Joe Sobran: Home Schooling Civics….

Joe Sobran on the best way to teach your children civics:

“Because I write about politics, people are forever asking me the best way to teach children how our system of government works. I tell them that they can give their own children a basic civics course right in their own homes.

In my own experience as a father, I have discovered several simple devices that can illustrate to a child’s mind the principles on which the modern state deals with its citizens. You may find them helpful, too.

For example, I used to play the simple card game WAR with my son. After a while, when he thoroughly understood that the higher ranking cards beat the lower ranking ones, I created a new game I called GOVERNMENT. In this game, I was Government, and I won every trick, regardless of who had the better card. My boy soon lost interest in my new game, but I like to think it taught him a valuable lesson for later in life.

When your child is a little older, you can teach him about our tax system in a way that is easy to grasp. Offer him, say, $10 to mow the lawn. When he has mowed it and asks to be paid, withhold $5 and explain that this is income tax. Give $1 to his younger brother, and tell him that this is “fair”. Also, explain that you need the other $4 yourself to cover the administrative costs of dividing the money. When he cries, tell him he is being “selfish” and “greedy”. Later in life he will thank you.

Make as many rules as possible. Leave the reasons for them obscure. Enforce them arbitrarily. Accuse your child of breaking rules you have never told him about. Keep him anxious that he may be violating commands you haven’t yet issued. Instill in him the feeling that rules are utterly irrational. This will prepare him for living under democratic government.

When your child has matured sufficiently to understand how the judicial system works, set a bedtime for him and then send him to bed an hour early. When he tearfully accuses you of breaking the rules, explain that you made the rules and you can interpret them in any way that seems appropriate to you, according to changing conditions. This will prepare him for the Supreme Court’s concept of the U.S. Constitution as a “living document”.

Promise often to take him to the movies or the zoo, and then, at the appointed hour, recline in an easy chair with a newspaper and tell him you have changed your plans. When he screams, “But you promised!”, explain to him that it was a campaign promise.

Every now and then, without warning, slap your child. Then explain that this is defense. Tell him that you must be vigilant at all times to stop any potential enemy before he gets big enough to hurt you. This, too, your child will appreciate, not right at that moment, maybe, but later in life.

At times your child will naturally express discontent with your methods. He may even give voice to a petulant wish that he lived with another family. To forestall and minimize this reaction, tell him how lucky he is to be with you the most loving and indulgent parent in the world, and recount lurid stories of the cruelties of other parents. This will make him loyal to you and, later, receptive to schoolroom claims that the America of the postmodern welfare state is still the best and freest country on Earth.

This brings me to the most important child-rearing technique of all: lying. Lie to your child constantly. Teach him that words mean nothing–or rather that the meanings of words are continually “evolving”, and may be tomorrow the opposite of what they are today.

Some readers may object that this is a poor way to raise a child. A few may even call it child abuse. But that’s the whole point: Child abuse is the best preparation for adult life under our form of GOVERNMENT.”

Joe Sobran On Christianity and History

The great conservative writer Joseph Sobran passed away on Sept. 30 2010.

I republish here one of his many fine essays on religion and culture, “Christianity and History,” Dec. 2. 2008:

Ignorance is often hidden behind an urbane surface. Many otherwise educated people lack the most elementary understanding of certain subjects. One of these is religion.

When I was an aspiring Shakespeare scholar during my college days, I was surprised to find that most commentators on Hamlet missed the play’s religious aspect. Prince Hamlet is evidently a Catholic, but he has been a student at Wittenberg, home of the Reformation. He puns on the Diet of Worms. His father’s ghost laments that he was murdered without a chance to receive the sacraments, a fact Hamlet recalls when he hesitates to kill his uncle at prayer; Hamlet later sends two former friends to their deaths without confession. Ophelia, an apparent suicide, is given a Christian burial, to the scandal of her gravediggers.

None of this would have been lost on the ordinary Elizabethan playgoer. Whether the ghost comes from purgatory or hell, whether the old sacraments are efficacious, whether Ophelia is damned — these are questions that would have occurred to everyone in the audience, Catholic, Anglican, or Protestant. Modern scholars consign them to footnotes. But Elizabethans would have agreed with the Anglican Samuel Johnson (writing two centuries later) that Hamlet has descended to a diabolical level by seeking the damnation of his enemies.

Public discussion of three current topics shows how ignorant most Americans have become about religious questions that would have electrified their ancestors. Pope Pius XII and Patrick Buchanan were accused of pro-Hitler sympathies because their critics didn’t realize that Communist persecution of Christians would take precedence, for them, over all other considerations. And in New York, a tax-supported art show stirred controversy because it featured a blasphemous picture of the Virgin Mary, splattered with elephant dung; for liberals, as usual, the only issue at stake was “artistic expression.”

