Friday, January 31, 2014

Ariel Sharon: Peacemaker, hero... and butcher

He was respected in his eight years of near-death, with no sacrilegious cartoons to damage his reputation; and he will, be assured, receive the funeral of a hero and a peacemaker. Thus do we remake history

Any other Middle Eastern leader who survived eight years in a coma would have been the butt of every cartoonist in the world. Hafez el-Assad would have appeared in his death bed, ordering his son to commit massacres; Khomeini would have been pictured demanding more executions as his life was endlessly prolonged. But of Sharon – the butcher of Sabra and Shatila for almost every Palestinian – there has been an almost sacred silence.
Cursed in life as a killer by quite a few Israeli soldiers as well as by the Arab world – which has proved pretty efficient at slaughtering its own people these past few years – Sharon was respected in his eight years of near-death, no sacrilegious cartoons to damage his reputation; and he will, be assured, receive the funeral of a hero and a peacemaker.
Thus do we remake history. How speedily did toady journalists in Washington and New York patch up this brutal man's image. After sending his army's pet Lebanese militia into the Sabra and Shatila refugee camps in 1982, where they massacred up to 1,700 Palestinians, Israel's own official enquiry announced that Sharon bore "personal" responsibility for the bloodbath.
He it was who had led Israel's catastrophic invasion of Lebanon three months earlier, lying to his own prime minister that his forces would advance only a few miles across the frontier, then laying siege to Beirut – at a cost of around 17,000 lives. But by slowly re-ascending Israel's dangerous political ladder, he emerged as prime minister, clearing Jewish settlements out of the Gaza Strip and thus, in the words of his own spokesman, putting any hope of a Palestinian state into "formaldehyde".
By the time of his political and mental death in 2006, Sharon – with the help of the 2001 crimes against humanity in the US and his successful but mendacious claim that Arafat backed bin Laden – had become, of all things, a peacemaker, while Arafat, who made more concessions to Israeli demands than any other Palestinian leader, was portrayed as a super-terrorist. The world forgot that Sharon had opposed the 1979 peace treaty with Egypt, voted against a withdrawal from southern Lebanon in 1985, opposed Israel's participation in the 1991 Madrid peace conference – and the Knesset plenum vote on the Oslo agreement in 1993, abstained on a vote for a peace with Jordan the next year and voted against the Hebron agreement in 1997. Sharon condemned the manner of Israel's 2000 retreat from Lebanon and by 2002 had built 34 new illegal Jewish colonies on Arab land.
Quite a peacemaker! When an Israeli pilot bombed an apartment block in Gaza, killing nine small children as well as his Hamas target, Sharon described the "operation" as "a great success", and the Americans were silent. For he bamboozled his Western allies into the insane notion that the Israeli-Palestinian conflict was part of Bush's monstrous battle against "world terror", that Arafat was himself a bin Laden, and that the world's last colonial war was part of the cosmic clash of religious extremism.
The final, ghastly – in other circumstances, hilarious – political response to Sharon's behaviour was George W Bush's contention that Ariel Sharon was "a man of peace". When he became prime minister, media profiles noted not Sharon's cruelty but his "pragmatism", recalling, over and over, that he was known as "the bulldozer".
And, of course, real bulldozers will go on clearing Arab land for Jewish colonies for years after Sharon's death, thus ensuring there will never – ever – be a Palestinian state. 

Courtesy:http://www.independent.co.uk/voices/comment/ariel-sharon-peacemaker-hero-and-butcher-9053699.html

