Sovereign Choices

Holger Schmieding, London’s Berenberg Bank Chief Economist, is dismayed that the UK might quit the EU.  The subtitle of his op-ed piece in the WSJ fully sums up his concern:

Rules from Brussels can border on the absurd, but what hurts the UK most are the policies its own politicians enact.

It also demonstrates how badly he misses the point of the movement to leave the EU.  It’s certainly true that Parliament is fully capable of enacting, and it often does enact, utterly foolish policies.  But at least they’d be sovereignly done, and not forced on them by a remote, extra-national quasi-government.

The PRC and the RoC

The Republic of China has elected a patriot as its president to replace Ma Ying-jeou, who spent his term acquiescing to nearly every PRC demand.  Tsai Ing-wen, with her countrymen’s welfare in mind as well as her nation’s short-term interests, is interested in stable relations with the PRC, but she’s not interested in “reunification.”  That’s why she was elected, too: neither are her fellow RoC citizens.

Despite this, The Wall Street Journal has editorialized in a different direction:

Ms Tsai faces a challenge of resetting Beijing’s expectations.  One way to do so might be to present herself as a mediator between Chinese leaders and increasingly nationalistic Taiwanese citizens.

No.  There’s nothing to mediate.  There’s no need to equivocate, either; equivocation just plays into the PRC’s hand and facilitates its long-term effort to conquer the RoC.

Encryption and Safety

Senators Richard Burr (R, NC) and Dianne Feinstein (C, CA), in their op-ed in The Wall Street Journal, demonstrated their lack of understanding of the relationship between security and safety.  Their piece’s title, Encryption Without Tears, illustrates their basic misunderstanding of the inherent tension between the two, here encryption and safety.

In an increasingly digital world, strong encryption of devices is needed to prevent criminal misuse of data.  But technological innovation must not mean placing individuals or companies above the law.

Neither can technological backdoors be allowed to place government above the law.

Over the past year the two of us have explored the challenges associated with criminal and terrorist use of encrypted communications.

But they’ve apparently spent not a red sou on exploring the challenges of a private citizens or private enterprises need for and use of encryption to protect themselves from criminal, and terrorist, and yes government misbehaviors.

Then they cited a couple of examples to illustrate their thesis; I’ll cite one of those below, because it so clearly illustrate the opposite and some interlinkage of the Left’s position on American safety (and disappointingly, Burr’s lack of thought).

…the Islamic State-inspired terrorist attack last year in Garland, Texas.  FBI Director Jim Comey said the attackers “exchanged 109 messages with an overseas terrorist” the morning of the shooting, but the FBI cannot access those messages to determine the exact role of Islamic State in the shooting and how to help prevent future attacks.

There’s no doubt that being able to read those messages would have been very useful.  However, Burr and Feinstein carefully neglect to mention that the Islamic State-inspired terrorist attack was stopped in its tracks and the terrorists killed on the spot by armed American citizens who were alert, on the scene, and unafraid to act.  The San Bernardino attack, for which Comey went to court to try to force Apple to break its own security algorithms (under the false claim that Apple’s efforts were absolutely necessary, mind you—until the FBI broke the algorithms with other means), occurred in a by-government-mandate gun-free zone, which ensured that only the terrorists had guns.  We’re left to speculate on how far the casualty list would have been reduced had the victim population been allowed to be armed themselves.  As the Left likes to say, though, “If it saves only one life….”

Yet Burr and Feinstein are “circulating” a draft bill:

The draft proposal requires a person or a company—when served with a court order—to provide law enforcement with information (in readable form) or appropriate technical assistance that is responsive to the judicial request.  This will enable law enforcement to conduct investigations using the communications involved in criminal and terrorist activities.

Our draft bill wouldn’t impose a one-size-fits-all solution on all covered entities….

The judicial request.  Carefully vague.  It may be the case, though, that their bill wouldn’t impose a one-size-fits-all solution.  No, it’ll just require an ex post back door to be created, one that’s usable for future “situations,” too, and the aggregation of which will allow government snooping.

It’s just this sort of Government arrogance, or even merely disingenuousness, against which we have such extensive protections against overreaching government men.  The government isn’t even pretending to act in good faith on this matter, as Comey’s behavior in that Apple case demonstrates.

Private encryption, with no backdoors, and an armed population.  That permits an optimum mix of security and safety and encryption with a minimum of tears.  Backdoors on Government demand permits the least mix of security and safety, broken encryption guaranteed to generate tears.

Market Choice?

Can’t have that.

The Obama administration is locked and loaded for a fresh push on gun control initiatives—reportedly moving to advocate for so-called “smart gun” technology….

Smart gun technology research may well be a good idea, and having smart guns—weapons that can be fired only by their legitimate owners—certainly seems like a good idea.

Even Government involvement in funding basic research—the secrets of the universe kind of thing—or doing its own basic research might be a good idea.

However, Government involvement in engineering research, which smart gun tech development surely is, and Government involvement in determining, or even merely jawboning, what products it wants in a free market most assuredly are not legitimate.

These are matters for private citizens, private enterprise, and the market place to determine.

Full stop.

Cyberthreat Information Sharing

The public and private sectors need to increasingly declassify and divulge critical information if the U.S. is to set up effective cyberthreat organizations, according to a report released Wednesday by PwC that sets out a blueprint for how those groups could be set up.

That would certainly lead to faster responses to hack attempts—committed by anyone, whether governments foreign or domestic or criminals—and to more efficient hardening against present and future hack attempts.

Unfortunately, FBI Director James Comey has already written off the concept of public sector—at the Federal government level, anyway—cyberthreat sharing.

That’s a very clear indication of what this administration and its potential Progressive-Democrat successor administration thinks about Government controls.