Author: Matthew G. Saroff

More Weirdness in the Anthrax Mailings

It’s been a while since I’ve written about the issues with the FBI’s investigation of the Anthrax mailings, and now it appears that the GAO report on this matter has attracted the interest of The New York Times:

A congressional inquiry into the F.B.I.’s scientific work on the anthrax mailings of 2001 has identified major gaps in genetic evidence that purportedly links the germs to Bruce E. Ivins, the Army microbiologist blamed for attacks that killed five people, sickened 17 others and shook the nation.

The Government Accountability Office study, requested in 2010 and made public on Friday, echoes earlier criticism from the National Academy of Sciences. In 2011, its expert panel found that the bureau’s analysis of the genetic evidence “did not definitively demonstrate” a firm link between the mailed anthrax spores and a sample taken from Dr. Ivins’s laboratory at Fort Detrick in Maryland, and more generally was “not as conclusive” as the bureau had asserted.

The G.A.O. had better access to F.B.I. records and deepened the genetic critique, finding that the bureau’s investigation “lacked several important characteristics” that could have strengthened its case. “A key scientific gap,” the 77-page report said, was the bureau’s failure to investigate whether samples of anthrax spores could naturally mutate enough to obscure their putative links to Dr. Ivins.

I think that it is more than likely that Dr. Ivins was involved in the anthrax mailing.

I know that the FBI was flailing wildly, and was looking for anyone that they could finger as the perp, and Ivins was the 2nd person that the FBI aggressively harassed, the first being Steven Hatfill, and it appears that in both cases, the FBI was hoping for a suicide to end their search.

Indian Boomer Enters Seal Trials

Speaking or Indian defense upgrades, the first Indian built SSBNs has entered sea trials:

In a major step in validation of indigenous defence technologies, the Indian built nuclear-powered ballistic missile submarine Arihant completed its harbour trials and entered the sea here on Monday.

Built under the highly secretive Advanced Technology Vessel project monitored directly by the Prime Minister’s Office, the nuclear-powered submarine emerged from the breakwaters of the Visakhapatnam Harbour under the watchful gaze of a low flying helicopter. The 112 metre, 6000 tonne partially submerged Arihant glided into the Bay of Bengal as part of its sea trials, sailing north along the coast before disappearing into the mist.

The Arihant class is kind of an odd hybrid: It only carries 4 Polaris class missiles or 12 shorter range missiles, and at 6000 tons it’s on the smallish size for a missile boat.

It is also the first indigenously designed and built nuclear submarine for the Indians, so it represents a big step forward.

India Initiates STOBAR Tests with Light Combat Aircraft

India’s defense upgrades continue apace.

They have started ski-jump tests with the Light Combat Aircraf (LCA):

The first prototype of the Navalaized Tejas Indigenous Combat Aircraft (LCA) developed for the Indian Navy has took off saturday (December 20, 2014) from the Ski-Jump facility of Shore Based Test Facility (SBTF) at INS Hansa in Goa. LCA (Navy) is designed with stronger landing gears to absorb forces exerted by the ski jump ramp during take-off, and cable arrested landing.

I’m dubious of the suitability of tailless (or canardless) design on an aircraft carrier, but this does represent a step forward for the Indian Navy.

Corporate Purchase of the Criminal Justice System: MPAA Edition

It appears that Google is involved in a pissing contest with the Mississippi Attorney General .

It appears that the latter is doing a cut and paste of MPAA legal filing.

Thankfully, the Sony hack has revealed these machinations:

Tensions between Google and Mississippi Attorney General Jim Hood exploded into public view this week, as Google filed court papers seeking to halt a broad subpoena Hood sent to the company.

The Hood subpoena, delivered in late October, didn’t come out of nowhere. Hood’s investigation got revved up after at least a year of intense lobbying by the Motion Picture Association of America (MPAA). E-mails that hackers acquired from Sony Pictures executives and then dumped publicly now show the inner workings of how that lobbying advanced—and just how extensive it was. Attorneys at Sony were on a short list of top Hollywood lawyers frequently updated about the MPAA’s “Attorney General Project,” along with those at Disney, Warner Brothers, 21st Century Fox, NBC Universal, and Paramount.