Dharavi keeps Tamil culture alive

Once again, Dharavi is the talk of Tamil Nadu. Thanks to Vijay’s new movie, Thalaivaa that is set in the Mumbai slum and whose protagonist is a character inspired by a late Tamil leader who lived there.
But did you know that Dharavi, a slice of Tamil Nadu in the heart of Mumbai, still keeps alive the Tamil culture, language and traditions? Makizhnan (29), who was born and brought up in Dharavi and is now settled in Chennai with his family, tells us how the bustling slum is a little Tamil Nadu though located in another state.
In fact, when Makizhnan came to Chennai two years ago, he was shocked at the way Tamil was spoken here. He feels that the language was spoken in a better form in Dharavi.“I can speak better Tamil than anyone across Tamil Nadu,” he proudly says.
Currently working in the production unit of a media firm, Makizhnan is also an accomplished Tamil writer and speaker. He has written articles about the lifestyle in Dharavi, apart from being an activist. He recounts how he, along with three other friends had succeeded in bringing 50,000 Tamilians across Maharashtra to form a human chain, as a protest against the genocide in Sri Lanka. “I studied in Kamaraj Memorial High School where I got to learn Tamil apart from Hindi, English and Marathi,” explains Makizhnan. When it comes to Tamil medium, there is only one school in Dharavi – Kamban high school, which has 40 students giving their public exam in tenth. However, according to him, it is not the schooling, but the books by Periyar and Ambedkar which nurtured in him the affinity towards Tamil literature.
The Tamil tradition, according to him, is kept alive by people who still have strong Tamil sentiments. “The streets are narrow, but we still manage to put kolam in the limited space during festivals,” he recalls. Not just the kolams, Makizhnan says that the “‘Tamizhan’ within them stays wherever they are” – the men wear lungis at home, and the women wear davani and jasmine flowers during occasions. Unlike the staple chapathis which Marathis have, the Tamils stick to their sambar, rasam, thayir, idli and idiappams, with beef during the weekends. Be it the Tirupathi laddoo, the Tirunelveli halwa or Kolli herbs, there will be a shop in Dharavi that sells it, he says.
“In fact idli-selling is a thriving business there,” says Makizhnan. Explaining the business prototype, he says, several families have women making around 200 idlis each, which the men sell in the city.
Talk about festivals, and Makizhnan has stories galore. “Last year, during Pongal, we organised 365 matkas,” he says, referring to the pots in which pongal is prepared. He and his group of friends, had invited Tamilians from across Dharavi to come and participate in the one-day celebration. What about Mattu pongal and Kanum pongal? “No, there is no madu in that part of the city to celebrate all that,” he snaps.
While pongal is the only Tamil festival which they celebrate, there are other North Indian festivals, to which often Tamil flavour will be infused through Karagatam, Oyilattam, and Koravan Korathi dance troups called from Tamil Nadu. This, he says, happens especially for the nine-day celebration of Ganesh Chathurthi. It’s that time of the year when the streets get noisy with the kutcheri groups singing top Tamil songs of the season, while they march the Ganesha idol, one that is made separately for the Tamil community there.
The same applies for the weddings, which happen in either of the Mariamman, Sudalai madan, Karupu Sami or Ganapathi temples there. “It happens in complete Tamil style with local nadaswaram groups playing a role in it,” he says.
“These festivals are not brought to limelight. No one shows how content we are. None shows our celebrations,” Makizhnan says, referring to the “grossly wrong picture” of Dharavi portrayed in Slumdog Millionnaire. He says that in spite of the slum being a perpetual shooting spot, till now, no one has contributed to its upliftment. “Probably, it’s because they want it to remain this way for further shooting,” he remarks in his sarcastic tone.

Akhtar’s war: Afghanistan

Up to the date of his tragic death on August 17, 1988 in the plane crash that also killed President Zia, few people apart from his family, knew General Akhtar Abdur Rehman. Certainly, within Pakistan, his name was unknown to the public. Even within the military few appreciated his enormous contributions to the Afghan jihad. This was partially due to the secret nature of his job as Director General of ISI from 1979-1987 and partially due to his deliberate avoidance of publicity. But as the dust of war settled down, he emerged as the only general in history to take on the Soviet military might since the end of World War II — and win.

There is hardly any book of international repute on Soviet-Afghan war that does not pay glowing tributes to General Akhtar and his ISI for their role in the jihad. Below are some of the excerpts from a book - ‘AFGHANISTAN - A Military History from Alexander The Great to The Fall of Taliban’ by Stephen Tanner. The author is a military historian and a freelance writer. His works include: From 1776 to the Evacuation of Saigon and Refuge from the Reich: American Airmen and Switzerland during WW II.

“General Akhtar Abdul Rehman Khan, head of Pakistan’s Intelligence Agency, Inter Services Intelligence (1S1), persuaded Zia that the Soviets could indeed be stalled in Afghanistan with all Pakistani assistance to the Mujahideen covertly funneled through ISI while the government officially denied participation. The Afghans would fight while Pakistan quietly stood behind them providing arms and expertise. It was considered important that the ‘Soviets were not goaded into a direct confrontation, meaning the water not get too hot.’ The other risk run by Zia was that Pakistan would have to effectively cede sovereignty of its Northwest Frontier Province to Mujahideen fighters and base camp. It was not then known that millions of refugee would follow.

