I started school in the first grade (we had no kindergarten) in Greenwood, Mississippi in September, 1943. We had one first grade teacher and no teaching assistants for over thirty students. Our reader was Dick and Jane.
I never heard anyone complain that public schools were failing.
In third and fourth grade, I attended school in a two-room, four grade country school house in rural Tulsa County, OK. The room was spartan. No library. No hall. We entered class through a door leading directly outside. There was no bathroom. Only an outdoor privy. I rode a bus over an hour to get there.
No one complained that public schools were failing.
I attended fifth and started sixth grade in temporary classrooms in Midwest City, OK. There was one teacher for over thirty students.
No one complained that the schools were failing.
I completed sixth through eighth grades in a rural school East of Oklahoma City. There were two grades in each classroom. I had the same teacher for all four grades. Many of my classmates had never set foot out of Oklahoma County. Many had never visited the state capital, ten miles away. Many students quit when they reached sixteen.
No one complained the schools were failing.
I was taken by bus ten miles into Oklahoma City for ninth and tenth grades. On the school grounds, older boys bullied younger ones and stole lunch money. Ninth grade students showed up for class some mornings drunk. Some stole cars and went joy riding. Most smoked. Many were sexually active from about the seventh grade on. Teachers were mediocre.
No one ever said the schools were failing.
We moved to Anchorage, Alaska. I walked two miles to school every day through snow drifts, often in below zero weather before sunrise.
No one ever said the schools were failing.
I graduated from the University of Mississippi and eventually received graduate degrees from Tufts and Harvard. I had no trouble competing.
Apparently I wasn't irreparably damaged by all those public schools.
Oh, by the way, what did those schools have in common? They were segregated (except for Anchorage - we had one African American in the high school).
When did I first start hearing that public schools were failing? Not until after school integration.
Could there be a connection?
Here's a good article from Huffington Post by an author who sends his children to public schools. He explains why.
My children also went to public schools. They aren't noticeably deprived or intellectually deficient.
Saturday, June 15, 2013
When Did You First Hear That Public Schools Were Failing?
Topic Tags:
education
Quis custodiet ipsos custodes?
Who watches the watchers?
Juvenal: Satires, Book VI
Juvenal: Satires, Book VI
Topic Tags:
government,
intelligence,
journalism
Sequester: A Destructive Solution To A Non-Problem
Two years ago, the newspapers and TV pundits were warning about a vast "debt crisis."
There never was a debt crisis. There were substantial deficits resulting from the economic collapse from our real estate bubble. Economic collapse and resulting loss of jobs triggered increased expenditures on the social safety net and reduced revenue.
This was not a problem - it is a feature of our economy. It is called "counter-cyclical" expenditure, and is designed to moderate the business cycle and prevent the economy from going into a tailspin. This time, the economic collapse was so severe, it took additional measures to avoid a collapse.
It could have been worse. Much worse.
By now, it could be much better, had we acted on a scale required by the situation. But especially after the 2010 election, the House of Representatives, under Republican leadership, did everything they could to sabotage recovery.
In early 2011, the newly sworn-in Republican House threatened to shut down the government if they didn't get their way.
The result was the sequester bill.
Just as recovery was beginning to happen (though more vigorous recovery efforts would have speeded things up), the sequester is now kicking in. As a nation, we are pressing on the brake while trying to accelerate up the on-ramp of recovery.
Bad idea.
Here's what I had to say about it two years ago.
The underlying problem isn't getting better.
There never was a debt crisis. There were substantial deficits resulting from the economic collapse from our real estate bubble. Economic collapse and resulting loss of jobs triggered increased expenditures on the social safety net and reduced revenue.
This was not a problem - it is a feature of our economy. It is called "counter-cyclical" expenditure, and is designed to moderate the business cycle and prevent the economy from going into a tailspin. This time, the economic collapse was so severe, it took additional measures to avoid a collapse.
It could have been worse. Much worse.
By now, it could be much better, had we acted on a scale required by the situation. But especially after the 2010 election, the House of Representatives, under Republican leadership, did everything they could to sabotage recovery.
In early 2011, the newly sworn-in Republican House threatened to shut down the government if they didn't get their way.
The result was the sequester bill.