The e-mails show a staggering level of access to, and influence over, elected officials. The MPAA’s single-minded obsession: altering search results and other products (such as “autocompleted” search queries) from Google, a company the movie studios began referring to as “Goliath” in around February 2014. The studios’ goal was to quickly get pirated content off the Web; unhappy about the state of Google’s voluntary compliance with their demands and frustrated in their efforts at passing new federal law such as SOPA and PIPA, the MPAA has turned instead to state law enforcement.

The most controversial elements of SOPA/PIPA would have let content owners effectively shut down websites they said were infringing their copyrights or trademarks. This already happens—think of various peer-to-peer sites that no longer exist—but it usually involves drawn-out litigation. SOPA promised a faster-moving process that would have essentially made rights holders a website’s judge, jury, and executioner.

To get the same results in a post-SOPA world, MPAA has hired some of the nation’s most well-connected lawyers. The project is spearheaded by Thomas Perrelli, a Jenner & Block partner and former Obama Administration lawyer. Perrelli has given attorneys general (AGs) across the country their talking points, suggesting realistic “asks” prior to key meetings with Google. Frustrated with a lack of results, Perrelli and top MPAA lawyers then authorized an “expanded Goliath strategy” in which they would push the AGs to move beyond mere letter writing. Instead, they would seek full-bore investigations against Google.

If the AGs felt short on resources—well, Hollywood studios could help with that. Money from Sony and other Big Six studios was available to draft the actual subpoenas, to research legal theories to prosecute Google, to spread negative press about the search giant, and to reach out to other state AGs that might join with Hood.

………

One chain of e-mails among the MPAA and studio lawyers bears the subject line “STATE ATTORNEY GENERAL PROJECT” and focuses on how Google could be pressured into altering its search results, demoting or removing so-called “rogue sites” that host high levels of copyrighted context.

Most notes on the project came from Vans Stevenson, the MPAA’s VP of state legislative affairs; higher-level updates were written by MPAA general counsel Steven Fabrizio or took the form of memos written by Perrelli. Most information about the AG project was shared with a group of more than 30 lawyers, including several from the MPAA and RIAA, as well as each of the six big studios, but some were kept to just general counsels and their immediate confidantes.

“[Attorney] General Hood told me by e-mail today that his conversation ‘with Google’s General Counsel did not go well,’ and therefore he followed up with the letter that was sent yesterday,” Vans Stevenson informed the group in November 2013. “Hood also said he was organizing a meeting during the NAAG [National Association of Attorneys General] meeting next week in New Orleans with his outside counsel Mike Moore, former MS Attorney General. Also attending that meeting will be MPAA/RIAA outside counsel Tom Perrelli and others, ‘so we can discuss the next move,’ Hood wrote…. I will keep you advised of further developments.”

The e-mail includes a letter from Hood to Google general counsel Kent Walker. It was published earlier this week by The New York Times, which reported that most of the letter was actually written by Perrelli’s law firm.

(emphasis mine)

Google counter-sued, which has the AG Hood calling for a timeout:

It appears that Mississippi Attorney General Jim Hood is making a strategic retreat in the wake of publicity about his investigation of Google.

On Friday morning, Google sued Hood, saying that a 79-page subpoena he had sent to the company was “punitive,” and violated Google’s First and Fourth Amendment rights. The company also pointed to recent press reports that showed Hollywood studios had lobbied heavily for the investigation.

Later that day, Hood sent a statement to The New York Times saying that he’s “calling a time out, so that cooler heads may prevail.” Hood says he wants to negotiate a “peaceful resolution to the issues affecting consumers” that he and other state AGs have pointed out in a series of letters.

Rather unsurprisingly, after the Mississippi AG told the press that he had received no funding from the MPAA, and challenged them to look, the press looked, and to no one’s surprise, they found MPAA money:

The saga of Mississippi Attorney General Jim Hood and his cozy ties to Hollywood continue to come out. He’s been claiming that, sure, he met with Hollywood’s top lawyer, Tom Perrelli, had him prep Hood for a meeting with Google, and even took a ~4,000 word angry letter that Perrelli wrote for him, signed it as his own and sent it to Google — but he did all that without knowing that Perrelli worked for Hollywood’s top lobbying arm, the MPAA. Uh huh.