Zia was disdained by the US, which had become aware of Pakistan’s secret nuclear programme, and the country itself was still wracked with poverty and politically unstable. The Soviet invasion of Afghanistan thus presented a dual opportunity for Zia to become a hero simultaneously to Islam and the West, leading both jihad against infidels and the crusade against Communism.

Pakistan took a decisive stand against the Soviet invasion from the beginning. With a hostile India on one side, and a Soviet occupied Afghanistan on the other, Pakistan was in danger of isolation. In addition, after Afghanistan, Pakistan’s own barren Balochistan was the only remaining barrier between the Soviets and the Arabian Sea. If the Soviets met with feeble resistance in Afghanistan, it was thought that Pakistan might well be their next target.

Akhtar’s ISI, who had lobbied for the stingers, thought that fall of Zhawar tilted the balance. General Yousaf of ISI wrote, ‘that frightened everybody into forgetting the risk and giving us what we wanted.’ lSl, which trained the Mujahideen in their use, applied strict safeguards, refusing to re-supply fighters with the weapons unless they produced proof of firing, and only providing weapons to skilled, trustworthy commanders. As it turned out, some stingers did fall into the enemy hands. Spetsnaz commandos sprung ambush near Kandahar and captured three of the weapons. Another Mujahideen unit lost four firing tubes and sixteen missiles to Iran when they accidentally, it was presumed, wandered over the border.

The turning point of the war occurred on September 25, 1986, when a formation of eight Soviet Hind helicopter gunships flew into Jalalabad on a routine mission. On its approach to the landing zone the lead helicopter suddenly exploded in the sky. The following also burst into the flames. Rockets curved through the aircraft, barely missing while the pilots dropped their helicopters like stones, shaking them and causing injuries. On the way down, still another helicopter exploded, spreading debris across the landscape.

The stingers were a gigantic success that had a ripple effect on the war. In the following year, 270 Soviet aircraft were knocked out of the skies, the Mujahideen claiming 75 percent killing rate. (American estimated an actual 30 to 40 percent rate, which was still excellent). Soviet aircraft especially the fearsome Hind gunships were forced to back off en mass from their previous close-quarter tactics. Bombing became less accurate as jet aircraft stayed at high altitude. According to the post war Soviet General Staff study ‘Beginning in January 1987, the Soviet forces for all practical purposes, ceased offensive combat and fought only when attacked by the Mujahideen’.

In August 1988, President Zia, General Akhtar, who headed the 1S1 for most of the war US Ambassador and military attaché, and eight Pakistani generals, all died in a plane crash. In clear skies the aircraft was seen to dip precipitately, regain altitude for a few seconds and then nosedive into the ground. During the last moments the cockpit crew was silent on the radio, and analysts estimated that they had been gassed.

By 1989, the original architects of Pakistan’s covert war strategy, President Zia, and the ISI chief Akhtar had been assassinated. The writer who had been the head of the 1S1 branch that directed Mujahideen field operations, planned weapon supply and training had retired after being passed over for promotions.

Akhtar’s funeral was a fitting one for a soldier of his rank. The president of Pakistan, the chiefs of all three services, members of the Senate and National assembly, together with large detachments of soldiers, sailors and airmen, attended it. They, along with sorrowing representatives of his comrades-in-arms, the Mujahideen came to give their final salute to the Silent Soldier. Probably, it will be the Mujahideen who would remember General Akhtar with more admiration and affection than his own countrymen.


The writer is a Former Head of the Afghan Cell in 1S1and author of Silent Soldier & The Bear Trap

