Tuesday, December 19, 2006

Go native

Collision between a comet and a 370 kilogram projectile exposes subsurface ice, causing large amounts of dust and over 250,000 tons of water vapor to stream off the comet. As a liquid that much water would fill over a hundred Olymic-sized swimming pools.

NASA for now is sticking to Werner von Braun's World War Two vintage idea of lunar and Martian bases that import everything from earth -- including even such basics as propellants, tankage, food, air, and water. While these white elephants are still seen by most of NASA as the "next logical steps", there are a wide variety of other and often much better ideas for space development out there. I've long considered the possibility that comet mining, or similar drilling for any ice that might exist underneath the regolith of some asteroids (as we know it does on Mars), is a much more productive way to go.

The argument for microgravity ice mining, laid out in the above-linked article, involves several steps of reasoning, but the most important parts of the idea are (1) that use of native materials, rather than hauling materials from earth, is crucial to productive and affordable long-term space development, and (2) that given the expensive bottleneck of launching from earth, the most important variable for space industry is the mass throughput ratio (MTR): the ratio of the mass of material processed per unit of time to mass of the (earth-origin) machinery required. Higher MTR translates to greater amplification of a small mass launched from earth into a large amount of materials processed in space. Cometary or similar ice can be processed to create propellant, tankage, and other useful items as described in the above-linked article.

Snow maker.

To develop space economically, instead of merely wasting large amounts of money on historical dead ends, we need to use native materials, and we need to process them with very high mass throughput ratios. Developing bases on the moon, Mars, or elsewhere in deep space without using native materials would be as foolish as if the Pilgrims at Plymouth Rock had imported all their water, food, and wood from England.

I endorse the ice mining approach because, even though cometary (and possibly asteroidal) ice is not conveniently located, we can generally process water with very high mass throughput ratios. Here are some approximate (back-of-envelope) estimates I've made, usually based on the linked descriptions of the process. I typically assume the machines can operate on average 20 hours per day, 300 days per year:

Centrifuge that separates sludge from water at a rate of 200 gallons per minute.

Snow cone machine (grinding ice into small bits): 67,000/yr. (In other words, the machine can convert 67,000 times its own weight in ice to "snow" in a year).

Sludge separation with centrifuge: 3,000/yr.

Snow making from liquid water: 330,000/yr.

The MTR of a sequence of processes can be readily estimated. For example to grind ice into snow, then melt it (which I assume here has an MTR of 10,000/yr.), then separate out the dirt and organics with a centrifuge, then make snow with the now clear water -- a sequence similar to the comet mining process described in the above-linked article -- I estimate the MTR to be about 1,500 per year with the current off-the-shelf equipment.

If this can be achieved for comet mining, then we can (for example) launch 10 tons of equipment and, by staying at the comet or asteroid for two years, make 30,000 tons of ice for various uses, including propellant, tankage, and radiation shielding. This is before discounting mass we lose from transporting the equipment to the comet or asteroid and ice back to a useful orbit, which will often be a factor of 10 to 20 -- see the above-linked article. Thus 10 tons launched into low earth orbit would result in 1,500 to 3,000 tons of water ice in a useful orbit such as earth geosynchronous orbit, Earth-Sun L1 (for the global warming application, link below), Mars orbit, or a wide variety of other inner solar system orbits.

Old ice breaker.

With a decent R&D budget we can probably actually do much better than the current off-the-shelf equipment, some aspects of which have to be redesigned for the space environment anyway (e.g. where the water flow depends on gravity). The MTRs of many of these machines can probably be improved by large factors by appropriate substitution of materials with better engineering properties (especially strength) per mass -- for example Kevlar, Vectran, Spectra, carbon fiber, or carbon nanotube for structural steel and diamond grit for grinding surfaces. Such substitutions would be too expensive for typical earthside applications, but make sense where transportation costs are very high, as with launch costs. This substitution is helped by fact that, unlike most other proposed processes for extracting propellant from materials native to space (e.g. liquid oxygen from lunar soil) these processes don't require high temperatures.

Old ice saw.

On a related note, here's an interesting set of pages on the ancient art of harvesting, handling and storing ice for refrigeration.

Lest this all be dismissed as mere NASA-style entertainment, there are possibly quite important applications, including combatting global warming, for which native material based space industry is crucial. (No, the idea is not to throw big ice cubes into the earth's oceans. :-) Furthermore, once the first mission returns ice, it can be used as propellant and tankage to bootstrap even more ice mining equipment. Only a few such boostrapping cycles are needed before orbital ice becomes as cheap as water on earth. Since comet ice can include methane and ammonia as well as water, it can provide the raw materials for most of chemicals and bulk materials we need in space industry. Indeed, all the above-mentioned advanced materials can be manufactured starting with these building blocks -- keeping in mind that the current earthside manufacturing processes will have to themselves be examined for MTR, reliability, and automability, and so the substitution of more simply produced materials may be in order, just as we are substituting a simpler rocket for advanced earth-launched upper stages in order to take advantage of native ice derived propellant and tanks.

Of course, there many challenges with automation and reliability to be met. Some of these are being addressed by the current developments in deep sea oil and mineral extraction, which I am currently researching and will hopefully cover in a near future post.

Here is recent evidence of not just ice, but (at least temporarily) liquid water underneath the Martian surface that has flowed out onto the surface and frozen. Mars itself, in a deep gravity well, is not an ideal source of water for use beyond Mars, but ice there suggests that ice might also survive near the surfaces of some asteroids that lie even farther from the sun.


Thursday, December 14, 2006

History in a nutshell

I've written about geographic patterns that demonstrate the importance of securing as well as producing wealth (link below). These have shaped forms of government and law. Hunter-gatherer tribes, under which our instincts evolved, had no need of large organizations, governments, or law as we know it. The dawn of agriculture was probably made possible, not by the discovery that food plants could be grown from seeds (this would have been obvious to a hunter-gatherer), but in solving the much harder problem of how to protect this capital investment over the course of a planting-growing-harvesting-storage cycle from fellow human beings. This required internal law and external security exercised much more thoroughly and over a larger area. It was securing the production, more than the production itself, that required eventually radical organizational evolution.

Once farmland became the main source of wealth, there were substantial economies of scale in protecting it. This posed a difficulty in forming organizations larger than tribes; those cultures that could coordinate larger militaries slowly displaced tribes that could not. This led to a wide variety of governmental forms, but they tended to have in common that the military consumed the bulk of the otherwise insecure agricultural surplus. The primary legal form was that of real property, usually claimed by military lords and their heirs.

The next phase appeared sporadically and temporarily among city-states that dealt most in goods (included harvested and transportable agricultural commodities) rather than farmland. As cultures became centered around trade and industry, converting from farmland to goods as the main source of wealth, they also tended to convert to from feudal monarchies to republics (or as we tend to call them now, democracies). Contract law became as or more important than real property law. Real property became much more alienable, either sold outright or pledged as security for insurance or investments.

As most wealth became mobile, taxes became centered on trade and income -- on wealth transfers that require crossing borders or crossing trust barriers -- rather than on wealth. During the same centuries as the rise of republics, cheap paper made widespread monolinguistic merchant communities more effective. The printing press gave rise to modern national languages, making large-scale organizations such as the modern corporation and nation-state possible. This led to substantial efficiency gains both in the security of production (and of the accompanying trade) as well as in the production and trade themselves.

Technology and economy have now once again leapt ahead of government and law: now in the most developed countries it's no longer goods, but services and information, which increasingly create wealth. It's still almost anybody's guess what organizational forms will be needed to produce and secure service value and information wealth, and for that matter whether such wealth will take the legal forms that have appeared with goods-centered republics (e.g. patents and copyrights) or whether new more security-efficient forms of property and contract will emerge. I expect smart contracts and related protocols to play an important role.

More about security and history here.

Thursday, December 07, 2006

From vending machines to smart contracts

Parts of the trend towards smart contracts are advances in vending machines. Indeed, a vending machine is a very ancient kind of smart contract, supposedly going all the way back to coin-operated holy water dispensers in Ptolemaic Egypt.

Touch screens allow some newer vending machines to present a user interface like that of a web site or catalog, and newer robotic mechanisms allow the goods to be dispensed more carefully (and thus allow a wider variety of products to be dispensed). If you haven't yet used one of these newer machines here's a good video:



It's important that the machine be as fair as possible to avoid either the vendor or the customer being cheated. But it's tricky. "[T]o prevent the thing snagging and you getting ripped off," Motorola's machine is designed so that "your card is only charged when the sensors detect you removing it from the bin."

