Category: World

  • Would Turkey in the Shanghai Co-op Cause a Global Power Shift?

    Would Turkey in the Shanghai Co-op Cause a Global Power Shift?

    By Jeff Uscher, Contributing Writer, Money Morning – February 15, 2013

    Is Turkey about to join the Shanghai Cooperation Organization (SCO)?

    After years of delay on its application to join the European Union (EU) as a full member, Turkey has made overtures to the SCO as an alternative to the EU.

    Turkish Prime Minister Recep Tayyip Erdogan said after a meeting with Russian Prime Minister Vladimir Putin that Turkey was seriously considering becoming a member of the SCO instead of continuing its efforts to join the EU.

    “The European Union needs to stop stalling us,” Erdogan said. “We have a strong economy. I told [Putin], ‘You should include us in the Shanghai Five [the former name of the SCO] and we will say farewell to the European Union.’ The Shanghai Five is much better off economic-wise. It is much more powerful. We told them, “If you say come, we will.’”

    What’s the Shanghai Cooperation Organization?

    The SCO’s full members are China, Russia, Kazakhstan, Kyrgyzstan, Tajikistan and Uzbekistan. Mongolia, India, Iran and Pakistan have observer status in the SCO while Turkey is a dialogue partner along with Sri Lanka and Belarus.

    Originally formed in 1996 to demilitarize the border between China and the former Soviet Union, the SCO was expanded in 2001 to include Uzbekistan.

    According to a background study by the Council on Foreign Relations, the SCO has the potential to be an important body for regional energy and security cooperation in Central Asia, but has so far not achieved anything substantial.

    Both China and Russia have secured bilateral agreements with other SCO members to build pipelines from the energy-rich Caspian Sea region to their respective home markets but this has taken place outside of the SCO.

    “The competing efforts of Russia and China to secure influence in the region are a potential obstacle to extensive SCO energy cooperation,” the Council on Foreign Relations concluded.

    If genuine energy cooperation could be achieved by the SCO, particularly if it included Iran, that would be a boon for Turkey, which depends on imported energy to fuel its rapidly growing economy.

    Would SCO Bid Affect Turkey’s NATO Status?

    Turkey is a member of NATO, while the SCO is seen as acting as a counterweight to American interests in Central Asia – if not outright anti-American.

    The SCO has called for U.S. troops to leave the region but the U.S. has military bases in several Central Asian countries, including SCO members Kyrgyzstan and Uzbekistan, to support the war in Afghanistan.

    Although those bases are subject to bilateral agreements with the countries involved and not with the SCO, the issue of what happens to those bases when the U.S. withdraws from Afghanistan at the end of 2014 will be a thorny one.

    Of course, the U.S. has a major military presence in Turkey. If Turkey joins the SCO, what will happen to the U.S. bases there? Will Turkey want to withdraw from NATO?

    As the U.S. State Department said, if Turkey joins the SCO, it will be “interesting.”

    SCO a Cover for Big Power Diplomacy?

    Many experts feel that the SCO can never be an effective security or energy cooperative organization because of its membership.

    Russia has a proprietary interest in the Central Asian countries Kazakhstan, Kyrgyzstan, Tajikistan and Uzbekistan, which used to be part of the Soviet Union, and clearly wants to keep rival China out.

    For its part, China wants to get access to the energy-rich area around the Caspian Sea which, according to the BP Energy Survey, holds about 21% of the world’s oil and 45% of the world’s natural gas.

    Would Russia or China really welcome Turkey, a significant power with regional ambitions of its own, into the SCO?

    That, too, would be “interesting.”

    via Would Turkey in the Shanghai Co-op Cause a Global Power Shift? – Money Morning.

  • Adobe confirms Reader flaws targeted in ‘Turkey visa’ PDF zero-day attacks

    Adobe Firmasının Açıklaması : “Turkey Visa” isminde gönderilen dosya virüs içermektedir. Dosyayı açmayın.

    Summary: Attacks on Adobe Reader are a truly European affair with Italian JavaScript, Spanish domains and Irish IP servers.

    Liam Tung

    By Liam Tung | February 14, 2013 — 11:15 GMT (03:15 PST)

    Adobe has confirmed there are two previously undocumented flaws in the latest updates of its PDF products Adobe Reader and Acrobat that hackers were exploiting with a Turkish visa form.

    The two vulnerabilities (CVE-2013-0640, CVE-2013-0641) affect Adobe Reader and Acrobat XI (11.0.01), X (10.1.5) and 9.5.3 and earlier for Windows and Mac, Adobe said in an advisory on Wednesday.

    Adobe said the targeted attacks were designed to trick Windows users into clicking on emailed malicious PDF attachments, however the flaws affect the products for OS X systems as well. The company is working on a fix, it said.

    At present there are few clues to who the attackers are. However, details provided to ZDNet from FireEye, the security firm that discovered the Adobe Reader and Acrobat exploits this week, suggest it is a European campaign aimed at would-be travellers to Turkey — a popular holiday spot for Europeans seeking winter sun.