And then in a press conference, he insisted that he was doing this out of his own interest in protecting the children — but also admitted that his office didn’t have any intellectual property experts and didn’t have a million dollars to do an investigation (approximately the amount the MPAA’s leaked emails show them discussing to fund this investigation) and that he needed to rely on such help from “victims” to make his case. It’s fairly rare, though, that “victims” of a crime run the actual law enforcement investigation and fund it as well.

Still, in that last post, we also mentioned how Hood implied that anyone suggesting he was “paid off” might be defaming him, and apparently also stated that he wasn’t getting any money from Hollywood, encouraging reporters to “check records.”

Okay then. Let’s… check the records. Here, for example, is the MPAA’s Political Action Committee apparently giving $2,500 to an operation called “The Friends of Jim Hood.”

And, you can also look at the public record of who donated to his campaign, which pretty clearly shows donations to his campaign from NBC Universal and 20th Century Fox.

And it goes on and on.

One big take away about all this is that the leaked emails reveal that the Hollywood studios long term goal is to break DNS:

Most anti-piracy tools take one of two paths: they either target the server that’s sharing the files (pulling videos off YouTube or taking down sites like The Pirate Bay) or they make it harder to find (delisting offshore sites that share infringing content). But leaked documents reveal a frightening line of attack that’s currently being considered by the MPAA: What if you simply erased any record that the site was there in the first place?

A bold challenge to the basic engineering of the internet

To do that, the MPAA’s lawyers would target the Domain Name System (DNS) that directs traffic across the internet. The tactic was first proposed as part of the Stop Online Piracy Act (SOPA) in 2011, but three years after the law failed in Congress, the MPAA has been looking for legal justification for the practice in existing law and working with ISPs like Comcast to examine how a system might work technically. If the system works, DNS-blocking could be the key to the MPAA’s long-standing goal of blocking sites from delivering content to the US. At the same time, it represents a bold challenge to the basic engineering of the internet, threatening to break the very backbone of the web and drawing the industry into an increasingly nasty fight with Google.

One final note, it appears that various legislators and Attorneys General are trying to restrict the practice of AGs getting secret funding from industry to prosecute cases.

Notice however how the New York Times story completely avoids mention that the MPAA was literally writing an AG’s legal documents:

In state legislatures and major professional associations, a bipartisan effort is emerging to change the way state attorneys general interact with lobbyists, campaign donors and other corporate representatives.

This month, during a closed-door meeting of the National Association of Attorneys General, officials voted to stop accepting corporate sponsorships. In Missouri, a bill has been introduced that would require the attorney general, as well as certain other state officials, to disclose within 48 hours any political contribution worth more than $500. And in Washington State, legislation is being drafted to bar attorneys general who leave office from lobbying their former colleagues for a year.

Perhaps most significant, a White House ethics lawyer in the administration of George W. Bush has asked the American Bar Association to change its national code of conduct to prohibit attorneys general from discussing continuing investigations or other official matters while participating in fund-raising events at resort destinations, as they often now do. Those measures could be adopted in individual states.

The actions follow a series of articles in The New York Times that examined how lawyers and lobbyists — from major corporations, energy companies and even plaintiffs’ law firms — have increasingly tried to influence state attorneys general.

These outside players have tried to shut down investigations, enlist the attorneys general as partners in litigation, or use their clout to try to block or strengthen regulations emerging from Washington, the investigation by The Times found.

While it may be a stretch to say that a lot of state Attorneys General are for sale, they certainly appear to be for rent.

Here is an Interesting Perspective on Russia Today

Admittedly, he has many reasons for animus towards Putin’s predecessor, Boris Yeltsin, which would give him a more favorable view towards the current Russian President, but the fact that Mikhail Gorbachev credits Vladimir Putin with saving Russia as a Nation is a significant statement:

Russian President Vladimir Putin saved the country from falling apart, former Soviet leader Mikhail Gorbachev said during the presentation of his new book ‘After the Kremlin.’ Gorbachev also commented on the situation in Ukraine and NATO expansion.

I think all of us – Russian citizens – must remember that [Putin] saved Russia from the beginning of a collapse. A lot of the regions did not recognize our constitution. There were over a hundred local constitutional variations from that of the Russian constitution,” RIA Novosti quoted Gorbachev as saying on Friday.