There's a flower-vending machine where you can either buy fresh flowers from the machine itself or order flowers sent somewhere.

There's a machine that loans soccer balls. The user interface is your cell phone instead of on the machine itself. The balls are tagged with RFIDs, a primitive form of proplet, so that the machine can tell when you've stolen a ball (or at least when you've removed it out of the allowed area of use) rather than returned it. The machine also keeps a social register of soccer players to help you find somebody nearby to play with. This is moving us far from the traditional vending machine and towards a far wider variety of automated transactions heretofore enforced by contract or property law rather than computer protocol.

Japan, as a low-crime and gadget-loving country, fields machines selling a wide variety of products and services. There's a refrigerated locker where you can store your groceries and continue shopping and a machine where farmers can put in money and polish their rice. Some machines take 10,000 yen notes (about $80). Some parking machines place bars under or in front of the car that prevent the car from being removed from the spot until the fee is paid.

Wednesday, December 06, 2006

The Vietnam Veterans Memorial

Maya Lin's Vietnam Veterans Memorial is the only major memorial in the United States capitol showing the names of the deceased. The other major memorials in D.C. are paeans to the politicans who put soldiers and civilians in the path of death and destruction or to the environments where the destruction took place. For example, the World War II Memorial echoes concrete bunkers and gun batteries. In contrast the Vietnam Memorial is an interactive experience where loved ones can come and remember those who actually sacrificed by leaving pictures, flowers, or flags and taking rubbings of their loved one's name.

Monday, November 27, 2006

Are most of us a bit Neanderthal?

This month has thrown off quite a bit of new information on Neanderthals and on the possibility that they interbred with some of the humans that came out of Africa. It's bound to stir up controversy.

The first interesting recent study comes from extracting the remains of a probable Neanderthal DNA from 38,000 years ago, copying it into bacteria, and then sequencing it at leisure. (Query: do fundamentalists oppose this procedure as a forbidden "cloning of a human"?). This bacterial-Neanderthal chimera (actually, the Neanderthal genes are really just junk DNA from the point of view of the normally functioning bacteria) is an improvement over the traditional technique that apparently destroys the original DNA in the process of sequencing it. Preserving the DNA is vital for this application: Neanderthal DNA has been severely damaged by 38,000 years of chemistry and can only be obtained with severe difficulty in small fragments.

Large-scale statistical studies from these probable Neanderthal sequences suggest that the number of genes we moderns derive from Neanderthals is few, if any. In other words, all of us trace either nearly all or entirely all of our ancestry from homo sapiens originating in Africa c. 200,000 years ago rather than to Neanderthals that originated some 700,000 years ago. Pretty much what most scientists have thought for the last few decades.

However, that does not mean humans and Neanderthals didn't interbreed, and it doesn't mean that none of us got any important genes from them. There is some fossil evidence from Portugal and Romania suggesting human-Neanderthal hybrids. Even more startling is a study published this month showing that about 70% of modern humans possess a gene for brain development (this paper goes straight for the controversy jugular!) derived from an "archaic species of homo" rather than from our African homo sapiens ancestor. Since the time of "introgression" (cross-breeding between the archaic species and the African-derived modern species, homo sapiens) was about 37,000 years ago, and the gene is overly represented in Europe and Asia but uncommon in sub-Saharan Africa (I warned you about controversy!), it's a good guess that this gene was a "gift" from a sneaky Neanderthal to the second wave of modern humans to have left Africa, the ancestors of most modern Europeans and Asians. A gift that was positively selected -- it replaced its African-derived alternative almost everywhere they were in competition -- and with which most of us are now blessed. The Neanderthal DNA sequencing study shows that the African genes won the vast majority of the other competitions.

Sunday, November 26, 2006

Are green beards ubiquitous?

This is a post is for those of you who are fellow fans of evolutionary theories of behavior.

A genetic strategy has been postulated by evolutionary theorists such as William Hamilton and dubbed by Richard Dawkins the "green beard effect." This effect has been observed in nature, though only rarely has it been clearly distinguished from other recognize-and-discriminate systems.

Green beard genes are genes (or more likely small sets of linked genes) that code for the recognition of their presence in other individuals along with discriminatory favoritism of those individuals. Kin altruism, although quite common and treated in this article as a distinct effect, can be thought of as a special case of the green beard effect. In kin altruism genes "recognize themselves" only in probabalistic assemblages, i.e. by degree of kinship (your children and siblings are guaranteed to share 1/2 of your uncommon mutations, nieces and nephews and grandchildren are 1/4 related to you, etc. Note that we are counting new and thus still uncommon mutations, not stable genes: the important question is what will favor or disfavor new mutations. Evolutionary pressure takes ubiquitous genes for granted).

"Green beard" is a misleading name as it has led scientists to look for blatant signals, but as I argue below the effects are much more likely to be subtle and parasitical on other kinds of recognition systems. (I don't know to what extent, if any, the following "green beard"/"blue beard" theory of mine is original, as I haven't thoroughly researched this literature and the theory is at least partially suggested by the papers I have read and cite here). Most evolutionary scientists have thought green beard effects would be rare because they have generally not found such blatant signals associated with clear green beard effects and because green beard effects require the simultaneous appearance of three distinct yet genetically linked traits:

(1) a detectable feature of the phenotype,

(2) the ability to recognize this feature (or the lack of it) in others, AND

(3) different behavior towards individuals possessing the feature versus those not

This argument for green beard rarity is flawed, because a wide variety of recognition systems already exist that can readily give rise to green beard genes, some of the main ones being:

+ gender recognition and sexual selection (the tendency to prefer some characteristics in mates and avoid others)

+ conspecific recognition (distinuishing own species from others)

+ kin recognition for kin altruism

+ maternal recognition of self vs. fetus

Let's call these "normal" recognition systems "blue beards." They are just as blatant or subtle as signals as "green beards." Any recognition system is imperfect: it is coded for by only some of the genes it benefits, and some of these genes will be more strongly linked than others. The more strongly linked genes automatically favor each other: they are green beard genes. Thus, almost any recognize-and-distriminate system can be expected to give rise to the following green beard cycle:

(1) green beard genes arise within an existing recognize-and-discriminate system (the blue beard genes) and spread in the population,

(2) as the green beard genes spread, the recognition system becomes noisier for unlinked (blue beard) genes,

(3) the noise has enough negative impact on unlinked blue beard genes (beneficiaries of the original recognition system) that the blue beard genes develop modifiers to suppress the green beards.

Alternatively, the green beard genes might have only a slightly deleterious effect on unlinked genes and thus might succeed. Consider the following hypothetical: a recognition system in a hypothetical cuckoo, a brood parasite, is under genetic pressure to favor blue or green tufts as these are the best ways (and blue is slightly better than green) for our hypothetical cuckoos as adults to recognize each other as distinct from their host species' adults which are red. The gene coding for the green tuft, however, is linked to the recognize-and-discriminate genes while a different gene coding for the blue tuft is unlinked. The green beard effect favors the green tuft even though is is slightly worse than the blue tuft as a signal recognition device.

A similar effect might help explain runaway sexual selection for expensive features such as peacock tails: in any sexual selection process, signal genes linked to signal recognition genes will favor each other until they become too expensive for unlinked genes: it's an arms race between the linked green beard genes and the unlinked green beard supression genes, and it may be that full elimination of the green beards is often not the equilibrium. Indeed complete elimination can't be the equilibrium since recognition systems are far from perfect, but almost complete elimination is probably the normal equilibrium. Some examples of exhorbitant display may be green beard genes effects which persist because of the unavailability of mutations for the unlinked genes to modify and thus suppress the green beard genes.

We thus can expect a red queen type arms race between green beard genes and the blue beard genes. That is just what has recently been found in the mother-fetus discrimination system (wherein the mother's cells distinguish mother cells from fetus cells and treat them differently). I expect far more effects like these to be found.
Sometimes green beard genes exist in equilibrium with a counter-effect such as lethal recessives. This has actually been observed in the red fire ant. In this ant, the kin recognition system, normally used by worker ants to recognize and kill unrelated queens, has given rise to green beard gene(s). One of these genes, a pheremone-coding gene, is always part of the green beard: at this gene locus "bb" is a lethal recessive, but "BB" also turns out to be lethal because "Bb" workers reliably recognize and kill "BB" queens just before they lay their first eggs. Thus "B" and "b" exist in equilibrium.

