Rad Geek People's Daily

official state media for a secessionist republic of one

Posts tagged New York Times

Gradualism in theory is perpetuity in practice

Are we about to turn a corner in Iraq, or should we just cut our losses and get out now? How much longer should we let things play out before we take a decisive step towards disengagement? Let’s ask Tom Friedman, the New York Times’s resident Sensible Liberal and global brain. Apparently, we need to let this play out for a while before we do anything rash. The next six months are critical. Give it until November or December of 2006. Then we’ll know:

Well, I think that we’re going to find out, Chris, in the next year to six months–probably sooner–whether a decent outcome is possible there, and I think we’re going to have to just let this play out.

–Thomas L. Friedman, Hardball, MSNBC (May 11, 2006)

How much longer should we let things play out before we take a decisive step towards disengagement? Let’s ask Tom Friedman, the New York Times’s resident Sensible Liberal and global brain. Apparently, we need to let this play out for a while before we do anything rash. The next six months are critical. Give it until March or April of 2004. Then we’ll know:

The next six months in Iraq–which will determine the prospects for democracy-building there–are the most important six months in U.S. foreign policy in a long, long time.

–Thomas L. Friedman, New York Times (November 30, 2003)

We should let this play out for a while before we do anything rash. The next six months are critical. Give it until December of 2004 or January of 2005. Then we’ll know:

What I absolutely don’t understand is just at the moment when we finally have a UN-approved Iraqi-caretaker government made up of–I know a lot of these guys–reasonably decent people and more than reasonably decent people, everyone wants to declare it’s over. I don’t get it. It might be over in a week, it might be over in a month, it might be over in six months, but what’s the rush? Can we let this play out, please?

–Thomas L. Friedman, Fresh Air, NPR (June 3, 2004)

The next six months are critical. Give it until April or May of 2005. Then we’ll know:

What we’re gonna find out, Bob, in the next six to nine months is whether we have liberated a country or uncorked a civil war.

–Thomas L. Friedman, Face the Nation, CBS (October 3, 2004)

Give it until June or July of 2005:

Improv time is over. This is crunch time. Iraq will be won or lost in the next few months. But it won’t be won with high rhetoric. It will be won on the ground in a war over the last mile.

–Thomas L. Friedman, New York Times (November 28, 2004)

We’re in the end game now. Give it until March or April of 2006:

I think we’re in the end game now…. I think we’re in a six-month window here where it’s going to become very clear and this is all going to pre-empt I think the next congressional election–that’s my own feeling–let alone the presidential one.

–Thomas L. Friedman, Meet the Press (September 25, 2005)

Give it until March or April of 2006:

Maybe the cynical Europeans were right. Maybe this neighborhood is just beyond transformation. That will become clear in the next few months as we see just what kind of minority the Sunnis in Iraq intend to be. If they come around, a decent outcome in Iraq is still possible, and we should stay to help build it. If they won’t, then we are wasting our time.

–Thomas L. Friedman, New York Times (September 28, 2005)

June or July of 2006:

We’ve teed up this situation for Iraqis, and I think the next six months really are going to determine whether this country is going to collapse into three parts or more or whether it’s going to come together.

–Thomas L. Friedman, Face the Nation (December 18, 2005)

July to October of 2006:

I think that we’re going to know after six to nine months whether this project has any chance of succeeding. In which case, I think the American people as a whole will want to play it out or whether it really is a fool’s errand.

–Thomas L. Friedman, Oprah Winfrey Show (January 23, 2006)

We’re in the end game now. We’ll see by sometime around May to July of 2006:

I think we’re in the end game there, in the next three to six months, Bob. We’ve got for the first time an Iraqi government elected on the basis of an Iraqi constitution. Either they’re going to produce the kind of inclusive consensual government that we aspire to in the near term, in which case America will stick with it, or they’re not, in which case I think the bottom’s going to fall out.

–Thomas L. Friedman, CBS (January 31, 2006)

We’re in the end game now. We’ll see by sometime around September to December of 2006:

I think we are in the end game. The next six to nine months are going to tell whether we can produce a decent outcome in Iraq. –Thomas L. Friedman, Today, NBC (March 2, 2006)

We need to let this play out for a while before we do anything rash. The next six months are critical. Give it until November or December of 2006. Then we’ll know:

Well, I think that we’re going to find out, Chris, in the next year to six months–probably sooner–whether a decent outcome is possible there, and I think we’re going to have to just let this play out.

