About Joe Wein

Software developer and anti-spam activist

Echoes of Trotsky

“You have shown yourself unworthy of the trust of civilized men and women.” These are the words with which murdered former Russian spy Alexander Litvinenko accused Russian president Vladimir Putin in a letter dictated on his deathbed. “You succeeded in silencing one man but the whole of protest from around the world will reverberate, Mr. Putin, in your ears for the rest of your life.”

Like the murder of Litvinenko’s friend, the journalist Anna Politkovskaya, the poison murder of the former agent is unlikely to be solved any time soon. Though the Russian authorities, which probably hold the key to the mystery, have declared their cooperation with the British police, they also emphasized that only they will be able to interrogate any suspects on Russian soil, or make arrests. They categorically stated that no suspects will be extradited to Britain, where the murder took place and of which Litvinenko had become a citizen. The only place any Russian suspects could be tried, according to the Russians, is in Russia. Already there are signs that the Russian authorities are not fully cooperating with British law enforcement, for example by refusing to question some parties the British were interested in talking to.

Putin denied any involvement in the two murders. That was to be expected, whether it was the truth or not.

Disingenuously Putin suggested, Politkovskaya’s death could have been the work of his political opponents in next-door Ukraine, to smear his name. The suggestion is somewhat ironic. Ukrainian president Viktor Yushchenko himself fell seriously ill after being poisoned with hard-to-detect but highly toxic dioxin by pro-Russian members of the Ukrainian security forces. If Litvinenko and Politkovskaya were indeed killed on behalf of Putin’s enemies, one would expect Russian authorities to be most keen and cooperative to track down their murderers. Yet so far there is no indication of that.

The nature of the poison used against Litvinenko, Polonium-210, makes anything but a state-sponsored assassination attempt unlikely. It is sold by commercial suppliers only in tiny quantities and the dose used would have cost $10 million. Arguably the question is not if Litvinenko was poisoned by current or former members of a state secret service, but whether Putin authorized the murder or not.

After the September 11, 2001 attacks against the USA Putin won praise as an ally in the so-called “War on Terror”. He let the US use airbases in former Soviet republics in Central Asia during the war against the Afghan Taliban regime. He maintains personal friendships with George W. Bush, former German chancellor Gerhard Schröder and former Italian premier Berlusconi.

His political friends in the West and also largely the Western media chose to turn a blind eye to Russian atrocities and massive human rights violations in Chechnya. Torture, arbitrary detention and “disappearances” (extrajudicial killings) are widespread. Russian forces act with total impunity. They literally get away with murder. A report by Human Rights Watch wrote in 2004:

Unchecked patterns of abuse by Russia’s forces in Chechnya will eventually affect the rest of Russian society. Tens of thousands of police and security forces have done tours of duty in Chechnya, after which they return to their home regions, bringing with them learned patterns of brutality and impunity. Several Russian human rights groups have begun to note a “Chechen syndrome” among police who served in Chechnya—a particular pattern of physical abuse and other dehumanizing treatment of people in custody. Russians already face serious risk of torture in police custody. The Chechnya experience is thus undermining efforts to promote the rule of law in Russia’s criminal justice system.

Putin ascended to power on the promise of a quick victory in Chechnya, yet despite of (or perhaps because of) ruthless methods Chechens still resist Russian occupation six years later. If anything can be learned from this period it is that Putin has few scruples, as long as he can get away with it. When the Chechen conflict erupted into a war again as Putin rose to power, Russia was gripped by fear from a series of unsolved bombings of apartment blocks which were blamed on Chechens, even though later security forces were caught red handed with explosives in the basement of one building. Anna Politkovskaya was investigating these bombings.

The murder of Litvinenko made a lot more headlines than that of Politkovskaya, not just because of the unusual choice of method but also because it took place in a Western country.