Only a few green beard genes have been observed in nature so far because (1) they are almost always associated with and parasitical on an existing recognize-and-discrimate systems (blue beards), and it is hard for observers to distinguish green beards from blue beards, and (2) they are mostly transient in nature: they are either soon (in evolutionary time) suppressed by blue beard genes or soon come to dominate the population, destroy the original recognition system, and become evolutionarily functionless (i.e. they don't need to code for anything any more once competition is eliminated, so they become just more junk DNA). An equilibrium like that reached in the fire ant will be a rarity.

Tuesday, November 21, 2006

Underappreciated (ii)

The potential for the application of discrete mathematics beyond computer science: in biology, economics, sociology, etc.

Hal Finney's Reusable Proofs of Work is important for at least two reasons: as a good stab at implementing bit gold, and for its use of the important idea of transparent servers: using remote attestation to verify the code running on servers.

The role of Stockholm syndrome in politics. Left as an exercise for the student. :-)

Three "silent" movies which I've had the good fortune to see on the big screen with live music: The Merry Widow, The Phantom of the Opera, and Safety Last.

Sunday, November 19, 2006

Underappreciated

Given that I subscribe to the law of the dominant paradigm, I have a soft spot in my heart for ideas that haven't gotten the attention they deserve. I try to choose such ideas to blog on. But I can't give all such ideas that I know of the necessary attention. Here are some:

Richard Dawkins himself is by now overexposed, but in his quest to convert the world to the atheist meme he, along with most of the rest of the world, has neglected his own theory of the extended phenotype. Like the metaphor of the selfish gene, this is an insight with many very important consequences. So far we've just scratched the tip of this iceberg.

Yoram Barzel is one of the most important economists of the last half century, but few people know this. Along with the much more famous Friedrich Hayek, Barzel is probably the economist who has influenced me the most. He has had a number of important insights related to transaction costs which I've confirmed repeatedly in my own observations and readings in economic history. Probably his most important insights relate to the importance and nature of value measurement. (“Measurement Cost and the Organization of Markets,” Journal of Law and Economics, April 1982 Reprinted in The Economic Foundations of Property Rights: Selected Readings, SPejovich, ed., Edward Elgar Publishing Company, 1997. And in Transaction costs and Property rights, Claude Menard, Editor, Edward Elgar publishing Company, 2004.) Another is his analysis of waiting in line (queuing) versus market prices as two methods of rationing. Waiting in line is the main means of rationing in a socialist economy but is surprisingly widespread even in our own. (“A Theory of Rationing by Waiting,” Journal of Law and Economics, April 1974 Reprinted in Readings in Microeconomics, Breit, Hochman, and Sauracker, 3rd ed., 1986).

Advanced cryptography over the last twenty-five years has come with a large number of important protocols. Public key encryption got all the hype, but it was just a warm-up. Alas, the perceived esoteric nature of the field and magical function of its protocols has apparently intimidated regular programmers away from implementing most of them. Appearances to the contrary they are based on solid math, not magic. I've blogged on some of these, but there is far more out there waiting to be picked up by mainstream computer security. Of all the advanced cryptography protocols secure time-stamping and multiparty secure computation are probably the most important.

The ideas of voluntary oblivious compliance and admonition systems from the capability security community. These are very useful in elucidating interelationships between wet protocols (e.g. manual procedures and law) and security. (By contrast I think capability security itself, and indeed the entire area of access control, is over-hyped: there are important roles for such things, for example in internal corporation access control, secure operating systems, and services where trust by all parties in corporate systems administrators is satisfactory, but they are nowhere close to being the be-all and end-all of distributed computing as often seems to be implied. Rather it's advanced cryptography where the most important advances in distributed security lie).

The whole topic of franchise jurisdiction, crucial to understanding medieval and Renaissance English law, has nevertheless long been almost completely neglected. It is also a very different paradigm of the power of courts that has been forgotten by the modern legal and political communities in favor of the Roman model of governmental sovereignty.

Almost any topic that requires knowledge from more than one academic specialty has been overly neglected: so much so that most such topics don't even exist but should.

The specific ideas mentioned are just the tip of the iceberg of underappreciated topics. Please let me know what ideas you think have been the most underappreciated. There are, I'm sure, many, many ideas out there that I should know about but don't.

Friday, November 10, 2006

Towards smarter democracy

Bryan Caplan has a great article on the irrationality of voters. (No, it's not a commentary on the most recent American election, which was probably a smidgen more rational than most, on balance). The basic idea, which I find unimpeachable except in one area, is that voters are almost never foreseeably impacted by their own votes. Single votes almost never change the outcome of elections. Even if they did they would rarely impact the voter or others in a way the voter clearly foresees. Given this disconnect between vote and consequence, votes instead are based on how good they make the voter feel. People vote in the first place, and then decide what to vote on, based almost entirely on their emotional needs rather than on a rational analysis of the kind that, for example, an engineer brings to designing software, an economist brings to crafting monetary policy, a lawyer brings to drafting a contract, a judge brings to interpreting law, or even that a boss or HR person brings to hiring a new employee.

I'd add that people use their political opinions to signal things they'd like their acquaintances to believe about their personality. For example, people support aid to the poor to signal to their friends and co-workers that they are generous people, and thus good people to be friends or co-workers with. The actual impact of any resulting policy on poor people or taxpayers or others generally remains unobserved by friends and co-workers and thus is irrelevant. Even if a friend believes the policy is mistaken, but that the opiner's heart is in the right place, this is sufficient for successful signaling. It's coming across as having a genuine desire to help the poor that counts. Similarly, people are motivated to vote in order to signal their altruistic participation in the community.

The one area Caplan fails to explore is very small-scale elections. I've long thought that juries, for example, are a much better example of democracy than large-scale elections. Jurors are forced to take the time to learn the facts (thus overcoming rational ignorance) and have a real case at hand (thus overcoming much of the mismatch between social signaling to ignorant friends and reality). They can clearly foresee the impact their verdict will have on the defendant. While Caplan extols the virtues of judges and other experts like himself (he'd like to have a Supreme Court of Economists to overturn bad economic legislation), such a Platonic oligarchy of experts needs to be checked and balanced by democracy. Juries, and the right of juries to judge law as well as fact (and for lawyers to argue law as well as fact in front of the jury), along with an unimpeachable right to trial by jury, are a much better way than large-scale elections to check oligarchy.

Wednesday, November 08, 2006

A raw idea to avoid being cooked

I come up with far more ideas than I have time to properly evaluate, much less pursue. Long ago I worked at the Jet Propulsion Laboratory and I still occasionally daydream about space stuff. Recently there have been several proposals for shading the earth from the sun, put forth to combat global warming. I've been noodling on my own sunshade idea for several years. For your entertainment (and who knows, it might also turn out to be quite useful) here it is:

Put a bunch of Venetian blinds at a spot permanently between the earth and the sun (know to orbital engineers as the first earth-sun Lagrange point, a.k.a. "L1"). These blinds would be refractive rather than reflective to minimize the stationkeeping needed to prevent being "blown" away by the pressure of sunlight. At L1 they only need to refract the light by less than one degree of angle for the light to miss the earth. Less than 2% of sunlight needs to be deflected away from earth to offset the expected global warming from "greenhouse gases," primarily carbon dioxide.

Venetian blinds, unlike this proposal, and this one, can be opened or closed to allow continued control over the amount of sunlight hitting earth. This is essential since we can't really predict with great accuracy the degrees of global warming that we will need to combat. The blinds I propose, rather than being a number of joined slats as in a normal Venetian blind, are simply a large number of separate satellites each with a refractive slat that can be manuevered to any angle with the sun (i.e. from fully "closed" vertical to fully "open" horizontal).

I propose that the blinds be placed precisely at the region where they will deflect primarily light headed for equatorial regions on earth. That will even out temperatures a bit between northern and equatorial latitudes and reduce the energy (caused by temperature differences) available for storm formation, and thus probably the intensity of storms (although the effect, like the effect of global warming itself, on storms may be negligible). But the blinds should be maneuverable enough, by using solar electric propulsion or "sailing" on sunlight pressure, to redeploy to deflect sunlight headed to extreme latitudes if polar ice sheet melting becomes a larger problem than equatorial heat.

Instead of launching these vast (or vast number of) panels from the very deep gravity well of earth or manufacturing them on the moon (which probably lacks the proper organic ingredients and even sufficient water, a crucial industrial input), we can extract the raw materials from any near-earth asteroids containing water and methane ice or, if there are none such, from Jupiter-family comets. Besides the proper raw materials being available in sufficient volume in such ice, but probably not on the moon, there are a number of other advantages to microgravity ice mining explained in that linked article. If extracting material from comets and manufacturing the blinds can be automated the entire vast project can be conducted by launching just a few dozen of today's rockets using the recently-proven solar electric upper stages; otherwise it will require manned missions similar to those recently proposed to Mars, but again using solar-electric upper stages. (Solar electric rockets are only required for the first trip; much lower cost solar-thermal ice rockets can be used in subsequent trips, again as explained in that linked article).

