

Projecting a murdered woman’s image on a building Read More »

Subway’s frequent-eater program killed because of fraud

From Bruce Schneier’s “Forging Low-Value Paper Certificates“:

Both Subway and Cold Stone Creamery have discontinued their frequent-purchaser programs because the paper documentation is too easy to forge. (The article says that forged Subway stamps are for sale on eBay.)

… Subway is implementing a system based on magnetic stripe cards instead.

Subway’s frequent-eater program killed because of fraud Read More »

The difficulty of recovering from identity theft

From TechWeb News’s “One In Four Identity-Theft Victims Never Fully Recover“:

Making things right after a stolen identity can take months and cost thousands, a survey of identity theft victims released Tuesday said. Worse, in more than one in four cases, victims haven’t been able to completely restore their good name.

The survey, conducted by Nationwide Mutual Insurance Co., found that 28 percent of identity thieves’ marks aren’t able to reconstruct their identities even after more than a year of work. On average, victims spent 81 hours trying to resolve their case.

According to the poll, the average amount of total charges made using a victim’s identity was $3,968. Fortunately, most were not held responsible for the fraudulent charges; 16 percent, however, reported that they had to pay for some or all of the bogus purchases.

Other results posted by the survey were just as dispiriting. More than half of the victims discovered the theft on their own by noticing unusual charges on credit cards or depleted bank accounts, but that took time: on average, five and a half months passed between when the theft occurred and when it was spotted.

Only 17 percent were notified by a creditor or financial institution of suspicious activity, a figure that’s certain to fuel federal lawmakers pondering legislation that would require public disclosure of large data breaches.

The difficulty of recovering from identity theft Read More »

Israeli car theft scam

From Bruce Schneier’s “Automobile Identity Theft“:

This scam was uncovered in Israel:

1. Thief rents a car.

2. An identical car, legitimately owned, is found and its “identity” stolen.

3. The stolen identity is applied to the rented car and is then offered for sale in a newspaper ad.

4. Innocent buyer purchases the car from the thief as a regular private party sale.

5. After a few days the thief steals the car back from the buyer and returns it to the rental shop.

What ended up happening is that the “new” owners claimed compensation for the theft and most of the damage was absorbed by the insurers.

Israeli car theft scam Read More »

Open source breathalyzers

From Bruce Schneier’s “DUI Cases Thrown Out Due to Closed-Source Breathalyzer“:

According to the article: “Hundreds of cases involving breath-alcohol tests have been thrown out by Seminole County judges in the past five months because the test’s manufacturer will not disclose how the machines work.”

This is the right decision. Throughout history, the government has had to make the choice: prosecute, or keep your investigative methods secret. They couldn’t have both. If they wanted to keep their methods secret, they had to give up on prosecution.

People have the right to confront their accuser. People have a right to examine the evidence against them, and to contest the validity of that evidence.

Open source breathalyzers Read More »

The Sumitomo Mitsuibank bank heist

From Richard Stiennon’s “Lessons Learned from Biggest Bank Heist in History“:

Last year’s news that thieves had managed to break in to Sumitomo Mitsui Bank’s branch in London and attempt to transfer almost $440 million to accounts in other countries should give CIO’s cause for concern. …

First a recap. Last year it came to light that U.K. authorities had put the kibosh on what would have been the largest bank heist in history.

The story is still developing but this is what we know: Thieves masquerading as cleaning staff with the help of a security guard installed hardware keystroke loggers on computers within the London branch of Sumitomo Mitsui, a huge Japanese bank.

These computers evidently belonged to help desk personnel. The keystroke loggers captured everything typed into the computer including, of course, administrative passwords for remote access.

By installing software keystroke loggers on the PCs that belonged to the bank personnel responsible for wire transfers over the SWIFT (Society for Worldwide Interbank Financial Telecommunication) network, the thieves captured credentials that were then used to transfer 220 million pounds (call it half-a-billion dollars).

Luckily the police were involved by that time and were able to stymie the attack.

From Richard Stiennon’s “Super-Glue: Best practice for countering key stroke loggers“:

… it is reported that Sumitomo Bank’s best practice for avoiding a repeat attack is that they now super-glue the keyboard connections into the backs of their PCs.

The Sumitomo Mitsuibank bank heist Read More »

Turnpikes, roads, & tolls

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

British turnpikes were a controversial response to a serious problem. Traditionally, the King’s Highway was open to all. The problem was how to keep it in good condition. As commerce grew, the need to maintain roads became acute. At first, in Elizabethan times, laws were enacted compelling all able-bodied commoner males to devote several days a year to labor on the highways. (See [1,66,80] for references for the background information as well as other items below that are not attributed otherwise.) The inequitable distribution of the burden this imposed and the lack of effective control mechanisms by the central government led to many complaints. As a result, in 1663, the first turnpike was authorized. A local group was authorized to create a turnpike trust that would borrow money to improve a section of a road, and then collect tolls from travelers for passage over that section of the road. This venture was set up (as were all subsequent turnpikes) as an ostensibly non-profit trust. (There were opportunities for profits there, for example in payment of above-market fees and other abuses, but those were illicit, and in any case were not the high profits that other, more private, enterprises, such as lighthouses and canals, offered.) The reason for the non-profit nature of turnpikes was presumably to allay concerns about a violation of the ancient principle that the King’s Highway was open to all. Still, this turnpike was very controversial (as were many later ones). Apparently largely for that reason, it took until 1695 before the next turnpike was set up [2].

