New iPod Accessories

Just in case anyone was still in doubt that Apple’s iPod is going to slowly grow into a universal portable media server, Apple has just announced several new iPod accessories, including a voice recorder (microphone to turn the iPod into a dictaphone) and media reader (accepts various media cards and slurps the data onto the hard drive for later retrieval). The iPod isn’t the first hard-drive based MP3 player to offer these extras (Archos has had one for a while), but Apple goes one step further with automatic synchronization of recorded audio and stored pictures with iTunes and iPhoto respectively. Now if they can just add Bluetooth the iPod will be well on its way to becoming the personal server it’s destined to become.

New iPod Accessories Read More »

It was just a matter of time…

I just got my first automated blog-comment spam, attached to my post about artificial diamonds (I’ve since deleted it). Interestingly enough, the spam wasn’t meant for me or my readers but for Google — it was just random snatches of English peppered with the word “jewelry” and links to http://jewelry.lstor.com/, which produces more random phrases. No doubt the idea is to raise the pagerank of some real page that will go there later.

Wonder if this is what they mean when all those spammers keep telling me they can raise my Google ranking?

It was just a matter of time… Read More »

Thoughts on the recall…

When the California recall started I saw it as an end-run around the Democratic process and a way for Republicans to do over an election they lost. I’ve changed my mind. However the recall started, it ended as a clear message from the people of California.

Some statistics helped put this in perspective for me. First, an LA Times exit poll reports that 25% of self-described liberals and 30% of Democrats voted in favor of the recall. (Annoying but free registration required for that link — may I suggest username cypherpunks22, password cypherpunks.) A fifth of Democrats, more than 40% of independents and 69% of conservatives voted for Schwarzenegger.

As for this being a do-over of an election that was already won, the people of California (myself included) were not very happy about the choices we got in that election. Democrats were stuck with an unpopular incumbent, and Republicans were egged on by Davis himself to nominate a candidate too far from center to be electable. Our dissatisfaction in that election was demonstrated by the lowest voter turnout on record and a full 3% of voters leaving the governor slot blank. To quote Jim Hightower, if the Gods had meant us to vote they would have given us candidates.

That said, I think Davis was a scapegoat for a much broader problem with how California is being run. As Governor he gets the spotlight, but blame goes to all. To Davis for not leading through force of personality and bully pulpit in times of crisis. To our partisan legislature for gridlock, sweetheart deals and gerrymandering of districts to offer safe havens for both Democrat and Republican incumbents. To previous administrations and legislatures for screwing up our energy deregulation process, and the Federal government for failing in their energy oversight. And to us, the citizens of California, for letting them get away with it and for misguided or poorly written initiatives like Prop. 13 and term limits that keep our system from running as it should.

Now with record voter participation, we have thrown the bum out and replaced him with an unknown. Incumbents throughout the state are no doubt aware that the anger directed against Davis will focus on others unless things change. I hope our new Governor will be able to leverage this mandate for change to turn things around before that happens, for all our sakes.

References

Thoughts on the recall… Read More »

Remember to vote if you’re in CA

Don’t forget to go vote today if you live in California.

And just so I don’t leave this ludicrous affair without a single post, Schwarzenegger yesterday said he would address all charges of sexual harassment in detail after the election.

He has also promised that after the election is over he will start answering questions from non-entertainment California press, debate (former) opposing candidates without requiring questions be given in advance, and start forming a policy.

Remember to vote if you’re in CA Read More »

Misperceptions, the Media and the Iraq War

The Program on International Policy Attitudes at the University of Maryland and Knowledge Networks have just released a report that sheds a lot of light on the much-reported polls that show Americans have serious misconceptions about the facts surrounding the Iraq War. (PIPA’s press release and questionnaire are also available).

At the heart of the PIPA study are three questions:

  • Is it your impression that the US has or has not found clear evidence in Iraq that Saddam Hussein was working closely with the al Qaeda terrorist organization?
  • Since the war with Iraq ended, is it your impression that the US has or has not found Iraqi weapons of mass destruction?
  • Thinking about how all the people in the world feel about the US having gone to war with Iraq, do you think the majority of people favor the US having gone to war?

The answers, by the way, are “no clear evidence has been found,” “no weapons of mass destruction have been found,” and “the majority of people in the world do not favor the US having gone to war.” If you got at least one wrong don’t feel too bad: only 30% of people surveyed in three polls (June, July, and August-September) got all three correct.