Probably the most famous of all foreign murders of an enemy of a Russian leader was that of Leon Trotsky. Exiled in 1929, the revolutionary and writer continued his opposition to Stalin, denouncing his policies in numerous books and articles. Finally in August 1940 he was slain by Ramon Mercader, an agent of the NKVD (the precursor of the KGB), at his home in Mexico City using an ice axe. His murderer, a Spanish citizen who used a fake Canadian passport and name, was arrested and sentenced to 20 years in prison. Stalin denied any involvement. Mercader’s real identity was not discovered until 1953. Upon his release from prison in 1960 he left Mexico and went to revolutionary Cuba. Until his death in Havana in 1978 he lived in Cuba and the USSR, where he was honoured as a “Hero of the Soviet Union”. His involvement with the KGB was not officially revealed until the fall of the Soviet Union in 1991.

While it took over half a century until written proof became available, Mercader’s hero status in the Soviet block from after his prison release had already made clear that Mercader had murdered Trotsky on Stalin’s orders.

In a similar vain, it may take a long time before all facts about Litvinenko, Politkovskaya and Putin get documented, a lack of cooperation from the Russian authorities will make it clear whose interests were served through these unscrupulous murders.

In February 2004 exiled former Chechen president Zelimkhan Yandarbiyev was killed by a car bomb explosion in Qatar. His killers, Russian agents Anatoly Belaskhov and Vasily Bogachev were sentenced to life in prison by a court but later transferred to Russia, which had put intense pressure on the small Gulf state while denying any involvement in the crime. At home the murderers were soon released from prison. In the summer of 2006 the Russian parliament passed a law that explicitly permits foreign assassinations if signed off by the Russian president.

It would be far easier to believe in Putin’s protestations of his innocence if it wasn’t for the track record of his regime in the past 6 years. Whether Putin gave direct orders or failed to supervise his security forces, it is he as the commander in chief who bears the responsibility for these deaths, as he does for the suffering and deaths of numerous others in Chechnya and other parts of the Russian sphere of influence. Those who still treat his rogue regime as a valuable friend and ally must share this grave responsibility.

CrossLoop beta released

CrossLoop, a secure screen sharing utility for anyone who uses a computer with a broadband connection, is now in beta testing. If you use computers you sooner or later encounter problems where you need somebody’s help to solve them. Often it can be difficult to describe the symptoms or the solution. Whether it’s helping a parent or a customer, CrossLoop makes remote problem solving and cooperation easy and intuitive. Installed and running in under two minutes, it lets you share access to the same computer, looking at the same screen and (optionally) with shared use of the keyboard and mouse. It’s also handy for running a slide show or demonstrating the use of some software to someone hundreds or thousands of kilometres away. Complex software installations, remote troubleshooting — it’s almost like you’re both sitting in front of the same computer. CrossLoop does this without complex setup such reconfiguring routers and firewalls and leaves no backdoors. All data is securely encrypted using 128-bit encryption, so no one can snoop in. And it’s all free 🙂

CrossLoop

Disclaimer: I work for the company that makes this product. As someone who lives in Japan, with family, friends and colleagues in Europe, the USA and elsewhere this is a natural product for me to work on and use myself.

Other blogs that talk about CrossLoop:

You can add comments and ratings to the digg review mentioned above by clicking the “join digg for free” link below the list of user comments.

Ten eyes for an eye

The Old Testament rule of “an eye for an eye, a tooth for a tooth” is often quoted to expose someone who is merciless to those he regards as his enemies. It is quite a different kind of justice to the one preached by Jesus when he asked his followers to “turn the other cheek” when someone slaps them in the face.

What is often forgotten is that even this brutal “an eye for an eye” rule was meant to prevent escalating vendettas, where two families would inflict ever increasing punishments on each other to exact revenge for previous misdeeds by members of the other family. Without it the violence could escalate without limits, until one side is wiped out.

I can’t help but think of this ancient concept of justice when I watch the news from Israel and Lebanon in these days of war. As I write this, over 50 Israelis have been killed since the beginning of the war, while numbers in Lebanon are anywhere from 500 to 750 dead, depending if bodies suspected to still be buried under collapsed buildings are counted or not. The vast majority of these victims are civilians, about one third of them are children.

It is obvious in this conflict that Israel has overwhelming firepower, but it can not use that firepower to win itself peace. I believe it is doing exactly what Hezbollah wants it to do, responding to a calculated provocation in way that will fan the flames of hatred against Israel in the Arab and Muslim world. 1 in 7 Lebanese is now a refugee. Billions of dollars in damage to housing, infrastructure and the whole economy will throw back Lebanon by years.