Just as recovery was beginning to happen (though more vigorous recovery efforts would have speeded things up), the sequester is now kicking in. As a nation, we are pressing on the brake while trying to accelerate up the on-ramp of recovery.
Bad idea.
Here's what I had to say about it two years ago.
The underlying problem isn't getting better.
Topic Tags:
economics,
government
Friday, June 14, 2013
More On Communications Intelligence
I realize my previous post on communications intelligence might have been a bit much for some readers. My excuse is that I was personally fascinated with the case of Stanley Johnston revealing through the Chicago Tribune that the US knew in advance where and when the Japanese would attack Midway. How Johnston may have learned of this remains a bit speculative.
What I find equally interesting is that Johnston, who was embarked as a journalist aboard USS Lexington (CV-2) during the battle of the Coral Sea, seems not to have been aware of the role played by communications intelligence in that battle. How did the US fleet know to be where they were at the time they were in order to engage the Japanese?
Johnston's book, Queen Of The Flattops, about the last days and eventual loss of Lexington remains a masterpiece of war coverage.
Two movies about the war in the Pacific provide some information about the role of communications intelligence: "Tora! Tora! Tora!" and "Midway." My favorite is Tora! Tora! Tora!
A recent series on public television, "Bletchley Circle," touches on the special skills of the (mostly women) who worked on breaking German codes during WWII.
Two works by Alexander Solzhenitsyn are of interest. In August, 1914, Solzhenitsyn describes the utter disaster of the Russian army at the Battle of Tannenberg, largely due to administrative incompetence in delivering radio code books to the field in time for the attack. As a result, Russian forces could only communicate with each other in the clear. The Germans knew every Russian move in advance. Whether the code books would have been effective had they been distributed is another question.
During the Winter War of 1939 between Finland and the Soviet Union, it is said that Finnish forces intercepted encrypted Soviet radio communications, transmitted the intercepts to Swedish experts at Uppsala University. The intercepts were decrypted and the information sent back to Finland. This intelligence enabled Finnish ski troops to operate with devastating effectiveness against Soviet units.
The other related book by Solzhenitsyn is First Circle. That book describes the work of Soviet convicts in developing technical means of voice recognition to identify a dissident from a recording.
These efforts were all forerunners of today's cyberwar.
What I find equally interesting is that Johnston, who was embarked as a journalist aboard USS Lexington (CV-2) during the battle of the Coral Sea, seems not to have been aware of the role played by communications intelligence in that battle. How did the US fleet know to be where they were at the time they were in order to engage the Japanese?
Johnston's book, Queen Of The Flattops, about the last days and eventual loss of Lexington remains a masterpiece of war coverage.
Two movies about the war in the Pacific provide some information about the role of communications intelligence: "Tora! Tora! Tora!" and "Midway." My favorite is Tora! Tora! Tora!
A recent series on public television, "Bletchley Circle," touches on the special skills of the (mostly women) who worked on breaking German codes during WWII.
Two works by Alexander Solzhenitsyn are of interest. In August, 1914, Solzhenitsyn describes the utter disaster of the Russian army at the Battle of Tannenberg, largely due to administrative incompetence in delivering radio code books to the field in time for the attack. As a result, Russian forces could only communicate with each other in the clear. The Germans knew every Russian move in advance. Whether the code books would have been effective had they been distributed is another question.
During the Winter War of 1939 between Finland and the Soviet Union, it is said that Finnish forces intercepted encrypted Soviet radio communications, transmitted the intercepts to Swedish experts at Uppsala University. The intercepts were decrypted and the information sent back to Finland. This intelligence enabled Finnish ski troops to operate with devastating effectiveness against Soviet units.
The other related book by Solzhenitsyn is First Circle. That book describes the work of Soviet convicts in developing technical means of voice recognition to identify a dissident from a recording.
These efforts were all forerunners of today's cyberwar.
Topic Tags:
espionage,
intelligence,
war
Thursday, June 13, 2013
Communications Intelligence: Press Disclosures In 1942 - Chicago Tribune
The Snowden affair calls to mind an earlier history of U.S. Intelligence efforts targeting communications. In the 1920's and 30's, the United States targeted foreign diplomatic and military communications. The early origins of the effort remain murky. The entire field of cryptography and cryptanalysis burgeoned after the introduction of radio communications. Intercepted radio message traffic provided intelligence analysts vast quantities of material to exploit. During World War I, the main target was Germany.