    A FireEye spokesperson told ZDNet on Thursday that the lure was PDF file labeled “Visaform Turkey.pdf”, which is required by all foreign travellers to the country.

    The callback from infected machines reveal that malware is communicating with a Spanish domain hosted on Irish IP servers while the JavaScript embedded in the maliciously crafted PDF is written in Italian.

    FireEye has released an updated technical report here, detailing how the exploit circumvents some of the anti-exploitation technologies, such as sandboxing, that Adobe has been building into Reader and Acrobat X and XI.

    It appears that security hardening measures Adobe introduced through “Protected View” in Reader and Acrobat XI to prevent such exploits will stop the exploit being used. Protected View was one of the main features Adobe touted at the product’s release last year, however Adobe said in its advisory that users will need to manually enable it for the protective measure to actually work.

    “Enterprise administrators can protect Windows users across their organization by enabling Protected View in the registry and propagating that setting via GPO or any other method,” the software company added.

    Besides this option, users could install alternative readers, such as (via CNET) Foxit, PDF-Xchange Viewer, Sumatra and Nitro among others.

    Topic: Security

    via Adobe confirms Reader flaws targeted in ‘Turkey visa’ PDF zero-day attacks | ZDNet.

  • Genetic Origins of the proto Turkic Peoples and their Relatives :Prof Spencer Wells : VIDEO

    Genetic Origins of the proto Turkic Peoples and their Relatives :Prof Spencer Wells : VIDEO

    SPENCER WELLS

     

    Published on Mar 26, 2012

    Genetic History of Central Asia (Turkestan) and genetic migrations. Blood relationships of Turks and Native Americans. Genetic link between Turks, Native Americans, Indians, Europeans, Asians.

    Konusu; insanlığın bilinen en eski genetik kökeninin, Kazakistan’da yaşamakta olan bir kişide olduğu..

     

    (Bu arada, kan ile, kemik ile ilgilenen bizler olsaydık “kafatasçı”, “faşist” olarak etiketlendirilirdik, oysa ilgilenenler yabancı olunca bunun adı, “bilimsel çalışma” oluyor)

     

     

    Prof. Spencer Wells,  bir genetik antropoloji araştırmacı. DNA’yı esas alarak, insanın dünya üzerindeki yayılımını araştırmakta. 100 bin yıl içindeki göç hareketleri ile ilgilenmiş.

     

    Hemen başta söylediği: Yaşam Afrika’da başlamışsa da, bakılıp büyütüldüğü yer, Orta Asya’dır. 

     

    Bu video’da Spencer Wells, Kazakistan’da yaşamakta olan Niyazov’a giderek tanışıyor ve anlatıyor:

     

    Wells’e göre; insanlığın ortaya çıkışı 60 bin yıl kadar önce Afrika’dan. Yine ona göre,  45 bin yıl kadar önce asıl çoğalma ve yayılma Orta Asya’dan olmuş.

     

    Niyazov’un DNA’sını ve kanını incelemiş ve Niyazov’un 2 bin kuşaktır etnik saflığını koruduğu anlaşılmış.

    Tüm Avrupa, Rusya, Kızılderililer ve kuzey Hintliler dahil, 1 milyardan fazla insanın atasının bu Orta Asyalı Niyazov’un ailesinden geldiği genetik antropoloji ile belirlenmiş.  

     

    Wells Kazakistan’daki 2 bin kişiden kan ve DNA örneği almış. Bunlardan Niyazov’unki olağan dışı  önemli. Çünkü Niyazov 40 bin yıl önce burada yaşamış olan bir aileden gelmekte.

    Genetik olarak M 173 –yani Orta Asya işareti- denilen DNA damgasını taşıyan ilk kabileden bir üye, Niyazov. Başka bölgeden biri ile karışma olmamış. Bu özel damganın tüm kuzey yarımkürede yayıldığı ve 1 milyardan fazla insanın DNA’sında bulunduğu bilinmekte. Niyazov’un atalarından gruplar kuzey yarım küreye yayılmışlar; Avrupa, Rusya, kuzey Hindistan, Asya’nın bazı bölgeleri, kuzey ve güney Amerika nüfusunu oluşturmuşlar. Kabilenin geri kalan üyeleri Kazakistan’daki aynı yerde yaşamaya devam etmekte.

     

    Wells’e göre Niyazov 2 bin kuşak (40 bin yıl) burada yaşamakta olan bir aileden gelme.

     

    Y-kromozomuna dayalı çalışmalar yapıldığında Niyazov’un varlığı, çok büyük önem taşımakta.

     

    (Wells bu video’da Türk sözcüğünden hiç bahsetmemekte. Niyazov’a bir ara, “Uygurlar, Tacikler, Pamirler’den önce..” diye bahsederken hemen keser,  “herkesten önce DNA’nın ne olduğunu biliyor musun?” diye sorar. “Evet” yanıtını aldıktan sonra kaldığı yerden devam etmez)

     

    Wells, Uygur’u, Pamir’i, Tacik’i sıralarken o anda Niyazov’un hafifçe, “Turki..” dediği duyulur ama devamı gelmez, havada kalır…

     

    Wells Türk sözcüğünü hiç ağzına almaz ama, “gece 9.’da doğu Kürdistan’dan yola çıktık” diye bahseder; artık Kürdistan’ın doğusu neresiyse?!