Of course shades don't combat other effects of excess carbon dioxide such as ocean acidification and faster and differential plant growth, but these effects alone do not justify the vast costs of reducing carbon dioxide emissions. Indeed faster plant growth is probably a major economic benefit.

My off-the-cuff estimate of cost, which is probably as good as any recent NASA estimate for any of their gigaprojects, is that the project would cost $10 billion per year over 50 years. That's for the manned version; if it could be automated it would cost far less. This is far cheaper than other space-based sunshade proposals because once initial capital costs are made and the first two or three bootstrapping cycles have been undertaken, the ongoing transport costs of material from comet to the earth-sun L1 point are extremely small.

As a side benefit it would (unlike a mission to the moon or Mars or a "base" or any similar project) develop infrastructure needed for large-scale space industry and colonization. I propose funding the project, not with a tax, but by treating the blinds like a carbon dioxide sink and auctioning extra carbon dioxide credits for a global carbon dioxide market, since the shade allows us to be far less drastic in reducing growth of carbon dioxide emissions. If instead of a market we go with carbon taxes the project could be funded from those. $10 billion per year is much lower than even the most optimistic estimates (at 1% of world GDP about $500 billion per year) of the costs of reducing carbon dioxide emissions. Furthermore, there are a variety of other markets for large-scale industry that can be exploited once the basic ice mining infrastructure is developed: space tourism and making manned missions and other transportation around the solar system vastly less expensive, for starters, as well as providing propellant, tankage, and industrial raw materials in earth orbits. As I stated in 1994:
If the output of the icemaking equipment is high, even 10% of the original mass [returned to earth orbit by rockets using water propellant extracted from the comet ice] can be orders of magnitude cheaper than launching stuff from Earth. This allows bootstrapping: the cheap ice can be used to propel more equipment out to the comets, which can return more ice to Earth orbit, etc. Today the cost of propellant in Clarke [geosynchronous] orbit, the most important commercial orbit, is fifty thousand dollars per kilogram. The first native ice mission might reduce this to a hundred dollars, and to a few cents after two or three bootstrapping cycles.
The savings for transporting materials to the earth-sun L1 point, instead of launching them from earth, are even larger.

Wednesday, November 01, 2006

Robot law

To what extent can law be mechanized? This author, Mark Miller, Lawrence Lessig, and others have proposed that software code can provide a substitute, to a greater or lesser degree, for various kinds of legal rules, especially in new software-driven areas such as the Internet. Indeed software increasingly provides a de facto set of law-like rules governing human interaction even when we don't intend such a result.

This post proposes a framework for mechanical laws in physical spaces inspired by the traditional English common law of trespass (roughly what today is called in common law countries the "intentional torts," especially trespass and battery).

Several decades ago, Isaac Asimov posited three laws to be programmed into robots:

1. A robot may not injure a human being, or, through inaction, allow a human being to come to harm.

2. A robot must obey orders given it by human beings, except where such orders would conflict with the First Law, and

3. A robot must protect its own existence as long as such protection does not conflict with the First or Second Law.

I reject these as an approach for analyzing the mechanization of law because (i) they represent a law of robot servants towards human masters, which is quite different from my present goal of analyzing the mechanization of laws among equals (whether equal as fellow property or equal as fellow property owner), and (ii) they are hopelessly subjective and computationally intractible. How does a robot determine when a human has been "harmed"? Even if that problem was solved how does a robot predict when a human will come to harm, much less how to avoid their own actions causing such harm, much less what actions will lead to avoidance of that harm? While Asimov attempted to address some of these issues in various oversimplified scenarios in his stories, this is no substitute for the real-world experience of actual disputes and settlements, and the resulting precedents and the evolution of rules.

Thus I propose to substitute for Asimov's Laws a framework which (1) is based on a real-world, highly evolved system of law that stressed concrete and objective rules rather than abstract, ambiguous, and subjective ethical precepts, (2) is "peer-to-peer" rather than "master-servant", and (3) is based, as much as possible, not on hypothetical human-like "artificial intelligence," but on a framework much of which can be tested with hardware and simple algorithms resembling those we possess today. Indeed, a prototype of this system can probably be developed using Lego(tm) robot kits, lasers, photosensors, sonar, video cameras, and other off-the-shelf hardware along with some custom computer programming using known algorithms.

Using such a prototype framework I hope that we can test out new legal rules and political systems in contests without harming actual humans. I also hope that we can test the extent to which law can be mechanized and to which security technology can prevent or provide strong evidence for breaches of law.

What about possible application to real-world security systems and human laws? In technical terms, I don't expect most of these mechanical laws to be applied in a robotic per se fashion to humans, but rather mostly to provide better notice and gather better evidence, perhaps in the clearest cases creating a prima facie case shifting the burden of lawsuit and/or the burden of proof to the person against whom clear evidence of law-breaking has been gathered. The system may also be used to prototype "smart treaties" governing weapons systems.

The main anthropomorphic assumption we will make is the idea that our robots can be motivated by incentives, e.g. by the threat of loss of property or of personal damage or destruction. If this seems unrealistic, think of our robots as being agents of humans who after initially creating the robots are off-stage. Under contest rules the humans have an incentive to program their robots to avoid damage to themselves as well as to avoid monetary penalties against their human owners; thus we can effectively treat the robots as being guided (within the limits of flexibility and forethought of simple algorithms) by such incentives.

The traditional trespasses are based on surfaces: a trespass on real property breaks a spatial boundary of that property, and a battery touches the skin or clothes or something closely attached to same (such as a tool grasped in the hand). Corresponding to such laws we have have developed a variety of security devices such as doors, locks, fences, etc. that provide notice of a surface and sometimes provide evidence that such a surface has been forceably crossed. The paradigmatic idea is "tres-pass", Law French for "big step": a crossing of a boundary that, given the notice and affordances provided, the trespasser knew or should have know was a violation of law. In our model, robots should have been programmed to not cross such boundaries without owner consent or other legal authority, ideas to be explored further below.

One way to set up this system is as contests between human programmers deploying their robots into the robot legal system. In a partially automated system there would be some human-refereed "police" and "courts," but an ideal fully-automated version would run without human intervention. Under contest rules in the fully-automated mode, after the human creators, who had an incentive to program the robots to respond to incentives, are done with their programming and the contest has commenced, only robots and other things exist in this robotic legal system. Only robots are legal persons; as such they can own other things and devices as well as spatial regions and things fixed therein (real property).

For each type of tort in my robot legal system, I propose a class of surface or other physical condition and correspondong class(es) of sensors:

(1) battery : physical surface of the robot (sensor detects touch). This touching must be the result of a physical trajectory that was probably not accidental (e.g. bumping a fellow robot on within a crowded space is probably not a battery).

(2) trespass to real property : three-dimensional surface of laser-break sensors bounding a space owned by a robot, or other location-finding sensors that can detect boundary crossings.

(3) trespass or conversion of moveable property: involves touch sensors for trespass to chattels; security against coversion probably also involves using RFID, GPS, or more generally proplets in the moveable property. But this is a harder problem, so call it TBD.

(4) assault is a credible threat of imminent battery : probably involves active and passive viewing devices such as radar, sonar and video and corresponding movement detection and pattern recognition. Specifics TBD (another harder problem).

Note that we have eliminated subjective elements such as "intent" and "harm." The idea is to replace these with deductiions from physical evidence that can be gathered by sensors. For example, evidence of a boundary crossing with force often in itself (per se) implies probable intent, and in such cases intent can be dispensed with as a conjunctive element or can be automatically inferred. With well-designed physical triggering conditions and notices and affordances to avoid them, we can avoid subjective elements that would require human judgment and still reach the right verdict in the vast majority of cases. In real world law such notices, affordances, and evidence-gathering would allow us to properly assign the burden of lawsuit to the prima facie lawbreaker so that a non-frivolous lawsuit would only occur in a miniscule fraction of cases. Thus security systems adapted to and even simulating real-world legal rules could greatly lower legal costs, but it is to be doubted that they could be entirely automated without at least some residual injustice.

Our robotic contract law is simply software code that the robots generated (or their human programmers have previously coded) and agree to abide by, i.e. smart contracts.

