The Google File System makes NSA’s hack blatantly illegal and they know it

nsa_google_snoopThe latest Edward Snowden bombshell that the National Security Agency has been hacking foreign Google and Yahoo data centers is particularly disturbing. Plenty has been written about it so I normally wouldn’t comment except that the general press has, I think, too shallow an understanding of the technology involved. The hack is even more insidious than they know.

The superficial story is in the NSA slide (above) that you’ve probably seen already. The major point being that somehow the NSA — probably through the GCHQ in Britain — is grabbing virtually all Google non-spider web traffic from the Google Front End Servers, because that’s where the SSL encryption is decoded.

Yahoo has no such encryption.

The major point […]

How Big Data is destroying the U.S. healthcare system

denied-stampOne thing I find ironic in the current controversy over problems with the healthcare.gov insurance sign-up web site is that the people complaining don’t really mean what they are saying. Not only do they have have little to no context for their arguments, they don’t even want the improvements they are demanding. This is not to say nothing is wrong with the site, but few big web projects have perfectly smooth launches. From all the bitching and moaning in the press you’d think this experience is a rarity. But as those who regularly read this column know, more than half of big IT projects don’t work at all. So I’m not surprised that […]

Privacy is dead and here’s how

privacy-do-not-disturb

My friend Dave Taht, who battles bufferbloat for us all, pointed me today to a document from the Wireless Internet Service Provider Association. It’s the WISPA CALEA Compliance Guide, which details most of the rules that wireless ISPs are required to follow by CALEA — the Communications Assistance for Law Enforcement Act of 1994. These rules, variants of which apply to all telcos and to ISPs of all kinds (not just wireless), say what those companies are required to do to comply with the law. More directly, it specifies how they can be required to intercept customer communications and relay that content to law enforcement agencies.

Read it if you have a moment. The document, which is […]

Abe fiddles while Fukushima leaks

fukushimatanksIn the middle of a pissing match between the President and Congressional leadership it’s good to remember that the United States isn’t the only government that seems to have lost touch with reality. I was reminded of that today when I read this story about the contaminated water problem at the Fukushima Daiichi nuclear power plant in Japan. Now here’s a government that is truly paralyzed!

The story from Japan Times, if you choose to read it, says Japanese Prime Minister Abe is reaching out to foreign experts in an attempt to deal with the problem of radioactive cooling water that is accumulating in hundreds of makeshift tanks that are now beginning to leak. “We […]

I have my doubts about Bitcoin

bitcoin-logo-3dAlmost every week some reader asks me to write about Bitcoin, currently the most popular so-called crypto currency and the first one to possibly reach something like critical mass. I’ve come close to writing those columns, but just can’t get excited enough. So this week when yet another reader asked, it made sense to explain my nervousness. Bitcoin is clever, interesting, brilliant even, but I find it too troubling to support.

But first, why should you believe me? You shouldn’t. Though I’m year after year identified by the Kauffman Foundation as one of the top 50 economics bloggers in America, that only means I get to hang out occasionally with the real experts, eating Kansas City […]