………

In terms of Russia’s worries over NATO’s expansion, Gorbachev agrees that the US is playing a key role in the process. “[NATO] began to establish bases around the world…I think the president [I believe that he is referring to Putin here, not Obama] is mostly right when drawing the attention to the special responsibility the US has,” Gorbachev said.

Meanwhile, when speaking about the domestic situation in the country, the former president of the USSR expressed confidence that Russia will get out of the crisis, adding that the only questions are “when and at what price.”

“Now we need to be very careful in politics – what policy is implemented, by who, and who stands to benefit?”

In total, I do think that Gorbachev is saying that he agrees with Putin’s assessment that NATO in general, and the US in particular, still seem determined to wage some sort of war against Russia.

So Not Surprised

It appears that the USAF is cooking the books on A-10 use in Afghanistan to justify retiring the Warthog:

Over the past five months, Air Force leaders have pointed to one key fact while advocating for their controversial decision to retire the A-10 Warthog, an aircraft specifically designed to provide support to ground troops. The service’s top leaders say the vast majority of so-called “close air support” missions conducted in Afghanistan since 2006 have been flown by a variety of aircraft that are not A-10s. Specifically, the leaders say that the 80 percent of these missions conducted by aircraft other than the Warthog shows that a variety of aircraft can do the critical mission of reinforcing ground forces with firepower from the air.

However, a number of observers challenge the Air Force’s claim that 80 percent of close air support missions are really conducted by non-A-10 planes. These observers assert that the service has deliberately manipulated the data to support its case.

The plan to retire the A-10 has sparked a firestorm of criticism from members of Congress, A-10 pilots and airmen whose job is to embed with ground forces and call in air strikes.

In fact, Congress is well on the way to rejecting the Air Force’s plans. The House of Representatives passed legislation Thursday, rejecting sending the A-10s to the boneyard. The Senate is expected to do the same.

The Air Force says it can save $4.2 billion over the next five years by retiring the fleet of 350 A-10s. The savings would be plowed into other aircraft that can perform a variety of missions, including close air support.

And, in making the case to retire the A-10, the one number that comes up time and again at congressional hearings is this: 80 percent.

………

The PBS NewsHour asked the Air Force about the basis for the 80 percent figure. The NewsHour shared the Air Force answers with A-10 supporters and those who advocate retiring the aircraft. The complete exchange can be viewed in the document linked here.

“This is a classic case of using numbers as propaganda for some bureaucratic position.”“This 80 percent number is a total fabrication,” said Pierre Sprey, one of the key designers of the A-10 in the 1960s and 1970s. Sprey has recently been lobbying Congress to save the aircraft. “This is a classic case of using numbers as propaganda for some bureaucratic position.”

Among the data the Air Force provided was a breakdown of the number close air support sorties flown between 2010 to 1014: 121,653. Also included was the number of sorties with at least one weapon released: 8,691.

Sprey notes that of the 121,653 close air support missions conducted, “93 percent of them never drop a weapon.” Sprey says the Air Force is “counting a whole lot of fluff.”

“The Air Force is counting these missions or these activities in a way that biases strongly against the A-10,” said Winslow Wheeler, a former congressional staffer with more than three decades of experience working for both Democrats and Republicans. Wheeler is now with the Project On Government Oversight, a non-profit watchdog organization.

The Air Force is “not counting sorties where actual munitions delivery actually occurs,” he said. And they are “not distinguishing” between bombing fixed points on the ground from 20,000 feet and supporting troops that are moving while under fire from an enemy in close proximity. Wheeler said it is in situations like this “that really count” and where the A-10 outperforms all other aircraft.

………

“Measures of kinetic activity alone don’t capture events where aircraft presence was sufficient to deter attackers — which can be the better outcome in COIN [counterinsurgency] operations,” Sholtis explained in an email. “Actions like shows of force or armed overwatch of ground forces are legitimate and effective forms of CAS.” Shows of force are when aircraft fly overhead, making their presence known and signaling to the enemy — sometimes by dropping flares — that they might get bombed.

But counting shows of force is stretching the definition of close air support, according to retired Chief Master Sergeant Russell Carpenter, a 30-year veteran and specialist in leading troops who call in air strikes. When you “look up the definition of close air support, shows of force doesn’t fit in there.” Carpenter said what the Air Force has “done is said there are a variety of ways we achieve air-to-ground effects. But guess what, call that something else. But it is not close air support.”