Three basic legal defenses (or justifications) for a surface break, taking of moveable property, or assault are:

(1) consent by the owner, expressed or implied (the former requires only some standard protocol that describes the surface and conditions for activity within that surface, i.e. a smart contract; I'm not sure what the latter category, implied consent, is in robot-land, but the "bumping in a crowded space" is probably an example of implied consent to a touch).

(2) self-defense (which may under certain circumstances include defense of property if the victim was illegally within a surface at the time), or

(3) other legal authorization.

The defense (3) of legal authorization is the most interesting and relates strongly to how robots are incentivized, i.e. punished and how robots are compensated for damages. In other words, what are the "police" and "courts" that enforce the law in this robotic world? Such a punishment is itself an illegal trespass unless it is legally authorized. The defense of legal authorization is also strongly related to the defense (2) of self-defense. That will be the topic, I hope, of a forthcoming post.

Tuesday, October 24, 2006

Things as authorities

When we hear the word "authority" we often think of people who have set themselves up in positions of power and on whom we have become dependent. But there is another kind of authority, often more reliable and trustworthy, that can be provided by things. These are physical standards, security devices, automata, and other objects by which we coordinate our interactions with fellow humans, especially with strangers who might not otherwise be trustworthy. These technologies are crucial to our modern civilization and its ability to make dealings with strangers more secure and reliable.

Authoritative automata often come in the form of what (on a computer) Mark Miller has dubbed an admonition system. An admonition system reminds a person of a plan or of a legal or ethical obligation. A clock, for example, can remind a person of a scheduled meeting, and a cash register communicates an obligation to pay.

With some extra security a device may also provide a strong affordance that requires the person to act purposefully to use it or to avoid using it, and may also gather evidence of such use or avoidance, as with tamper evidence. A locked door, for example, reminds a person about whether they have consent to enter, makes accidental entry effectively impossible, and often requires those who enter anyway to leave behind evidence of lock picking or forcible entry.

Some technologies create standards that we all come to follow, as in standard weights and measures. Old unforgeably costly standards, such as those of shells used in hunter-gatherer and Neolithic cultures and the gold standard used up to modern times, enabled the emergence of money to replace barter and other costly and inconvenient in-kind transactions. Physical standards provide objective, verifiable, and repeatable interactions with our physical environment and with each other.

When new kinds of authoritative automata are proposed, the robotic response of Hello Kitty people is that they are inflexible and impersonal and thus not to be trusted. The Roman playwright Plautus made fun of early complainer of this kind, a bum objecting to one of the earliest authoritative devices, the sundial:
The gods confound the man who first found out
How to distinguish the hours. Confound him too,
Who in this place set up a sundial,
To cut and hack my days so wretchedly
Into small pieces! When I was a boy,
My belly was my sundial -- only surer,
Truer, and more exact than any of them.
This dial told me when 'twas the proper time
To go to dinner, when I ought to eat;
But nowadays, why even when I have,
I can't fall to unless the sun gives leave.
The town's so full of these confounded dials!
But history teaches that it is the many people who act strategically against strangers who are not to be trusted. It is human preferences, not machines, that are unpredictable and incomparable, as well they should be. For coordinating our interactions with strangers, impartial automata are often crucial.
To what extent will computer algorithms come to serve as authorities? We've already seen one algorithm that has been in use for centuries: the adding algorithm in adding machines and cash registers. Some other authoritative algorithms have become crucial parts of the following:

(1) All the various protocols network applications use to talk to each other, such the web browser protocol you are probably using right now,

(2) The system that distributes domain names (the name of a web site found in an URL) and translate them to Internet protocol (IP) addresses -- albeit, not the ability to register domain names in the first place, which is still largely manual,

(3) Ranking algorithms such as Google page rank (for relevance based on a particular text search) and popularity ranking algorithms such as those used by Digg, Reddit, and the like,

(4) Payment systems, such as credit card processing and PayPal,

(5) Time distribution networks and protocols,

(6) The Global Positioning System (GPS) for determining location based on the time it takes radio signals to travel from a orbiting satellites, and

(7) A wide variety of other algorithms that many of us rely on to coordinate our activities.

Algorithms give us the potential of moving beyond the weak and reactive security of most physical devices to strong and often preventative security. Technologies such as digital signatures and mulitparty private computation may be used to implement things like unalterable audit trails, smart contracts, secure and owner-controlled property title registries, and so on. Bit gold, or property titles to unforgeably costly bits, might be possible. These automata will rely more on distribution and protocol security and less on trusted third parties than traditional authorities. There is a strong argument to be made that algorithmic authorities should be open source.

We've just scratched the surface of what secure authorities we can establish over computer networks. Such authorities will make it far easier for 6 billion plus strangers to interact with each other securely and reliably.

Monday, October 23, 2006

Fifty years ago today

Today was the start of that glorious lost cause that ultimately won, the 1956 Hungarian Revolution. That event is today's featured article on Wikipedia. Since Hungary finally won its freedom from communist rule and Soviet control in 1989, October 23rd has been a national holiday.

Communism was an ideology based on envy of the rich but resulting in devastation to all. The keys to Soviet power were control over business, borders, and ideas. Control of the "commanding heights" of the economy and in particular control over food distribution made it highly dangerous to oppose communists rulers.

The Soviet bloc severely restricted exit, a policy known as the "iron curtain." A communist state was a vast prison camp: the government fed you and you were not allowed to leave. Except for a brief period during the 1956 Revolution, this state of affairs lasted until Hungary opened its borders to free Austria in 1989, leading later that year to the fall of the Berlin Wall and freedom in Eastern Europe.

Victim of communist genocide in the Ukraine, 1930s.

The Soviets had a control over the observed reality and beliefs of its subjects that is hard to imagine in today's Internet era. The communist party owned all broadcast stations and newspapers and severely restricted smaller-scale means of communications such as telephones, small printing presses, and copy machines (and later faxes and computers). Government art encouraged secular worship of a godlike Marxist avant-garde, echoing the deification of emperors in imperial Rome.


A crucial event in fighting totalitarianism: rebels took control of a radio station from the communist media monopoly and redubbed it "Magyar Szabad Radio" (Hungarian Free Radio)

Thus, although the Soviets had already murdered millions, directly and through robbery of food and other vital supplies (as in "Ukranian famines" under both Lenin and Stalin), little was known about these events: behind the iron curtain all mention of them was excised from academia and media; outside the iron curtain they were unknown, denied, or ignored. To this day these events, collectively the greatest mass murders in world history committed by any ideological movement within a single century, remain largely forgotten thanks to the remarkably successful efforts of Soviets in destroying or simply failing to report publicly the evidence.

Meatspace blog: messages for rebels in shop window.

The resignation of the Stalin-era dictator Mátyás Rákosi under pressure from the new Soviet dictator Kruschev in July of 1956 emboldened Hungarians to speak somewhat more freely among themselves. László Rajk, judicially murdered under the Rákosi regime, was reburied and celebrated and the anti-Stalinist Imre Nagy (pronounced "Nahj") was invited to rejoin the Hungarian Worker's Party (the communist party and the only legal party). On October 16th students in University of Szeged boycotted the official party student union and reestablished the non-communist MEFESZ student union which had been banned under Rákosi. Soon students all over Hungary followed suit.

Students demonstrating.

Members of the Hungarian Writer's Union and students, numbering over ten thousand, gathered to demand reform on October 23rd -- 50 years ago today -- at the statute of General Bem, a hero of Hungary's War of Independence in 1849. Students who had brought some Hungarian flags started cutting out the hated communist red star from the flags, leaving ragged circles. By 6 p.m., the crowd had crossed the Danube to the Parliament Building. Enthusiastic locals swelled it to probably well over a hundred thousand. Some enthusiasts toppled the largest Stalin statue, leaving his boots.

Stalin's boots.

The government radio stations, the only ones allowed, railed that the crowds were "reactionary mobs." ("Reactionary" was the favorite insult of self-styled "progressives" in both the Soviet bloc and the West.) In response a crowd gathered at Radio Budapest, guared by the State Protection Authority (Államvédelmi Hatóság or ÁVH), the communist Hungarian equivalent of the U.S. FBI. When some of the crowd's leaders expressed demands for equal time on the radio to rebut the government's slanders, the ÁVH detained them and the crowd grew even angrier. Soon the ÁVH fired tear gas into the crowd, and soon after that started shooting into the crowd. Hungarian soldiers (of the regular army) were sent in to assist the ÁVH, but when some soldiers witnessed the protestors being fired on they mutinied, joining the crowd. The crowd and its new army recruits fanned out, siezing control of military depots and distributing guns. The Revolution had begun.

Rebels overan the communist party's headquarters and cut out the hated red star from the Hungarian flag.

