I see that Guido has launched a petition and campaign for the restoration of capital punishment in the UK; specifically for the killers of children and police.
Now that the government has launched an e-petitions site, Guido will put all the resources at his command into a campaign for a vote on the restoration of capital punishment for child and cop killers.
Guido Submits “Restoration of Capital Punishment” Petition
This is such a difficult issue – and is probably the one area where I fundamentally disagree with his principles.
These are some of my difficulties:
- No-one has the right to kill – but that should include the State.
- Anyone who does kill must be punished – but that should include the State.
- What if we get it wrong, and we murder an innocent person?
- Why just children and police? Killing is killing, or is some killing worse than others?
- Where do you draw the line between murder and self-defence?
- If a demonstrator were to kill a policeman, should that demonstrator be executed? If a policeman were to strike and kill an innocent passer-by, should that policeman be executed?
Now let’s examine our collective emotions on this. Guido uses Baby P as an example. What revolts us the most: the fact that he was killed, or the fact that he was tortured first? I suspect the latter. Why should capital punishment be applied to murder but not to torture? I make this distinction solely to show that our emotions play a serious part in this debate when it is one that perhaps above all others should be governed by logic.
And what about China and Saudi Arabia? Most of us are horrified by capital punishment in foreign climes, yet most of us seem to want capital punishment here.
For me, however, the bottom line is not that I don’t think murderers deserve to lose their own life, but that the risks in getting it wrong are too great.
I just had one of those phone calls about the problems with my computer (they’ve been increasing recently).
I lied. “I don’t have a computer,” I told her.
“Yes, this is about the problems you are having with it.”
“I don’t have a computer,” I repeated.
“But you do have broadband.”
The tone in her voice had changed. She was guessing that I had a computer because she knew that I had broadband.
How did she know that? Is it common knowledge available to anyone? Is it obtained nefariously? Or do our ISPs sell their customer lists?
Two separate bits of news that caught my eye are Google’s purchase of PittPatt (a face recognition company as reported by the WSJ), and Entrust’s release of a digital certificate system for smartphones.
Google has acquired a seven-year-old company that develops facial-recognition technology for images and video, though the Web-search giant didn’t say what it plans to do with it.
Google Acquires Facial Recognition Technology Company
What will it do with it? Is it going to add it to Google+ in the same way Facebook introduced face recognition last year? Or will it be built into Android? (Could be both, of course, just like it could equally hive off into a new profit centre offering facial biometrics and recognition to law enforcement and border agencies…).
Moving on, Entrust yesterday announced and claimed that ‘Entrust IdentityGuard strengthens mobile security with device authentication, network access (VPN), SMIME and application security — all with self-service capabilities’.
You have to look at the detail here. This is a self-service digital certificate for smartphones: “Authorised employees, staff or contractors simply log in to the Entrust IdentityGuard Self Service Module to enroll their mobile device — compatible platforms include the Apple iPhone, Apple iPad, Android, BlackBerry, BlackBerry PlayBook and more — and are issued a digital certificate.”
The problem is that a digital certificate authenticates the identity of the device, not the person using it. I asked Bill Connor, President and CEO of Entrust, to elaborate on the security of the digital certificates themselves.
The Entrust IdentityGuard Self-Service Module offers end users a simple and consistent way to enrol for and install certificates and keys for network access and secure email on their mobile devices. The certificates and keys are stored within the devices’ native certificate stores and can therefore be leveraged by native device applications such as VPN clients and email clients. Private keys are thus protected according to the mechanisms employed by the mobile device OS.
But what if the device is lost, stolen or cloned? Could it be used as an authenticated device by an unauthenticated user?
As the private keys are stored natively by the mobile device, they are protected against device cloning and theft according to the mechanisms employed by the mobile device vendor, including device PIN protection, password protection and hardware-derived keys for the certificate store. Certificates issued to mobile devices may be easily and immediately revoked by both administrators, through IdentityGuard WebAdmin, and users, via the IdentityGuard Self-Service Module, if/when users become aware of device theft or compromise.
