Surveillance, long-term effects of

Interesting post by a former Federal agent:

We all have a “private self” and a “public self.” It’s no secret that we all act and communicate differently when we are alone or in a setting with people with trust. In a free country, the decision to transition from that private self to the public self is largely within the control of the individual. When a free man or woman is home spending time with family he or she inhabits the private self. Typically one transitions to a public self when they grab the car keys and open the front door to head to work. There are things you may do or say while you were acting as that private self that you will no longer do or say at work, in your car, in an email, or on a business conference call.

Now, imagine living in a place where there is no distinction between the private self and the public self. Imagine a place where only the government has the key that unlocks the door between the private self and the public self…

The (non)sharing economy

This morning’s Observer column:

A euphemism is a polite way of obscuring an uncomfortable or unpleasant truth. So pornography becomes adult entertainment, genocide becomes ethnic cleansing, sacking someone becomes letting him (or her) go. People pass away rather than die; toilets become rest rooms; CCTV cameras monitor public and private spaces for our comfort and safety; and shell shock evolved into battle fatigue before finally winding up as post-traumatic stress disorder – which is really a way of disguising the awkward fact that killing people in cold blood can do very bad things to your psyche.

The tech industry is also addicted to euphemism. Thus the ubiquitous, unfair, grotesquely unbalanced contract which gives an internet corporation all the rights and the user almost none is called an end-user licence agreement. Computers that have been illegally hacked are “pwned”. The wholesale hoovering-up of personal data by internet companies (and the state) is never called by its real name, which is surveillance. And so on.

But the word that is most subverted by the tech industry is share…

Read on

History’s contradictions

Lovely Observer piece by Will Hutton:

Sometimes dealing with the past is easy. A few months ago, the college where I am principal (Hertford, Oxford) handed back a precious 16th-century atlas to its rightful owners – the Humboldt University library in Berlin. A British soldier had been offered it in exchange for a packet of cigarettes in the devastated streets of Berlin in May 1945. His father was an Oxford professor and for most of the last 70 years the Ortelius atlas had been first buried in his room and then locked in the college safe.

The 70th anniversary of the end of the war seemed as good a moment as any to return it. But what struck everyone at the small ceremony was how affected the German delegation, including representatives from the embassy and Humboldt University, were by what we were doing. It was a symbol of Germany’s relationship with Britain within a peaceful EU, an act of friendship all the more valuable because it had been freely offered and a recognition that history had moved on.

But more often than not history’s legacies are more unforgiving – a minefield in which yesterday’s and today’s realities seem irreconcilable…

Hunting the Qubit

Today’s Observer column:

We live in a universe that virtually none of us will ever understand. Physicists, however, refuse to be daunted by this and have been casting about for ways of putting these quantum properties to practical use. In the process, their gaze alighted on that fundamental building block of digital technology, the humble binary digit (or “bit”) in which all digital information is encoded. In the Newtonian (ie non-quantum) world, a bit can take only one of two values – one or zero. But at the quantum level, superposition means that a quantum bit – a qubit – could have multiple values (one, zero and a superposition of one and zero) at the same time. Which means that a computer based on quantum principles would be much, much faster than a conventional, silicon-based one. Various outfits have been trying to build one.

The results are controversial but intriguing…

Read on

Academic bitchiness

Isaiah Berlin was a past-master of the genre. Here he is writing1 to Marion and Felix Frankfurter in December 1934 about Richard Crossman, who was then a Fellow of New College, Oxford (where Berlin had been briefly a Fellow), and whom I think Berlin detested.

“Crossman is trying to sell his soul again & finding no buyers even among those who think he had one.”

I worked for Crossman briefly, when he was Editor of the New Statesman. He was an interesting man, but not a nice one.


  1. from Flourishing: Letters 1928-1946, edited by Henry Hardy, Chatto & Windus, 2004. 

Living with the surveillance state

Point made well by Bill Keller in a thoughtful column:

The danger, it seems to me, is not surveillance per se. We have already decided, most of us, that life on the grid entails a certain amount of intrusion. Nor is the danger secrecy, which, as Posner notes, “is ubiquitous in a range of uncontroversial settings,” a promise the government makes to protect “taxpayers, inventors, whistle-blowers, informers, hospital patients, foreign diplomats, entrepreneurs, contractors, data suppliers and many others.”

The danger is the absence of rigorous, independent regulation and vigilant oversight to keep potential abuses of power from becoming a real menace to our freedom. The founders created a system of checks and balances, but the safeguards have not kept up with technology. Instead, we have an executive branch in a leak-hunting frenzy, a Congress that treats oversight as a form of partisan combat, a political climate that has made “regulation” an expletive and a public that feels a generalized, impotent uneasiness. I don’t think we’re on a slippery slope to a police state, but I think if we are too complacent about our civil liberties we could wake up one day and find them gone — not in a flash of nuclear terror but in a gradual, incremental surrender.

We’re the suckers in the Syrian poker game

From Tom Friedman’s NYT column:

What Obama also has right is that old saying: “If you’re in a poker game and you don’t know who the sucker is, it’s probably you.” That’s the game we’re in in Iraq and Syria. All our allies for a coalition to take down ISIS want what we want, but as their second choice.

Kurds are not going to die to liberate Mosul from ISIS in order to hand it over to a Shiite-led government in Baghdad; they’ll want to keep it. The Turks primarily want to block the Kurds. The Iranians want ISIS crushed, but worry that if moderate Sunnis take over its territory they could one day threaten Iran’s allies in Iraq and Syria. The Saudi government would like ISIS to disappear, but its priority right now is crushing Iranian-backed rebels in Yemen. And with 1,000 Saudi youth having joined ISIS as fighters — and with Saudi Arabia leading the world in pro-ISIS tweets, according to a recent Brookings study — the Saudi government is wary about leading the anti-ISIS fight. The Russians pretend to fight ISIS, but they are really in Syria to protect Bashar al-Assad and defeat his moderate foes.