Ghandian non-violent resistance only works where there is a well-established free press sympathetic to the resisters. This was certainly not the case behind the iron curtain in 1956. After the ÁVH fired on unarmed protestors most of the Hungarian Army sided with the protestors, defended them from the ÁVH, and helped them capture the government radio station. With control of the radio station rebels were able to broadcast their rebuttals of the government's slanders, to call for justice against the murderers of protestors, and to make their case for anti-communist reforms. Military depots were raided and arms distributed to civilian rebels, defeating communist gun control.

Sunday, October 22, 2006

The pigeonhole principle

The pigeonhole principle sounds trivial but is profound. It says that you can't fit n pigeons into fewer than n holes without cramming at least two pigeons into one of the holes. It says that somebody must lose in a game of musical chairs. In fancier mathematese, which you can safely skip if it sounds like gibberish, the pigeonhole principle says that there is no bijective (or 1-to-1 and onto) mapping (or function) between a set S and any proper subset of S, or for that matter any set smaller than S. [*]

The pigeonhole principle readily proves that there are people in Ohio with the same number of hairs on their head, that you can't eliminate the possibility of hash collisions when the set of possible input data is larger than the possible outputs, that if there are at least two people in a room then there must be at least two people in that room with the same number of cousins in the room, and that a lossless data compression algorithm must always make some files longer. This is just the tip of the iceberg of what the pigeonhole principle can help prove.

First let's prove that if there are n people in the room, where n is at least two, then there must be at least two (but not necessarily n) people in that room with the same number of cousins (of the same degree or less) in the room. In mathematese (which you can again ignore if you wish) being a "cousin" a symmetric relationship (if I'm your cousin then you're mine) and non-reflexive (I'm not my own cousin). The proof actually works for any such relationship: twins separated at birth, members of the opposite sex, and so on. Here it is, another proof by contradiction:

(1) Assume that each person in the room has a different number of cousins in the room;

(2) Putting the pigeons in their holes, one person must have no cousins, and another one cousin, and so on; the nth person must have n-1 cousins. That fills up all the holes with no doubly-stuffed holes, right?

(3) Yes, but if the nth person is a cousin with every other person in the room, then there can be nobody in the room with no cousins, so sequence (2) is an impossible contradiction, proving that in fact statement (1) is false: there must be at least two pigeons in the same hole, i.e. at least two people with the same number of cousins in the room.

Next let's prove (again by contradiction) that any lossless compression algorithm must make some file larger:

(1) Since it's a compression algorithm, by definition at least one file will be made shorter. Call the shortest such file F of size m which compresses to size n (i.e. n<m);

(2) furthermore assume no file will be made longer;

(3) thus every file of size n or less is incompressible;

(4) since no files are made longer, thus there must be at least 2^n + 1 files that compress to size n or less: all files of size n or less plus file F;

(5) but we can't fit 2^n + 1 pigeons into 2^n holes without putting two pigeons in one of the holes: in other words, at least two files must compress to the same output file, which is lossy compression;

(6) thus assumption (2) is false: if the compression is lossless some file must be made longer.

Lossless compression nevertheless can be quite effective because data is usually far from uniformly distributed among the 2^n possibilities. The most common patterns are given the shortest codes, resulting in overall compression in almost all real files that aren't already compressed, encrypted, or otherwise random.

The proofs on hairs and hash collisions are left as exercises for the student. (Don't you hate when math textbooks say that?)

An old pigeon farm, back when people actually ate these nasty critters. Presumably all the pigeons fit into all the holes.

[*] Update: this holds for finite sets; the technicalities are a bit different for infinite sets. See comments.

Friday, October 20, 2006

Three kinds of jurisdiction

Jurisdiction is the legal right of a court to order coercive process: to imprison a person, to put them on trial, to punish criminals, and to require plaintiffs with a variety of remedies (ranging from payment of damages to injunctions) at the expense of defendants. Subject matter jurisdiction is the areas of law over which a court may legally assert jurisdiction, and personal jurisdiction is those persons over which a court may assert jurisdiction.

The question of which court has jurisdiction is in theory independent of the question of which law will be applied ("choice of law" or "conflict of laws"), though they for various practical reasons they are often in fact intertwined.

Jurisdiction comes in three basic forms:

(1) Sovereign government. This is what we were taught in high school civics class -- courts have jurisdiction over us because -- well, because they're "the government," that's why. Many people now consider this the only kind of jurisdiction. However, historically sovereign jurisdiction had its origin in a much more general kind of jurisdiction:

(2) Property. One owns jurisdiction over certain subject matters, and exercises that jurisdiction over certain tenants or visitors to one's franchise territory, based on conditions in the property deed or covenant. Often the franchise territory is simply the territory of the land one owns and to which the franchise is attached, but the charter defining the franchise could specify a different territory. The largest jurisdiction is the realm itself, the jurisdiction owned by the king, and consisting of all jurisdiction in the realm not owned by others in the form of a granted or prescriptive franchise. Jurisdiction as property was historically often associated with feudal or colonial government, but the degree of decentralization possible varied radically. In its more decentralized forms (such as those of medieval Iceland, and to a lesser extent medieval and Renaissance England) this is a radically different model of jurisdiction than that based on sovereign government. More here.

(3) Contract. This has been common in various times and places, and is on the rise in many parts of the modern world in the form of choice of law and choice of forum clauses (often called "arbitration clauses" because they often specify a private arbitrator instead of a state court). Contractual jurisdiction works much better for relational disputes than for torts between strangers. Conceivably, however, a network of contracts in which people agree to delegate consent to jurisdiction could grow dense enough to cover most or even all persons who might contact each other. There are however no modern examples of this. Medieval Iceland has sometimes been interpreted as an example of universal contract-based jurisdiction, but is better viewed as a hybrid property/contract system, since it was based on a franchise-like property right called a "godord."

The U.S. Supreme Court splits on its justifications for why a state may exercise of broad jurisdiction. The view of conservative justices is just that states are sovereign over their territories, period. If the state "tags" you inside its territory you are "it" in their courts for any amount of liability, even if you were just passing through. Liberal justices have justified state jurisdiction as a kind of restitution or implied contract, described further below. Under both views you can also be hauled in from outside the state if you had "minimal contacts" with that state, for example shipping a product there.

Thoughtful political and legal scholars have long recognized that jurisdiction requires much more than brute force assertion: it requires some kind of consent of the governed. Legal scholar Lysander Spooner long ago debunked the idea that government is a "social contract" that you and I actually agreed to abide by. Neither you nor I have ever agreed to any such thing by any process resembling that of formation in contract law. The liberal justices dredge up a similar argument: by entering a state territory and performing some minimal act, such as driving on the roads, you have "availed" yourself of the protections of that jurisdiction. By driving on the road, for example, you have availed yourself of the "significant benefit" of police services, and thereby have now subjected yourself to the full sovereign jurisdiction of that state -- even if that puts you in jeopardy of a penalty far out of proportion to any benefit you have obtained, and even if the penalty is for something completely unrelated to the benefit.

For example, let's say you were married and living in New Jersey and your spouse ran off to California with the kids. You visit California for three days to see the children.

Both the liberals and conservative justices in the U.S. agree that your spouse can greatly extend your stay by hauling you into California court to dissolve your New Jersey marriage and split up your New Jersey property. But they agree on this grotesque idea for different reasons.

According to the conservatives, California is sovereign and can simply can tag you because you are in their territory. According to the liberal justices, you have "availed" yourself of the "significant benefits" of the California laws by driving on California roads, and thereby justified California gaining control over your marriage, your children, and your property. (The actual case was Burnham v. Superior Court of California, 495 U.S. 604 (1990)).

One cannot rebut the conservatives because they just make a raw assertion: a conclusory statement, not an argument. Your spouse simply needs to file a complaint and serve you with process in California territory: tag and you're it. Stay away from your spouse and kids and your New Jersey marriage and New Jersey property are safe from the tender mercies of the California courts. Take one step inside and it's all up for grabs.

The shallowness of the liberals' pseudo-contractual argument can be seen by translating it to an actual contractual setting. Suppose you stepped onto a car lot called Mike's Maserati Mecca and were talked into test driving that slick silver bullet you certainly can't afford. After a thoroughly enjoyable ride with Mike, in which you consented to follow his directions and availed yourself of the significant benefits of his hospitality, Mike presented you with a contract from the back office. He then declared that, by driving the car, you thereby agreed to buy it. The price is the standard market price, but that doesn't mean that you can afford it. Call it a "drive-wrap contract."