Another controversial aspect in the way the 80 percent number was generated is the time frame of when close air support missions are counted. According to Air Force data released to the NewsHour, the service counted missions flown between 2006 and October 2013.

The Air Force told the NewsHour “unfortunately we do not have information prior to 2006 available in our AFCENT Combined Air Operations Center database.” Other Air Force officers who asked that their names not be used in this article, because they were not authorized to speak publicly, also told the NewsHour that the Air Force has not maintained records from before 2006.

But critics are skeptical.

“The date 2006 was not picked by accident,” said Sprey, the A-10 aircraft designer.

From March 2002 to December 2006, the only fixed-wing aircraft that could operate from the austere and dilapidated runways in Afghanistan were A-10s, according to the Air Force. Sprey believes counting close air support missions beginning in 2006 is suspect because that time period marks the point when different types of aircraft were beginning to operate out of the newly improved runways in Afghanistan.

“Before 2006, they couldn’t even get fighters into Afghanistan, they couldn’t land anywhere,” Sprey said. “They were totally dependent on the A-10 before and they don’t want to admit that, so they don’t tell you about it before 2006.”

The USAF has wanted to kill the A-10 and replace it with a “Wild Blue Yonder” alternative  since it began to enter service in the 1970s.

Close air support has been a responsibility that the Air Force has consistently shirked since before its creation as an independent service.

This is Foreseeable Blow-Back from Our Stupidity in the Banks of the Black Sea

Russia has just revised its military doctrin, and ……… wait for it nostalgia buffs ……… gone back to declaring NATO to be its primary threat:

Russian President Vladimir Putin on Friday signed into law a new defense doctrine that identifies NATO as the chief threat to Russian security and claims the right to use nuclear weapons to counter any aggression that “threatens the very existence” of Russia.

The revisions to the 2010 defense mission statement were few but appeared intended to put further pressure on the United States and the Western military alliance to cease courting Ukraine as an economic and strategic ally.

The North Atlantic Treaty Organization has moved forces closer to Russia’s borders in response to the Kremlin’s annexation of Ukraine’s Crimea region in March and its dramatically increased challenges of the alliance’s airspace and maritime borders. NATO officials report that the number of aerial and maritime intrusions by Russian fighter jets in the Baltic Sea area has more than tripled this year over last.

The new defense doctrine cites NATO troop deployments and induction of former Soviet-allied states as the top threat to Russian security. It also deems the developing Prompt Global Strike program of the United States as hostile. The precision weapons system is being designed to be able to strike anywhere in the world so swiftly that the target has too little time to respond.

The new doctrine also mentions NATO missile defense plans as destabilizing and for the first time identifies a priority for Russia to protect its natural resource and maritime interests in the Arctic Sea.

The Neocon’s little adventure in the Ukraine is the gift that keeps giving.

The insane interventionist streak that oozed out of the American foreign policy establishment at the end of the Cold War is dangerous and insane, but it remains the consensus within the halls of government.

It’s like our government is being run by a bunch of rabid wolverines.

Merry Christmas from the NSA

You know how people drop bad news on Friday evenings in Government?

Well, the NSA just dropped some sh%$ so heavy that they waited until Christmas Eve:

The National Security Agency on Christmas Eve day released twelve years of internal oversight reports documenting abusive and improper practices by agency employees. The heavily redacted reports to the President’s Intelligence Oversight Board found that NSA employees repeatedly engaged in unauthorized surveillance of communications by American citizens, failed to follow legal guidelines regarding the retention of private information, and shared data with unauthorized recipients.

While the NSA has come under public pressure for openness since high-profile revelations by whistleblower Edward Snowden, the release of the heavily redacted internal reports at 1:30PM on Christmas Eve demonstrates limits to the agency’s attempts to demonstrate transparency. Releasing bad news right before a holiday weekend, often called a “Christmas Eve surprise,” is a common tactic for trying to minimize press coverage.