     

    Bu sıralarda ülkemizde birileri Türksüz anayasa için harıl harıl çalışırken, bir yerlerde başka birileri de Türksüz tarih, Türksüz bir dünya hazırlamak için var güçleriyle çalışmakta…

     

    Oysa İstanbul üniversitesinin hocalarından Alman Prof. Neumark demişti ki:

    “Tarihten Türk çıkarılırsa tarih kalmaz. Osmanlı arşivi tam olarak ortaya çıkarsa, bugünkü tarihlerin yeniden yazılması gerekir”.

     

    Dostlukla,

    LALE GURMAN

    ============================

    Spencer Wells

    Image of Spencer Wells
    • From the Author
    •  |
    • From Wikipedia

    Spencer Wells is an Explorer-in-Residence at the National Geographic Society and Frank H. T. Rhodes Class of ’56 Professor at Cornell University. He leads the Genographic Project, which is collecting and analyzing hundreds of thousands of DNA samples from people around the world in order to decipher how our ancestors populated the planet. Wells received his Ph.D. from Harvard University and conducted postdoctoral work at Stanford and Oxford. He has written three books, The Journey of Man, Deep Ancestry, and Pandora’s Seed. He lives in Washington, D.C. with his wife, a documentary filmmaker.


    Books by Spencer Wells (See all books)

     

    • All Formats
    • Kindle Edition
    • Hardcover
    • Paperback
    • More Options  
    1-6 of 6
    Sort:

     

    The Journey of Man: A Genetic Odyssey
    The Journey of Man: A Genetic Odyssey
    Paperback: $10.17 Kindle Edition: $11.99
    February 17, 2004
    4.3 out of 5 stars  carrot. V192251235 (79)
    Expand See Book Details
    Deep Ancestry: Inside The Genographic Project
    Deep Ancestry: Inside The Genographic Project
    Paperback: $10.36 Kindle Edition: $9.39
    November 20, 2007
    3.8 out of 5 stars  carrot. V192251235 (51)
    Expand See Book Details
    Pandora's Seed: The Unforeseen Cost of Civilization
    Pandora’s Seed: The Unforeseen Cost of Civilization
    Hardcover: $10.40 Kindle Edition: $11.99
    June 8, 2010
    3.5 out of 5 stars  carrot. V192251235 (31)
    Expand See Book Details
    Deep Ancestry, 2nd Edition: How DNA Reveals the Roots of Your Family Tree
    Deep Ancestry, 2nd Edition: How DNA Reveals the Roots of Your Family Tree
    Kindle Edition: $9.99
    December 31, 2035
    Expand See Book Details
    Pandora's Seed: Why the Hunter-Gatherer Holds the Key to Our Survival
    Pandora’s Seed: Why the Hunter-Gatherer Holds the Key to Our Survival
    Paperback: $9.63
    September 13, 2011
    4.6 out of 5 stars  carrot. V192251235 (5)
    Expand See Book Details
    Pandora's Seed: Why the Hunter-Gatherer Holds the Key to Our Survival (Penguin Press Science)
    Pandora’s Seed: Why the Hunter-Gatherer Holds the Key to Our Survival (Penguin Press Science)
    Paperback: $25.25
    July 1, 2011
    Expand See Book Details

     

     

     

  • Ten Things to Know About Voting Technology

    Ten Things to Know About Voting Technology

    1. Voting is not like any other transaction.

    The first remark I usually hear on the subject of Internet voting is, “I
    can shop online, I can bank online, why can’t I vote online?” The answer
    is that voting is not like those transactions. Credit card companies and
    banks tolerate a degree of fraud in all of their transactions. We could
    not similarly accept some degree of fraud in the voting process. And,
    when you make a deposit to your checking account over the Internet, your
    bank sends you back a message confirming the transaction and the amount
    of your deposit. But if we are to preserve our right to cast a secret
    ballot, then we would not want to vote online and have our election
    agencies send back to us a note confirming our choices.

    Casting a secret ballot in a fair and democratic election is, in fact,
    unlike any other kind of transaction. Think about it: each person only
    gets to vote once, in a limited time frame, and every voter must be
    authenticated while at the same time preserving that voter’s right to
    cast a secret ballot. Voters must be confident that their votes have
    been accurately recorded and the voting system must create an audit
    trail in case a recount is needed that also preserves the secret ballot.
    It is not impossible to build an online voting system, but it’s
    important to realize that to do so creates unique challenges because
    voting is unlike any other transaction.

    2. There are two kinds of Internet voting: polling place Internet
    voting, and remote Internet voting.

    It’s important to distinguish between polling place Internet voting and
    remote Internet voting, which is voting from home or work. Both remote
    and polling place Internet voting use computers in the voting process
    and both use the Internet to transfer ballots to the central counting
    center. The important difference between the two methods is ownership of
    the computer that’s acting as a voting machine. With polling place
    Internet voting, the voting machine is owned and controlled by election
    officials. With remote Internet voting, the voting machine is owned and
    controlled by either the voter or their employer.