Courtesy: http://www.thenews.com.pk/Todays-News-13-24830-Akhtars-war-Afghanistan

Monday, January 27, 2014

N.S.A. Able to Foil Basic Safeguards of Privacy on Web

The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.s

The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.
Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth.
The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.
The N.S.A. hacked into target computers to snare messages before they were encrypted. In some cases, companies say they were coerced by the government into handing over their master encryption keys or building in a back door. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
“For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”
When the British analysts, who often work side by side with N.S.A. officers, were first told about the program, another memo said, “those not already briefed were gobsmacked!”
An intelligence budget document makes clear that the effort is still going strong. “We are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic,” the director of national intelligence, James R. Clapper Jr., wrote in his budget request for the current year.
In recent months, the documents disclosed by Mr. Snowden have described the N.S.A.’s reach in scooping up vast amounts of communications around the world. The encryption documents now show, in striking detail, how the agency works to ensure that it is actually able to read the information it collects.
The agency’s success in defeating many of the privacy protections offered by encryption does not change the rules that prohibit the deliberate targeting of Americans’ e-mails or phone calls without a warrant. But it shows that the agency, which was sharply rebuked by a federal judge in 2011 for violating the rules and misleading the Foreign Intelligence Surveillance Court, cannot necessarily be restrained by privacy technology. N.S.A. rules permit the agency to store any encrypted communication, domestic or foreign, for as long as the agency is trying to decrypt it or analyze its technical features.
The N.S.A., which has specialized in code-breaking since its creation in 1952, sees that task as essential to its mission. If it cannot decipher the messages of terrorists, foreign spies and other adversaries, the United States will be at serious risk, agency officials say.
Just in recent weeks, the Obama administration has called on the intelligence agencies for details of communications by leaders of Al Qaeda about a terrorist plot and of Syrian officials’ messages about the chemical weapons attack outside Damascus. If such communications can be hidden by unbreakable encryption, N.S.A. officials say, the agency cannot do its work.
But some experts say the N.S.A.’s campaign to bypass and weaken communications security may have serious unintended consequences. They say the agency is working at cross-purposes with its other major mission, apart from eavesdropping: ensuring the security of American communications.

Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL; virtual private networks, or VPNs; and the protection used on fourth-generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send an e-mail, buy something online, consult with colleagues via their company’s computer network, or use a phone or a tablet on a 4G network.
For at least three years, one document says, GCHQ, almost certainly in collaboration with the N.S.A., has been looking for ways into protected traffic of popular Internet companies: Google, Yahoo, Facebook and Microsoft’s Hotmail. By 2012, GCHQ had developed “new access opportunities” into Google’s systems, according to the document. (Google denied giving any government access and said it had no evidence its systems had been breached). 
“The risk is that when you build a back door into systems, you’re not the only one to exploit it,” said Matthew D. Green, a cryptography researcher at Johns Hopkins University. “Those back doors could work against U.S. communications, too.”
Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip.
“And they went and did it anyway, without telling anyone,” Mr. Kocher said. He said he understood the agency’s mission but was concerned about the danger of allowing it unbridled access to private information.
“The intelligence community has worried about ‘going dark’ forever, but today they are conducting instant, total invasion of privacy with limited effort,” he said. “This is the golden age of spying.”