The reports, released in response to a Freedom of Information Act request submitted by the American Civil Liberties Union, offer few revelations, but contain accounts of internal behavior embarrassing to the agency. In one instance an NSA employee “searched her spouse’s personal telephone directory without his knowledge to obtain names and telephone numbers for targeting”, a practice which previous reports have indicated was common enough to warrant the name “LOVEINT”.

Many of the reports appear to deal with instances of human error rather than malicious misuse of agency resources. Nonetheless, many of these errors are potentially serious, including entries suggesting that unminimized U.S. telephone numbers were mistakenly disseminated to unauthorized parties and that military personnel were given unauthorized access to raw traffic databases collected under the Foreign Intelligence Services Act.

Yeah, and the people who did this are still on the job:

For the most part, the reports don’t appear to contain anything especially new, but I was struck by this particular violation:

………The OIG’s Office of Investigation initiated an investigation of an allegation than an NSA analyst had conducted an unauthorized intelligence activity. In an interview conducted by the NSA/CSS Office of Security and Counterintelligence, the analyst reported that, during the past two or three years, she had searched her spouse’s personal telephone directory without his knowledge to obtain names and telephone numbers for targeting….Although the investigation is ongoing, the analyst has been advised to cease her activities.

If the NSA gave even half a f%$# about this sort of abuse, this analyst would be fired, and her security clearance would be pulled.

Instead, she was “advised to cease her activities.”

This is why super-secret organizations need real independent oversight, because their first priority is preserving their own prerogatives, using whatever means necessary.

Full report here. (PDF)

Don’t Jump to Conclusions on the Sony Hack

Bruce Schneier, perhaps the most prominent security pundit in the world, is dubious about the FBI’s claim that the DPRK is behind the Sony Hack, while Kurt Stammberger, the senior VP Norse, a cybersecurity firm, insists that all evidence points to an internal hack:

Cybersecurity experts are questioning the FBI’s claim that North Korea is responsible for the hack that crippled Sony Pictures. Kurt Stammberger, a senior vice president with cybersecurity firm Norse, told CBS News his company has data that doubts some of the FBI’s findings.

“Sony was not just hacked, this is a company that was essentially nuked from the inside,” said Stammberger.

While Norse is not involved in the Sony case, it has done its own investigation.

“We are very confident that this was not an attack master-minded by North Korea and that insiders were key to the implementation of one of the most devastating attacks in history,” said Stammberger.

He says Norse data is pointing towards a woman who calls herself “Lena” and claims to be connected with the so-called “Guardians of Peace” hacking group. Norse believes it’s identified this woman as someone who worked at Sony in Los Angeles for ten years until leaving the company this past May.

I’m inclined not to believe the official story from the FBI.

The sketchy accounts currently given by the FBI seem to indicate that they worked backward, starting with the guilt of North Korea, and then picking and choosing evidence on that basis.

Here is an Interesting Jurisdictional Conundrum

The Department of Justice has subpoenaed some Microsoft emails, and the Redmond Borg has objected because the emails in question are on a server in Ireland:

The Irish government today supported Microsoft in its ongoing fight against US prosecutors – who appear to want access to server hard drives anywhere in the world.

Microsoft has garnered serious backing from the technology industry in its case against American investigators. The Feds believe they have the right to access emails stored on Microsoft’s servers in Ireland; Uncle Sam thinks it can lawfully tap up any US company for information, regardless of where that info is stored.

The Feds wants the messages to prosecute a drug case, and obtained a simple search warrant served against Microsoft in New York, rather than approaching the Irish government and its courts for help. If the US govt wins the case, which is being played out in the aforementioned state, it will effectively mean that Microsoft’s cloud data stored around the world can be read at will by US g-men.

Now the Irish government has filed an amicus curiae brief [PDF] supporting Microsoft’s position. If the US government wants information on servers overseas, it should go through existing treaties rather than just expecting to snatch the bytes with a US-issued search warrant.

This is not a big deal from a procedural standpoint: It really would not take much longer to make existing treaty mechanism, but it is from a business perspective, because, should the DoJ prevail, it will be yet another reason for foreign customers to flee American cloud providers.

The degree to which the US state security apparatus attempts to eschew treaty based in attempt to be bad-ass borders on the pathological.

Quote of the Day

If we render our torturers superior to the political institutions of the government, and if we render the police superior to the civil power of elected officials, then we essentially have empowered independent standing armies to conduct our wars and enforce our laws, and self-government descends into bloody farce.