    In our January 2000 report, the California Internet Voting Task Force
    made this important distinction between polling place and remote
    Internet voting, and concluded that while polling place Internet voting
    can and should be explored, remote Internet voting could greatly expose
    the voting process to fraud. For this reason we made no prediction of
    when, if ever, remote Internet voting would be possible.

    3. Remote Internet voting is highly susceptible to voter fraud.

    A voting machine owned and maintained by a county election office can be
    controlled, but a third party machine, owned by the voter or their
    employer, is highly susceptible to attack. For example, a remote
    Internet voter could unknowingly download a “Trojan Horse” or virus that
    sits on the voter’s computer. When the voter opens his Internet ballot
    on his computer desktop, at that point the ballot is no longer encrypted
    and would therefore be susceptible to manipulation by a virus or
    malicious code. A Trojan horse could then, for example, rearrange the
    appearance of the voting boxes on the ballot, leading you to believe,
    for example, that you voted for the incumbent but actually returning
    your ballot with a vote for the challenger. You would then send your
    ballot back encrypted to your election agency, and since we cast a
    secret ballot neither you nor your election agency would know that your
    vote had not been properly recorded.

    If you think this scenario is far-fetched, consider this: already some
    Internet users have unknowingly downloaded programs known as “spyware”
    that keep track of their computer usage and page visits without their
    knowing it and report this information via the the user’s Internet
    connection to commercial and marketing interests. Already the vast
    majority of Internet users visit web sites that set “cookies” in their
    web browsers used to track their online movements. Few even know what a
    cookie is, let alone know how to remove one or how to set their browser
    preferences to refuse them altogether.

    Consider also the fact that remote Internet voting will give rise to a
    whole new wave of voter fraud attacks from people living in foreign
    countries as well as those who previously had no interest in elections
    but enjoy a good hacking challenge. The Pentagon detected more than
    22,000 attempts to probe, scan, hack into, infect with viruses or
    disable its computers in 1999 alone, and anticipates the number of
    attacks will only increase with time. And let’s not be naive about our
    country’s record on voter fraud. Though voter fraud is not as much of a
    problem here as it has been in other countries, history shows that in
    close races some campaigns do resort to cheating in order to win.
    Automating the voting process gives one person the ability to make a
    much greater impact when they attempt to cheat.

    When you consider the likely increase in attempts at voter fraud,
    combined with the low level of computer literacy we have now, both among
    users and the election community, it is unrealistic to think we are
    ready for remote Internet voting anytime soon.

    4. Remote Internet voting may erode our right to cast a secret ballot
    and lead to political coercion in the workplace.

    Currently we cast our ballots in a private polling booth, and in some
    counties voters place their ballots inside an envelope so that poll
    workers and other voters won’t catch a glimpse of their votes before
    they drop their ballot into the ballot box. Polling place Internet
    voting can preserve the secret ballot and the sanctity and privacy of
    the polling place. Remote Internet voting, on the other hand, can lead
    to voting from work, which is where most of us connect to the Internet
    during the day. And for many of us, our workplace computers are far from
    private.

    If we were to vote from work, our coworkers or supervisors might
    casually or deliberately watch us as we make our choices. Even if they
    aren’t standing over your shoulder, the company intranet could easily
    retain a copy of your ballot. These are not insurmountable obstacles,
    but it does mean that if we allow for voting in the workplace, we’ll
    need new policies to protect employees from potential political coercion
    in the workplace. New policies would need to be developed to protect the
    right to cast a secret ballot in the workplace on your employer’s
    computer, and such policies would contradict with existing laws that
    assert an employer’s right to review any material their employees create
    on a company computer, including personal email. Simply put, voting in
    the workplace could be a nightmare for employers and employees alike,
    and if we were to move forward with remote Internet voting in the future
    we’d be wise to prohibit voting in the workplace altogether.

    5. Remote Internet voting poses a threat to personal privacy.

    How would we authenticate remote Internet voters? Authenticating voters
    is one of the primary steps we take to protect our elections from fraud.
    We have to make sure that people are eligible to vote, vote only once,
    and cast their own ballots. Using a pin number in combination with other
    pieces of personally identifiable information, as the Arizona Democratic
    Party did in its March 2000 Primary, is not sufficient to protect our
    elections from vote selling, vote swapping, and voter fraud. Digital
    signatures may be an option, and we have a long way to go before that
    technology is widely understood and accepted by the public, and digital
    signatures still cannot protect Internet voters’ ballots from a Trojan
    horse attack.

    The most secure way to authenticate voters is to use biometric scanning
    procedures, such as retinal or finger-printing scans. I, like many
    Americans, find such security measures invasive, and believe it would be
    unwise to sanction government agencies to begin collecting sensitive
    biometric data on American citizens. There is a general rule I follow:
    for every degree of convenience we gain through technology there is
    usually a corresponding loss of privacy. Remote Internet voting would
    make voting more convenient, but that convenience will come at a price
    that, in my opinion, is too high.