The great vice of liberal thinking is its failure of imagination with respect to Christians. For all their preaching of “sensitivity” and “multiculturalism,” they are belligerently ignorant of Christian culture and Christians’ feelings. In fact they seem to think that there is something specially “artistic” about offending Christians. Offending blacks, Jews, feminists, or homosexuals is “insensitive,” while offending Christians is “irreverent” — a word that has come to suggest a rather cute sassiness.

Yet the whole history of Western Civilization is rooted in religion. Unless you understand Judaism, Catholicism, and Protestantism, along with the rise of Islam, you don’t understand the events that shaped the modern world. The issues of the Reformation were still alive when the United States was founded, when slavery was debated, when the Civil War tore the country apart, when Prohibition was adopted, when Joe McCarthy assailed “godless Communism,” when John Kennedy became the first Catholic American president.

The Christian Right is closer to its own historic roots than most Americans, yet the media and the history textbooks treat it as a marginal, virtually un-American movement. This isn’t “multicultural”; it’s anti-cultural. It refuses to take America’s real origins seriously, adopting the Supreme Court’s shallow and ahistorical interpretation of the separation of church and state.

Liberal diatribes against “McCarthyism” leave out the crucial fact that American Christians felt deeply betrayed by the outcome of World War II, when our “Soviet ally” won control of a huge section of Christian Europe, just as Pius XII had feared it would. The war began when the Soviets and Germans had invaded Catholic Poland; it ended with Roosevelt’s turning Poland over to “Uncle Joe” Stalin’s tender mercies. It took the leadership of a Polish Pope, John Paul II, to win back Poland’s freedom.

Yet the young pass through our entire educational system without being taught what the Christian perspective was, and is, or how it has shaped the great events of history. Few of them know that many of the authors of the Constitution were clergymen; fewer still realize that the separation of church and state applied only to the federal government, not to the states. (The First Amendment says that “Congress shall make no law respecting an establishment of religion,” leaving the states free to do so.)

Like Soviet history, American history has been rewritten, with inconvenient facts deleted. In both countries, the “progressive” forces have subverted their subjects’ sense of the past.”

Stuxnet: A Chronology (Ongoing)

October 2, 2010

The NY Times now backtracks, claiming that Israeli cyber warfare experts are “too smart” to leave a clue behind. Thus..by inference…it must be a country that wants to implicate Israel, which..by inference…is Iran (surprise).  Too clever by half, these folks. Another reason I believe Israel or an Israeli-backed team is behind Stuxnet is the fact that Wikileaks apparently had a reference to a possible nuclear “accident” in Iran in July 2009. That is around the time when some researchers argue Stuxnet infections first began.

October 2, 2010

Jeffrey Carr backs off from the allegation that Israel is the culprit, claiming that Ralph Langner was the sole source of the allegation and was irresponsible in posting it on his blog as though it were the opinion of the intelligence community. Carr quotes an earlier piece of his, along with these words:

“Last week I wrote about how the Israel-Iran conspiracy theory around the Stuxnet worm was built entirely on one security engineer’s personal conjecture (Ralph Langner) with absolutely no weighing of alternative possibilities for attribution, nor any objective assessment of the evidence.”

However, if you click on the earlier piece he cites, he wrote nothing of the sort in it. Nowhere in that piece did Carr claim that Langner was the sole source of the allegation; he quotes the NY Times as noting several people who’d reached the same conclusion. Also, there is no hint in the piece that he considered Langner’s allegation speculative or poorly founded. He cited it instead as a likely possibility. This is clear back-pedaling, probably provoked by the fear that the story might lead to a crackdown on Iranian dissidents and foreigners. Well, of course it will. But that’s not the fault of journalists reporting on the story. Or of Ralph Langner, who clearly states on his blog that he is “speculating” (see previous link).

The fault lies with the unknown cybercriminal/s who came up with Stuxnet.

“Stuxnet Speculation Fuels Crackdown By Iranian Intelligence,” Jeffrey Carr, The Firewall, Forbes, October 2, 2010/

*October 1, 2010

[See “Clues Emerge About Genesis Of Stuxnet Worm,” CS Monitor, October 1, 2010]

*October 1, 2010

[“Israel: Smart Enough To Create Stuxnet; Stupid Enough To Use It” War In Context, Oct. 1, 2010]

*October 1, 2010

Cryptome is arguing that Israel would never have done anything so sloppy as what’s alleged. Could it be that some group is deliberately playing off one side against the other, that is, playing divide-and-conquer? Or is this more “plausible deniability”?

On looking back, I notice that one of the first people to launch the “Israel did it” allegation is one Richard Falkenrath, who works for the Chertoff Group (my emphasis).

That makes me wonder.

