The Best Of The Dish Today

No, we aren’t done with bollocks. But I shifted from the Weiner circus to the broader issue of the morality – or otherwise – of virtual sex.

If there’s one argument I’d like to emphasize today is would be this one about why the Catholic Church cannot adopt a hate-the-sin-love-the-sinner paradigm with gay people, as the last Pope, for all his faults, recognized. It’s incoherent and incompatible with much deeper teachings of the Gospels, as this Pope clearly expresses in his tone and inclusiveness.

Two words: President Palin.

The most popular post of the day was “The Fragile Faith Of Fox News.” Second was my take on Tina Brown and Sally Quinn’s exasperation with dickmanship.  My post “This Extraordinary Pope” is the most popular of the last week.

It was one of those summer days on Cape Cod when only the bugs remind you that you haven’t died and gone to heaven.

See you in the morning.

Another Way For The Earth To Die

600px-Venus_globe

It could become another Venus:

The “runaway greenhouse” — which is thought to have happened on Venus in the past — is basically a climate change worst-case scenario: We reach a critical point where the atmosphere is so thick with greenhouse gases that no sunlight can escape back into space, the planet heats uncontrollably, the oceans evaporate completely, and things get, well, pretty uncomfortable, to put it mildly. “Everything is really quite dead at that point,” Colin Goldblatt, a planetary scientist at Canada’s University of Victoria, says in a chipper English accent. Goldblatt has been working to understand whether a runaway greenhouse could ever happen on Earth.

Scientists have long believed that even with extreme greenhouse gas concentrations, our sun simply doesn’t heat the planet enough to trigger this effect. But using a series of custom computer programs that model incoming sunlight, greenhouse gas concentration, radiation absorbed by water vapor, and a host of other physical factors, Goldblatt has revised that threshold down, and in a paper published Sunday in Nature Geoscience says that a runaway greenhouse could kick off with the amount of sunlight we get today.

Clouds act as Earth’s saving grace:

So, what’s keeping us cool? The [paper’s] authors suggest two things. The first is that our atmosphere isn’t uniformly saturated with water; some areas are less humid and allow more heat to radiate out into space. The other factor is the existence of clouds. Depending on their properties, clouds can either insulate or reflect sunlight back into space. On balance, however, it appears they are key to keeping our planet’s climate moderate.

But clouds won’t help us out indefinitely. Long before the Sun expands and swallows the Earth, the amount of light it emits will rise enough to make a runaway greenhouse more likely. The authors estimate that, with an all-water atmosphere, we’ve got about 1.5 billion years until the Earth is sterilized by skyrocketing temperatures. If other greenhouse gasses are present, then that day will come even sooner.

(Image of Venus via Wikimedia Commons)

Brainwashed By Jihad

Andrew O’Hagan visits a juvenile detention center in Kandahar, where he finds two types of children: those who committed petty offenses and child jihadis. Here’s his portrait of the latter:

Beltoon was told that the index finger of his right hand was the Shahadat, the finger of ‘witness’, the digit of Allah. He was told he must use this finger on the suicide vest to be sure of his place in paradise. He must be sure to flick the switch firmly with this finger. (A Unicef worker explained: ‘When the Kalima-e-Shahadat is said in Tashahhud during the prayer, all the fingers except the index should be lightly closed like a fist, keeping the thumb with the middle finger in a circle. It is sunnah – following what the Prophet did – to raise the index finger.’) In this way the mentors suggest that what they are doing is part of an Islamic ritual and Beltoon was convinced he had found the best way to raise himself to the pinnacle of respect and into a life much greater than this one.

Beltoon was close to a boy called Sahim, also 15. After six months in Quetta they were driven to a local house in Kandahar province for further ‘initiation’. They got to know the location where they would do their holy work. Sahim appeared to have no end of enthusiasm for the planned attack. He enjoyed speaking to Beltoon about the logistics. He couldn’t wait. Early in 2012 the boys were dropped off on a street near the American base. They were walking side by side and saying nothing when an Afghan soldier near the entrance to the base saw them. They seemed unsure what to do – Sahim pushed Beltoon and they argued for a moment – and the soldier ordered them to stop and he summoned other military. The boys’ suicide vests were removed on the spot and that night they were taken to the detention centre in Kandahar. Beltoon hasn’t seen his mother again but a message was sent to him encouraging him not to give up hope. ‘Maybe next time,’ she said.