Notice those two key phrases: ‘according to the mechanisms employed by the mobile device OS’ and ‘according to the mechanisms employed by the mobile device vendor’.
So what we have here is an excellent product from Entrust that will authenticate the device and is perfect for business use; but is reliant on other systems for authenticating the user to the device. But the only way you can really authenticate the user is with biometrics – so we’re back to PittPatt.
It is coincidence rather than conspiracy that I learnt of these two developments on the same day – but what a co-incidence. Put the two together: facial recognition built into the operating system for user authentication and Entrust’s easy-to-use and established certificate system for device authentication and the result would be genuine security for mobile devices.
Two developments to watch, I think!
Good days to bury bad news occur when the existing news is already horrific. And the current news is truly horrific. In the UK we’ve been stunned by the depth and depravity of the press, the revelation that our police force embodies corruption, and that our politicians have been complicit. This against the background of a potential Eurozone implosion and US debt default; either of which could drag the world back into and further beyond any recession ever known. And, of course, the Norwegian massacre.
It was against this background that the UK government quietly announced on Monday that it was backtracking on its promise to remove innocent people’s DNA from the Police DNA database – despite being required by European law to do so. Despicable, underhand and cynical.
But don’t worry, they whisper. The data will be anonymised.
Clearly they think we are stupid. What good is anonymous DNA? If the DNA makes an anonymous match they’ll know that someone out of several million people is the culprit, but won’t know who. Of course it’s not anonymous. Anonymous means ‘unknown name, nameless, incognito, unidentified, unknown, secret’. What they really mean is that if a match is found, a unique code will have to be used to look up the actual name of the owner in a different database.
So to despicable, underhand and cynical we must add liars.
Jon Snow has blogged about Anders Breivik: Norway’s terrorist: a lone wolf?
But Anders Breivik, did not act alone. He swept the extremist sites of the free world for material to stoke his hatred. He was nicely rewarded by entirely legal entities both in Britain and abroad.
The web is a feeding ground for deranged individuals who seek justification for their anger and resentment. The wonder is that we have to go back to Timothy McVeigh, the Oklahoma bomber to find the closest parallel. And that was sixteen years ago – 168 dead, over 600 injured. He was judicially killed in 2001.
Norway’s terrorist: a lone wolf?
It’s a worrying comment. Clearly it’s true. But the first implication – not the statement, but a clear implication – is that we need to do something about it. And that’s what I find worrying.
Years ago the UK government was trying to establish a Key Escrow system so that nobody could use encryption to conceal their actions from law enforcement agencies. All of the liberty-leaning mailing lists were aghast. On one of the more reasonable but vociferous lists, the Home Office had its own advocate, always trying to put the Government point of view. All of this was before 9/11.
In the end, liberty won for now. But one of the last comments from the advocate was effectively, “you wait, it will take only one terrorist outrage for the people to be crying out for more restrictions.”
And then we had 9/11 and the Patriot Act and the anti-terror laws and the illegal invasion of Iraq and everything else. It takes just one terrorist outrage for governments to justify what they want to do anyway: increase their control by limiting our liberty.
Then we must consider the second implication in Jon Snow’s comments: “The wonder is that we have to go back to Timothy McVeigh… to find the closest parallel.” The implication here is just as clear: the internet doesn’t create terrorists. It is used by terrorists and criminals and racists – but it does not create them. Society does that. And repressive laws. And illegal wars.
So as free citizens we should offer our sympathy to Norway and Norwegians and we should grieve with them. But we must never let outrages be used by our governments to take away any more of our liberty.
Well Sir Paul Stephenson must be hoping for a quick return to power for Labour because he’s never going to get his ermine from a Conservative government now. Which is ironic since he’s just demonstrated a brilliant example of ducking, diving and blame-shifting – absolute paramount pre-requisites for a successful politician.
This Neil Wallis thing is an absurd red-herring. That’s not why he resigned, nor why he had to resign. He has presided over and/or been a senior officer in the most important police force in the UK while it has demonstrated repeated examples of corruption – corruption that the next few weeks is likely to show was more widespread and endemic than we suspect. Unless attention can be diverted elsewhere.