Charlie Pierce

He is taking about how our torturers and our police demand to operate with impunity.

So, The Interview is Going to be Released After All

And suddenly I have no urge at all to see the film:

A comedy film about North Korea that had its Christmas Day launch cancelled after a major cyber attack and threats against US cinema-goers is now to get a limited theatrical release, Sony says.

The Interview will be shown in some independent US cinemas on Thursday.

Sony Chairman Michael Lynton said he was “excited” that the comedy, about a plot to assassinate North Korean leader Kim Jong-un, would now be seen.

Two cinemas in Atlanta and Austin have already revealed screenings.

Any urge I had to see the movie has vanished, but I am now seriously considering Will Bunch tweeted tongue in cheek conspiracy theory:

Elevator pitch: Slapstick comedy about worst movie ever made becoming box-office smash when it’s hacked by North Korea
— Will Bunch (@Will_Bunch) December 23, 2014

Well, It’s a Start

South Korea has indicted Uber CEO Travis Kalanick:

South Korea has indicted the chief executive officer and local subsidiary of Uber Technologies Inc for violating a law governing public transport, becoming the latest jurisdiction to challenge the U.S. taxi service provider.

The Seoul Central District Prosecutors’ Office issued the indictment against CEO Travis Kalanick and the firm’s Korean unit for violating a law prohibiting individuals or firms without appropriate licenses from providing or facilitating transportation services, an Uber spokeswoman said.

The prosecutors’ office declined to comment.

“Uber Technologies respects the Korean legal system and will provide its full cooperation,” the company said in a statement without detailing the charges brought against it.

Uber, through its apps, charges fees to play matchmaker for passengers and drivers – some registered as taxi drivers. But a lack of regulation for the relatively new business model has brought Uber to the attention of authorities worldwide.

Taiwan and the Chinese mainland city of Chongqing on Monday separately said they were investigating Uber over concerns it and its drivers were not appropriately licensed.

Seeing as how Uber’s basic business model is lawlessness with a few legal walls to ensure that people like Kalanick will never face any liability for anything, the idea that he has been personally indicted is a good thing.

Here’s hoping that he he actually has to stand trial there.

Hotel Telecommunications F%$#ery

Marriott specifically, who just got fined for jamming personal Wi-Fi hotspots, and is now attempting to get regulatory forbearance:

Microsoft and Google don’t agree on much, but they’ve presented a united front against the hotel industry, which is trying to convince government regulators to give them the option of blocking guests from using personal Wi-Fi hotspots.

The tech companies recently joined the wireless industry’s lobbying group and a handful of other parties in opposing the hotel industry’s petition, which seeks the Federal Communications Commission’s permission to block personal Wi-Fi networks on their properties.

This summer, the American Hospitality & Lodging Association and Marriott International asked the FCC to declare that a hotel operator can use equipment to manage its network even if it “may result in ‘interference with or cause interference’ to a [wireless device] being used by a guest on the operator’s property.”

 Now that many people have cell phones, and don’t pay the usurious fees for phone calls, Marriott wants to jam personal Wi-Fi hotspots so that they can charge equally usurious fees for that:

The Marriott-owned Gaylord Opryland Hotel and Convention Center tech staff was using a monitoring system that de-authenticated guests’ personal Wi-Fi hot spots. Meanwhile, the hotel was charging exhibitors and attendees anywhere from $250 to $1,000 for Wi-Fi service, the FCC said.

In October, Marriott settled an FCC complaint about the practice for $600,000 but argued that it hadn’t broken the law and was using technology to protect guests from “rogue wireless hotspots that can cause degraded service, insidious cyber attacks and identity theft.”

A month later, the agency asked for comments on Marriott’s earlier request to find such Wi-Fi blocking legal.

 Like I said, Hotel Telecommunications F%$#ery.

I think that the deadline for comment has passed, but you can read the comments here.

The Tor Anonymity Network Just Got Hacked by Law Enforcement

Paul Carr at Pando has been writing a lot about potential security issues with TOR, both issues with the ties between the founders and the US state security apparatus, and possible technical issues.

One of the ones that he has mentioned is the compromise of their exit nodes or their directory authorities.