–Thomas L. Friedman, Hardball, MSNBC (May 11, 2006)

Next month: Tom Friedman thinks that we’re going to find out whether it’s time to leave Iraq in the next six months! Give it until January 2007…

Be sure to bear in mind, in case you are confused, that there are always more corners to turn when you are lost in an endless maze.

(Quotes thanks to FAIR 2006-05-16. Link thanks to Dominion Weblog 2006-05-16.)

Well, it’s an honor just to be nominated.

(I owe the link to Broadsheet 2005-10-27.)

We can start with the headline:

Bush Is Not Expected to Feel Need to Pick Woman Again

And it gets better: another bunch of anonymous professional blowhards, informing us that Bush, having gotten that whole woman thing over with by tossing an ill-considered and ineffective nomination to someone with two X chromosomes, can now get to the important stuff. You know, the politics:

WASHINGTON, Oct. 27 – In choosing a replacement for Harriet E. Miers, President Bush may feel less of a need to select a woman to fill the seat of Justice Sandra Day O’Connor, several lawyers and analysts said Thursday.

The lawyers and analysts, all of whom have been involved in directly or indirectly counseling the White House about Supreme Court selections, also said that because of Mr. Bush’s desire to move quickly, he would probably choose from the roster of candidates whom he has considered before and whose backgrounds and records have been extensively researched.

The consensus among the handful of people who spoke about Mr. Bush’s situation was that in addition to deciding whether he had the leeway to replace Justice O’Connor with a man, Mr. Bush will have to deal with other more pressing political questions in making his selection.

And not a moment too soon. After all, who would want to get hung up on something non-political, like the gender makeup of the most powerful courts? You might as well try to have a political discussion about housework or childcare! What ever would all the analysts and lawyers assert their expertise and insider information on then?

Patents kill

So, it turns out that today is–by edict of WIPOWorld Intellectual Property Day 2005. Among the objectives set out for the day are:

  • To increase understanding of how protecting IP rights helps to foster creativity and innovation;
  • To raise awareness of the importance in daily life of patents, copyright, trademarks and designs.

Well, who could disagree with such educational goals? The Ministries of Culture and Science in this secessionist republic of one applaud the educational purposes of World Intellectual Property day, and offer the following in the effort to raise awareness of the importance in daily life of patents and copyrights, and to make sure that you understand exactly how protecting IP restrictions is fostering creativity and innovation.

Intellectual property restrictions are government-granted monopolies. They have nothing, actually, to do with property rights; what they do is seize ordinary people’s property and hold it hostage to the license-holders’ demands for ransom. They kill innovation because they kill new products; they kill new products because they invade other people’s real property — meaning pens, paper, scanners, computers, DVD players, and so on — in the attempt to lock down ideas — which are, by nature, non-rivalrous resources; this amounts to nothing less than a systematic and ruthless intellectual enclosure movement against what is and ought to be the common property of all humanity.

Now, as a techno-geek, I don’t like how this strangles the amazing innovation that we could be seeing in the intelligent use of audio, video, and text content, in this age of cheap computers and plentiful storage. But the plain fact is that this isn’t, really, about what your latest gizmo can or can’t do with your music library, and it’s not a topic for polite debate and economic wonkery. This is life and death. For example, in India recently:

India, a major source of inexpensive AIDS drugs, passed a new patent law yesterday that groups providing drugs to the world’s poorest patients fear will choke off their supply of new treatments.

The new law, amending India’s 1970 Patent Act, affects everything from electronics to software to medicines, and has been expected for years as a condition for India to join the World Trade Organization.

But because millions of poor people in India and elsewhere — including by some estimates half the AIDS patients in the Third World — rely on India’s generic drug industry, lobbyists for multinational drug companies as well as activists fighting for cheap drugs had descended on New Delhi to try to influence the outcome.

It’s very disappointing, but it could have been worse, said Daniel Berman, a coordinator of the global access campaign for the medical charity Doctors Without Borders. All generics could have been removed from the market.

Instead, all the generic drugs already approved in India can still be sold, though sellers must now pay licensing fees. There are also provisions allowing companies that make generics to copy drugs in the future.