Just like Coulson had to resign from No 10 because he knew things would get worse, so Stephenson has had to resign from the Met. But making a snide remark directed at Cameron draws attention away from the Met, and even away from the hacking. It suits the Labour party, it suits the Met and it suits the press (who are all wondering who will be next after NoW).
Brilliant politicking. He will be a loss to the House of Lords.
I yesterday had the pleasure to meet around 35 Chief Executive Officers (CEOs) from leading firms with an interest in broadband and the Internet.
Neelie Kroes: Working with businesses to deliver the internet revolution
This is exactly why Neelie Kroes and Viviane Reding are so concerned about women’s representation at the highest levels:
I’ve blogged before about getting Every Woman Digital. I continue to find it troubling that women are under-represented in the ICT sector at every level, and particularly in decision-making positions. And the situation doesn’t seem to be getting better.
Every woman digital – plugging the ICT skills gap
This is a real problem. Women are under-represented from engineers to executives, and it’s a great shame and a great waste of talent. I have no answers, although I don’t believe in ‘positive discrimination’: discrimination is discrimination whether it’s positive or negative, and should be shunned. But this picture shows the size of the problem.
It’s just a pity that in the rest of her blog, Ms Kroes goes on to repeat the same sort of double-speak that we have come to expect from Europe.
I was clear that whatever needed to be done should be in full respect of competition rules. On net neutrality, I remain convinced that we should maintain a robust, best-efforts internet with access for all, and that we also need to allow new business models under fair conditions. BEREC is currently analysing the current situation very thoroughly and we will study the results carefully.
Working with businesses to deliver the internet revolution
‘Access to all’ does not net neutrality make. And “we also need to allow new business models under fair conditions” is simply code for allowing ISPs to charge more for heavy users. I have strong concerns that net neutrality is doomed if the EC gets its way. It’s a shame that the EC isn’t as concerned about business net neutrality as it is about business gender neutrality.
We in the self-righteous and self-congratulatory West tend think little of personal freedom and privacy rights in the Far East (with obvious exceptions here and there, of course). So it comes as a bit of a shock that a lawyer in South Korea has successfully sued Apple for breaching privacy on his iPhone.
Apple Korea said it had paid one million ($950) to iPhone user Kim Hyung-Suk, complying with a compensation order from a court in the southern city of Changwon.
Kim, a 36-year old lawyer, filed suit against Apple on April 26. He said the smartphone’s location recording infringed on his constitutional rights to privacy and freedom and caused psychological stress.
Apple makes first S. Korea payout over tracking
It’s going to be worth watching this to see whether the issue quietly goes away or balloons. If Kim Hyung-Suk’s privacy was illegally violated, did the same happen to every other South Korean iPhone user? And what about us here in Europe, with our much-vaunted privacy protections?
Mobile phone usage depends on the user telling the supplier where he is so that the conversation/data can be routed via the nearest mast. So some invasion of privacy is a requirement. And we know from German Green politician Malte Spitz’s FOI demand, that can be a staggering amount:
Cellphone companies do not typically divulge how much information they collect, so Mr. Spitz went to court to find out exactly what his cellphone company, Deutsche Telekom, knew about his whereabouts. The results were astounding. In a six-month period — from Aug 31, 2009, to Feb. 28, 2010, Deutsche Telekom had recorded and saved his longitude and latitude coordinates more than 35,000 times.
Slashdot: German Politician Demonstrates Extent of Cellphone Location Tracking (T-Mobile Realizes Hitler’s Wet Dream)
But is this collection implicit (or even explicit in the small print) of any agreement with the service provider, and how long can they keep it? I don’t know. It would take the courts and our EC masters to proclaim on this. But it’s certainly something that needs to be sorted. Although Apple may not be the service provider in this case, it and other phone vendors must surely be reigned back in what data they collect from us. Alternatively, let’s hope that every iPhone user in the world manages to get $1000 dollars from them. That would make them sit up and think.