After WWI, for a time the effort continued using combined resources of the Army, Navy, State Department and Justice, under leadership of Herbert Yardley, who had headed the Army's communications intelligence effort during the Great War. This effort, known officially as the Cipher Bureau and unofficially as the American Black Chamber, continued until it was closed during the Hoover Administration in an apparent economy measure. Or, alternatively, it was closed as a result of Secretary of State Stimson's discomfort with the program. "Gentlemen don't read each other's mail," he declared.
Japan had been a major target of US communications intelligence which played a key role in US diplomatic success during the Washington Naval Conference of 1922. The Navy began its own effort at communications intelligence in 1926 (probably building on earlier efforts). Here is an account of the Navy's efforts leading up to WWII.
Something to bear in mind is that US Government efforts to intercept, decode, translate and distribute foreign message traffic was in clear violation of the Telecommunications Act of 1934. These efforts, which played a key role in US operational success in both oceans during WWII, continued to violate US law until an exception was made by statute in 1978.
In the intervening decades, there were several instances of inadvertent or unauthorized disclosure of US communications intelligence. Here is an account of what happened in 1942 concerning one such unauthorized disclosure concerning Midway:
After WWI, for a time the effort continued using combined resources of the Army, Navy, State Department and Justice, under leadership of Herbert Yardley, who had headed the Army's communications intelligence effort during the Great War. This effort, known officially as the Cipher Bureau and unofficially as the American Black Chamber, continued until it was closed during the Hoover Administration in an apparent economy measure. Or, alternatively, it was closed as a result of Secretary of State Stimson's discomfort with the program. "Gentlemen don't read each other's mail," he declared.
Japan had been a major target of US communications intelligence which played a key role in US diplomatic success during the Washington Naval Conference of 1922. The Navy began its own effort at communications intelligence in 1926 (probably building on earlier efforts). Here is an account of the Navy's efforts leading up to WWII.
Something to bear in mind is that US Government efforts to intercept, decode, translate and distribute foreign message traffic was in clear violation of the Telecommunications Act of 1934. These efforts, which played a key role in US operational success in both oceans during WWII, continued to violate US law until an exception was made by statute in 1978.
In the intervening decades, there were several instances of inadvertent or unauthorized disclosure of US communications intelligence. Here is an account of what happened in 1942 concerning one such unauthorized disclosure concerning Midway:
The Battle of Midway
continued long after the combatants retired. Because of the
confusion that surrounded the nascent and relatively unfamiliar
U.S. Navy policies governing secrecy and need to know in 1942,
the Battle of Midway was refought in the newspapers and
courthouses of three major U.S. cities - New York, Chicago, and
Washington - for several weeks after the battle actually ended.
At issue was how the Navy knew of Japanese plans, how that
knowledge came into the possession of a newspaper reporter, and
how the government should handle a serious security violation. In
the end no one was ever formally punished for revealing to the
public the role communications intelligence played in the
Japanese defeat. Whether the Japanese ever discovered that U.S.
cryptologists had successfully penetrated their most secret
operational code, or even suspected the magnitude of the warning
provided by COMINT, remains a matter of conjecture to this day.
At the time, however, officials within OP-20-G were certain that
subsequent almost draconian corrections in Japanese
communications procedures and cryptography were traceable
directly to the following events.
On 17 May 1942, the
survivors of the Lexington
were en route to San Diego and San Francisco aboard the USS Barnett
and the USS Elliot.
(One account said that Admiral Fitch and Captain Sherman were
aboard the transport Chester.)
Anticipating their arrival in the United States, CINCPAC sent the
following message to Admiral Fletcher, CTF 17, with information
copies to COMINCH and the Commandants of the 11th and 12th Naval
Districts:
It is imperative that all survivors Coral Sea action being returned Mainland be instructed that they are to refrain from any mention of the action upon their arrival west coast port. Com11 is requested berth transports where debarkation can be conducted without contact with newsmen. All personnel will probably require reoutfitting. There will be no publicity regarding this matter until Navy Department release. Barnett and Elliot will stop at San Diego to discharge excess personnel en route San Francisco.