But there are relatively tough criteria for such copying, and activists predicted that prices for newly invented drugs will be much higher, because drug makers will have the same 20-year patent monopolies as they have in the West. As AIDS patients develop resistance to old drugs, new treatments will become less affordable, they said.

In addition, it is unclear whether makers of generic drugs in other countries, like Brazil, China and Thailand, will fill any increasing demand for cheaper medicines.

All Western countries grant product patents on new inventions. Since 1970, India has granted process patents, which allow another inventor to patent the same product as long as it was created by a novel process. In pharmaceuticals, that has meant that a tiny tweak in the synthesis of a molecule yields a new patent. Several companies can produce the same drug, creating competition that drives down prices.

Before 1970, India’s patent laws came from its colonial days, and it had some of the world’s highest drug prices. Process patents on drugs, fertilizers and pesticides have extended life expectancy and ended regular famines.

In Africa, exports by Indian companies, especially Cipla and Ranbaxy Laboratories, helped drive the annual price of antiretroviral treatment down from $15,000 per patient a decade ago to about $200 now. They also simplified therapy by putting three AIDS drugs in one pill. Dr. Yusuf Hamied, Cipla’s chairman, called the new law a very sad day for India.

— New York Times 2005-03-24: India Alters Law on Drug Patents

And the same folks want to do the same thing to Latin America, through the adoption of CAFTA:

Found to be HIV-positive shortly before her husband died of AIDS-related complications last fall, an ailing Garcia was convinced of her own death sentence. But generic drugs have kept the virus in check and restored 60 lost pounds to her frame.

I now have hope, said the 52-year-old grandmother and flower vendor, who gets her medicine free from a nonprofit clinic.

Public health experts fear that hope might fade for Garcia and thousands of the region’s chronically ill if the Dominican Republic-Central American Free Trade Agreement, known as CAFTA, is approved this year.

Under the pact American pharmaceutical giants would gain a five-year edge on the development of new drugs by low-cost competitors. Generic versions of name-brand drugs are the main weapon for battling the AIDS pandemic in the developing world.

Healthcare activists say those intellectual property protections would drive up the cost of treating chronic conditions, particularly HIV/AIDS, sufferers of which routinely develop resistance to old medications. About 40 million people worldwide are infected with HIV, the virus that causes AIDS, and more than 275,000 of them live in the six Latin American CAFTA nations, according to United Nations statistics.

— LA Times 2005-04-22: AIDS Patients See Life, Death Issues in Trade Pact

Patents kill people. They mean that the pharmaceutical cartel can call up the armed bully-boys of almost every government in the world in order to enforce artificially high prices for their top money-makers; and that means that State violence is being used to prevent affordable, life-saving drugs from reaching the desparately poor of the world. The multilateral so-called free trade agreements of the past couple decades — NAFTA, the WTO, and upcoming plans such as CAFTA and the FTAA — are slowly cutting back on traditional industrial protectionism while dramatically expanding the scale, scope, and deadly reach of intellectual protectionism.

To hell with that. Intellectual property is not about incentivizing or encouraging or opportunities. It’s about force: invading other people’s property to force them to render long-term rents to you long after you have stopped putting any particular work into what you’re claiming to be yours. A necessary corollary is that it also means invading those who offer innovations based on the work that you have done unless those innovations comply with a very narrow set of guidelines for authorized use. You have no right to do that, and you sure don’t have the right to do it at the expense of innocent people’s lives. A free society needs a free culture. Patents kill and freedom save people’s lives. This is as simple as it gets. Écrassez l’inf?@c3;a2;me: écrassez l’etat.

Further reading

April Fools

Quick review.