Here’s Cryptome:

“Really? Personally I’d be surprised if a crack team of Israeli software engineers were so sloppy that they relied on outdated rootkit technology (e.g. hooking the Nt*() calls used by Kernel32.LoadLibrary() and using UPX to pack code). Most of the Israeli developers I’ve met are pretty sharp. Just ask Erez Metula.

http://www.blackhat.com/presentations/bh-usa-09/METULA/BHUSA09-Metula-ManagedCodeRootkits-
PAPER.pdf

“It may be that the “myrtus” string from the recovered Stuxnet file path

“b:\myrtus\src\objfre_w2k_x86\i386\guava.pdb” stands for “My-RTUs”

as in Remote Terminal Unit. See the following white paper from Motorola, it examines RTUs and PICs in SCADA systems. Who knows? The guava-myrtus connection may actually hold water.

http://www.motorola.com/web/Business/Products/SCADA%20Products/_Documents/Static%20Files/SCADA_
Sys_Wht_Ppr-2a_New.pdf

As you can see, the media’s propaganda machine is alive and well.”

I am completely out of my depth in the technical part of this. But not in the propaganda part.

As an instance of the way group conflicts can be set off, think of how during the financial crisis there were an inordinate number of Indians being trotted out to do the explaining…and taking the brunt of the public’s anger, although last I looked, despite a respectable number of Indian billionaires, the head honchos of the major banks (with one exception) and the biggest and most important speculators, managers, and  international officials were not Indian, to phrase it as politely as possible.

Setting race and nation each against other is of course the modus operandi of the power elite, and both Kashmir and Israel have played that divisive role in the past….and continue to do so.

*October 1, 2010

A link to an Examiner piece is coming up right at the top of a Google search of Stuxnet and Israel. With all due respect to the author, who probably thinks he/she is on the side of the angels and simply preempting an outburst of anti-Semitism by this effort, the piece is quite misleading….and, apparently, deliberately so, as an examination of the other links listed here, from a variety of  sources in the West (see this NY Times pieces) will prove.

For instance, the Examiner piece doesn’t cite the reports from many western security companies and research teams (see links below) that have extensively researched the issue, nor does it acknowledge that it was these sites that first advanced the claim that Israel/Israeli hackers were likely responsible. Instead, it cites a Times of India piece that republishes the claims.

The attempt, apparently, is to mislead the public into thinking that the allegation of Israeli involvement is one mainly advanced by untrustworthy foreigners with axes to grind (note the description “Iran’s friend, India”).

“Another of Iran’s friends, India, is pushing the notion that Israel did it. According to an http://timesofindia.indiatimes.com on Friday, “A Biblical reference has been detected in the code of the computer virus that points to Israel as the origin of the cyber attack.” It’s further explained that the word “myrtus” is in the code, and that this is a “reference to the myrtle tree”

In point of fact, it was western security companies and western researchers who came to that conclusion.  Moreover, the targets of the worm fit very well with Anglo-Zionist imperial objectives – covering as they do the largest Muslim populations in Asia.

[See “German Firm Employee May Have Created Stuxnet; Israel Blames.” Examiner.com, October 1, 2010

*September 30, 2010

Quote:

“Buried in Stuxnet’s code is a marker with the digits “19790509” that the researchers believe is a “do-not infect” indicator. If the marker equals that value, Stuxnet stops in its tracks, and does not infect the targeted PC. The researchers — Nicolas Falliere, Liam O Murchu and Eric Chen — speculated that the marker represents a date: May 9, 1979. While on May 9, 1979, a variety of historical events occurred, according to WikipediaHabib Elghanian was executed by a firing squad in Tehran sending shock waves through the closely knit Iranian Jewish community,” the researchers wrote. Elghanian, a prominent Jewish-Iranian businessman, was charged with spying for Israel by the then-new revolutionary government of Iran, and executed May 9, 1979.”

Quote:

“Last weekend, Iranian officials confirmed that tens of thousands of PCs in their country had been infected by Stuxnet, including some used at a nuclear power plant in southwestern Iran that’s planned to go online next month. The Symantec researchers also revealed a host of other Stuxnet details in their paper, including a “kill date” of June 24, 2012, after which the worm will refuse to execute.”

[See “Stuxnet Code Hints At Possible Israeli Origin, Researchers Say,” by Gregg Keizer, Symantec, Sept. 30, 2010]

*September 30, 2010

Symantec puts out a dossier of information on Stuxnet that includes the following:- attack scenario and timeline, infection statistics, malware architecture, description of all the exported routines, injection techniques and anti-AV, the RPC component, propagation methods, command and control feature, and the PLC infector.

Eric Chien summarizes findings about the worm:

“Only more recently did the general public realize Stuxnet’s ultimate goal was to sabotage an industrial control system.

Analyzing Stuxnet has been one of the most challenging issues we have worked on. The code is sophisticated, incredibly large, required numerous experts in different fields, and mostly bug-free, which is rare for your average piece of malware. Stuxnet is clearly not average. We estimate the core team was five to ten people and they developed Stuxnet over six months. The development was in all likelihood highly organized and thus this estimate doesn’t include the quality assurance and management resources needed to organize the development as well as a probable host of other resources required, such as people to setup test systems to mirror the target environment and maintain the command and control server.”