Despite these precautions
by CINCPAC, events aboard the Barnett
resulted in even more damaging revelations than those CINCPAC had
hoped to prevent. In ancillary actions, CINCPAC learned that
medical reports filed in Navy Bureau of Medicine channels
revealed the status of American carriers after the battle. In a
hasty message on 3 June 1942, CINCPAC notified COMINCH and
requested immediate action to suppress the errant reports. At 2050 on 8 June 1942, COMINCH sent the
following message to CINCPAC:
Contents of your 311221 May were published almost verbatim in several newspapers yesterday. Article originated with correspondent Stanley Johnson [sic] embarked on [USS] Barnett until June 2d. While your despatch was addressed Task Force Commanders it was sent in channel available to nearly all ships which emphasizes need of care in using channels para. Cominch investigating on Barnett and at San Diego.
CINCPAC's message of
311221 May contained his final appreciation of the Japanese order
of battle prior to Midway.
True to his word, COMINCH
immediately convened several formal inquiry panels, which began
gathering depositions from witnesses. The panels inquired into
the circumstances aboard the Barnett,
which, in addition to most of the crew, carried the executive
officer of the Lexington,
Commander Morton T. Seligman, and a newspaper correspondent, Mr.
Stanley Johnston, back to the United States, and in Chicago in
the headquarters Colonel R.R. McCormick's newspaper, the Chicago
Tribune, where the story had originated. According to Admiral King's biographer, Thomas
B. Buell in Master of Seapower,
Admiral King "was in a white fury at his headquarters while
his staff frantically tried to discover the source of the
leak."
By 11 June all of the
principals had been interviewed. Those aboard the Barnett
were interviewed more than once. Out of this work emerged a very
unpleasant picture of official neglect and confusion concerning
the safeguarding of communications intelligence both on the Barnett
and in the newspapers. Because of the perception that newsmen
accompanying U.S. forces were sworn to secrecy, indictments of
the principal employees of the Chicago
Tribune were sought on 9 June, even before
the inquiries were completed. They were returned on 7 July by a
Chicago grand jury. At this point serious snags appeared at every
turn, and the matter lay in the hands of the grand jury and a
special prosecutor for several weeks while the navy added
depositions to a record that increasingly showed that Johnston, a
British subject, had, with the help or negligence of others,
betrayed the trust placed in him.
While many in the navy
focused on finding a suitable punishment for Johnston, COMINCH
issued another memorandum on 20 June 1942 similar to those he had
originated in March and April. It was sent to CINCLANT, CINCPAC,
and CDR- SWPACFORCE bearing the subject "Control of
Dissemination and Use of Radio Intelligence." Within the
navy this would prove to be the only remedial action to come out
of the Johnston case.
On 24 June the New York
newspaper PM published a story without attribution announcing
that the Justice Department did not plan to prosecute anyone,
either in the newspapers or in the U.S. Navy, as a result of their role in the revelations.
Ironically, three days later the navy discovered that Johnston's
own government had earlier declared him "unreliable" as
a correspondent.
It was the same government, however, that subsequently forged the
ultimate solution by addressing the correlation between the
Johnston revelations and safeguarding communications
intelligence.
On 14 July, the special
prosecutor, Mr. William D. Mitchell, transmitted his
comprehensive "Report on the Chicago
Tribune Case" to Attorney General
Francis Biddle and Secretary of the Navy Frank Knox. His
conclusion, after he had reviewed the law, the evidence, and the
circumstances surrounding the "leak," ended by
suggesting that "the game may not be worth the candle"
and that the national effort would be better served if the case
were dropped.
In the mind of the special
prosecutor, none of his major reasons for dropping the case
concerned the safeguarding of communications intelligence. Three
salient points concerning the merits of the government's case
were cited instead. All were related to the personal behavior of
the principals: "1) Johnston said (on 8 June) that he got
the information from a paper he found on his desk; 2) Two
officers testified seeing Seligman working at a table in his
quarters and that before him was a 'writing on Navy paper' giving
a list of Jap vessels divided into a 'striking force, support
force, etc.'; 3) If, as appears likely, some officer left a copy
of that dispatch lying around, it may fairly be said there was as
much carelessness on the ship as the Tribune
was guilty of, and the Jury may think so."