    6. There is a huge politics and technology information gap.

    In my seven years of working in politics and technology, I have found
    there are unfortunately too few people who have a working knowledge of
    both fields. This huge gap between politics and technology appears to be
    widening, not closing over time, and is becoming increasingly evident
    around the issue of Internet voting. Many of the political experts who
    talk about Internet voting don’t appreciate the technological dangers of
    voting online. Then there’s the technologically-savvy but politically
    naive people who say, “Wouldn’t it be great if we could vote on
    everything?”, failing to understand either the benefits of
    representative democracy or the complexities of the voting process. If
    we are going to close the politics and technology gap, we are all going
    to have to make a great effort to educate the experts and bring people
    from diverse fields together online and offline through conferences and
    public meetings. It’s going to take a lot of work, but if we address the
    politics and technology information gap it will make for better public
    policy in every area impacted by technology.

    7. There is a generational technology gap.

    Older people are not as familiar with new technology as younger people
    are, and surveys show that younger voters are sometimes intimidated by
    existing voting technology. The generational technology gap turns up in
    many places. The Democracy Online Project’s post-2000 general election
    survey found that the younger the voter, the more likely they used the
    Internet to access election information.

    Internet voting polls also find that younger voters find the idea of
    Internet voting much more appealing than older voters do. For example, a
    poll conducted by ABC News in 1999 found that only 19 percent of
    Americans age 65 and over would support Internet voting even if it could
    be made secure from fraud. Similarly, a year ago the Public Policy
    Institute of California surveyed Californians and found that public
    support for Internet voting is highest among 18-34 year olds (59
    percent) and lowest among those 55 and over (27 percent). There is no
    doubt that new technology provides an unprecedented opportunity to
    engage alienated young people in the democratic process, but we must be
    careful that we don’t alienate older voters along the way.

    8. Changing technology alone isn’t enough; voter education is also
    needed.

    It made me angry to hear people ridicule Florida’s voters for casting
    their votes incorrectly. As an experienced voter educator, it no longer
    surprises me to hear about the elements in our voting process that
    voters find confusing. There is an intolerable lack of reliable,
    nonpartisan voting information available for U.S. voters; most of what
    passes for election information comes in the form of campaign mailers
    and thirty second spots designed to confuse, manipulate or scare voters
    and do just about anything but inform them.

    We take so much for granted when it comes to voter education, and it is
    shameful that the United States poses as a model democracy for other
    countries to emulate when we make virtually no effort to educate our own
    voters and prepare them to vote on Election Day. We can begin to address
    this problem by appropriating federal and state funds to nonpartisan
    voter education efforts. We already spend $31 million a year on the
    National Endowment for Democracy to advance democracy abroad; we can
    certainly afford to spend at least the same amount to advance democracy
    at home.

    9. Transparency in the voting process fosters voter confidence and
    security.

    Whatever changes we make to our voting technology, we must not sacrifice
    the trust that is gained by having a transparent vote casting and
    counting process. The old voting technology that we are talking about
    replacing, in particular the punch card ballot, functions in a way that
    is transparent to the voter. You mark or punch your ballot, you drop it
    into a locked box, and the box is transported to the central counting
    center by pollworkers where the public can (and often does) watch the
    counting of ballots.

    Now, as we consider introducing computers into the voting process, we
    must look at how transparency may be affected. Whether we are talking
    about Internet voting or any kind of computerized voting, one inevitable
    result is that very few people, and certainly not your typical voter,
    have the expertise to review the software used for a computerized system
    and know that it is functioning properly. Consequently, it will require
    much more faith on the part of the voter in both the voting technology
    and their election officials to trust that a computerized system
    accurately records and counts their votes. And faith, unfortunately, is
    something that’s in short supply right now in our democracy, so we must
    be careful that we don’t erode it any further when we upgrade our voting
    technology.

    10. Software used in the voting process should be open to public
    inspection.

    One way to build public confidence in computerized voting is to require
    voting software code be made public. Election officials often cringe at
    this suggestion for two reasons: they think that making voting
    technology source code public will undermine the security of the voting
    process; and they expect that voting technology companies will object to
    revealing their source code because it undermines their competitiveness
    in the marketplace. In fact, many of the leading voting technology
    companies are not necessarily opposed to public source software, and
    some have already indicated they will comply with a public source code
    requirement if it’s imposed on everyone.

    The first concern — the public source undermines the security of the
    voting process — reflects the misguided “security through obscurity”
    approach to software, which is the idea that keeping your source code
    secret makes your technology more secure. In fact, there is consensus in
    the security industry that public source code leads to more secure
    computer systems than closed source.

    In fact, the Pentagon, our number one military agency, recently decided
    to no longer purchase closed source, commercial software programs from
    companies such as Microsoft, Netscape and Lotus to use in its most
    sensitive systems. The reason given by a Pentagon official, speaking
    anonymously to the Washington Post, is because they found that these
    closed source programs had too many holes, backdoors and trapdoors that
    place the department in greater danger of a computer attack than using
    public and open source software would.