In the early 18th century, the turnpike movement took off in earnest. Although there were frequent protests (sometimes violent, as in the burning of the toll gates around Bristol in 1727 and 1735), by mid-1830s there were over 20,000 miles of turnpikes in England. …

Tolls were usually doubled on Sundays for ordinary commercial traffic, but were eliminated for travel to or from church. They also “were never levied on foot passengers, and were thus unfelt by the labouring poor” (p. 124 of [80]). There were also options in many cases for a flat fee for annual access. Still, there were countless controversies about the toll, “the collection of which led to endless evasions, inequalities and favouritisms of all kinds, arbitrary exactions, and systematic petty embezzlements” (p. 136 of [80]). …

… road tolls are coming back as a result of growing congestion and improved technology. Unlike telecommunications, where technology is increasing capacity of fiber, coax, and radio transmissions, building new roads is increasingly difficult, and making existing ones carry more traffic can only be done to a limited extent. At the same time, electronic means for monitoring traffic and collecting tolls are improving, and we see central business districts in Norway, Singapore, and London imposing tolls. Most of these systems do raise privacy issues, too, since they are centralized ones with information about users, or at least cars. Still, there is a strong tendency to introduce ever more detailed monitoring of traffic, often with the explicit goal of charging users according to their level of activity (whether by governments or by insurance companies).

Turnpikes, roads, & tolls Read More »

Canals & tolls

From Andrew Odlyzko’s “Pricing and Architecture of the Internet: Historical Perspectives from Telecommunications and Transportation“:

The modern canal era can be said to start with the Duke of Bridgewater’s Canal in England. Originally it was just a means of connecting the Duke’s colliery to Manchester. The parliamentary charter (which enabled him to take over private property, with appropriate compensation) obliged the Duke to carry cargo to Manchester at a maximum charge of 30 pence a ton, and to sell his own coal in Manchester for no more than 80 pence a ton, about half the price that had prevailed before [38,68]. Parliament was determined to obtain substantial benefits for the public from the grant of government powers to the Duke. …

The great financial success of the Duke of Bridgewater’s Canal led to widespread attempts to emulate it. In the early 1790s, there was a canal mania, with a burst of construction that was never to be replicated in Britain. (The U.S. had its canal mania some decades later, following on the great success of the Erie Canal.) The charters of those canals show a general trend towards greater price discrimination. …

Similar toll schedules depending on cargo were also common in the United States. As an example, when parts of the still incomplete Erie Canal were opened in 1820, there was a long list of tolls, concluding with “All articles not enumerated, one cent, per ton, per mile” (Chapter 2 of [81]). The enumerated articles (among those that were measured by the ton) were charged tolls ranging from salt and gypsum at 0.5 cents per ton per mile, to 1 cent for flour, to 2 cents for merchandise, and nothing for fuel to be used in the manufacture of salt (so that it was necessary not only to know the nature of the cargo, but its ultimate use). …

While canal operators were trying to squeeze carriers (who were trying to squeeze merchants, in ways similar to those described below for turnpikes), carriers often attempted to evade tolls. They bribed toll-collectors, misrepresented what the cargo was, or how much there was of it, and in some cases even hid cargo with high toll charges under commodities such as sand for which the fees were low. The countermeasures, just as they are today, and would likely be in the future with electronic communications, were based on both technology and law. Measurements were taken (in many cases there were books available to canal operators, listing canal boats, and the weight of cargo aboard as a function of how deeply in the water they lay), and there were punitive penalties for evasion.

Canals & tolls Read More »

Security will retard innovation

From Technology Review‘s “Terror’s Server“:

Zittrain [Jonathan Zittrain, codirector of the Berkman Center for Internet and Society at Harvard Law School] concurs with Neumann [Peter Neumann, a computer scientist at SRI International, a nonprofit research institute in Menlo Park, CA] but also predicts an impending overreaction. Terrorism or no terrorism, he sees a convergence of security, legal, and business trends that will force the Internet to change, and not necessarily for the better. “Collectively speaking, there are going to be technological changes to how the Internet functions — driven either by the law or by collective action. If you look at what they are doing about spam, it has this shape to it,” Zittrain says. And while technologi­cal change might improve online security, he says, “it will make the Internet less flexible. If it’s no longer possible for two guys in a garage to write and distribute killer-app code without clearing it first with entrenched interests, we stand to lose the very processes that gave us the Web browser, instant messaging, Linux, and e-mail.”

Security will retard innovation Read More »

Terrorist social networks

From Technology Review‘s “Terror’s Server“:

For example, research suggests that people with nefarious intent tend to exhibit distinct patterns in their use of e-mails or online forums like chat rooms. Whereas most people establish a wide variety of contacts over time, those engaged in plotting a crime tend to keep in touch only with a very tight circle of people, says William Wallace, an operations researcher at Rensselaer Polytechnic Institute.

This phenomenon is quite predictable. “Very few groups of people communicate repeatedly only among themselves,” says Wallace. “It’s very rare; they don’t trust people outside the group to communicate. When 80 percent of communications is within a regular group, this is where we think we will find the groups who are planning activities that are malicious.” Of course, not all such groups will prove to be malicious; the odd high-school reunion will crop up. But Wallace’s group is developing an algorithm that will narrow down the field of so-called social networks to those that warrant the scrutiny of intelligence officials. The algorithm is scheduled for completion and delivery to intelligence agencies this summer. …

Terrorist social networks Read More »