No further action was
taken until 15 August 1942, when the British Admiralty delegation
in Washington sent a letter to Admiral King expressing concern
that the Hearst revelations posed a danger to special
intelligence methods, that a trial would further compromise this
source, and that "preservation of this invaluable weapon
outweighs almost any other consideration." King's reply
reassured the British that the U.S. Navy would not do anything to
increase the harm already inflicted by the original news story. Five days later, the Chicago
Daily Tribune carried the front page story,
"U.S. Jury Clears Tribune." This story signaled the end
of the grand jury investigation, though no reasons were ever
given to the press by Mr. Mitchell, the special prosecutor.
What were the facts in the
strange case of Stanley Johnston? As noted above, CINCPAC 311221Z
May 42, was the message that passed CINCPAC's final appreciation
of the Japanese order of battle for the Battle of Midway to the
commanders of Task Forces 16 and 17, Admirals Spruance and
Fletcher, respectively. The message was passed in communications
channels available to other ships. Contrary to normal practices,
which expected communicators to ignore traffic not addressed to
their ship or commander, it was probably decoded by
communications officers from the Lexington
en route home from the loss of their ship at Coral Sea, who were
acting as watch standers aboard the transport USS Barnett
(AP11). Their reason for doing so may have been the presence of
the Lexington's
executive officer, Commander Morton Seligman. The message was
given to Commander Seligman, who, apparently under the impression
that he was authorized to do so, showed the message to Johnston,
who had been aboard the Lexington during the battle and was being
evacuated with the crew. Johnston and Seligman may have shared
the same quarters aboard the Barnett.
On 7 June 1942, five days
after Johnston's arrival in San Diego and one day after CINCPAC's
"POA Communique #3" appeared announcing "a
momentous U.S. victory," Johnston's story of U.S.
foreknowledge of Japanese forces and their plans appeared in the Chicago
Tribune and other newspapers in Washington
and New York.
The headlines that introduced the story on page 4A in the Washington
Times Herald for 7 June 1942 revealed
without a doubt that the author had been privy to secret material
concerning Japanese intentions and strategy: "U.S. KNEW ALL
ABOUT JAP FLEET. GUESSED THERE WOULD BE A FEINT AT ONE BASE, REAL
ATTACK AT ANOTHER."
Though he could not know
the extent of the duplicity involved, Walter Winchell, in his
column in the New York Daily Mirror,
characterized the Tribune
as having "tossed security out the window."
Understandably, Johnston's repeated denials that he had ever seen
CINCPAC's message were received with cynical disbelief in
Washington. Even his media superiors readily admitted they could
not otherwise account for the similarities.
On 8 June, following an
inconclusive meeting between high naval and newspaper officials,
Johnston and his editor in Washington, Arthur Henning, met
privately with Vice Admiral Russell Willson, Admiral King's chief
of staff. It was during this meeting, as noted by the special
prosecutor, that Johnston may have contradicted himself (Admiral
Willson was to say that Johnston "confessed") and
admitted seeing a list of Japanese vessels. With the concurrence of the secretary of the
navy and the president, Admiral King barred Seligman from
promotion forever. Seligman retired in 1944.
OP-20-G's assessment of
the damage done by the Johnston revelations took a long time to
develop primarily because the Japanese themselves were slow to
change their procedures. Nevertheless, OP-20-G maintained it was
no mere coincidence that within a few weeks of the Johnston
expose drastic changes were made in virtually all Japanese codes
and ciphers including the Japanese Fleet General-Purpose System,
which changed on 15 August, only two months into the current
cipher. Consistent with these changes, navy monitors also noted
the omission of message serial numbers beginning on 15 August and
a major change in the Japanese callsign system on 1 October 1942.
All of the Japanese
refinements were justifiably described by OP-20-G analysts as
serious threats to their capability to produce current
intelligence.
Thus, it is difficult to say at this point that a single event
occurred that prompted Admiral King to decide what course of
action he would take. It may have been OP-20-G's concern that a
jury trial would have even more painful consequences than those
already experienced, or Admiral Willson's reading of the meeting
he had had with Johnston, or the trauma of preparing highly
classified testimony to be given before a Chicago grand jury.