The report is well worth reading, but here’s a brief summary of their findings:

Misperceptions, the Media and the Iraq War Read More »

NeoMedia coming out with portable price-checker

NeoMedia has just announced a service where you can take a picture of an ISBN code (the barcode printed on every book jacket) with a cellphone camera and be automatically brought the the Amazon.com page for that book. From their press release:

“Now, shoppers can take out their Nokia(R) 3650 camera phone at Barnes & Noble, Border’s, or just about any other book store, and just take a picture of the ISBN on the book to comparison shop at Amazon.com right on the screen of their wireless Web browser,” Jensen said. “It’s kind of a high-tech version of the Santa Claus at Macy’s(R) sending Christmas shoppers to Gimbels in the classic movie, ‘Miracle on 34th Street’,” he mused.

Gizmodo suggests this is Barnes & Noble’s worst nightmare, but I expect it won’t hurt the large chains, as their volume keeps prices fairly close to Amazon’s as it is. It’ll be harder on independent bookstores, but even then there’s a premium that people are willing to pay for a book that’s already in their hot little hands. That premium will be even larger than the usual amount people will pay for bricks-and-mortar convenience because the customer is already in the store — I expect a lot more.

The biggest question for me is whether “now is the time.” I first saw this kind of technology about 6 years ago, both in a class project at MIT and in Anderson Consulting’s (now Accenture‘s) Shopper’s Eye project, and even briefly looked at doing a startup in this area just before the crash. It never quite felt like the time was right for this to go mainstream because the technology wasn’t in the hands of enough consumers. Clearly NeoMedia thinks we’re getting close.

References

NeoMedia coming out with portable price-checker Read More »

CIA and ICT developing anti-terrorism training “game”

The CIA’s Counter-Terrorism Center (CTC) is working to develop training simulations with the help of the Institute for Creative Technologies, a center within the University of Southern California that specializes in combining artificial intelligence, virtual reality and techniques from the videogame and movie industries to create interactive training simulations. The company recently received accolades for their “Full Spectrum Warrior” project, which was designed as a training aid for the US Army but has also lead to a commercial videogame for the X-Box. The Army project uses material developed with the Army Infantry School at Fort Benning and a rich AI engine to run trainees through both military and peacekeeping scenarios. For example, in one scenario the trainee plays an officer in charge of a unit that has just been involved in a traffic accident between a tank and a non-English-speaking civilian. If approved, the CIA’s simulation would allow analyst trainees to play themselves or the part of terrorist cell leaders, cell members, money-movers and facilitators.

The Washington Times, who broke the story, is highly critical of the project, comparing it to Vice Adm. John Poindexter’s ill-received Idea Futures project and quoting unnamed military officials and other critics who call it “a ridiculous and absurd scheme that makes Poindexter’s project look good in comparison” and suggest that “the key issue here is the CTC misspending funds on silly, low-priority projects, exactly the kind of thing that forced Admiral Poindexter to resign.” A follow-up article, also in the Washington Times, quotes former Georgia congressman Bob Barr (R-GA) as saying “Perhaps this is the reason we were surprised by September 11. If it weren’t so serious, it would be comical… What we ought to be doing is focusing our money and attention in identifying terrorists and their associates so we can be on the watch for these characters, not playing video games.” The Sydney Morning Herald was slightly less critical, but also linked the project with Poindexter’s projects.

It’s entirely possible that this project is too expensive (the CIA has not revealed the price tag) or that the simulation is in some way teaching the wrong lessons. However, the main criticism seems to be of the form “the CIA is wasting time playing video games,” which is patently absurd. Simulation role-playing has been an effective training tool in both the military and business for decades, and in fact much of the technology now seen in video games was originally developed for training U.S. Army officers. To suggest that the CIA should be out catching terrorists instead of playing video games is like suggesting the U.S. Army should be out fighting wars instead of wasting their time doing training exercises consisting of “running around with toy guns playing capture the flag.”

It’s pretty clear that there’s a thicket of political wrangling going on behind the scenes, and the Times story is a salvo fired by people who want this CIA project canceled. I’ve no idea whether this is a case of fighting over scarce funding, vengeance against the CTC, or an honest attempt to scuttle a project that won’t provide good training, and I won’t even begin to speculate. Hopefully someone with a better understanding of the ins and outs of intelligence and military politics (like Phil Carter at Intel Dump) will weigh in on this before long.

CIA and ICT developing anti-terrorism training “game” Read More »

TSA still pushing on CAPPS II

It seems the Transportation Security Administration is still determined to go forward with their test of the Computer Assisted Passenger Prescreening System (CAPPS II) with live data, even if it means forcing airlines to cooperate. Airlines are understandably hesitant, since Delta Airlines withdrew support after facing a passenger boycott and JetBlue is now facing potential legal action for handing over passengers’ data to a defense contractor without passenger knowledge or consent.