New Life For A Dead Language

Latin is making a comeback on a cutting-edge platform:

In January, not long before stepping down, [Pope Benedict] launched a Latin language Twitter account that has since attracted more than 130,000 followers. People have used it to follow the visit to Brazil of the new pope, Francis. By comparison, the Polish papal Twitter feed has slightly more than 108,000 followers whereas Spanish, the most popular of the papal accounts, has more than 3m. …

Latin’s succinctness makes it ideal for Twitter’s 140-character epigraphs and aphorisms. Five words can often say more than ten English ones, according to David Butterfield, a Latinist at the University of Cambridge. He also believes that the language is suited to journalism: “Whatever the first tongue of the reporter, and regardless of the native language of the subject matter recounted, Latin will allow a precise and direct summary,” he says.

The above tweet is from the account of Pope Francis and is called Summi Pontificis Breviloquentis –“the briefly speaking supreme pontiff”

For Her Love Of The Game

Stacey May Fowles pushes back against a Tom Maloney article making light of a surge in female fandom at Blue Jays games. From Maloney’s piece:

The percentage of women within the Gen-Y group at Rogers Centre jumped to an astounding 50 per cent from 30 per cent over a two-year span. … “It’s fun, like a concert,” says [game attendee Emily] King, 29, who works in advertising and lives within an easy stroll of the stadium. “I’m not sure we’re actually watching the game, to be clear. … It’s the best patio in the city, the best people-watching in the city.”

“It’s outside, it’s social,” says [Olivia] Polak, 30, in ophthalmology and living 30 minutes away. “We’re here with like eight other girls for a bachelorette party instead of just sitting in a bar. It’s not expensive and we can ‘watch’ the game – in quotations.”

Fowles counters:

I certainly don’t deny that these kinds of fans exist—but I cannot agree that they’re a problem. … The actual problem lies in consistently putting this very limited depiction of women’s relationship to sports into the world. It does real exclusionary damage in terms of attracting new fans, a project that both makes good economic sense and goes far in improving the overall experience for everyone.

This idea that women don’t really watch permeates sports.

Last year, The Score Blog’s Ellen Etchingham brilliantly summed up our severely limited viewpoint of female sports fandom in her reaction to While the Men Watch, CBC’s abhorrent hockey feed for women. In it, she describes the dominant stereotype as follows: “Women don’t understand sports. Women don’t care about sports. If women watch sports, they only do so because a man pushes it on them. Women are interested in fashion, cleaning, shopping, and men.”

She further articulates how offensive it is for female fans to have this heteronormative femininity constantly pushed on us by the media, as many use sports to actually escape that very thing. For Etchingham, hockey has acted as a haven, a break from strict societal norms. “For many of the so-called serious female fans, watching the game is one of the best social avenues for meeting people and hanging out in a relatively ungendered way,” she explains. “Being into sports allows us to be guys, not in the sense of men, but in the sense of participants in a laid-back, friendly, easygoing social milieu that doesn’t feel defined by gender lines. Many female fans explicitly resist the category ‘female fans,’ because for us part of what is great about being a fan is the sense that female or male doesn’t matter so much.”

Quote For The Day II

Pope Francis Attends Celebration Of The Lord's Passion in the Vatican Basilica

“Ask for the grace of shame; the shame that comes from the constant dialogue of mercy with Him; the shame that makes us blush before Jesus Christ; the shame that puts us in tune with the heart of Christ who is made sin for me; the shame that harmonizes our heart in tears and accompanies us in the daily following of “my Lord”.

And this always brings us, as individuals and as a Company, to humility, to living this great virtue. Humility that makes us understand, each day, that it is not for us to build the Kingdom of God, but it is always the grace of God working within us; humility that pushes us to put our whole being not at the service of ourselves and our own ideas, but at the service of Christ and of the Church, like clay pots, fragile, inadequate, insufficient, but having within them an immense treasure that we carry and that we communicate,” – Pope Francis at a mass today to celebrate the feast of Saint Ignatius of Loyola, the founder of the Jesuit order.

(Photo: Pope Francis prays on the floor as he presides over a Papal Mass with the Celebration of the Lord’s Passion inside St Peter’s Basilica on March 29, 2013 in Vatican City, Vatican. By Dan Kitwood/Getty Images.)

