Follow Slashdot stories on Twitter

 



Forgot your password?
typodupeerror
×
User Journal

Journal Journal: The ultimate in military training environments 5

I had checked out... The environment was so complete that for a discrete moment I had completely forgotten that we were still in the continental United States. Perhaps it was the smell of kebabs cooking or the sound of Nusrat Fateh Ali Khan playing from the electronics shop that also sold pirated Western DVDs or the afternoon call to prayer coming from the tops of the minarets in the local mosque. It could have been the women selling bread, fruits or flowers by the side of the road or the Arabic men playing backgammon in the cafe with shisha pipes. Toyota trucks or bicycles being repaired in the roadside repair shops under Iraqi flags added to the realism along with a tangle of wires on poles carrying telephone and electricity around town with satellite dishes for television on rooftops were added elements. But the thing that completed it was the sound of Baghdadi Arabic from a gentleman greeting us as we drove through town.

Read all about it here. Medina Wasl with the 3rd Special Forces Group

User Journal

Journal Journal: Sundance New Frontier 2010 and a Banksy sighting

New JonesBlog update. Sundance New Frontier 2010 and a Banksy sighting

I ran up to Park City for the Sundance Festival and to photograph an art installation, the Cloud Mirror by Eric Gradman. The point of the Cloud Mirror is to search out information on the Internet about visitors and merge that information with a real time image of the person on an LCD screen in front of them using computer vision to augment reality. You see yourself reflected back live, in person on the LCD screen in front of you with a thought bubble out of a comic book superimposed next to your head displaying all sorts of information that can be dug up through the Internet. The Cloud Mirror searches Facebook, Twitter, Flickr, IMDB, sex offenders databases and displays activities, relationship status, your favorite movies, books, music, any status updates you post etc...etc...etc... along with snarky comments.

User Journal

Journal Journal: Shot Show coverage 2

I flew down to Las Vegas to do some work that I'll talk about here later. But while I was in town, I took two days to document Media Day and Shot Show 2010 for a number of sources including Wired, The Firearm Blog and other resources. There was some interesting new technology including a new pistol from Armatix that uses RF signals to disable the sidearm if it is too far from the wristwatch the accompanies it. Also new ballistics computers that are mounted on rifles are discussed.

New JonesBlog update(s). Shot Show 2010 Media Day

Shot Show 2010. The Actual Shot Show

and a little after party. AAC Big Bang Party

User Journal

Journal Journal: Galloping down the slippery slope?

The airplane hijackings and subsequent mass murders of 11 September 2001 did not rely on bringing bombs aboard. They were simply hijacked using pocket tools (box-cutter knives), then used in a novel way to wreak destruction. A large number of security restrictions were subsequently brought in to prevent hijacking, but many have noted that the circumstances of hijackers changed that day. Before, passengers meekly obeyed the hijackers, knowing that they would eventually be released when the hijackers' demands were met, or perhaps when the plane was stormed by special forces. There was no point trying to play the hero. After the twin towers were hit - and even in the fourth plane hijacked that day - passengers realized that they had to overpower the hijackers to save their own lives, and preferably do so before the hijackers had control of the flight deck. Since then, there have been attempts, not actually to hijack airliners, but apparently to destroy them in flight using explosive devices. The "shoe bomber" and the "underpants bomber" are the two that come to mind, but in each case, the perpetrator was overpowered by fellow passengers before he could get his device to work. Following each case, additional ham-fisted security procedures were implemented in airports and inconvenient restrictions imposed on passengers on the ground and in the air. More time wasted in terminals; shoes and belt off at security checkpoints; no liquids or metal combs on board; no washroom or laptop in the last hour of flight; and so forth. The list of restrictions and inconveniences is quite long.