Clearly, Admiral King had decided not to implement the 7 July
grand jury indictment when he responded to the British letter in
August; and the evidence suggests, albeit weakly, that as early
as 20 June he had begun to regret even seeking the indictment.
Throughout the Johnston
affair, OP-20-G consistently sought a plausible cover story to
minimize the damage already done. They appealed to King for
future safeguards to prevent the loss of a vital advantage to the
navy. King's reiteration of his restrictions on distribution on
20 June, while perhaps not all that OP-20-G wanted, strongly
suggested that these appeals were heard.
Questions concerning the
appropriate applications of communications intelligence to
wartime emergencies of all types continued to arise. One problem
addressed in December 1942 affected how newspapermen and radio
broadcasters treated information they knew originated from enemy
communications. A new paragraph was prepared for insertion in the
"Code of Wartime Practices for the American Press" by
the secretaries of war and navy and sent to the director of
censorship for implementation:
ENEMY COMMUNICATIONS
To the end that the enemy may not have information concerning any success the U.S. may attain in deciphering his encoded or enciphered communications, no mention should be made of available or captured enemy codes or enemy ciphers, or about the intelligence gained from intercepting and studying enemy radio messages.
A prestigious trade
journal gave immediate approval to the addition while at the same
time registering the idea that after the war censorship should
not continue. After citing a post-Pearl Harbor report that
"monstrously exaggerated" U.S. losses as an example of
irresponsible behavior, the editorial concluded with some ideas
that are still relevant:
As between an ethical professional requirement that a journalist hold nothing back and a patriotic duty not to shoot one's own soldiers in the back, we have found no difficulty in making a choice. Freedom of the press does not carry with it a general license to reveal our secret strengths and weaknesses to the enemy.
It was not until 1985 that
anyone from the Pacific COMINT centers received any formal
recognition for his contribution to either the Coral Sea or
Midway victories. In 1985, in response to a massive outpouring of
affection from his friends, Joseph Rochefort received the
Distinguished Service Medal posthumously from the secretary of
the navy. For the rest, their epitaph was most fittingly
expressed by a perfect stranger many years later:
History, with its
flickering lamp, stumbles along the trail of the past, trying
to reconstruct its scenes, to revive its echoes, and kindle
with pale gleams the passion of former days. What is the
worth of all this? The only guide to man is his conscience.
The only shield to his memory is the rectitude and sincerity
of his actions. It is very imprudent to walk through life
without this shield, because we are so often mocked by the
failure of our hopes and the upsetting of our calculations,
but with this shield, however the fates may play, we march
always in the ranks of honour.
Topic Tags:
history,
intelligence,
journalism,
war
Wednesday, June 12, 2013
Less Or Fewer? Not Just A Linguistic Pet Peeve - A Logic Trap
Yesterday's Scientific American addressed in a blog one of my linguistic pet peeves: the increasingly common failure of speakers to distinguish between meaning and usage of "less" and "fewer."
It seems mighty simple to me. If you count it, the reduction in number is referred to as "fewer." If you measure it, the word is "less."
Scientific American explains the distinction as deriving from the mathematical concepts of "continuous," which applies to things you measure, or "discrete," applying to things you count. Here is the article.
It seems mighty simple to me. If you count it, the reduction in number is referred to as "fewer." If you measure it, the word is "less."
Scientific American explains the distinction as deriving from the mathematical concepts of "continuous," which applies to things you measure, or "discrete," applying to things you count. Here is the article.
Topic Tags:
language,
mathematics
Return With Us Now To The Thrilling Days Of Yesteryear
Many commentators have observed that North Carolina is rapidly undoing a century of relatively progressive legislation. In Yesterday's Washington Post, Katrina vanden Heuvel explains how that came about.
The answer: money.
The answer: money.
Topic Tags:
politics,
state government
NSA, Metadata And History
Recent disclosures that NSA has been collecting data, perhaps massive amounts of so-called meta data, on telephone, internet and social network communications calls to mind some history.
From the very beginning of the Republic - and even before, intelligence played a major role in our revolution. Consider the mobilization of patriots in New England to resist and outwit the Redcoats intending to seize the arms and military provisions of the local militia. There was not only the midnight ride of Paul Revere (and others) that fateful 18th of April in '75. There was all the preparatory work.