George W. Bush, Dick Cheney, Tony Blair, Donald Rumsfeld, and several other senior government officials in the U.S. and U.K. told us that Saddam Hussein’s regime in Iraq had large stockpiles of chemical and biological weapons. They told us that they were actively trying to find nuclear weapons. They told us that they had connections with the al-Qaeda terrorist network, and that therefore Iraq posed an imminent threat to the security of the United States. Therefore pre-emptive war was necessary, and nothing short of regime change would do.

photo: Dick Cheney

They lied. When Ambassador Joe Wilson told them that their evidence for claiming that Saddam Hussein was trying to acquire nuclear weapons was a forgery, they kept citing that completely spurious, forged evidence in public statements. When the U.S. intelligence apparatus was not giving the answers that they needed to justify their policy, they didn’t change the policy; they set up a new intelligence office to give them the answers they wanted. Questions were left unasked and intelligence was cherry-picked and sexed-up and those who offered cautious, qualified, or dissenting views were were marginalized by the
gang at the top and their political appointees at the top of the intelligence agencies
. Needless to say, the caveats and doubts were completely erased in the governments’ public declarations and policy statements. Mysteriously enough, somehow or another, the attitudes of the mad-dog bosses at the top created an environment where groupthink flourished and even though the intelligence community was inundated with evidence that undermined virtually all charges it had made against Iraq (Washington Post 2005-03-31), not one word of this evidence made it past the policy gate-keepers in the President’s cabinet. In other words, they had a goal, they looked for evidence to support that goal, and when they did not find good evidence they repeated evidence that they were informed repeatedly ahead of time was questionable or completely spurious evidence, and they shamelessly bowdlerized the data to in order to hide these opportunities for doubt and hype their war.

And it turns out that what they claimed on nearly every point was false.

photo: Donald Rumsfeld

Iraq had no stockpiles of chemical and biological weapons.

Iraq had no connections with al-Qaeda.

Iraq was not any threat to the United States whatsoever.

Or to put it another way: they lied through their fucking teeth and, as a result, some 10,000-100,000 Iraqi civilians were murdered, thousands more were brutalized and tortured, and over 1,500 British and American troops have died in a rudderless, pointless bloodbath.

Dead wrong indeed. You fucking assholes.

Now that the latest report on intelligence failures–even while piously avoiding unauthorized inquiries into questions concerning the political use of intelligence in driving war policy, of course–has reiterated these sorry facts yet again, it seems that our august media and government officials are finally turning to serious questions of responsibility and policy, to make sure that something like this never happens again.

For example, The New York Times’ Op-Ed page indignantly blasts the Administration for encouraging the credulous use of shaky testimony from unscrupulous interested parties.

Meanwhile, Kit Bond tells us it’s all Bill Clinton’s fault..

And the commission’s report and Bond and the rest of the blowhard brigade have got an answer. Here it is:

The commission’s report said the principal cause of the intelligence failures was the intelligence community’s inability to collect good information about Iraq’s WMD programs, serious errors in analyzing what information it could gather and a failure to make clear just how much of its analysis was based on assumptions rather than good evidence.

The single most prominent recurring theme of its recommendations is stronger and more centralized management of the intelligence community, and, in general, the creation of a genuinely integrated community, instead of a loose confederation of independent agencies.

The panel urged Bush to give broad authority to John Negroponte when he is confirmed as the director of national intelligence.

— CNN 2005-04-01: Report: Iraq intelligence ‘dead wrong’

The problem, you see, is how decentralized intelligence-gathering in the United States is. We’ve got to make sure in the future that we can avoid the politically-driven manipulation of data, that we can prevent dissenting or cautious assessments from being filtered out by hard-charging bosses, that decision-makers get all the information and analysis that they need to make a balanced assessment. And the best way in the world to do this is to consolidate and centralize as much of the intelligence apparatus in the United States government as possible.

photo: George W. Bush

Because nothing ensures a wide range of opinion and the integrity of data like making sure that it’s all filtered through a single directorate before it reaches decision-makers.

A single directorate under the control of one all-powerful political appointee, who answers directly to the President.

And that one political appointee should be John Negroponte.

All of this would be really depressing. I’m just glad that it’s nothing more than one sick fucking April Fools’ joke.

Right?

The Solution to Spam Pollution

A few things have recently come together for me. First, Andrew Leonard recently penned an interesting column on spam-blocking technology for Salon; then Jennifer Lee wrote another interesting article for The New York Times. Finally, I made use of a brief free trial of McAfee’s SpamKiller software. I’ve also just been doing a lot of thinking lately about what needs to be done to seriously address the rising tide of spam that is flooding most everyone’s inbox. Spam e-mail has been getting worse over the past several years, and it’s been getting worse at an accelerating pace. If we don’t want Internet communications to become simply worthless from being drowned by spam e-mail, then we have to rethink our basic model for e-mail so that spammers can no longer take advantage of the system’s architecture to overwhelm legitimate messages with their crap. Lee’s article shows a good grasp of the problem and why anti-spam legislation won’t do much to solve it. Leonard’s has a good grasp on the overall technological shift needed to address the problem, but he doesn’t push the envelope nearly enough in the kind of framework that needs to be accomplished.