The question I have is whether these post-9/11 attempts were actually intended to destroy an aircraft. If that were the case, the terrorist would have been instructed to prepare and use the device while in the washroom, and not while in his seat. I suspect that the real objective was to cause the very security escalations that we have seen. These "security" procedures further cripple air transport (and indirectly handicap many other forms of business), and divert resources from other potentially productive activities into large bureaucracies and security organizations which have negative economic value. More insidiously, they undermine the very basis of Western society, removing or reducing freedoms and grossly expanding powers of state organizations (police, DHS, border patrols, etc.) to resemble those of totalitarian states.

We've blundered several steps down this slippery slope already. We went from mild and fairly unintrusive security procedures (to prevent tragedies such as the bomb on an Air India 747) which largely accomplished their purpose, to heavy-handed and extremely intrusive "security" procedures, which have no chance of achieving theirs, and are, in fact, utterly unnecessary and ultimately self-defeating. Here are some further steps down this slope, as I see it, and the reasons they are futile:

1a. Well, terahertz scanners can see through clothes to the skin revealing every little detail (ooh, privacy violations, creepy pedo images, blah-blah outrage, etc.), somewhat like a "hands-off" strip search. But once they are installed at every airport and used on every passenger, it would be impossible for a passenger to hide explosives/flammables/nerve gas/etc. on their person. WRONG. Ever seen a fat person naked? There are often rolls of flesh, with nice deep folds which the terahertz scanner does not see into - it can't penetrate skin, remember. Ladies with pendulous breasts also have nice hiding places which are not seen by the terahertz scanners. Men might even manage to hide a small item with creative placement at the scrotum. Perhaps armpits could be used, if one is not required to perform gymnastics while in front of the scanner.
1b. Before long, some terrorist takes advantage of having rolls of fat, and smuggles nasty things onto an airliner in them. But that terrorist gets overpowered by fellow passengers as he/she prepares the nasty things at his/her seat, and before the nasty things can be used (assembled/detonated/activated/whatever). Note that I expect the preparation to be at the terrorist's seat on the plane, where other passengers can spot what's happening, since the real objective is to escalate the security procedures.

2a. Next, passengers are required to raise limbs and adopt lewd postures etc. while being scanned, so that their entire surface is visible to the scanner. Those whose flesh folds are incompletely observed are required to step to the side so a security officer can have a grope inside those folds. This is tantamount to a "hands-on" porno strip search for those who are not particularly lean. Now this is quite intrusive, and some people would simply stop traveling by air. It would also require a certain type of security person to do the job correctly at low wage - exploring dusty crevices of human blubber with his/her fingers (indeed, the best candidates for this job might be in jail). But it's for the security of you and your fellow passengers, so you can't complain! Surely nobody can smuggle anything nasty aboard with these procedures. WRONG. How does contraband get into prisons? That's right, some of it travels in smooth containers shoved into body cavities. Every human has one such cavity, and ladies are blessed with a second suitable cavity.
2b. Soon enough, some terrorist passes through the scanner, with or without the extra grope-search, with one or more plastic containers concealed in a body cavity. These containers are retrieved in a washroom trip during the flight, but the terrorist is overpowered by fellow passengers as he/she prepares the nasty things contained therein at his/her seat, and before the nasty things can be used (assembled/detonated/activated/whatever). Note that I expect the preparation to be at the terrorist's seat on the plane, not in the washroom, since the real objective is to escalate the security procedures.