[See W32.Stuxnet Dossier, Eric Chien, Sept. 30, 2010]

*September 25, 2010

Quote:

The director of the Information Technology Council of the Industries and Mines Ministry has announced that the IP addresses of 30,000 industrial computer systems infected by this malware have been detected, the Mehr New Agency reported on Saturday. An electronic war has been launched against Iran,” Mahmoud Liaii added.“This computer worm is designed to transfer data about production lines from our industrial plants to (locations) outside of the country,” he said.

[See “Iran Successfully Battling Cyber Attack,” Mehr News, Sept. 25, 2010]

*September 24, 2010

A piece in the Guardian suggests that a government agency is most likely behind the worm but warns against leaping to conclusions. It notes that many hackers/criminals might have become sophisticated enough to create a worm of this type. The piece notes that attacks against Iran have increased and that the identification of the worm was originally made by a Belarus security firm for an Iranian client and that Iran had been experiencing problems with their nuclear facility at Bushehr for months. It notes that the worm uses a stolen cryptographic key from the Taiwanese semiconductor manufacturer Realtek.

[See “Stuxnet Worm Is The Work Of A National Government Agency,” Josh Halliday, Guardian, Sept. 24, 2010]

“Stuxnet: The Trinity Test Of Cyberwarfare,” War In Context, Sept. 23, 2010

*September 16, 2010

Symantec researchers say that Stuxnet had to be created by a state, because it was the most devious and sophisticated malware they’d come across.

Quote:

“I don’t think it was a private group,” said O Murchu. “They weren’t just after information, so a competitor is out. They wanted to reprogram the PLCs and operate the machinery in a way unintended by the real operators. That points to something more than industrial espionage.”

The necessary resources, and the money to finance the attack, puts it out the realm of a private hacking team, O Murchu said.

“This threat was specifically targeting Iran,” he continued. “It’s unique in that it was able to control machinery in the real world.”

“All the different circumstances, from the multiple zero-days to stolen certificates to its distribution, the most plausible scenario is a nation-state-backed group,” said Schouwenberg, who acknowledged that some people might think he was wearing a tin foil hat when he says such things. But the fact that Iran was the No. 1 target is telling.”

[See “Is Stuxnet the Best Malware Ever?” Gregg Keizer, Symantec Security Response, Sept. 16, 2010]

*September 13, 2010

German computer security research Ralph Langner speculates that Stuxnet is part of cyberwar:

Ralph’s theory — completely speculative from here

“It is hard to ignore the fact that the highest number of infections seems to be in Iran. Can we think of any reasonable target that would match the scenario? Yes, we can. Look at the Iranian nuclear program. Strange — they are presently having some technical difficulties down there in Bushehr. There also seem to be indications that the people in Bushehr don’t seem to be overly concerned about cyber security. When I saw this screenshot last year (http://www.upi.com/News_Photos/Features/The-Nuclear-Issue-in-Iran/1581/2/) I thought, these guys seem to be begging to be attacked. If the picture is authentic, which I have no means of verifying, it suggests that approximately one and a half year before scheduled going operational of a nuke plant they’re playing around with software that is not properly licensed and configured. I have never seen anything like that even in the smallest cookie plant. The pure fact that the relevant authorities did not seem to make efforts to get this off the web suggests to me that they don’t understand (and therefore don’t worry about) the deeper message that this tells.

Now you may ask, what about the many other infections in India, Indonesia, Pakistan etc. Strange for such a directed attack. Than, on the other hand, probably not. Check who comissions the Bushehr plant. It’s a Russian integrator that also has business in some of the countries where we see high infection rates. What we also see is that this company too doesn’t seem to be overly concerned about IT security. As I am writing this, they’re having a compromised web site (http://www.atomstroyexport.com/index-e.htm) that tries to download stuff from a malware site that had been shut down more than two years ago (www.bubamubaches.info). So we’re talking about a company in nukes that seems to be running a compromised web presence for over two years? Strange.
I could give some other hints that have a smell for me but I think other researchers may be able to do a much better job on checking the validity of all this completely non-technical stuff. The one last bit of information that makes some sense for me is the clue that the attackers left in the code, as the fellows from Symantec pointed out — use your own imagination because you will think I’m completely nuts when I tell you my idea.

Welcome to cyberwar.”

[See “Stuxnet is a directed attack: hack of the century,” Ralph Langner]

*September 8, 2010

German computer security expert Ralph Langner writes to a friend:

Historical document: Ralph informs Joe Weiss what Stuxnet is. Note the date of the email.

*July 22, 2010

Symantec analyzed W32.Stuxnet as a worm that uses a  hitherto unknown Windows bug to attack and then searches the target for SCADA systems and design documents. SCADA is a network used to control utilities, transportation and other critical infrastructure. The worm then contacted Command &Control servers that control the infected machines and retrieved the stolen information. The servers were located in Malaysia and Symantec redirected traffic away from them to prevent the take-over of the information.