Leonard’s article describes the development of SpamAssasin, an open source spam blocker being adopted and improved by many system administrators. Leonard points out that the collaborative effort between legions of dedicated spam-fighters can greatly improve the ability of the software to identify spam messages. As Leonard puts it, The only way to stem the flood of unwanted e-mail may be to harness a million eyeballs and an army of open-source hackers. There’s an intuitive reason why this should be the case. Obviously, by harnessing the efforts of thousands of administrators who ferociously hate spam, it will get a big boost in productive energy. But that’s not all.

The basic problem is this: under the present e-mail architecture, the spam market works. It works phenomenally well, and especially well for the seedier side of online industries, in particular pornography and sex-related products, which can’t advertise through conventional media (other than other porn outlets) and don’t have any financial interest in maintaining a reputation as a friendly corporate citizen. The reasons are inherent features of the e-mail architecture:

  • It costs nearly nothing to send spam: once you have an Internet connection set up (which you’ll need for your product’s website, anyway), it costs virtually nothing to send out scads and scads of spam e-mail. Labor costs can be reduced to nill by feeding addresses from a web crawler into an automated spamming program. This is a fundamental reversal from direct mail and telemarketing, where a fixed cost for contacting a person is borne by the advertiser.

  • Lots of people see it: If you send out a spam message to a huge group of people, then most of the people you send it to will see it. In part, this is because e-mail is a durable medium, like direct mail or fax, and unlike the telephone, so if you send a message while the user is away, they still get it. It’s also due to the relatively primitive state of message sorting and spam filtering–users have very little control over the order and priority with which messages appear in their inboxes, so to get to the mesages they want, they generally have to wade through, or at least scan over, any spam that they get.

  • It’s hard to track offenders. Many comparisons have been drawn between spam e-mail and the junk faxes whose rising costs spurred a federal law against them in 1991. The two are alike in that advertisers get a basically free contact, while victims are stuck with the primary costs (in paper, bandwidth, time, what have you) of the interactions. However, there is a crucial difference: junk faxes can easily be tracked to their perpetrator through phone company records. Offenders can be blocked and identified for legal action. Spam e-mails, on the other hand, are generally very difficult to track to their originators. Headers can easily be forged, server relays can be found to use, one-time-only addresses created with free services, work can be farmed out to mule computer users, who are paid a small amount to send out a huge volume of messages, and then take the fall if they get caught. The anonymity of e-mail and its reliance on the honor system for identifying senders makes spam very difficult to flag and filter.

When we look at all these factors, we begin to see that we need a comprehensive solution which will work to address these structural holes. We cannot rely on anti-spam legislation, since spammers will merely relocate to different states or different countries, and use the anonymity of the communication to further shield themselves. Spam is only going to get worse until we have mass deployment of an easy-to-learn, easy-to-use, agile framework which harnesses both human intelligence and high-quality, flexible technological solutions to make legitimate email easier to access and identifies and deals with spam.

Unfortunately, most anti-spam solutions fail, because they are focused narrow-mindedly on a single goal–the goal of accumulating as many heuristic rules as possible to identify and kill spam (this is reflected in the names–McAfee’s SpamKiller, SpamAssasin, and so on. The most common and most maddening manifestation of this is scorched-earth spam programs such as SpamKiller, which works entirely by accumulating thousands and thousands of rules to try to identify common patterns in the way that spam messages are written or addressed. These do indeed catch a lot of spam, but they also slam perfectly legitimate e-mail. For example, my decision to uninstall SpamKiller was finalized when I saw it was trashing legitimate e-mails because a filter (one of thousands, which took lots of scrolling to find) was killing messages because they contained the word rape. Now, look, folks, I’m pretty much physically nauseated by some of the spam ads I’ve received for rape-fetish pornography sites. But I’m an anti-rape activist, and I receive tons of perfectly legitimate e-mail with the word rape in it. SpamKiller’s approach to spam is like trying to kill a swarm of mosquitoes with a cluster bomb, and plenty of perfectly innocent messages were getting clobbered.