3a. Obviously, we need to add body cavity searches to the security procedures to prevent this sort of attack. Either it's full rubber gloves & lube, or an equivalent manufactured probe (presumably sterilized between uses), or some kind of ultrasound scanner that you can sit on (is ultrasound able to distinguish between a tampon/IUD and some other object?). This kind of examination would be required for every passenger. Of course, this would be an outrageous violation of civil rights, but how else to keep you and your fellow passengers safe from attack? After all, with this procedure added to the others, it would be impossible to get anything nasty on board an airliner! WRONG. How do high value drugs get smuggled via airliners? Some travels inside swallowed condoms, which would not be detectable via cavity search or ultrasound of the area around body cavities. Drug mules commonly swallow multiple condoms containing pure drugs.
3b. As soon as these procedures are widespread, some terrorist swallows one or more condom bombs before getting on a flight. There are numerous ways this could be arranged to cause an explosion or equivalent in-air catastrophe, which I will not go into. Here's one: two latex condoms are partly filled with binary components which will spontaneously ignite/explode on contact; they are placed inside a silicone condom, which also contains a small amount of a material which will corrode or dissolve latex; the terrorist swallows one or more of such silicone condom bombs. Note that in this method, no external device is required, and there may not be any indication that there is an explosion coming (unless the airline makes the terrorist puke via food poisoning). In this case, the other passengers do not overpower the terrorist, and the device presumably explodes (messily), but it is not certain that the airliner would be destroyed in every attempt. In some attempts the airliner would survive, albeit with a very messy and somewhat devalued interior, and the modus operandi would become evident, provoking further posturing by security agencies.

4. Citizens, rejoice! To protect you against terrorists who have swallowed bombs or other nefarious devices, new security procedures have been instituted. But what could they be? Any option I can think of (using existing technology) is appallingly intrusive and/or costly in time and money. Here are a few possibilities: expensive and time-consuming MRI scan of all passengers; compulsory stomach pumping; administer fast acting emetics and purgatives (and provide a sufficiency of toilets at security). The MRI scan would see most things, but not confidently distinguish among them: an apparent prosthetic implanted in the abdomen might need to be examined laparoscopically or even excised for proper identification. What of partly metallic implants to replace a damaged hip bone? Any sort of implant would completely pass by the stomach pump or emetic/purgative approach. And yes, there are ways to remotely detonate implanted explosives without using metals on the inside or outside. Short of MRI scans coupled with exploratory surgery as standard security procedures, a determined organization could still get a suicide bomber and bomb onto an airliner.

And where have we descended to on this slope? While airliners have been discussed in the steps above, other modes of mass transport and places of mass gatherings could also be targeted. Would trains and concert halls also be encumbered with such ludicrous pseudo-security antics?

I submit that there is actually no sure-fire defense against some forms of terrorist attack. In particular, it is impossible to prevent all possible ways to get a bomb or nerve gas on board an airliner. Note that this analysis even assumes that all of the security procedures are carried out competently, which is perhaps not the case. Protecting against a subset of those ways merely ensures that the unprotected methods will be employed. The steps outlined above can be viewed as a classical "arms race" between cannon and fortresses. The fortress never wins the race in the end, however many steps and twists the race contains.

I also submit that the best defense of an airliner is the self preservation instinct of its passengers (similarly for trains, concert halls, and so forth). By all means, employ the security procedures we had before 9/11, as they will catch the egregious large bombs and obvious suicide bombers. They were much less intrusive and much less expensive, and were a much lighter imposition on civil rights and freedoms. And that's what we should be preserving - our traditional liberties and civil rights, and the duties that accompany them. The slippery slope we are descending is rapidly eroding those rights and liberties, at great expense and without providing the security it pretends. It is also eroding what little is left of the notion of a citizen's duty to defend the society around him/her, replacing it with more encouragement to be a passive and powerless victim or bystander, while the "security" theater attempts to fulfill that duty on his/her behalf but inevitably fails.

This slippery slope of "security" theatrics leads nowhere that we should wish Western societies to go. It has us in lock-step with terrorists all the way, marching to the same destination; a destination of the terrorists' choosing. Every step down the slope is an act of surrender, including the steps already taken. How can that message be brought to those who are steering us downwards? And how can we reverse the process, and recover some of those lost liberties?
User Journal

Journal Journal: Achievement? 1

Apparently, having a journal entry counts as a /. "achievement". It's about the only reason I can conceive of for making this journal entry. It's a fairly weak reason, at that, since most /. "achievements" are by no means achievements.