No court anywhere I know of would enforce this "contract": your small act of stepping into the car dealer's territory, availing yourself of property protected by Mike's security guard, and even the somewhat larger and related act of test-driving his car, in no way could be construed as consent to "rules of the territory" that include an obligation to purchase the car. Many courts have a derogatory name for this: "officious intermeddling." Another example: if the neighbor kid shows up one day and simply starts mowing your lawn, there is no implied contract whereby you owe the kid the typical price of a mown law. You may be morally or reputationally obligated in your neighborhood, depending on its norms, but it is not a legal obligation. The only vaguely analogous situation where a court will allow a person to force a contract with you is if you are completely incapacitated and desperately in need a help: if a doctor helps you, a typical court will construe the existence of a contract to pay the doctor a reasonable fee, because that is what you almost surely would have agreed to had you been conscious. This implied-in-law contract is also often called an action for "restitution": you have been unfairly enriched by the doctor, and must "disgorge" the unfair enrichment.

On the other hand, if you had started smashing on of Mike's Maseratis with a sledge hammer, Mike would under traditional common law be within his rights to restrain and arrest you for vandalism on his property. See also Semayne's Case for the implied franchise that pertains to one's house to protect it from trespass. While (in the same move away from traditional English law that gave us the doctrine of substantive sovereign jurisdiction in place of property-based jurisdiction) many jurisdictions have restricted rights to defend oneself and one's property, many other jurisdictions retain them in statute, such as the "stand your ground" statutes that give you the right to protect your property as well as yourself in your house, and in some state in your automobile and at your place of business. Similarly, if while in California you started beating your spouse, there would be no traditional common law objections to California dealing with you in defense of its resident. Committing a tort (or crime) is itself implied consent to tort (or criminal) jurisdiction.

The liberal justices with their pseudo-contractual or pseudo-restitutionary talk of "availment" to "significant benefit" giving rise to arbitrary jurisdiction do not explain why California's assertion of jurisdiction over out-of-state marriage and property is not also simply officious intermeddling. They certainly do not explain why, even if you've unfairly enriched yourself by driving free on California's roads, you should be forced to disgorge far more than the value you obtained, and in areas of your life unrelated to highway safety: your marriage, property, and children.

Assertion of sovereign jurisdiction, the kind were taught in school is the only kind, is in fact the kind of jurisdiction that is the most unjust and that is on most intellectually shaky ground. U.S. courts either simply don't try to justify it or try to justify it with absurd pseudo-contractual arguments. Like their intellectual forebears with their specious idea of a "social contract," many modern justices at least recognize the moral requirement for consent to jurisdiction. But they too fail to address the issue with intellectual seriousness, because the consequences for the law of jurisdiction would be too radical: their own courts could lose most of their power.

There are some good arguments for some sovereign jurisdiction, but they lead to a sovereignty far smaller than that exercised by the modern state. The necessity for some minimal sovereign court, to which you and I are bound "just because," seems unavoidable. For both the property- and contract-based jurisdictions there seems to be the need for at least a "night watchman" or "meta" court that determines the questions of basic jurisdiction itself. In property-based jurisdictions such as the franchises of England, the king's courts determined these questions as a matter of "trespass" on (infringement of) franchise property. It was also possible for a court to trespass on a defendant by violating basic due process rights associated with the type of jurisdiction, for example torturing the defendant or by denying right to a trial by jury. In a contract-based system, involuntary courts with large territories would be needed to determine, if disputed, the preliminary question of whether a proper contract had been formed with a proper choice of forum clause. In the U.S. this question is answered by the court with jurisdiction over the contract, usually a court of the state where the contract was formed.

Tuesday, October 17, 2006

Citron's "data reservoirs": putting liability at the wrong end of the problem

Danielle Citron has written an interesting article on liability for leaks of data like social security numbers (SSNs) that many organizations use as authenticators. Use of such weak authenticators increasingly results in failed (i.e. false) authentication ("identity theft") that harms a victim by imputing to that victims debts or bad credit history. Citron argues that the handling of such "personal data," like the reservoirs in Rylands v. Fletcher, should be deemed an "ultrahazardous activity", and thus that those who handle personal data should be held strictly liable for any damages caused in fact by the handling of that data (in particular, by leaks of that data subsequently used by "cyber-criminals" to harm a victim).

There are several things wrong with Citron's analysis:

(1) Strict liability, like other forms of liability, is generally limited by proximate cause. Indeed, I've never heard of strict liability coupled to mere cause-in-fact. If there is a data leak by Trent that enables Mallet to falsely authenicate himself as Bob, which failed authentication is then depended on by Alice resulting in harm to Bob, both Mallet and Alice are intermediate causes of Bob's harm. There is thus cause-in-fact but no proximate cause between Trent's data leak and the harm to Bob. Indeed, the typical identity theft involves a chain of causation quite remote from the data leaker and thus far beyond where courts have ever dared to tread. This is in sharp contrast to the completely unmediated causes in all previous ultrahazardous activity strict liability regimes.

The case Citron cites about the landlord being held liable for the harm of an assault inside his property arose as she states under negligence, not strict liability. Furthermore it was a rare exception, it is not the rule. In most states this would go the other way. The same issue of intermediate cause has rendered futile attempts to hold gun sellers responsible for crimes committed with their guns. The relation between the typical data merchant and the person referred to in the data is far more distant than the landlord/tenant relationship. Even the gun seller is fewer intermediate causes away from the harm of a typical murder than an SSN leaker is to the harm of a typical identity theft victim. Quite often the origin of the identity thief's false authenticator simply cannot be established, whereas the organization that depended on the false authenticator and proximately caused bad credit or false debt is well known.

(2) The article assumes data held by trusted central authorities who have the ability to protect this data at a relatively low cost, and that if they cannot protect it then society could do without the activity. The first assumption is questionable given the existence of tiny data fobs and many other ways to steal or accidentally lose data beyond the control of the organization. Citron debunks the second assumption herself by pointing out how ubiquitous and how important the use of such data is.

Furthermore, just about every organization in our society, and many individuals, handle data which could be used to harm people. It's hard to imagine articulating a rule clear enough (by, say, restricting it to specific kinds of data such as SSNs) to cover most of the risks, yet to put the risks on the major data brokers in particular but not on the rest of us. If strict liability is restricted to certain poor authenticators (e.g. SSNs) but not others (e.g. legal names), data brokers and authenticators will simply switch their activities to use the non-covered authenticators, which are often even weaker, the result being even greater levels of identity theft.

(3) Citron does not provide a clear set of rules, but clear and complely objective rules, and methods for gathering unambiguous evidence of violations, are crucial for a regime of strict liability.

(4) A much better alternative is to let liability lie on organizations that use information known to be widely distributed and often leaked, such as SSNs, as authenticators, and on organizations or individuals who most proximately cause the harm of identity theft -- those who even in good faith falsely report the victim's name to a credit bureau or try to collect a false debt from the victim that was incurred by depending on a false authentication of the victim. These situations are far more analogous to the landlord case -- like the landlord, they have established a relationship with victim; at least they have after falsely reporting the victim's name to a credit bureau or trying to collect a false debt from the victim. Indeed they are more proximate to the victim than even the identity thief: the thief fraudulently used the victim's authenticators, but the thief was not the party that directly harmed the victim by putting the false information on the victim's credit report or by attempting to collect a debt the victim did not in fact incur.

(5) Citron's "data reservoir" metaphor is facially attractive, but as with most physical metaphors applied to information it is highly misleading. The "water" (data) leaking here causes no obvious direct damage like a flood. Rather when data leaks it does not cause any damage until it is used by other parties, like water being used for irrigation. Applying Citron's reasoning to the latest e. coli contaminated spinach harm, Citron would make liable not the immediate seller of the spinach, nor the packager, nor even the grower who used the contaminated water. Instead Citron would put the liability on the rancher whose cattle produced the e. coli in the first place, even though e. coli is inevitable ingredient of manure and thus an inevitable part of ranching activity. Citron's strict liability rule would brinig the entire business of cattle ranching to an end. Just the same, in a world of laptops and fobs and a variety of other conduits, data leaks are an inevitable part of the indispensible business of handling data, and Citron's rue would devastatingly bring this business to an end.

Bottom line: liability should be put on the low-cost avoider. This is not merely a rule of negligence but a guideline for determining where any kind of liability should fall in any new area of commerce. The idea that the data brokers are the low cost avoiders in this system is highly implausible. Rather, here as with most other harms, it is those parties most proximate to the harm who can most easily prevent it. Furthermore, the evidence needed to hold parties liable will be far more reliably available for the proximate harmer than the remote data leaker.