A Vital Capability
The documents are among more than 50,000 shared by The Guardian with The New York Times and ProPublica, the nonprofit news organization. They focus on GCHQ but include thousands from or about the N.S.A.
Intelligence officials asked The Times and ProPublica not to publish this article, saying it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful privacy tools.
The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June.
“Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.
The documents make clear that the N.S.A. considers its ability to decrypt information a vital capability, one in which it competes with China, Russia and other intelligence powers.
“In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” a 2007 document said. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.”
The full extent of the N.S.A.’s decoding capabilities is known only to a limited group of top analysts from the so-called Five Eyes: the N.S.A. and its counterparts in Britain, Canada, Australia and New Zealand. Only they are cleared for the Bullrun program, the successor to one called Manassas — both names of an American Civil War battle. A parallel GCHQ counterencryption program is called Edgehill, named for the first battle of the English Civil War of the 17th century.
Unlike some classified information that can be parceled out on a strict “need to know” basis, one document makes clear that with Bullrun, “there will be NO ‘need to know.’ ”
Only a small cadre of trusted contractors were allowed to join Bullrun. It does not appear that Mr. Snowden was among them, but he nonetheless managed to obtain dozens of classified documents referring to the program’s capabilities, methods and sources.
Ties to Internet Companies
When the N.S.A. was founded, encryption was an obscure technology used mainly by diplomats and military officers. Over the last 20 years, it has become ubiquitous. Even novices can tell that their exchanges are being automatically encrypted when a tiny padlock appears next to a Web address.
Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware.
According to an intelligence budget document leaked by Mr. Snowden, the N.S.A. spends more than $250 million a year on its Sigint Enabling Project, which “actively engages the U.S. and foreign IT industries to covertly influence and/or overtly leverage their commercial products’ designs” to make them “exploitable.” Sigint is the acronym for signals intelligence, the technical term for electronic eavesdropping.
By this year, the Sigint Enabling Project had found ways inside some of the encryption chips that scramble information for businesses and governments, either by working with chipmakers to insert back doors or by exploiting security flaws, according to the documents. The agency also expected to gain full unencrypted access to an unnamed major Internet phone call and text service; to a Middle Eastern Internet service; and to the communications of three foreign governments.
In one case, after the government learned that a foreign intelligence target had ordered new computer hardware, the American manufacturer agreed to insert a back door into the product before it was shipped, someone familiar with the request told The Times.
The 2013 N.S.A. budget request highlights “partnerships with major telecommunications carriers to shape the global network to benefit other collection accesses” — that is, to allow more eavesdropping.
At Microsoft, as The Guardian has reported, the N.S.A. worked with company officials to get pre-encryption access to Microsoft’s most popular services, including Outlook e-mail, Skype Internet phone calls and chats, and SkyDrive, the company’s cloud storage service.
Microsoft asserted that it had merely complied with “lawful demands” of the government, and in some cases, the collaboration was clearly coerced. Some companies have been asked to hand the government the encryption keys to all customer communications, according to people familiar with the government’s requests.
N.S.A. documents show that the agency maintains an internal database of encryption keys for specific commercial products, called a Key Provisioning Service, which can automatically decode many messages. If the necessary key is not in the collection, a request goes to the separate Key Recovery Service, which tries to obtain it.
How keys are acquired is shrouded in secrecy, but independent cryptographers say many are probably collected by hacking into companies’ computer servers, where they are stored. To keep such methods secret, the N.S.A. shares decrypted messages with other agencies only if the keys could have been acquired through legal means. “Approval to release to non-Sigint agencies,” a GCHQ document says, “will depend on there being a proven non-Sigint method of acquiring keys.”
Simultaneously, the N.S.A. has been deliberately weakening the international encryption standards adopted by developers. One goal in the agency’s 2013 budget request was to “influence policies, standards and specifications for commercial public key technologies,” the most common encryption method.
Cryptographers have long suspected that the agency planted vulnerabilities in a standard adopted in 2006 by the National Institute of Standards and Technology and later by the International Organization for Standardization, which has 163 countries as members.
Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.”
“Eventually, N.S.A. became the sole editor,” the memo says.
Even agency programs ostensibly intended to guard American communications are sometimes used to weaken protections. The N.S.A.’s Commercial Solutions Center, for instance, invites the makers of encryption technologies to present their products to the agency with the goal of improving American cybersecurity. But a top-secret N.S.A. document suggests that the agency’s hacking division uses that same program to develop and “leverage sensitive, cooperative relationships with specific industry partners” to insert vulnerabilities into Internet security products.
By introducing such back doors, the N.S.A. has surreptitiously accomplished what it had failed to do in the open. Two decades ago, officials grew concerned about the spread of strong encryption software like Pretty Good Privacy, designed by a programmer named Phil Zimmermann. The Clinton administration fought back by proposing the Clipper Chip, which would have effectively neutered digital encryption by ensuring that the N.S.A. always had the key.
That proposal met a backlash from an unlikely coalition that included political opposites like Senator John Ashcroft, the Missouri Republican, and Senator John Kerry, the Massachusetts Democrat, as well as the televangelist Pat Robertson, Silicon Valley executives and the American Civil Liberties Union. All argued that the Clipper would kill not only the Fourth Amendment, but also America’s global technology edge.
By 1996, the White House backed down. But soon the N.S.A. began trying to anticipate and thwart encryption tools before they became mainstream.
Each novel encryption effort generated anxiety. When Mr. Zimmermann introduced the Zfone, an encrypted phone technology, N.S.A. analysts circulated the announcement in an e-mail titled “This can’t be good.”
But by 2006, an N.S.A. document notes, the agency had broken into communications for three foreign airlines, one travel reservation system, one foreign government’s nuclear department and another’s Internet service by cracking the virtual private networks that protected them.
By 2010, the Edgehill program, the British counterencryption effort, was unscrambling VPN traffic for 30 targets and had set a goal of an additional 300.
But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence.
A 2010 document calls for “a new approach for opportunistic decryption, rather than targeted.” By that year, a Bullrun briefing document claims that the agency had developed “groundbreaking capabilities” against encrypted Web chats and phone calls. Its successes against Secure Sockets Layer and virtual private networks were gaining momentum.
But the agency was concerned that it could lose the advantage it had worked so long to gain, if the mere “fact of” decryption became widely known. “These capabilities are among the Sigint community’s most fragile, and the inadvertent disclosure of the simple ‘fact of’ could alert the adversary and result in immediate loss of the capability,” a GCHQ document warned.
Since Mr. Snowden’s disclosures ignited criticism of overreach and privacy infringements by the N.S.A., American technology companies have faced scrutiny from customers and the public over what some see as too cozy a relationship with the government. In response, some companies have begun to push back against what they describe as government bullying.
Google, Yahoo, Microsoft and Facebook have pressed for permission to reveal more about the government’s requests for cooperation. One e-mail encryption company, Lavabit, closed rather than comply with the agency’s demands for customer information; another, Silent Circle, ended its e-mail service rather than face such demands.
In effect, facing the N.S.A.’s relentless advance, the companies surrendered.
Ladar Levison, the founder of Lavabit, wrote a public letter to his disappointed customers, offering an ominous warning. “Without Congressional action or a strong judicial precedent,” he wrote, “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”