The Concord militia removed their heavy cannon from the armory and buried the big guns in hidden locations. They relocated gunpowder and other supplies. They hid as much of the other provisions and weapons as they could. How did they know what the British intended? Intelligence. Collected by bartenders, artisans and ordinary citizens who interacted with soldiers and officers in their every day dealings. Their observations came together in time to warn militia of the British move on Lexington and Concord.
Make no mistake, the British were collecting intelligence as well. But they faced the same dilemma that occupiers throughout history have faced - whom to trust and how to evaluate the information gathered. In today's parlance - how to tell the "good guys" from the "bad guys." Even worse, how to suppress the insurrectionists without arousing animosity among those on the fence? They never solved the problem.
And what of Paul Revere?
Suppose the British had been able to uncover the role of key individuals, illuminate their relationships and round up the leaders? Could they have done this without overhearing actual conversations or intercepting letters?
Suppose all they had was a list of members of various New England organizations. What could they have learned?
As it turns out, they might have been able to arrest and interrogate the whole conspiracy. One of the keys was Paul Revere.
Last week, Kieran Healey, a Duke University Sociologist, posted a very interesting examination of how the British might have been able to use what is now called "metadata" to catch Paul Revere. Metadata is apparently what NSA is collecting from Google, Verizon and other sources. Here is his post.
Here is a more detailed article on Paul Revere's ride by political scientist Shin-Kap Han. The metadata in both articles is drawn from David Hackett Fisher's book, Paul Revere's Ride. Another of David Hackett Fisher's books, Washington's Crossing, gives a good feel for the effectiveness of Washington's intelligence networks during the campaign in New Jersey and the increasing frustration of British intelligence.
All of this preceded the U.S. Constitution.
Even the central trade offs between liberty and security - a dilemma of the present age, was apparent before the Constitution:
They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.
Benjamin Franklin, 1775
From the very beginning of the Republic - and even before, intelligence played a major role in our revolution. Consider the mobilization of patriots in New England to resist and outwit the Redcoats intending to seize the arms and military provisions of the local militia. There was not only the midnight ride of Paul Revere (and others) that fateful 18th of April in '75. There was all the preparatory work.
The Concord militia removed their heavy cannon from the armory and buried the big guns in hidden locations. They relocated gunpowder and other supplies. They hid as much of the other provisions and weapons as they could. How did they know what the British intended? Intelligence. Collected by bartenders, artisans and ordinary citizens who interacted with soldiers and officers in their every day dealings. Their observations came together in time to warn militia of the British move on Lexington and Concord.
Make no mistake, the British were collecting intelligence as well. But they faced the same dilemma that occupiers throughout history have faced - whom to trust and how to evaluate the information gathered. In today's parlance - how to tell the "good guys" from the "bad guys." Even worse, how to suppress the insurrectionists without arousing animosity among those on the fence? They never solved the problem.
And what of Paul Revere?
Suppose the British had been able to uncover the role of key individuals, illuminate their relationships and round up the leaders? Could they have done this without overhearing actual conversations or intercepting letters?
Suppose all they had was a list of members of various New England organizations. What could they have learned?
As it turns out, they might have been able to arrest and interrogate the whole conspiracy. One of the keys was Paul Revere.
Last week, Kieran Healey, a Duke University Sociologist, posted a very interesting examination of how the British might have been able to use what is now called "metadata" to catch Paul Revere. Metadata is apparently what NSA is collecting from Google, Verizon and other sources. Here is his post.
Here is a more detailed article on Paul Revere's ride by political scientist Shin-Kap Han. The metadata in both articles is drawn from David Hackett Fisher's book, Paul Revere's Ride. Another of David Hackett Fisher's books, Washington's Crossing, gives a good feel for the effectiveness of Washington's intelligence networks during the campaign in New Jersey and the increasing frustration of British intelligence.
All of this preceded the U.S. Constitution.
Even the central trade offs between liberty and security - a dilemma of the present age, was apparent before the Constitution:
They who can give up essential liberty to obtain a little temporary safety, deserve neither liberty nor safety.
Benjamin Franklin, 1775
Topic Tags:
history,
intelligence
Subscribe to:
Posts (Atom)