The Matrix

Journal Journal: Bionic implants 10

New JonesBlog update. Bionic implants

The device seen in these images is called the Utah Electrode Array (WARNING: potentially graphic image after the jump of an implant in a human brain). The Utah Electrode Array is a brain implant technology developed here at the University of Utah by Richard Normann. The purpose of this device, built by currently built for us by Blackrock Microsystems is to transduce signals from external devices to deliver to the brain for interpretation. Alternatively, the device can record impulses generated in the brain for delivery of neural signals to external devices. Our potential interests in this approach are manifold, but real use and implementation of these devices is some years away still.

User Journal

Journal Journal: A couple brainstorms on theoretical biology 3

I recently blogged a couple brainstorms on potential tools in the field of phylogeny-

Long-term alternatives to our current common-descent model in contexts where horizontal gene transfer is significant;

Logarithmic Evolution Distance, an intuitive computational approach to comparing genomes.

They were a lot of fun to think about; perhaps they'd be fun to read if you like theoretical biology stuff.

User Journal

Journal Journal: Computational Framework for Mapping of Neural Circuitry 15

New JonesBlog update. A Computational Framework for Ultrastructural Mapping of Neural Circuitry

We have just published a manuscript in PLoS Biology where we describe how to build a complete and accurate neural network. This of course is one of the long standing holy grails in neuroscience. So, this effort meets two goals: 1) It meets the goals of building a complete neural connectome (we'll be finished collecting all of the data with cell identity, physiologic response and all synaptic connectivity in approximately six days) and 2) It defines a workflow whereby investigators from around the planet can download and use the tools we are providing to build their own connectome projects using existing infrastructure. We are making those tools available here to enable other groups to assemble, browse and annotate the terabyte sized datasets required of connectome level projects.

User Journal

Journal Journal: How to convince others to open source software? 1

About two years ago I wrote a piece of software that sits squarely in between two open source products. Two years later I'm no further along in getting my company to agree to open source the software. What suggestions do Slashdot readers have to help me convince the powers that be that the software should be open sourced?
User Journal

Journal Journal: More mod abuse 1

Well, Mr. 4-digit UID asshat: I now know who you are. Let's just say my spies are everywhere. Oh, no, I'm not going to call you out. I want you to sweat it: does he really know or not? Because you don't want a war. You really don't want to pick a fight with me. I've been on this system at least as long as you have. Think about what that means. Or are you too stupid? Better watch your back, pal.

Microsoft

Journal Journal: Another Open Letter to Brad Smith

This is another open letter to Brad Smith, Microsoft's general legal counsel, in regards to their thinly veiled Linux patent threats and related lawsuit against TomTom.

(Disclaimer: As I am a nobody as far as Microsoft is concerned, I don't honestly expect Brad Smith or anyone at Microsoft to read this, and I don't care. Mostly I'm just blowing off steam and getting my beefs out in the open).

So it's come to this, is it? Suing over an ancient filesystem developed from the the 1970s (FAT) and the assorted ugly hackish kluges that have been necessary to keep the decrepit pile of garbage on life support? The one that only became a defacto standard because at one time its use was all but mandated by some older versions of Microsoft Windows that didn't support anything else? You know, the one originally developed for floppy disks?

Why don't you just stop your lawsuit now before you get laughed out of the courtroom? Seriously, you guys are starting to look more and more like your old sock puppet, The SCO Group? Remember them? Yeah, they're basically on life support now thanks to IBM, Novell and Red Hat practically bankrupting them. Guess they chose the wrong opponents to pick a fight with, huh?

So you thought maybe TomTom would roll over and play dead, eh? I guess they didn't. Especially now that they're backed by the Open Invention Network.

So you have $20 billion in the bank? Wanna watch that money continue to slowly dwindle whilst you fight the Linux community? You don't get it do you? A lot of people with serious cash have a vested interest interest in watching Linux succeed in dwindling your market share. You think others in the industry aren't prepared to enter the melee between you and TomTom? Wrong.

Give it up before you embarrass yourself. Seriously.

Slashdot Top Deals

I tell them to turn to the study of mathematics, for it is only there that they might escape the lusts of the flesh. -- Thomas Mann, "The Magic Mountain"

Working...