For those who haven’t heard about CAPPS-II, the idea is to replace the current airline security system where passenger’s names are checked against a no-fly list and people with “suspicious” itineraries like one-way flights are flagged for extra search. The TSA has released a disclosure under the Privacy Act of 1974, and Salon published a nice overview on the whole debate a few weeks ago. The ACLU also has a detailed analysis. Extremely briefly, the new system would work like this:

  1. Airlines ask for your Name, Address, Phone Number and Date of Birth.
  2. That info plus your itinerary goes to the CAPPS-II system, which
  3. sends it to commercial data services (e.g. the people who determine your credit rating) who
  4. send back a rating “indicating a confidence level in that passenger’s identity.”
  5. CAPPS-II sends all the info to the Black Ops Jedi-Mind-Reader computer that was provided by aliens back in 1947.
  6. The Black Ops computer comes back with a rating of whether you are or are not a terrorist, ax murderer, or likely to vote against the President.
  7. Based on both identity and threat ratings, the security guard either gives you a once-over, strip-search, or shoots you on sight (actually, just arrest on sight).

Number 6 is the part that really scares people, because the TSA refuses to say anything about how the (classified) black box computer system will identify terrorists. It could be based on racial profiling, political ideology, or i-ching and no one would ever know.

There’s a lot of speculation that the whole “airline security” story is just an excuse to collect travel information from everyday citizens for use in something akin to the Total Information Awareness project that was just killed (or at least mostly just killed) by Congress last week. I’m of two minds on that theory. On the one hand, I can’t believe the people at the TSA would really be so stupid as to think something like CAPPS-II would work for the stated purpose, so they must have ulterior motives. On the other hand, maybe I’m being too generous and they really are that stupid, or at least have been deceived by people a little too high on their own technology hype. Of course, there might be a bit of both going on here.

Too many details are left out of the TSA’s description of CAPPS-II to do a full evaluation, but even with what they’ve disclosed there are some huge technological issues:

  • The commercial database step (#4) is to verify that you are who you say you are. The classified black-box step (#6) is to verify that the person you say you are is not a terrorist. This means a terrorist only has to thwart one of the two checks: he either steals the identity of a mild-mannered war hero who is above suspicion, or he gives his real identity and makes sure he doesn’t raise any red flags himself. Since no biometric info (photo, fingerprints, or the like) is used, it would be trivial to steal someone else’s name, address, phone number and birth date and forge a driver’s license for the new identity.
  • Like all automatic classifiers, CAPPS-II needs to be tuned to trade off the number of false positives (innocent people arrested) vs. false negatives (terrorists let through with just a cursory search). Make it too sensitive and every third person will trigger a request for a full search (or worse, arrest), slowing down the security lines. Make it too lax and terrorists will get through without giving up their nail files. The trouble is that airports screen over a billion people a year, and yet even with our supposed heightened risk these past two years far fewer than one in a billion is a terrorist who plans to hijack a plane. Given those numbers, even if our CAPPS-II system correctly identified an innocent person 99.99999% of the time, we would still arrest 1000 people per year due to false information. And with a 99.99999% accuracy requirement on false positives, the odds are good that even Jedi-mindreading alien technology won’t have a great false-negative rate. This isn’t to say risk-assessment has no effect — it may still give better odds than the system we use currently — but most of the benefit from our security screening comes from the added random risk of being caught that a terrorist faces. And that brings us to the third technical problem: intelligent opponents.
  • Standard classification is a pattern recognition problem. A computer is given large amounts of data and expert knowledge, and tries to predict what class a sample (in this case, a passenger) falls into. Classification of intelligent adversaries is different though — it leaves the realm of normal pattern recognition and enters into game-theory. Once this happens it’s a constant arms (and intelligence) race: terrorists commit 9/11 with one-way tickets, so we double-search people with one-way tickets. So all but the stupidest of terrorists now buy round-trip tickets, thus giving them even better than random chance to get through with just a once-over. Of course, we know that’s what they would do, so we should switch to letting one-way tickets through and double-search round-trip tickets, at least until the terrorists catch on and change their plans. (Surely I cannot choose the wine in front of me.) There is a solution to all this madness: completely random selection of passengers for extra screening cannot be gamed in this way. Anything else and it become a question of who can figure out the other side’s profile faster, and given an intelligent foe who can probe the system to his heart’s content, I know who I’d bet on in that race.

