The Revolution Devours Its Own

Great quick analysis of the now-long-running schizophrenia in the Republican party and how its internal fighting destroys its actually effective politicians.

John Boehner ends his career a conservative...
...
What’s amazing about all of this is the degree to which Boehner and his team have actually delivered conservative policy. Under his leadership, congressional Republicans have slashed federal spending—achieving $3.2 trillion in cuts—and blocked important parts of Obama’s agenda, like comprehensive immigration reform. Despite this, rank-and-file Republicans hate him. According to a new surveyfrom NBC News and the Wall Street Journal, 72 percent of GOP primary voters are dissatisfied with Boehner and Senate Majority Leader Mitch McConnell, including the 36 percent who want them “immediately removed” from their posts.

The Volkswagen Scandal Is Just the Beginning

But security researchers have run into a surprising roadblock: copyright law. The Digital Millennium Copyright Act prohibits the “circumvention” of digital rights management software that locks down media. The DMCA was intended to keep digital movies and music safe from pirates who’d upload them onto the Internet (fat lot of good that has done), but it has been repurposed for some unintended consequences. Technology companies regularly threaten security researchers who try to look inside their products, arguing that these products contain copyrighted software that must be kept secret, because reasons. (Never mind that these reasons never have much to do with copyright; the resale value of the software inside a garage door opener is nil.)
Despite the fact that this kind of tinkering is explicitly legal under every states’ trade secret laws, tech companies try to use copyright threats under the DMCA to shut it down, keeping the security community in the dark about vulnerabilities in the devices we use every day. As more things have software inside them — from baby monitors to firearms — the risks to privacy and safety are mounting. Anything that can think for itself is also something that can be mind-controlled; looking inside its digital brain is the only way to be confident it hasn’t been hit with an Imperius curse. Welcome to the Internet of Things That Can Kill You.
With these concerns in mind, the Electronic Frontier Foundation asked for a pair of car-related exemptions from the DMCA. One would let security researchers investigate the software in cars; the other would let car owners tinker with and repair their cars. Unsurprisingly, the Auto Alliance — a trade group including VW’s North American unit — filed extensive commentsagainst both, arguing in large part that the black boxes need to stay sealed to keep everyone safe...

Living in a Code Yellow World

In the 1980s, handgun expert Jeff Cooper invented something called the Color Code to describe what he called the "combat mind-set."...
Cooper talked about remaining in Code Yellow over time, but he didn't write about its psychological toll. It's significant. Our brains can't be on that alert level constantly. We need downtime. We need to relax. This is why we have friends around whom we can let our guard down and homes where we can close our doors to outsiders. We only want to visit Yellowland occasionally.
Since 9/11, the US has increasingly become Yellowland, a place where we assume danger is imminent. It's damaging to us individually and as a society.
...
The same effects occur when we believe we're living in an unsafe situation even if we're not. The psychological term for this is hypervigilance. Hypervigilance in the face of imagined danger causesstress and anxiety. This, in turn, alters how your hippocampus functions, and causes an excess of cortisol in your body. Now cortisol is great in small and infrequent doses, and helps you run away from tigers. But it destroys your brain and body if you marinate in it for extended periods of time.
Not only does trying to live in Yellowland harm you physically, it changes how you interact with your environment and it impairs your judgment. You forget what's normal and start seeing the enemy everywhere. Terrorism actually relies on this kind of reaction to succeed.

Hacking Team, Computer Vulnerabilities, and the NSA

When the National Security Administration (NSA) -- or any government agency -- discovers a vulnerability in a popular computer system, should it disclose it or not? The debate exists because vulnerabilities have both offensive and defensive uses. Offensively, vulnerabilities can be exploited to penetrate others' computers and networks, either for espionage or destructive purposes. Defensively, publicly revealing security flaws can be used to make our own systems less vulnerable to those same attacks. The two options are mutually exclusive: either we can help to secure both our own networks and the systems we might want to attack, or we can keep both networks vulnerable. Many, myself includedhave long argued that defense is more important than offense, and that we should patch almost every vulnerability we find. Even the President's Review Group on Intelligence and Communications Technologies recommended in 2013 that "U.S. policy should generally move to ensure that Zero Days are quickly blocked, so that the underlying vulnerabilities are patched on U.S. Government and other networks."
Both the NSA and the White House have talked about a secret "vulnerability equities process" they go through when they find a security flaw. Both groups maintain the process is heavily weighted in favor or disclosing vulnerabilities to the vendors and having them patched.
An undated document -- declassified last week with heavy redactions after a year-long Freedom of Information Act lawsuit -- shines some light on the process but still leaves many questions unanswered. An important question is: which vulnerabilities go through the equities process, and which don't?

The Security Risks of Third-Party Data

The Internet is more than a way for us to get information or connect with our friends. It has become a place for us to store our personal information. Our e-mail is in the cloud. So are our address books and calendars, whether we use Google, Apple, Microsoft, or someone else. We store to-do lists on Remember the Milk and keep our jottings on Evernote. Fitbit and Jawbone store our fitness data. Flickr, Facebook, and iCloud are the repositories for our personal photos. Facebook and Twitter store many of our intimate conversations.
...
Many people don't think about the security implications of this information existing in the first place. They might be aware that it's mined for advertising and other marketing purposes. They might even know that the government can get its hands on such data, with different levels of ease depending on the country. But it doesn't generally occur to people that their personal information might be available to anyone who wants to look.
In reality, all these networks are vulnerable to organizational doxing. Most aren't any more secure than Ashley Madison or Sony were. We could wake up one morning and find detailed information about our Uber rides, our Amazon purchases, our subscriptions to pornographic websites -- anything we do on the Internet -- published and available. It's not likely, but it's certainly possible.
...
Privacy isn't about hiding something. It's about being able to control how we present ourselves to the world. It's about maintaining a public face while at the same time being permitted private thoughts and actions. It's about personal dignity.

Colombia, FARC rebels vow to end 50-year war within six months

Colombian President Juan Manuel Santos and the top FARC rebel commander pledged on Wednesday to end their 50-year war within the next six months, sealing their pact with a handshake likely to stand as a lasting image in the South American nation.
Santos and FARC rebel leader Rodrigo Londono, better known by the nom de guerre Timochenko, also agreed the leftist guerrillas would lay down arms within 60 days of signing the deal, which now has an official deadline of March 23, 2016.
If successful, it would end a conflict that has killed 220,000 and displaced millions over half a century.
A lasting peace would also mark a huge advance for one of Latin America's star emerging economies and could deal a setback to illegal narcotics trafficking. Some FARC units have formed an alliance with drug cartels, exchanging protection for money.
The government and the rebels have been in talks in Havana for nearly three years, but this was the first time Santos had come to Cuba and the first time he had met Timochenko.

China May Never Get Rich

Some great analysis from Noah Smith using a few basic economic theories.

China is already the world's largest economy by some measures, such as purchasing power parity. It's clear, however, that the country's growth is slowing. Growth dipped from roughly 10 percent to about 8 percent in 2012, and is falling again amid the current slowdown. 
When the country recovers from its slump, how much more expansion can we expect before it settles down into a nice, slow, steady pace like every other fast-growing "miracle" country eventually does? 
That leaves open the big question of how wealthy China will become relative to developed nations such as Japan, France or the U. S...