Within a 72 hours period Symantec identified close to 14,000 IP addresses infected with W32.Stuxnet trying to contact the C&C server. 58.85 % came from Iran, with the rest coming from Indonesia (18.22%), India (8.31%), with the Azerbaijan, US, and Pakistan making up the other affected countries, with under 2% each (this information is also provided at the Microsoft website).

[See Symantec Security Response,W32.Stuxnet – Network Information, Vikram Thakur, July 22, 2010]

*July 21, 2010

Quote:

“The zero-day vulnerability, rootkit, main binaries, stolen digital certificates, and in-depth knowledge of SCADA software are all high-quality attack assets. The combination of these factors makes this threat extremely rare, if not completely novel.

Quote:

The complexity and quality of the attack assets lead some to believe only a state would have the resources to conduct such an attack. However, the usage of the second digital certificate is a bit odd. One could make the case that once the first attack succeeded, a state would take cover and not waste the second digital certificate. Instead, by signing a very similar binary, security companies were immediately able to detect the second stolen certificate, making it useless in further compromises…..

Quote:

.. Hackers bound by a common cause may target another country, organization, or company that they feel are their enemies. Such hacking groups often have the patience and expertise to gather such attack assets. Further, their goals of continued attack may lead them to continue to refine their attack as they are thwarted or discovered, such as resigning their driver files with a newly stolen digital certificate, modifying their binaries to avoid security product detection, and moving their command-and-control hosts as they are decommissioned…..

Quote:

…..This scenario [terrorism] is like something out of movie and, while for most attacks we’d immediately dismiss this as a possibility, given the amount and quality of the attack assets, terrorism even seems within the realms of possibility in this case.

[See “The Hackers Behind Stuxnet” by Patrick Fitzgerald, Symantec Security Response,  July 21, 2010]

*July 17, 2010

Researchers find that Stuxnet targets industrial control systems of the kind that control manufacturing and utility companies. It targets Siemens management software called Simatic WinCC, which runs on the Windows operating system.

The systems that run the Siemens software, called SCADA (supervisory control and data acquisition) systems, aren’t usually connected to the Internet, but the virus spreads when an infected USB stick is inserted. If it detects the Siemens software, the virus logs in using a default password.

[See “New Virus Targets Industrial Secrets,” Robert McMillan, Computer World, July 17, 2010]

*July 16, 2010

Symantec starts a blog series on the Stuxnet infection that continues through the summer and into September

[See also Microsoft Security Advisory, July 16, 2010 and Krebson Security, July 16, 2010]

*July 7, 2010

Stuxnet could well have caused the glitch in the solar panels of India’s Insat-4B satellite on July 7, 2010. That led to the shutting down of 12 out of 24 of the transponders and 70% of the customers dependent on Direct to Home (DTH) including those using Doordarshan (Indian TV), Sun TV and Tata’s VSNL. The customers were redirected to point to the Chinese satellite  ASIASAT-5, owned and operated by Asia Satellite Telecommunications Co., Ltd (AsiaSat) whose two main shareholders are General Electric (GE) and China International Trust and Investment Co. (CITIC), a state-owned company

[See “Did The Stuxnet Worm Kill India’s INSAT-4B Satellite?” by Jeffrey Carr, The Firewall, Forbes.com, Sept. 29, 2010]

*June 16, 2010

Symantec Security Response Team begins its investigation into the Stuxnet worm. The first sample dates from June 2010, but the team believes the worm dates back a year, or maybe even earlier.

*June 2010

The malware is first identified by a Belarus security company, Virusblokada, for its Iranian client.

[See Symantec Security Response, webpage, Sept 30, 2010]

*January 2010

Stuxnet infection begins, according to Symantec

*July 2009

Stuxnet infection begins, according to to Kasperksy

SEC Report On Flash Crash Blames Algorithmic Trading

According to CNN Money the SEC and CFTC report on the May 6 “flash crash” blames it on an unnamed trader’s algorithmic trading of E-Mini contracts, leading to two crashes – one in the broad index and one in individual stocks. [None of this actually makes sense to me. I thought there were already circuit -breakers in place since “Black Monday” to stop crashes. Two. How does a sell-off in the broad index cause steep plunges in particular stocks, but not in others? Three. Why would an order of this size not be broken up? Four. Can you tell I don’t believe this flimsy story?]

“A large investor using an automated trading software to sell futures contracts sparked the brief-but-historic stock market “flash crash” on May 6, according to a report by federal regulators released Friday.

In the 104-page report, staff members at Securities and Exchange Commission and the Commodity Futures Trading Commission said an unnamed investor used a trading algorithm to sell orders for futures contracts called E-Minis, which traders use to bet on the future performance of stocks in the S&P 500 index.