    No software program is perfect, and any voting software program will
    inevitably have holes and some problems. If the source code is closed,
    those who want to manipulate the outcome of an election will eventually
    find and exploit those holes. If the source code is open and public,
    then the good guys in the security industry can find the holes first and
    help fix the software.

    One high-profile example of this shift toward public source for
    high-security operations is the National Security Agency’s initiative to
    develop “Security Enhanced Linux”. This is a new, security-enhanced
    operating system that was just released this month. It’s based on Linux,
    a very successful open source operating system, and anyone in the world
    can go online to www.nsa.gov/selinux/ and download its source code. If
    the agency entrusted with protecting our national security finds public
    source code more secure than closed source code, it should be a clear
    signal that the election community would be wise to follow suit.

    Of course, we can’t assume the good guys are going to forever be
    reviewing voting software code, so it’s crucial that a continuous
    recertification process is also established. Computerized voting
    machines, unlike punch cards, are based on dynamic, not static
    technology. We must anticipate that any computerized system will need to
    have security holes fixed, upgrades made, and new computer and Internet
    protocols supported. Even if we have public source voting software, we
    will still have a limited number of experts capable of evaluating its
    reliability. And what some security experts are saying is that it will
    be difficult, if not impossible to know for certain if the software
    that’s been certified and is publicly available is the same software
    that’s running on your voting machine. It’s worth noting that some of
    the strongest objections to computerized voting are made by computer
    security experts. For this reason, and also to foster voter confidence
    in new voting technology, it would be wise to consider a way to use a
    mix of paper ballots and computers in the voting process, and to require
    that paper ballots be counted along with digital ballots so that we
    could create a paper audit trail and thwart attempts to rig voting
    software.

    III. Conclusion

    New voting technology has many advantages, but it also brings new
    challenges to the voting process. And not all current voting technology
    is inadequate. Many voters in the U.S. cast ballots using optical scan
    systems, which are affordable, accurate, have a paper audit trail that
    can provide for a recount, and some of which feature a ballot scanner at
    the polling place that helps voters avoid overvoting or spoiling their
    ballots. Whatever we do to upgrade voting technology, we must ensure
    that all voters have an equal chance of having their votes counted.

    We need to close the politics and technology gap and continue to bring
    experts from different fields together to share information and learn
    from each other. We need our elected representatives to demonstrate
    patience, good judgment and leadership, and we need the media and public
    to pay close attention to voting technology policy as it develops. And
    we need to get serious about voter education in this country and spend
    the public resources needed to prepare people to vote on Election Day.

    It is remarkable that the first Presidential election of the new
    millennium came down to the question of whether we have more faith in
    people or machines to accurately and fairly count votes. The U.S.
    Supreme Court decided the answer was machines. This ruling sets a
    dangerous precedent. Technology can do a lot for us, but it cannot and
    should not trump human judgment.

    I raise concerns about Internet voting not because I am pessimistic; on
    the contrary, I am very optimistic about the opportunities before us to
    advance and transform democracy using computers and the Internet. I am
    critical of voting technology not because I am opposed to it, but
    because I cherish democracy and think computerized voting is both one of
    the most exciting and potentially dangerous ideas of our time.

    – – – – – – – – – – – – – – – – – – – – – – – – –

    The California Voter Foundation is an independent, non-profit
    organization advancing new technologies to improve democracy and
    providing non-partisan voter information on the Internet at
    www.calvoter.org. CVF-NEWS is the California Voter Foundation’s free,
    electronic newsletter featuring news and updates about politics and the
    Internet, emphasizing activities taking place in California.

  • Letter from Istanbul: Is Tom Cruise a Mayan, After All?

    Letter from Istanbul: Is Tom Cruise a Mayan, After All?

    James Tressler / Sunday, Dec. 16 @ 10:03 a.m. /  Elsewhere

    If Mayan predictions are true, the end of the world is nigh. A tiny village in western Turkey, it seems, is exempt. That’s attracting a lot of people, including — according to rumor, at least — one of Hollywood’s biggest stars.  

    276476 tom cruiseI was getting my haircut in Kadikoy on Wednesday morning when I overheard thekuaför gossiping: Tom Cruise was coming to Turkey. It was in the newspapers that were scattered on the small table for the waiting customers to read over cups of tea.

    “For a new film?” I interrupted.

    “No, for the end of the world,” he said. “You know it? December 21? The Mayans?”

    Of course I knew what he was talking about. The Hollywood star, Maverick, it seems, is coming to the town of Sirince in Turkey to seek refuge from the end of the Mayan doomsday. Sirince is one of those places identified – by whoever decides such things – as a safe haven. (As an aside, I’ve always wondered, why is it we have never bothered to seek out the Mayans on anything else in the past few millennia, yet take their loin-cloth and huipil- wearing asses at their word on this, the ultimate score? Never mind.)

    At the school an hour later, Fethi was upstairs in the canteen reading the newspaper, checking the football scores. “Today is 12 December 2012,” he remarked, with a bemused chuckle. “12-12-12.”

    Alas, the times, it seems, are chock full of strange and interesting signs. As Bukowski once observed, we are filling up the prisons and emptying out the madhouses.

