No Doesn’t Mean No in Europe

EU call to re-run treaty referendums,” by John Thornhill, George Parker in Brussels, and Betrand Benoit, Financial Times, 25 May 2005,

The EU’s lack of respect for democracy isn’t new news, but it’s good to keep tabs on it. Hat-tip to Catholicgauze

France and the Netherlands should re-run their referendums to obtain the “right answer” if their voters reject Europe’s constitutional treaty in imminent national ballots, Jean-Claude Juncker, the holder of the EU presidency, said on Wednesday.

The Luxembourg prime minister said all 25 EU member countries should continue their attempts to ratify the treaty whatever the outcome of the French and Dutch votes.

But it’s get better

The countries which have said No will have to ask themselves the question again. And if we don’t manage to find the right answer, the treaty will not enter into force,” he said in an interview with the Belgian Le Soir newspaper.

To borrow the most annoying of the anti-Iraq-Liberation slogans,

Love without consent is Rape

Network Discovery (Nmap, Cinema, Iraq Warriors, and American Feminists)

What You See Is What You Get — or Is It?,” by Margaret Heffernan, WITI Careers mailing list, 24 May 2005,

In The Matrix Reloaded, our heroine needs to take over the city’s electricity network to turn off alarms.


While in Battle Royale, our hero’s friend needs to subvert the system’s security network


What do both characters use? Nmap, a network discovery tool. Network discovery lets you know what a network is like. Is it just one computer? Many? Are they secure? Easy to penetrate and subvert?

Likewise, they can be social networks, whether Family/Steep/Pre-Modern Nets…


Ideological/Flat/4th Generation Nets…


or combinations of these…


I’ve written before that in war, the style of network takedown depends on the style of network. But how can we quickly determine what type of network we are dealing with?

In an otherwise bitchy whiny article, Margaret Heffernan gives us a very low tech version of nmap

If offered a drink, always accept — and see who goes to get it. You may be told the hierarchy’s flat, but it isn’t that flat if only assistants get the coffee.

Of course, this won’t always work. Lawrence of Arabia famously includes a scene of Prince Faisal, the head of a very steep network, serving a guest himself. But if a warrior knows the local culture, he can quickly do network discovery with very little technology. This is vital to winning the Second Battle of Iraq in the Global War on Terrorism.

Mutant Frog on Slate (Kind Of)

Slate mentions me but forgets to link,” by Adamu, Mutant Frog, 25 May 2005,

Congrats to Adamu’s Mutant Frog for being mentioned in Slate, just like Coming Anarchy and tdaxp before him

Mutant Frog Travelogue‘s Adam Richards, who posted a video of a North Korean public execution on his Web site earlier this year warns, “Watching idly and wondering if everyone’s OK is unacceptable because we know exactly what’s being done to the North Koreans. Think before you watch.

Well, kind of

One problem, however: SHE FORGOT TO LINK TO MY SITE! What gives? Every other site got a link but mine. Funnily enough, I’m still experiencing a surge in hits from those with the patience to copy-paste “Mutant Frog Travelogue” into their favorite search engine.

Bidisha Banerjee, I beseech you: link to me! If not this time than the next, please! As someone who covers blogs, you should realize how precious links are to bloggers.

Well, Slate got what I said wrong. Slate’s more MSM than blog, so we shouldn’t expect a correction.

Minnesota’s Habit of Strange Pedophilia Laws

Minnesota court takes dim view of encryption,” by Declan McCullagh, CNET, 24 May 2005, (from Slashot).

Minnesota, South Dakota’s neighbor to the east, is regionally known for quirkiness. Swedish-style leftism, prairie populism, and Great Lakes industry trade makes the state, which means Sky-Reflecting Water in Sioux, a mirror into the least practical fads of the moment. I early blogged of the Minnesota Legislature encouraging pedophiles to kill their victims. Now, a common privacy tool is evidence of criminal intent

A Minnesota appeals court has ruled that the presence of encryption software on a computer may be viewed as evidence of criminal intent.

Ari David Levie, who was convicted of taking illegal photographs of a nude 9-year-old girl, argued on appeal that the PGP encryption utility on his computer was irrelevant and should not have been admitted as evidence during his trial. PGP stands for Pretty Good Privacy and is sold by PGP Inc. of Palo Alto, Calif.

But the Minnesota appeals court ruled 3-0 that the trial judge was correct to let that information be used when handing down a guilty verdict.

“We find that evidence of appellant’s Internet use and the existence of an encryption program on his computer was at least somewhat relevant to the state’s case against him,” Judge R.A. Randall wrote in an opinion dated May 3.

Randall favorably cited testimony given by retired police officer Brooke Schaub, who prepared a computer forensics report–called an EnCase Report–for the prosecution. Schaub testified that PGP “can basically encrypt any file” and “other than the National Security Agency,” nobody could break it.

Shaub either perjured himself or is dangerously ignorant for his position.

So do you have criminal intent? Yes, if you use a Mac

The court didn’t say that police had unearthed any encrypted files or how it would view the use of standard software like [Apple Macintosh] OS X’s FileVault. Rather, Levie’s conviction was based on the in-person testimony of the girl who said she was paid to pose nude, coupled with the history of searches for “Lolitas” in Levie’s Web browser

Other programs that use encryption are some file compressors, the web browser you are reading this page with, some media players — basically, anything involving credit cards, online business, or electronic personal security. As dahnmich writes, under a rule that ‘personal security equals criminal intent,’ even possession a gun would be evidence of criminal intent.

Short Review of "2009: Lost Memories"

2009: Lost Memories is Racist Anti-Japanese Terrorist Propaganda.

2009: Lost Memories

While stylish, it’s also sickening. The protagonist, the hero, becomes a murderer whose objective is starting a war between Japan and the United States. It plays like Arab nationalism — angry, backward-looking, unconcerned about the lives of others, petty.

Josh from One Free Korea has the deteriorating relationship between South Korea and the United States in his Death of an Alliance series. 2009 brings the same message, but as a jump through the gut.

It is a rare movie that makes you want to root for the Empire of Japan. The sickening nationalism of 2009 makes Lost Memories just such a movie.

Barnett: No Hubbert (Peak Oil) Curve

The Other Culprit on High Oil Prices,” by Thomas Barnett, Thomas P.M. Barnett :: Weblog, 25 May 2005,

Interesting thinking from Kerry-votin’ geopolitical grand strategist Thomas PM Barnett. While I had dismissed scare mongering, Barnett gives an alternative system-level explanation for high oil prices besides “oil is running out.”

Another great front-page WSJ on the global oil markets, pointing out that after the rising demand of India and China and other emerging markets, the key culprit in persistently high prices today is the fact that global oil companies simply haven’t invested in refining capacity for years now.

What’s interesting about this is that it’s really a self-fulfilling prophecy: the oil companies resist sinking the big bucks because they fear oil is receding in importance in coming years and decades as we shift to hydrogen (e.g., British Petroleum becomes Beyond Petroleum), and so by eschewing these investments, they create persistent high prices that accelerate that shift.

But if you don’t believe in that, you can always stick to the Hubbert Curve and wah-wah-wah yourself all the way to some scary doomsday scenario

Oil capitalism leading the shift away from oil. Nifty.