Given that Congress has just moved to delay CAPPS II until the General Accounting Office makes an assessment, I can only hope they’ll have similar questions and concerns. This system is either lunacy or a boondoggle to keep a database on the travel habits of every single American — neither is a comforting option.

TSA still pushing on CAPPS II Read More »

Breaking the brick

Intel’s Personal Server project, lead by Ubiquitous Computing long-timer Roy Want, got some press this past week after it was shown at the Intel Developer Forum. The prototype is a 400MHz computer with Bluetooth, battery and storage, all about the size of a deck of cards. No screen and no keyboard — I/O is handled by whatever devices happen to be around, be they the display and keyboard on your desk, the large-screen projector in the conference room or your portable touch-screen. This concept isn’t new; it’s something that researchers in Ubiquitous Computing and Wearable Computing (including Roy) have been talking about for over a decade. But it is the right concept, and Moore’s Law is finally bringing it to almost within reach.

There are three main reasons why this is the Right Thing(tm):

  • Your hands aren’t getting smaller. Handheld computers are now small enough that the limiting factor is screen and button size. Since our hands aren’t getting any smaller, we’re pretty much at the limit for everything-in-a-single-brick handhelds, at least for current applications. One of the ways out of that box is the wearable computing approach, where interfaces are spread around the body like clothing or jewelry. Displays are shrunk by embedding them directly into the glasses, tiny microphones are used for speech recognition, micro cameras and accelerometers are used for for gesture and context recognition, and specialty input devices such as medical monitors get used instead of more generic input devices. One of the big difficulties with wearables is all the wires leading from the CPU/Disk/Battery unit to the I/O devices, and in fact this problem was a big motivating force behind the IEEE 802.15 short-range wireless standards, which include Bluetooth. Wireless isn’t a complete solution (you still have to worry about powering your I/O devices) but it’s a start.

    The other way to break the hand-size limit is the UbiComp approach: use whatever interfaces are in your surrounding area. When I’m at my desk I want to use my nice flat-panel display and ergonomic keyboard, not my black-and-white cellphone LCD. When I give a presentation I want to use the conference hall’s projector. I don’t need a keyboard at all, just enough to launch my Keynote presentation and change slides. Roy naturally leans towards this second approach, but as I’ve argued before the Ubicomp and Wearables approaches work well together; there’s no need to choose.

  • Always the right tool for the job. Another advantage to breaking the CPU from the I/O is it gets around an inherent conflict in interface design. On the one hand, designers will tell you that you always want the interface to fit the task. Use a hammer to drive nails and a screwdriver to turn screws, and all that. But in the mobile world you don’t want to carry around your cellphone, PDA, MP3 player, two-way pager, camera and laptop everywhere you go. When it comes to mobility, most people choose to carry a Swiss Army knife instead of a full toolchest, even though the one-size-fits-all interface won’t ever be quite right for the task. (That’s why I still carry my Danger Hiptop, which is great for text messaging but feels like I’m holding a bar of soap to my ear when I use it for voice.) When you break the brick, as it were, you can use one CPU, main battery, network connection and storage for all your devices. Then just bring whatever interfaces you need for whatever you tasks you expect that day, and use interfaces in your environment when they’re available.

  • Thin clients don’t grow with Moore’s Law. An alternative to having your personal CPU with you at all times is to run a thin client that has just enough smarts to talk to a server over wireless. The server then does all the heavy lifting. The trouble with this approach is that thin clients rely mainly on two resources: wireless bandwidth and the rather significant battery power needed to get to the nearest cell tower. The trouble is, these are the two resources that are growing most slowly. Since 1990, the RAM in mobile computers has improved a hundred-fold, CPUs 400-fold, and disk-space a whopping 1200-fold. In that same time, long-haul wireless speed has improved only 20-fold and battery efficiency only three-fold. (Thanks to Thad Starner for those numbers.) And, of course, thin clients don’t work when you’re in a wireless deadzone.

It’s not clear when Intel (or Apple or Sony for that matter) will finally come out with a successful Personal Server style product. The hardware is just one necessary piece to the puzzle, with resource discovery, communication standards, good interface design and of course the all-important “killer app” to bring it all together. But in spite of the hurdles yet to come, this is the right approach. I’m glad to see Intel is giving it the support it deserves.

Breaking the brick Read More »

ISWC registration deadline this Friday

As a reminder for those who are interested in wearable computers, the early registration deadline for the 7th IEEE International Symposium on Wearable Computers is this Friday, September 26th. You can check out the advance program here.

I’ll be co-teaching the Introduction to Wearable Computers tutorial with Thad Starner, and am also tutorials chair and on the program committee.

ISWC registration deadline this Friday Read More »