The contracts were sold quickly and in large numbers, according to the report, on a day when the market was already under stress due to concerns about the European debt crisis.

The selling was initially absorbed by “high frequency traders” and other buyers, the report said. But the algorithm responded to an rise in trading volume by increasing the number of E-Mini sell orders it was feeding into the market.

“What happened next is best described in terms of two liquidity crises — one at the broad index level in the E-Mini, the other with respect to individual stocks,” the report said.

In other words, the lack of buyers and the rapid selling of E-Mini futures contracts began to affect the underlying stocks and the broader stock indexes.

As a result, the Dow Jones industrial average plunged nearly 1,000 points, briefly erasing $1 trillion in market value, before regaining much of the lost ground to close lower. It was the largest one-day drop on record.

Waddell & Reed, an asset management and financial planning company based in Overland Park, Kan., has been widely reported as the investor behind the sell order. But the report identified only a “large fundamental investor.”

Waddell said in May that it was one of possibly 250 other investors trading the E-mini futures contract on the day in question, and that it did not intend to disrupt the market.”

Who’s Waddell & Reed? Its website has a brief self-description:

“Founded in 1937, Waddell & Reed is among the most enduring asset management and financial planning firms in the nation, providing proven investment and planning services to individuals and institutional investors.”

Huff-Po adds some details from the SEC report (which I’ll read in a bit):

The new “circuit breakers” are in effect until Dec. 10. Under the rules, trading of any Standard & Poor’s 500 stock that rises or falls 10 percent or more within a five-minute span is halted for five additional minutes. On May 6, about 30 stocks listed in the S&P 500 index fell at least 10 percent within five minute”

Now, why December 10? I’ve no idea.

None of this is new. Just after the crash, Zerohedge had the pertinent questions based on a report by Matthew Goldstein at Reuters, which included the following crucial information:

“Waddell’s contracts were executed at Barclays Plc’sBarclays Capital and later given up to Morgan Stanley, according to the document.”

Barclays and Morgan Stanley, of course, played powerful supporting roles in the ongoing looting of mainstreet by the big banks.

At least, no one’s saying it was a just a “fat-finger” anymore.

The Execution Of Furkan Dogan, 19, “terrorist”:

From Truthout.org:

“The report of the fact-finding mission of the Office of the United Nations High Commissioner for Human Rights (OHCHR) on the Israeli attack on the Gaza flotilla released last week shows conclusively, for the first time, that US citizen Furkan Dogan and five Turkish citizens were murdered execution-style by Israeli commandos.

The report reveals that Dogan, the 19-year-old US citizen of Turkish descent, was filming with a small video camera on the top deck of the Mavi Marmara when he was shot twice in the head, once in the back and in the left leg and foot and that he was shot in the face at point blank range while lying on the ground.

The report says Dogan had apparently been “lying on the deck in a conscious or semi-conscious, state for some time” before being shot in his face.

The forensic evidence that establishes that fact is “tattooing around the wound in his face,” indicating that the shot was “delivered at point blank range.” The report describes the forensic evidence as showing that “the trajectory of the wound, from bottom to top, together with a vital abrasion to the left shoulder that could be consistent with the bullet exit point, is compatible with the shot being received while he was lying on the ground on his back.”

Israeli Worm Behind Cyber-Attack On Iran? (Updated)

Update 1, October 1, 7:09 PM:

Now, some are arguing that the worm might have been developed elsewhere – say, India –  and blamed unfairly on Israel. Frankly, I don’t find this plausible.

Further links supporting the Israeli sabotage thesis include this Reuters piece describing Israel’s motives, assertions, and capabilities in regard to Iran:

HOW MIGHT ISRAEL ATTACK IRAN?

Overt or covert? Israel has been developing “cyber-war” capabilities that could disrupt Iranian industrial and military control systems. Few doubt that covert action, by Mossad agents on the ground, also features in tactics against Iran [ID:nLV83872]. An advantage of sabotage over an air strike may be deniability.

The blog warincontext has an excellent piece analyzing Israel’s motives for and ability to launch cyber attacks. It concludes that the mere evidence of Iranian vulnerability constitutes an effective blow in strategic terms, perhaps even avoiding the need for Israel to literally commit an act of sabotage.

ORIGINAL POST

Earlier we blogged about the Stuxnet worm attack on Iranian computer systems. Only a few countries had the capacity for it. Now come reports that a crack Israeli team may have been behind the worm and that its code concealed a biblical reference (hat-tip to reader DCN for telling me about Unit 8200):

“Computer experts have discovered a biblical reference embedded in the code of the computer worm that has pointed to Israel as the origin of the cyber attack.

The code contains the word “myrtus”, which is the Latin biological term for the myrtle tree. The Hebrew word for myrtle, Hadassah, was the birth name of Esther, the Jewish queen of Persia.

In the Bible, The Book of Esther tells how the queen pre-empted an attack on the country’s Jewish population and then persuaded her husband to launch an attack before being attacked themselves.

