…the Cogitorium Twitter Feed

As of November, 2023 the TimsCogitorium Twitter has been deleted. I was hoping Elon Musk would cave to greed and return Twitter to a useful public forum. Instead, he’s apparently willing to lose tons of money in an attempt to create a forum for his own warped world-view. This somewhat completes a full-circle that started in 2019 when most of this blog’s content was pushed to social media. I’m now fully off of social media, so any thoughts I need to share will have to be here.

For historical purposes, the old Twitter feed has been exported and the content is now available within this site.


…the Cogitorium Facebook Page

As of November, 2021 the TimsCogitorium Facebook page has been deleted. I neither like nor trust the platform, and I will no longer support the irresponsibility with which Facebook has handled curation of their content. I appreciate all the thoughtful interaction over the last decade.

For historical purposes, the old page has been exported and the content is now available within this site.


Why the FBI vs. Apple Matters

iphone-6s-tear-downTo most Americans, Apple’s refusal to unlock the San Bernadino shooter’s iPhone seems an untenable position. After all, Farook is a known terrorist who committed a horrific crime. That a legal warrant should be issued to search his every sock drawer and hard drive to uncover links to other terrorists or plots is patently obvious. Clearly Apple should just give the FBI what they want. So why is Apple balking? And why does most of the tech community side with them?

The facts are a bit confusing to those outside the tech community. The average American doesn’t (and probably doesn’t want to) understand the intricacies of data encryption and security. With that in mind, I’m going to try to make a more real-world analogy that everyone can relate to, but still illustrates the problem at hand. To do that, let’s assume that this is the 1960s. “Ivan” has just committed an act of terror in the name of the USSR. He was killed in the event, but police suspect he may have had microfilmed plans and lists of other Soviet agents inside the US.

The FBI discovers Ivan has a safety deposit box at the local bank. They go to the court and get a warrant, present it to the bank, and the bank manager opens the box inside the vault and surrenders the contents inside to the authorities.

This situation is similar to requests Apple has responded to many times before. It is a request for something Apple has possession of (e.g. iMessage conversations on its servers) which are turned over willingly with the proper legal authorization. This is how most people seem to be thinking of the Farook iPhone case, but it is not similar to the current case at all.  For that, let’s move on to the next scenario.

Police then discover that Ivan has an ACME Self Destructing Safe in his basement. The feds know this safe is equipped with an acid release failsafe inside the unit such that if the wrong combination is tried too many times or they attempt to force open the safe, the acid is released and all contents of the safe are destroyed.

The FBI then goes to the ACME company and asks them to open the safe. But ACME explains that even they don’t have the combination. Only Ivan did, and he’s gone. ACME doesn’t own the safe or any of its contents. It just designed and built it. Then the FBI comes back to ACME with a new plan and a court order to make ACME implement it. They want ACME to build them a device that can neutralize the acid failsafe so that the police can then just crack the safe.

However, ACME is aware that this acid neutralizing device will actually work on any of their safes, not just Ivan’s. Further, they know their safes are the bane of the FBI, and that police have hundreds of these legally confiscated safes from other crimes stored in evidence lockers across the country. The FBI would love to open them all.

ACME is worried that eventually one of the neutralizing devices or the plans for one will get out in the public or on the black market, and once that horse is out of the barn, there’s no putting it back. They realize that what the FBI is asking them to do is effectively remove the acid failsafe as a security feature from everyone’s safe, not just Ivan’s. This compromises the safety of ACME’s many legitimate customers who have trusted them to secure their belongings.

Further, the security industry as a whole is worried that if ACME yields, it sets the precedent that no one can build and sell uncrackable safes or unbreakable locks. Every security system must be penetrable by the police without the owner’s cooperation. But such a built in weakness is also exploitable for nefarious purposes, both by corrupt government agents as well as theives and spies.

This is the situation Apple finds itself in with the locked iPhone. Once it builds the crack tool, there is no reality under which it would be used just once and destroyed. Even if that tool was safely destroyed, the FBI would be back next week with another warrant for another iPhone, and they would be forced to build it again. Eventually, it becomes impractical to destroy and rebuild the tool each time, so the issue becomes about controlling access to the tool.

Therein lies the weakness. In a world where horses don’t exist, no one has to worry about watching the barn door. But once you create a horse, then the door becomes a liability. And because horses are useful, eventually you have multiples… then multiple barns… and multiple doors. It’s only a matter of time before one gets loose. After all, no security system is perfect.