An excessive response that punishes Lebanese civilians, including many children, for the violence of Hezbollah will make it harder for both sides to speak to each other. A durable peace can only be based on a negotiated compromise.

CNN reports about online scams

A recent CNN article described various online scams, including fake lotteries and other 419 scams:

As one scam-watch site pointed out, lottery companies do not organize “promotional” lotteries, they advertise. A free “promotional” lottery that you only hear about if you win would only promote the lottery to a handful of customers. That doesn’t make any sense.

If you answer the e-mail, after one or two e-mail exchanges with the so-called lottery officials or claims agent, perhaps accompanied by some official looking but fake documents, you’ll be asked to pay fees for taxes or handling or some other reason. This is the scam — you pay the fees and never see any winnings, mainly because there are none to see.

Currently fake lotteries are the most prominent of online scams. We get far more queries about fake lotteries than about all other types of scams taken together. More people fall for them than for any other scam, maybe because so many people play lotteries in “real life”, so the idea of a sudden lucky strike is not alien to them.

In case you wondered, the unnamed scam-watch site quoted by CNN is the one you’re looking at right now. It was a quote from our 419 fraud FAQ about fake lotteries. The article also prominently mentioned Fraudwatchers.org of which we’re a member and listed it as the first of several fraud-information websites.

Education is the most effective weapon against scams. People who know about scams are not easily tricked any more. If more newspaper and TV and radio stations were to talk about scams, fewer people would fall victim to them.

A strange type of spam

On June 15 I received some unusual spam. It arrived from an IP address in Turkey (88.224.75.25) that is listed by SpamHaus.

Subject: Credit card processing courtiers

Hello,

Im Adam Aministers from credit card processing company. We can offer now good rates and bi-weekly payouts. If you are still looking for credit card processing, please contact me by ICQ 192687669

With regards,
OffshoreInstantProcessing
Key account manager

A credit card processor who would handle card data for all your customers has to be trustworthy. Someone who sends spam, doesn’t have a website and can not be contacted via either e-mail nor the telephone (let alone gives a physical address) is the exact opposite. What merchant in his right mind would do business with these people?

My suspicion is that the credit card transactions these guys handle in themselves are illegal (e.g. software piracy, child pornography).

Communications via ICQ are very common in Russian spammer and online fraud circles.

Toshiba Gigashot GSC-R30 / GSC-R60 Hard Disk Camera

Gigashot GSC-R30 at AmazonThe Toshiba Gigashot GSC-R30 is my fourth video camera since I started filming for a hobby in 1990. It is compact, fairly lightweight and records hours of DVD-quality video and/or tens of thousands of digital pictures without any change of media. I bought it in early April 2006 (my previous camera, a Mini DV model by Sony, had developed problems with its zoom after a close encounter with sea water).

Initially I was considering another DV model or maybe a DVD-R recorder, but Toshiba’s new hard disk recorder caught my eye in the store. Its 30 GB capacity far exceeds the 1.3 GB of DVD recorders or various memory card-based recorders. The R30 includes a 30 GB tiny 1.8″ hard disk while the slightly more pricey R60 features a 60 GB drive. That’s enough for almost 7 hours / 14 hours of DVD-quality video or 30,000 / 60,000 digital pictures at 2 Megapixel.

The 60 GB model also includes a docking station or cradle for recharging or connection to the computer. The cradle provides an Ethhernet network connection on top of the USB connection, which may be useful if you want to view clips from more than one machine, but the R60 was not in stock when I purchased the camera.

At home I can hook up the camera to my computer using a USB 2.0 cable and it acts just like a USB 2.0 hard disk to the computer. I can browse the folder tree inside the camera using Windows Explorer. Any video clip on there can be played using the Windows Media Player or an MPEG-2 player of your choice. Burning a DVD is fairly easy.

Because of the MPEG-2 recording format, no conversion with loss of picture quality is required to produce a DVD on your computer. I would recommend backing up the files inside the camera onto your computer’s main hard drive or onto an external USB drive, even before you burn DVDs.