    Speaking of: “Did you hear Tom Cruise is coming to Turkey?” I asked Fethi.

    “Tom Cruise?” He looked up from his newspaper. “Really? A film?”

    “No, not a film,” I said. “For the end of the world.”

    “Sorry?” Fethi seemed confused for a moment.

    “Tom Cruise is a Mayan?” he asked.

    “Not really, no.” (But this set off a train of thought!)

    Fehti caught up. With a wave of his hand, Fethi, a devout Muslim who closes the canteen every Friday morning to go to the mosque, dismissed the Mayans as “rubbish,” and went back to his football scores. Good old Fethi. I have a feeling that even if the world did end, he would still find a way to be open for business, with his fresh tea and toasted sandwiches. He’d probably even have the insider tally on the living and those who are now, as they say, the souls behind lightning.

    Meanwhile, it was a busy morning at the school. We have recently formed a partnership with International House, a well-known school with branches all over the world. The IH inspector was due to arrive that morning to have a look around, talk with teachers and observe lessons. If the world is indeed to end, then it will have to wait until after the inspection. We won’t even have the final report of the inspection until at least mid-January. And besides, think how much the school has already spent on the downstairs renovation. It looks nice, too! In these tough fiscal times, we can’t let money go to waste, people! Fiscal Cliff! Fiscal Cliff doesn’t care much for ancient prophesies. In fact, I think Fiscal Cliff votes right most of the time, and is not haunted by our own strange and terrible fantasies. It only cares about brinksmanship on its own terms, which are green and red.

    Anyway, surely we are allowed a little while to enjoy the downstairs redesign. After all, teachers alone can save nations, as the Great Kemal Ataturk said. If we can save nations, then we can certainly enjoy our new space until – let’s say until the late spring. By then the upstairs renovations will be done too, and the meteorites and tidal waves can come and have it all in one fell swoop. I mean, if you’re going to have wholesale destruction, you might as well do it right, right?

    While I was waiting to meet the inspector, I did some quick research on this promised land, Sirince. For those who don’t know it, Sirince is a tiny village of about 600 in the west of Turkey in the Izmir province. According to Wikipedia, “Sirince was settled when Ephesus was abandoned in the 15th century but most of what one sees today dates from the 19th century. There is a story that the village was settled by freed Greek slaves who named the village Çirkince (meaning ‘Ugly’ in Turkish) to deter others from following them.[1] The village’s name was changed to Şirince (meaning ‘Pleasant’) in 1926 by the governor of Izmir Province.[1]” I’ll leave it to those on the professional irony circuit to have a go at that one.

    Actually I cursed myself for not having taken a few days off and gone down to take in the scene. It’s the kind of thing that Raoul Duke would do. You know, get in the Great Red Shark with a pint of whiskey, a bag of grass and a suitcase full of illegal substances, and drive on down to where all the pilgrims of the world arrive, bloody and half-insane, while the rest of the world sinks back into the mantle. What a story!

    And just think! All this time, while I have been here in Istanbul, the apocalyptic, doomed mega-city, I could have been down in Sirince with not a care in the world. I could be hanging out with Tom Cruise. He could, at this precise moment, be giving me the low down on when the Mother Ship will arrive, taking us all back to the Source. God forbid, the Mayans could be wrong, and we are still around on December 22, when, as some say, the rest of the world awakes into a brave new world of peace and enlightenment. Either way, I shall surely be kicking myself. To miss such a chance, to have T.C. really lay it on me, man. Perhaps in Sirince he will indeed, as Fehti suggested, unveil his true identity as Mayan Re-incarnate. I see him now, standing proudly in his loin cloth, perhaps a plume of feathers on his handsome head, the sun shining as Great Truths emit from the Mayan Re-incarnate T.C., and all of the pilgrims gathered in Sirince gather to kiss his golden feet …

    … But enough of this daydream, this frolic, this fantasy. It’s time for my appointment with the inspector, and after that classes to teach. The work must go on. One thing I will say for the Mayans though, is at least they had the sense to end the world on a Friday. That’s what I call real style. But the question begs: If the world does end on Dec. 21, then where does that leave the Messiah? Wait, maybe he’s Tom Cruise too. Maybe T.C. has great range and power as an actor: now that would truly be a revelation.

    Ed. note: While rumors of Tom Cruise going to Turkey have been reported in the Turkish press this past week, as of Sunday, there has been no official confirmation that Tom Cruise will be there.

    James Tressler was a reporter for the Times-Standard. His books, including “Conversations in Prague” and “The Trumpet Fisherman and Other Istanbul Sketches,” are available at Amazon.com and Lulu.com. He lives in Istanbul.

  • America Again Submits to the Istanbul Process

    America Again Submits to the Istanbul Process

    By Nina Shea
    December 3, 2012 12:28 P.M.

    0

    Round three of the “Istanbul Process” opens today, December 3, and runs through Wednesday, at Canada House, in London, hosted by the U.K. and Canada. The Istanbul Process is Secretary of State Hillary Clinton’s major transnational law initiative, undertaken in partnership with the Organization of Islamic Cooperation (OIC). It was established last year to “implement” measures against speech and expression that negatively “stereotype[s]” Islam and Muslims, with a particular emphasis on enacting them in the West.