It now appears that a large cluster of exit nodes has been seized by the authorities:

Earlier this week, we reported on an apparent threat by an unnamed agency to disable the Tor anonymity network.

According to founder Roger Dingledine:

The Tor Project has learned that there may be an attempt to incapacitate our network in the next few days through the seizure of specialized servers in the network called directory authorities.

This is not the current problem though,  it appears that some of the exit nodes have been seized by the authorities:

Today, Thomas White who operates “a large exit node cluster for the Tor network and [a] collection of mirrors,” reports that his servers have apparently been compromised.

Tonight there has been some unusual activity taking place and I have now lost control of all servers under the ISP and my account has been suspended. Having reviewed the last available information of the sensors, the chassis of the servers was opened and an unknown USB device was plugged in only 30-60 seconds before the connection was broken. From experience I know this trend of activity is similar to the protocol of sophisticated law enforcement who carry out a search and seizure of running servers.

White warns “Do NOT use my mirrors/services until I have reviewed the situation,” adding:

At this moment in time I am under no gagging orders or influence from external parties/agencies. If no update is provided within 48 hours you may draw your own conclusions.

Needless to say if you rely on TOR for some sort of crucial secure communications, I would suggest that you find some other method, or go dark, over the short term.

I know a guy with a carrier pigeon.

It Goes Without Saying that Rush Limbaugh is a Blithering Idiot

As evidenced by his recent racist screed about how Idris Elba cannot play James Bond because the actor is black.

Emails revealed that a senior Sony executive was looking to tap Elba to replace Daniel Craig when the latter is done with the role.

Of course, Rush Limbaugh had a bigotrygasm over all of this.

This begs the question:  Why are sponsors supporting this inveterate racist?

To be clear, I would much rather have Elba playing George Smiley than James Bond:  I’ve always found Bond to be a bit one dimensional.

I will say something here:  If  Sony co-chairman Amy Pascal has mooted casting Elba take the role of Jack Ryan in a Tom Clancy movie, I would be upset: It’s a profound waste of his not inconsiderable acting talent.

Then again, playing Jack Ryan in a Tom Clancy would be a waste of pretty much anyone’s acting talent.

This is Not Going to End Well………

The Ukrainian Parliament has voted to abandon their non-aligned status:

In a sign of Ukraine’s hardening attitude toward Russia, Ukrainian lawmakers on Tuesday voted to remove a legal barrier to joining the NATO defense alliance.

The move provoked an angry response from Russia, even though NATO shows few signs of accepting Ukraine as a member anytime soon. But this year’s bloody conflict in Ukraine’s east has altered the country’s feelings about the Western alliance. A plurality of Ukrainians now favor joining NATO, a stark change from recent years when just a small fraction did.

Ukraine’s decision comes as Russia struggles with a weakened ruble and growing concerns about economic instability.

The vote in Ukraine’s parliament had no immediate practical effect on the country’s relationship with NATO. But it ended Ukraine’s nonaligned status, which was adopted as a way of reassuring Russia that its neighbor would not join NATO. Russian President Vladimir Putin cited his fear of Ukraine’s joining NATO as a reason Russia annexed Crimea in March.

This is a very stupid step to take when the cease fire finally appears to be holding in the east of the Ukraine.

It is a deliberate provocation, and I believe that the US government was involved in this move.

We already know that Victoria Nuland, the Assistant Secretary of State for European and Eurasian Affairs, was intimately involved in funding the revolt that overthrew Viktor Yanukovych, and the fact that senior positions in the current government, most notably the American born Natalie Jaresko at finance minister, indicates that there had to be at least tacit approval.

In fact, Jaresko, appears to still be in the US payroll, albeit through the back door.

There are a whole bunch of people in the State Department, Pentagon, and intelligence services who are still intent on imposing something like the Morgenthau Plan, which was intended  intended to reduce Germany to a pastoral following WWII on Russia.

Putin is very much aware of these attitudes, it’s hard to miss when folks like Senators John McCain and Lindsey Graham have made no bones about supporting this strategy.

Paranoid Putin may be, but it is a justified paranoia, and the recent vote in the Ukraine will only serve to reinforce that attitude, and so escalate the conflict.

It looks like we are into a cycle of doomed imperial hubris on and around the Black Sea.