Israel has threatened to launch a pre-emptive attack on Iran’s facilities to ensure that the Islamic state does not gain the ability to threaten its existence.

Ralf Langner, a German researcher, claims that Unit 8200, the signals intelligence arm of the Israeli defence forces, perpetrated the computer virus attack by infiltrating the software into the Bushehr nuclear power station

Mr Langer said: “If you read the Bible you can make a guess.”

Computer experts have spent months tracing the origin of the Stuxnet worm, a sophisticated piece of malicious software, or malware, that has infected industrial operating systems made by the German firm Siemens across the globe.”

Read the rest of the piece at The Daily Telegraph.

What’s interesting to me is that when I was doing a little googling to find out about Stuxnet,  I came across a Microsoft page on it in July 2010 that listed Iran, India, Indonesia, and the US as the only countries in the world associated with the worm.

How State Subsidies Of Higher Education Kept India Illiterate

Atanu Dey: What “free” (state-subsidized) education has cost India

[While I disagree with his premise that public goods should be subsidized, Dey does make an excellent argument that the subsidy of higher education ended up being a subsidy of foreign corporations and economies. Yet another of the unintended consequences of statist benevolence….]

“India suffers from very low literacy even compared to other developing countries. Yet one gets to hear about the tremendous impact that Indian doctors, engineers and scientists have had around the world. This conveys the impression that the Indian schooling system works. I believe that that impression is wrong and that in fact the Indian school system is inefficient and biased against the poor.

Free Education

I spent many years the Indian school system and I must admit that I received very good schooling. My eleven years in a pretty good high school in Nagpur was practically free. I was given a scholarship during my bachelor’s degree in engineering. At IIT Kanpur, while doing a master’s degree in computer sciences, I received a stipend which was sufficient to pay for all normal expenses. I estimate that my entire education in India, including a master’s in computer science, cost me less than US$ 100 in today’s terms.

How is it that a poor society can afford to educate its children for free? I come from a middle class family and I am sure we could have afforded more than that. I am also sure that if the education had been priced at full cost, we could not have paid for it up front. [There is a way to circumvent this problem. See “Full cost pricing” at the end of this page.]

Someone else paid for my education. That is true for a very large number of people who are educated in India’s premier institutions–someone else paid.

Nagpur is a medium-sized city by Indian standards. It has a bunch of good high schools. You have to have a middle-class or better background to get into those because competitive pressures keep the poor out. But if you get in, and don’t goof off too much, you can do well in the competition for admission into a good engineering or medical college. And then you get heavily subsidized education in college. Armed with all the advantages, you fill out a bunch of applications, write the GRE and the TOEFL and off you go to the US, never to return.

Brain Drain

It was fashionable in the 1970s and 80s to refer to the migration of trained doctors, scientists and engineers to the advanced industrialized countries as a “brain drain.” Actually, it was a “resource drain” rather than a “brain drain.” India never really had a shortage of basic brains. There are hundreds of millions of basic brains in India. However it takes resources to train a basic brain and turn it into a useful brain. These scarce resources are lost to the economy when used to train brains that eventually migrate.

Just like capital flight from poor economies to the rich ones, the migration of trained manpower, human capital flight, is enormously expensive. It is an even more of a burden when the training is publicly funded. When a trained engineer migrates to the US, it is totally indistinguishable from a gift of US$ 100,000 from India to the US. Over the years, the total implicit subsidy from India to the US could be estimated to be of the order of hundred billion dollars.

Losses

When an educated person leaves India, there is a first-order loss to the economy if the education was publicly funded. There is no comparable first-order loss if private resources were involved in the training. But in either case, the economy loses the life-time stream of economic contributions that the migrant would have made. This is a second-order loss. There is what can be considered a third-order loss that is harder to estimate but whose impact may be the most damaging in the long run. This arises from publicly subsidizing higher education at the expense of primary education.

Primary education, somewhat like primary health care, has characteristics of what economists call a “public good.” The positive effects of primary education spill over into the larger economy more than that of higher education, which is more like a private good. Markets efficiently provide optimal quantities of private goods but are known to under-provide public goods. The market understandably fails in the case of primary education. The solution is straightforward: the public subsidy of primary education.

The essential point is that the subsidizing higher education is an inefficient use of resources which could have been used for primary education. And this distorted system has real-world consequences: the shameful neglect of primary education.

Dismal Statistics

The Indian constitution mandates universal primary education for all (see Article 8 of the Indian Constitution). Yet, 41% of children do not reach grade 5 in India. Compare that to some other countries:

   	  Gambia             20%
	  Mali               18%
          Senegal            15%
          Tanzania           17%
          Burkina Faso       25%

[Source: Human Development Report 1999. UNDP.]