    This initiative was started as an inexplicable, gratuitous gift to the Muslim world following the March 2011 adoption of a non-binding U.N. Human Rights Council resolution (16/18) on the same theme. While the Obama administration claims that it doesn’t intend for the process to adopt regulations beyond the American free-speech standard, our partner, the OIC, is only too eager to do just that.

    For over a decade within the U.N., the OIC has relentlessly pushed for a universal law to punish blasphemy, or “defamation,” of Islam. This 56-member-state organization, an essentially religious body, is in fact chartered to “combat defamation of Islam.” It issues fatwas and other directives to punish public expression of apostasy from Islam. Its current action plan calls for “deterrent punishments” in all states for “Islamophobia,” a term that encompasses a broad range of constitutionally protected speech, judging from the OIC website’s black list of Americans and other perpetrators of “Islamophobia.” The OIC’s stated understanding of the Istanbul Process is that it will “help in enacting domestic laws for the countries involved in the issue, as well as formulating international laws preventing inciting hatred resulting from the continued defamation of religions.”

    Corner readers will remember that the Istanbul Process’s first conference was co-chaired by Clinton and the OIC secretary general in July 2011, in Istanbul, with the foreign ministers of the Muslim countries in attendance. The second was held over three days of closed-door meetings last December, at the offices of the U.S. Department of State in Washington. That meeting drew enough controversy within free-speech circles to raise questions about whether the process would continue. But thanks to a leak last week by OIC head Ekmeleddin Ihsanoglu, we now know the event will go ahead, even if its agenda is still being treated like it’s “classified.”

    Judging from the 2011 session I was partially able to observe as a commissioner on the official U.S. Commission on International Religious Freedom, the point of the Istanbul Process is for the governments of the developed West give an accounting to the governments of Saudi Arabia, Egypt, Pakistan, Qatar, and other key Muslim states on measures taken to stop American and other Western citizens from disparaging Islam. This puts our diplomats.in a tight spot: Unlike virtually every other country represented in the conference hall, America does not protect any religion or any other body of ideas from criticism and ridicule. However, when we’re in the dock this time around, the U.S., represented by Dr. Suzan Johnson Cook, the administration’s severely marginalized ambassador-at-large for religious freedom, will have some measure of “progress” to report.

    For example, the U.S.’s top intelligence official and its top commander in Afghanistan were again deployed to suppress blasphemy against Islam in Florida and, this time around, they succeeded. Last year, the efforts of our top authorities to stop Florida micro-church pastor Terry Jones from desecrating a Koran ended in failure. But this year, their resort to the “good offices” of Tampa socialite Jill Kelley proved an effective strategy. Her persuasive emails resulted in Florida talk-show host Bubba the Love Sponge’s standing down from deep frying a Koran, something he had threatened to do on-air. The OIC’s Ihsanoglu would likely rule Bubba was about to “abuse” freedom of expression by not being able (incontrovertibly, I should note) to pass a “responsible use” test.

    That leads to our next plea: The administration has also adopted the OIC’s own standard of condemning the “abuse of free expression.” Or at least that is what it appeared to do on the website of the pivotal U.S. embassy to Egypt on September 11 this year. Our embassy declared on its homepage: “We firmly reject the actions by those who abuse the universal right of free speech to hurt the religious beliefs of others.”

    But perhaps, the best evidence of America’s “implementation” in response to the Istanbul Process is the Justice Department’s dispatching the FBI a couple months ago to investigate Mark Basseley Youssef (a.k.a. Nakoula Basseley Nakoula, or Sam Bacile), the California Coptic filmmaker of “Innocence of Muslims,” the YouTube trailer that blasphemed the Muslim prophet. As Ambassador Cook can point out, this investigation has resulted in a creative criminal conviction of Youssef, and his being sentenced by a federal court to a year in prison. All the better for the U.S.’s reputation as implementers is that it will be lost on the conferees that Youssef has been imprisoned on a probation offense, à la Al Capone — though, unlike Capone, his underlying offense, without which he would not have been investigated, was making a crude, insulting video, which is hardly equivalent in American law to gangland massacres or racketeering. It, in fact, is not a crime at all. Thus, most important, the OIC’s take-away will be that in defense of Islam the U.S. government can and will regulate speech.

    Nevertheless, none of this is likely to impress the Istanbul Process gathering. On its opening day last December, Saudi Arabia — headquarters to and godfather of the OIC — beheaded a Sudanese woman for “sorcery.” Last week, Egypt sentenced to death Youssef, Terry Jones, and six other Americans implicated in the blasphemous YouTube trailer. For the Istanbul Process that’s “best practices” for “implementation.” Thus, again, America will be judged to have fallen short, indignation will rise, and the Istanbul Process will need to ramp up its pressure.

    — Nina Shea is director of the Hudson Institute’s Center for Religious Freedom and co-author with Paul Marshall of Silenced: How Apostasy and Blasphemy Codes Are Choking Freedom Worldwide.