The problem here is that most people who work on spam-blocking software and most of those who purchase it are basically in the frame of mind of trying to get rid of a source of long-term and maddening irritation. Programs tend to be reactively focused on axing spam by any means necessary, rather than proactively focused on improving the e-mail user’s experience. But if we keep our mind on what users need and want, rather than what gives us the temporary satisfaction of the kill, then we should begin to see a bit more clearly what needs to be done.

To reduce the effectiveness of spam, first spam management software needs to be widespread, usable, and respectful of user’s legitimate e-mail. With millions of users employing software that lets them take control of their own inboxes, users will be able to stay on top of their legitimate e-mail and sidestep the spam. Information for identifying spam should come from automated reports that millions of users submit: when a spam slips through, the recipient presses one button in the mail client and it is registered as a spam message so that no-one else receives it (SpamAssassin uses Vipul’s Razor, a system which does just this, but it needs to be integrated into easy to use clients, not just arcane Unix mail filters).

Second, we need to plug the anonymity hole through use of double-key authentication and encryption of e-mail. E-mail clients could prioritize messages which can be verified as coming from a valid address, and also messages which are encrypted for the recipient’s eyes only. Spammers who want their messages seen would have to separately acquire a public key for, and encrypt the message for every intended recipient. For millions of e-mail addresses, that’s an awful lot of extra processor time, network bandwidth, and human labor that the spammer has to pay for. Furthermore, the spammer’s PGP signature or signatures can be blacklisted as quickly as the spams start going out.

Finally, system administrators at big ISPs need to get responsible. One of the biggest conduits for spam open relays, poorly configured mail servers which allow anyone on the Internet to send e-mail through the server by forging headers to pose as a machine on the server’s network. System administrators need to get serious about ensuring that connections are only accepted from authenticated users or legitimate machines on the ISP’s own subnet. And when spam is being sent by a user, they need to be quick about axing that user’s account.

What you can do now:

You can do some things now, both short-term and long-term, to keep yourself from being overwhelmed and work towards an Internet not being drowned in spam.

  • Use shield accounts for online commerce. A lot of high-end spamhouses harvest addresses by buying them from merchants such as Amazon.com. For online interactions which won’t be anything other than perfunctory receipts, it’s good to maintain a shield account (say, diespammersdie@hotmail.com or somesuch) as the address through which you interact with online stores.

  • Download and use PGP. You can get PGP — a great security program which will let you securely sign messages (so that the recipient can verify your identity) and/or encrypt messages (so that only the recipient can read them). The Windows version of PGP automates the process of creating and using PGP keys, and has plugins for popular Windows e-mail clients which let you use simple pushbuttons for its functions. PGP will make your e-mail more secure, and also help build an Internet environment where spammers can no longer hide behind forged headers to conceal their identities.

  • Look for solid anti-spam software that suits you. If you can find spam management software which suits your needs, grab it! If you’re willing to geek around a lot, SpamAssasin looks very good. Better yet, Deersoft is in the process of developing SpamAssassin Pro, a commercial product for Windows based on the SpamAssassin engine and integrated with your mail client. Unfortunately, most spam management software I’ve tried (e.g., SpamKiller) is crap.

  • More tips: Jennifer Lee’s article is accompanied by some tips for avoiding spam, some of which I agree with, and others of which I don’t. Unfortunately, the present spam-heavy environment is encouraging a lot of people to take up measures which cut down spam at the expense of breaking human usability of the e-mail system. Lee suggests using complex e-mail addresses, which do thwart spammers who use dictionary searches on mail services, but which also makes it hard for your friends to remember your e-mail address. She also suggests removing your e-mail from any online directories in which it may be included, which will again thwart spammers but also keep people from being able to reach you. I totally disagree with this method of spam filtering. Again, it amounts to protecting your inbox at the cost of shredding real people’s ability to contact you. Nevertheless, some of her suggestions (such as disposable forwarding accounts for use on Usenet and bulletin boards) are solid.

Anticopyright. All pages written 1996–2024 by Rad Geek. Feel free to reprint if you like it. This machine kills intellectual monopolists.