Courtesy: http://www.nytimes.com/2013/09/06/us/nsa-foils-much-internet-encryption.html


In 1964, Isaac Asimov Imagined the World in 2014

But he couldn't have known the consequences of the development he predicted—a planet whose climate is badly destabilized, whose inhabitants face mass extinctions in the years ahead.

In August of 1964, just more than 50 years ago, author Isaac Asimov wrote a piece in The New York Times, pegged to that summer's World Fair.
In the essay, Asimov imagines what the World Fair would be like in 2014—his future, our present.

His notions were strange and wonderful (and conservative, as Matt Novak writes in a great run-down), in the way that dreams of the future from the point of view of the American mid-century tend to be. There will be electroluminescent walls for our windowless homes, levitating cars for our transportation, 3D cube televisions that will permit viewers to watch dance performances from all angles, and "Algae Bars" that taste like turkey and steak ("but," he adds, "there will be considerable psychological resistance to such an innovation").

He got some things wrong and some things right, as is common for those who engage in the sport of prediction-making. Keeping score is of little interest to me. What is of interest: what Asimov understood about the entangled relationships among humans, technological development, and the planet—and the implications of those ideas for us today, knowing what we know now.

Asimov begins by suggesting that in the coming decades, the gulf between humans and "nature" will expand, driven by technological development. "One thought that occurs to me," he writes, "is that men will continue to withdraw from nature in order to create an environment that will suit them better. "

It is in this context that Asimov sees the future shining bright: underground, suburban houses, "free from the vicissitudes of weather, with air cleaned and light controlled, should be fairly common." Windows, he says, "need be no more than an archaic touch," with programmed, alterable, "scenery." We will build our own world, an improvement on the natural one we found ourselves in for so long. Separation from nature, Asimov implies, will keep humans safe—safe from the irregularities of the natural world, and the bombs of the human one, a concern he just barely hints at, but that was deeply felt at the time.

But Asimov knows too that humans cannot survive on technology alone. Eight years before astronauts' Blue Marble image of Earth would reshape how humans thought about the planet, Asimov sees that humans need a healthy Earth, and he worries that an exploding human population (6.5 billion, he accurately extrapolated) will wear down our resources, creating massive inequality.

Although technology will still keep up with population through 2014, it will be only through a supreme effort and with but partial success. Not all the world's population will enjoy the gadgety world of the future to the full. A larger portion than today will be deprived and although they may be better off, materially, than today, they will be further behind when compared with the advanced portions of the world. They will have moved backward, relatively.
This troubled him, but the real problems lay yet further in the future, as "unchecked" population growth pushed urban sprawl to every corner of the planet, creating a "World-Manhattan" by 2450. But, he exclaimed, "society will collapse long before that!" Humans would have to stop reproducing so quickly to avert this catastrophe, he believed, and he predicted that by 2014 we would have decided that lowering the birth rate was a policy priority.

Asimov rightly saw the central role of the planet's environmental health to a society: No matter how technologically developed humanity becomes, there is no escaping our fundamental reliance on Earth (at least not until we seriously leave Earth, that is). But in 1964 the environmental specters that haunt us today—climate change and impending mass extinctions—were only just beginning to gain notice. Asimov could not have imagined the particulars of this special blend of planetary destruction we are now brewing—and he was overly optimistic about our propensity to take action to protect an imperiled planet.

2013 was not the warmest year on record but it will come close. Last month, November, was the warmest since 1880. All of the 10 warmest years on record have occurred since 1998. A video from NASA shows the dramatic shift in recent years. Watch what happens in the decades after Asimov wrote his essay. (Yellow and red represent temperatures warmer than the average for the years from 1951 to 1980.)

http://www.youtube.com/watch?feature=player_embedded&v=TO03ColwxHE

Courtesy: http://www.theatlantic.com/technology/archive/2013/12/in-1964-isaac-asimov-imagined-the-world-in-2014/282728/