Of the countries that rank lower than India in the human development index, only about four have higher percentage of children that do not reach the fifth grade. Mozambique does worse than India, for instance. But never mind small strange sub-Saharan African countries. Take Indonesia for example: only 11% of its children don’t go past the fifth grade. Or take Mexico with its 14% figure. Compare India with neighboring Sri Lanka with its 17%.

The failure of Indian primary education is hard to escape. Sixty years after India’s political independence, India is places 126th out of 175 countries ranked in the 2006 Human Development Report. India’s adult literacy rate is a dismal 61%, below Cameroon (68%), Angola, Congo, Uganda (67%), Rwanda (65%), and Malawi (64%). That 40% of today’s Indian adults cannot even “both read and write a short, simple statement related to their everyday life” implies that they did not get the equivalent of the most basic of primary education. Compare that to China’s 90% adult literacy. [Source: UNDP Human Development Report.]

Successful NRIs

The argument is often advanced that the Indian education system must be world-class. After all, doesn’t it produce world-class NRIs (non-resident Indians) like Vinod Khosla and Rajat Gupta? Yes, of course. And don’t they turn around and give millions of dollars to support the IITs? Yes, of course. Sure the NRIs send some money home. But what is the ratio of the amount India spends on their education to what these worthies send back home?

Even then, who could be so crass as to measure everything in terms of dollars? Surely there is something more important than money. Yes, there is. And it is the untapped human capital that India has in abundance and which it criminally neglects. It neglects them because the powers that be have it made under the current system and it serves their narrow purposes.

In practically every measure of education, India’s rank is so abysmal that it is depressing to even look at the figures. Even if the solution to India’s education problems were as little as a week’s worth of clean drinking water, India would still be in trouble. Around 60% of Indians don’t have access to clean drinking water.

For all our vaunted world-class scientists, doctors and engineers, India ranks miserably in the number of scientists and technicians it has: 0.3 such per 1,000 population. Compare that to: China 0.6, Islamic Rep of Iran 0.7, South Africa 1.7, Korea 2.9.

Hyperbole and Hubris

We in India lack many things. One thing appears not to be in short supply–the hyperbole and the capacity for self-delusion. We have pretences of being an information superpower. Our IT sector is supposed to make us great. It stretches the imagination beyond belief that this idea can be entertained by anyone. We account for less than 1% of the global $600 billion IT business. Remember we represent 17% of the world’s population. Even if we were to increase our share 10 times (and this is unreasonable by any account) we’d still be below the world average.

Judging the Indian education system based on a Chandrashekhar or a Ramanujan is misguided and delusional. It is like weighing a pinch of mustard seeds against a herd of elephants and declaring that the mustard weighs more. How do we manage to delude ourselves so? I believe that those doing the judging live in very rarified atmospheres. Their world is populated by jet-setting intellectuals and internet millionaires and H1-B visas and ecommerce and NRIs. Hard evidence to the contrary, it is more comforting to believe that we are not that badly off.

Is there any point in confronting the hard evidence, you may ask. Yes, there is. Unless we recognize the basic problem, examine it dispassionately, we are unlikely to even consider solving the problem. In a sort of defense through denial, we can go on with business as usual by declaring the problem does not exist. But the problem does exist. And the problem is not one that does not have wide ranging implications. The most devastating impact of our dismal educational system is that we are condemning ourselves to a future of exceedingly low economic development. If there is one thing that developmental economists have learnt, it is this: education is the most important factor in economic growth. Education has more impact on economic growth than natural resources, foreign investment, exports, imports, whatever. Neglect education and you may as well hang yourself and save yourself the pain of a slow miserable death.

So who paid for my education? It is the poor rural children, thousands of them, who paid for my education by losing their opportunity to become semi-literate. The system is tilted against them and unless there is a radical change in the way that education is funded, they will continue to pay the price for subsidizing the US for decades to come.

~~~~~~~~~~~~~~~~~~

FULL COST PRICING

A brief solution to the problem of full-cost pricing is easy to state. Price all higher education at full cost. If a year of engineering school costs Rs 3 lakhs, price it at that. Then give loans to every student that needs it to pay the price. The loan is repayable upon employment and in terms commensurate with the level of employment. If you earn big dollars in the US, pay in big dollars. If you work as a doctor in a small village in India, pay small amounts in rupees. Essentially, with the loan system in place, there is no need for public subsidies for higher education.”

Rahm Goes Back To Chicago..

Rahm Emanuel is being  reported as stepping down as White House Chief of Staff tomorrow.  Two close associates said that Emmanuel would be making an announcement over the weekend that he would be making a bid for Mayor of Chicago, now that Mayor Richard Daley will not be seeking reelection.

A piece at Slate sums up the reactions from the establishment and the “professional left.” To the former and to the media, Emanuel was a “fixer” who made things work. To such outlets as Daily Kos he was a Rasputin who sabotaged the progressive agenda.

But with no Rahm around, it’s not clear whom the left will have to blame for the failures of this administration.