GOP senators to feds: Leave the Internet alone

12217_large_neutral-bits.pngIt’s this sort of thing that really pisses me off. The intention is exactly right. The Internet should be free of interference. It should continue to be accessible by anyone, empower content and service creators, and foster innovation. Yet excluding all government regulation of the Internet is exactly contrary to achieving that goal.

In fairness, the issue of Net Neutrality is a bit complicated.  Most people don’t know how the Internet works. And this leaves open the opportunity to exploit that lack of understanding through politi-speak gems like this

“There are exceptions of course, but far too often, when you hear someone say, ‘We need regulations to protect the Internet,’ what they’re actually saying is they don’t really trust the entrepreneurs and Internet technologists to create the economic growth and to increase public welfare.”

Net Neutrality regulations don’t stifle entrepreneurs and technologists. Rather, they keep the network available for them. Net Neutrality reigns in big ISPs from exploiting their effective monopolies for increased profit and offering preferential treatment for other large companies who can afford to pay to play. It protects the consumer and the entrepreneur from big business.

In a very real way, keeping the government from regulating the Internet is simply paving the way for a few large private business to regulate it. There’s no way that ends well for small businesses and consumers.

All regulations are restricting someone else’s freedom. That doesn’t make them all bad. Net Neutrality regulations are all about preserving the freedom of the Internet. If you would rather trust AT&T, Time Warner, Verizon, and Comcast to keep your network a free and open egalitarian network… you’re more than a little naive.


Did Snowden Execute the NSA’s Corbomite Maneuver?

TheCorbomiteManeuver
Star Trek’s episode “The Corbomite Maneuver” teaches the value of a high stakes bluff.

The NSA debacle gets more weird by the minute. First, the NSA get “outed” for doing what pretty much everyone thought they were doing anyway. Government officials promptly and predictably lose their collective shit, because apparently they were the only ones in the dark.

Then the whistleblower/traitor outs himself as the highly skilled tech with the keys to the information kingdom who couldn’t live with his conscience any longer. Sounds noble. But he’s quickly unmasked as a man who by all accounts was dramatically unqualified for the position he apparently held. Okay, maybe he’s a tech savant of sorts. At this point I was still trying to give him the benefit of the doubt.

However, Snowden then starts giving interviews claiming the NSA has lots of capabilities, that to many of us in the technical community, just seem damned unlikely. Are they collecting data? Sure. Are they trying to analyze and mine it? Sure. But reconciling and normalizing zetabytes of heterogeneous data is damned hard, and most often yields digital gludge. Their data repository is likely way more plentiful than their information repository. Then along come companies like Google to start piling on, indicating how the NSA Prism program really works with them. And frankly, Google’s story is far more technically plausible than Snowden’s.

For added measure, Snowden’s latest interview asserts that the NSA isn’t just snooping on US citizens, but is actively hacking China’s networks as well. Ummm… duh. Does anybody really hope that’s not happening? Especially since they’re beating on our firewalls every day like a jockey on an indolent donkey? But what has this got to do with Fourth Amendment rights, the privacy of American citizens, or the overreach of government? Did he not understand the mission of the NSA when he took the job?

And finally, the boy genius is hiding out in Hong Kong, a place with an extradition policy so friendly to the U.S. that jaywalkers are frequently remanded to the States for unpaid tickets.  This dude is no rocket surgeon.

So what gives? Why is this guy talking? And why is anyone listening?

Fair warning: what follows is pure unadulterated speculation. But someday I aspire to become a pundit on a network news channel, so I need the practice.

I think Snowden is the key operative in the NSA’s version of “The Corbomite Maneuver”. As you may recall, Corbomite was the substance Capt. Kirk claimed the enterprise was coated in. Kirk claimed Corbomite reflected any attack back on the attacker, and thus bluffed Balok into backing off despite his superior power.

I think Snowden is touting the powers of the NSA’s Corbomite. He’s a patsy—promoted beyond his capability, given access to staged capability, and indirectly urged to “blow the whistle”. He’s disclosing the capability the NSA wishes it had. Capability that would send our enemies into a technical paranoid frenzy. The goal? Forcing Al Qaeda to resort to old school postal mail and coded classified ads to communicate. Starting a cyber cold war with China by convincing them there would be technological Mutually Assured Destruction. This is a game of hacker-poker, and we just raised.

Either that, or Snowden’s an ego fueled blowhard. It’s hard to tell.