Upgrading your hard disk with Acronis True Image

Last Saturday the hard disk in my notebook computer started making strange noises. It performed lengthy retries and eventually produced write errors from Windows. This is usually a sign that a drive is on it’s way out. Not a good way to start a relaxing weekend, I thought.

My notebook is a 6 year old Dell. I bought it second hand on eBay. A disk upgrade from 12 GB to 40 GB about 4 years ago and a more recent memory upgrade to 512 MB have kept the 650 MHz Pentium III machine quite viable for me. I don’t see the point in purchasing more CPU power than I need, just as long as the rest of the system is adequate. It’s been quick enough and it was a reliable performer. Though I was worried about how long it would last, I was not keen on having to reinstall all the software on it if I were to move to a new machine.

Most of my data these days sits on external USB 2.0 hard disks. That way, if one machine goes down I just plug the drive into a USB port on another box and life goes on. I keep copies of the same data on multiple drives, but still, you always need a C: drive. The Windows registry and all the application settings in there don’t travel that easily. With the disk errors announcing the eventual failure of the drive it looked like I didn’t have much of choice.

I went out to local computer stores and ended up buying two items:

  • a 300 GB USB drive (IO DATA / Maxtor). Eventually I didn’t need this for the upgrade, but my 160 GB USB drive had too little space left for making a 40 GB image and I would have had to get something bigger soon.
  • a 60 GB USB notebook drive (Logitec) – I was originally looking for an internal drive (2.5″), but the USB version proved very useful.

My first approach
To be on the safe site, I first copied a few essential folders from the internal drive to the USB drive. Next I installed PowerQuest Disk Image 7 (DI7), which allows you to copy an entire drive to an image file on another drive and later restore it to another disk. That’s how the upgrade from the original 12 GB drive had been done. I had no luck. As soon as I started DI7 the program terminated, no error message. Probably the activiation mechanism realized I had previously activated the software on another machine, a desktop which I had used to try to copy the notebook drive to another internal drive because there I can hook up multiple drives to ATA cables.

I talked to a friend and he mentioned Acronis True Image. At just under $50 it was $20 cheaper than Noprton Ghost, the equivalent product from Symantec, which acquired PowerQuest’s product line. I found the product was available with a 15 day free trial and the reviews looked good.

Later in the afternoon my hard disk had recovered somewhat, but I still wanted to move on to the new drive because computer problems that go away on their own have this nasty habit of coming back on their own…

I installed Acronis on the machine (download Acronis True Image 9.0 Home 15 days trial here) and hooked up the notebook drive. It first wasn’t recognized because my notebook USB card did not supply bus power, but once I hooked up the USB power cable to the USB hub of my desktop monitor the drive came up. I selected the “Clone Disk” option, asking it to copy from the first hard disk to the USB hard disk. Then Acronis told me it was going to reboot the computer, which it did. I left it like this overnight.

In the morning I rebooted and found the complete original data on the USB drive. I then shut down the machine, removed the 40 GB notebook drive, opened the external USB case and transplanted the drive inside the notebook. The first reboot was unsuccessful, Windows reset the machine, but after the second reboot I was in business. I ran scandisk, viewed a couple of folders, everything worked. I had all my data and programs on a new drive and 30 GB of extra free space. This is excellent. I fully recommend Acronis True Imagine for anyone who wants to upgrade a hard disk in their machine. Using a USB hard disk as the target drive this process is fairly painless even if only one hard disk at a time can be fitted inside the machine.

Acronis and network drives
There was one small hitch, which I found later in the day. I could no longer map a network drive to the 160 GB USB drive on my notebook from other machine in the network. The NET USE command from a DOS prompt gave the following error message:

System error 1130 has occurred.

Not enough server storage is available to process this command.

A quick Google search found a ready-made solution to the problem. Aparantly, Acronis installs a driver that watches writes to the disk drive so that it can determine which data needs copying on an incremental backup. This driver causes problems for the network server on Windows. The solution is to set a registry value in Windows to make the network server allocate more space when handling disk requests.

Getting started

I finally got around to installing WordPress on the server to write a blog. A previous attempt at using static HTML was too time-consuming. I’ll write more regularly now, mostly about issues related to spam, software, hardware and probably a little bit of politics. Enjoy!