Organizations that use widely distributed and easily leaked data like SSNs as authenticators, and who currently depend on such weak authentications for credit reporting and debt collection, can switch to more secure passwords at lower costs than would be imposed by Citron's regime. Organizations that fail to use secure authenticators, especially organizations that report information to credit bureaus or attempt to collect debts based on insecure authenticators, should bear the liability for identity theft due to the known insecurity of those authenticators, rather than organizations who inevitably leak already widely distributed data.

H/T: Emergent Chaos.

Monday, October 16, 2006

How to succeed or fail on a frontier

In the early 15th century, two nations at opposite ends of the world -- one vast and the other tiny, one an ancient and advanced civilization and the other recently emerged from a barbaric Dark Ages, one fielding large fleets with large ships, the other fielding small fleets with small ships -- both set out on the sea. Told that one of these nations was destined to travel around Africa and conquer the main sea trade routes of the world by the early part of the 16th century, any rational observer would conclude that this prophecy must refer to the vast and ancient civilization with its giant fleets. That observer would have been wrong. But why?

The vast nation, the Chinese Empire, sent abroad vast naval flotillas -- the Zheng He fleets. The main purpose of these fleets was not to develop trade, nor to protect trade, nor even to conquer. Instead, the main purpose was simply to display the glory of the Chinese Empire, which as everyone already knew was indeed the most glorious and powerful empire on the planet. A quite secondary purpose was to collect tribute, which came nowhere near the levels needed to fund the fleets.

Size of a Zheng He "treasure ship" vs. a typical Portuguese or Spanish caravel (here Columbus' Santa Maria).

These state fleets operated completely independently of the vibrant private Chinese merchant fleets that traded not only off China with Japan and Korea and the Philippines, but in Indonesia, Indochina, India, and as far as the east coast of Africa. Zheng He did not help to either protect, expand, or otherwise enable this trade. Instead Zheng He, a eunuch and master bureaucrat of the Emperor, sailed his vast fleet as far as Africa accomplishing little more than showing off the glory of the Emperor and collecting exotic animals for his amusement.

All it took was a political change for the bureaucracy to realize that these expeditions were far too expensive and ultimately pointless. But, as often occurs with politics, the Emperor overreacted and banned not only Zheng He's "treasure fleets," but also the productive trade of the Chinese merchants. The last "treasure fleet" returned in 1433 and China soon withdrew on itself.

A million-yuan giraffe, brought back to China from East Africa by a Zheng He flotilla in 1414 (click to enlarge). Not the most cost-efficient zoo acquisition, but the Emperor's ships were bigger and grander than anybody else's! In the same year, on the other side of the planet, the Portuguese using a far humbler but more practical fleet took the strategic choke-point of Ceuta from the Muslims.

Meanwhile, on the other side of the globe, a tiny nation of fishing villages and small-time crusaders set out on a different path. Assisted by navigators and investors from other parts of Europe, the Portuguese embarked on a pay-as-you go path of conquest and trade. They focused on conquering strategic points that allowed them to control, tax, protect, and enable trade. They enforced the property rights of their allied merchants and otherwise enabled the commercial institutions by which that trade could flourish.

The first little conquest was Ceuta, on the African side of the Straights of Gibraltar, the strategic choke point of the Atlantic-Mediterranean shipping routes. In 1414, at the height of the Zheng He expeditions, Prince Henry ("the Navigator") of Portugal conquered Muslim Ceuta for the Christians. Having gained this crucial strategic advantage over their Muslim and Genoan rivals, Portugal went on to conquer and settle several Atlantic island chains that had been discovered by the Genoans, including the Canaries and the Azores. The Portuguese also followed the older Genoese missions down the west coast of Africa.

At each step down Africa, the Portuguese set up trading stations. They traded European goods ranging from weapons to Venetian glass beads (used by many Africans as money and jewelry) for gold, slaves, and a variety of exotic products. At the same time the Chinese Empire was persecuting its merchants, banning them from trading overseas, the Portuguese were slowly expanding their trading posts down the coast of Africa, paying for their explorations as they went by setting up new and lucrative businesses.

Each expedition pushing farther south was a humble affair involving tiny numbers of small ships. Soon after the middle of the century, the Portuguese learned by repeated experience how to navigate out of sight of the (northern) Pole Star. Using this knowledge they made their way down the west coast of Africa in the southern hemisphere. Then they did what no Arab, Chinese, or Indian navigator had apparently done from the other direction. In 1488 Bartolemeu Dias' tiny fleet of caravels sailed around the southern cape of Africa and into the Indian Ocean. Four years later Portugal's neighbor Spain sent the Genoese navigator Christopher Columbus to Asia from the other direction, but Asia turned out to be much farther west than Columbus predicted and America sat in between.


Extent of the Portuguese maritime empire by the mid 16th century (click to enlarge). Controlled territory in green; forts and trading colonies in red. By stark contrast, China with its vast wealth, advanced civilization, and giant fleets failed to sail around Africa to set up trading posts on the west coast of Africa or Europe.

Using its now mature experience in open-seas navigation and advanced European technologies such as the cannon, as well as its good sense of affordable yet effective fighting and trading ships, subsequent Portuguese naval fleets soon conquered the main strategic choke points of Middle Eastern and Asian trade: Hormuz, Malacca, and others. Rather than ignoring merchants, they focused on controlling and enabling trade. They weren't out to show off the glory of Portugal; instead they created it. They invited investors from many other parts of Europe to send trading fleets. Trading between different Asian ports and trading European silver for exotic Asian goods both proved quite lucrative. By the early 16th century, the Portuguese had revolutionized navigation and had conquered the main trade routes of the world. Instead of Chinese fleets conquering Ceuta and Gibraltar and setting up trading posts in London and Lisbon, it was Portuguese fleets that set up trading colonies in India, Indonesia, Japan, and China. Soon other small European nations were to follow.

When it comes to the "final frontier" of space, it seems to be so far the West that has stepped into China's old shoes. What did Apollo return but glory and a handful of rocks? We proved that our socialists, if funded by taxing capitalists, could beat their socialists funded by socialists. Did such proof of bureaucratic glory really require 1% of our GDP over several years?

Apollo has been followed by several more white elephants that have much more to do with showing off the power and glory of federal bureaucrats than with military advantage or practical business. The space shuttle was originally promised to cost $36 million per flight (in today's dollars). It was supposed to greatly reduce the cost to space and thereby give rise to "space-based civilization." NASA predicted that we would have bases on Mars by the year 2000, and a generation of boys dreamed of growing up to be astronauts who traveled across the solar system.

A billion-dollar rock made of anorthosite, a very common mineral on earth as well as on the moon. But we got there first, and our rocket was bigger than theirs!

In fact the Shuttle ended up costing $1.5 billion per flight, over forty (40) times the promised price even when adjusted for inflation . The space station announced in the early 1980s and promised to be completed within a decade. But the first module was not launched (to be assembled into the greatly designed-down form of the International Space Station) until 1998. And just NASA's portion of the cost has exceeded its estimated cost for the entire program when it was first announced.

Past and current proposals for Moon and Mars bases are also nothing more than the same kind of dramatic white elephants: they have no realistic prospects of military advantage or practical business. NASA is still stuck on Werner Von Braun's sixty-year-old science fiction scenario of "space stations" and "bases" that have almost no practical use beyond showing off the power of federal bureaucrats to spend vast sums of money in dramatic ways.

There is a thread of space development that more closely resembles the pay-you-go methods of Portugal and other successful explorers and developers of frontiers. These involve launching useful satellites into orbit for communications and surveillance. As with the Portuguese, these serve both military and commercial purposes. They are not just for show. Spinoffs of these spacecraft form the flotilla of small unmanned spacecraft we have sent to by now explore all the planets of the solar system, as well as several comets and asteroids. The succesful Hubble telescope is a spinoff of the U.S. National Reconaissance Office's spy satellites. And environmental satellites have revolutionized weather prediction and climate study on our home planet. Recently, space tourism with suborbital rockets has demonstrated a potential to develop a new thread of pay-as-you-go space development largely unrelated to the prior gargantuan manned spaceflight efforts.

The Zheng He and NASA style of frontier-as-PR, where the emphasis is on showing the glory of the government, is a recipe for failure in the exploration and development of new frontiers. It is in sharp contrast to the pay-as-you go method by which tiny Portugal conquered the world's oceans, exemplified today by the practical unmanned satellites of the commercial and military efforts. It is by these practical efforts, that fund themselves by commercial revenue or practical military or environmental benefit, and not by glorious bureaucratic white elephants, that the successful pioneers will, in good time, explore and develop the solar system.