The Latest Leak

Greenwald reports new details on a surveillance system known as XKeyscore, which, according to NSA PowerPoint slides, allows an analyst to search a user’s emails, chats, and browser history after obtaining an email, IP address, or enough metadata:

[T]raining materials for XKeyscore detail how analysts can use it and other systems to mine enormous agency databases by filling in a simple on-screen form giving only a broad justification for the search. The request is not reviewed by a court or any NSA personnel before it is processed. XKeyscore, the documents boast, is the NSA’s “widest reaching” system developing intelligence from computer networks – what the agency calls Digital Network Intelligence (DNI). One presentation claims the program covers “nearly everything a typical user does on the internet”, including the content of emails, websites visited and searches, as well as their metadata.

As usual, Ambers provides a thorough walkthrough:

XKEYSCORE is not a thing that DOES collecting; it’s a series of user interfaces, back end databases, servers and software that selects certain types of metadata that the NSA has ALREADY collected using other methods. XKEYSCORE, as D.B. Grady and I reported in our book, is the worldwide base level database for such metadata. XKEYSCORE is useful because it gets the “front end full take feeds” from the various NSA collection points around the world and importantly, knows what to do with it to make it responsive to search queries. As the [NSA’s PowerPoint] presentation says, the stuff itself is collected by some entity called F6 and something else called FORNSAT and then something with the acronym SSO. …

I should probably refrain from being more specific. FORNSAT simply means “foreign satellite collection,” which refers to NSA tapping into satellites that process data used by other countries. And SSO — Special Source Operations — refers to the branch of NSA’s Signals Intelligence Division that taps cables, finds microwave paths, and otherwise collects data not generated by F6 or foreign satellites. Basically, everything else. The presentation suggests that the NSA collects internet traffic from 150 sites — specific facilities — worldwide.

Drum considers its implications for domestic surveillance “murky” so far:

Greenwald suggests that this validates Snowden’s statement in an earlier interview that “I, sitting at my desk, certainly had the authorities to wiretap anyone, from you, or your accountant, to a federal judge, to even the President if I had a personal email.” But that’s not clear at all.

X-KEYSCORE appears to be a database search tool, not a real-time surveillance tool, nor does it appear to give anyone “authority” to wiretap a U.S. citizen. Rather, it hoovers up tremendous volumes of foreign communications, which can then be searched by NSA analysts. As Greenwald points out, there are known “compliance problems” with NSA’s surveillance programs, since communications by U.S. persons with foreign targets end up in the same database and can therefore end up on an analyst’s desktop. The NSA’s minimization procedures are supposed to prevent such “inadvertent” targeting of U.S. persons, but as Greenwald reported earlier, there are plenty of exceptions to this rule.

Charles Johnson is also skeptical of Glenn’s portrayal of the system:

Greenwald, searching for “warrant” immediately brings up the most important point, buried in the tenth paragraph under tons of exaggeration and hyperbole:

Under US law, the NSA is required to obtain an individualized Fisa warrant only if the target of their surveillance is a ‘US person’, though no such warrant is required for intercepting the communications of Americans with foreign targets. But XKeyscore provides the technological capability, if not the legal authority, to target even US persons for extensive electronic surveillance without a warrant provided that some identifying information, such as their email or IP address, is known to the analyst.

That’s right — once again, Greenwald is not documenting any actual wrongdoing. It’s a very deliberate rhetorical trick he uses over and over — conflating the ability to do something with actually doing it, and glossing over the fact that there are very serious legal consequences in store for anyone who actually does abuse these systems.

Shane Harris wonders if the PowerPoint obtained by Snowden – which was created in 2008 – is overselling the capabilities of the actual system:

The proponents of a particular tool or program frequently create promotional materials like the XKeyscore presentation to encourage analysts to use their technology, and to promote interest among lawmakers who control the NSA’s budget. This was true of a slide presentation describing the PRISM system revealed earlier by the Guardian and the Washington Post, the official told Foreign Policy. It had “made the rounds” of intelligence agencies and offered exaggerated claims about PRISM’s capabilities, such that it was the biggest contributor of information to the president’s daily intelligence briefing. This official strongly disputed that PRISM was so extraordinary.

The XKeyscore presentation claims that “over 300 terrorists [were] captured using intelligence generated from” the tool. It also claims to be able to search more deeply in different data sets than other NSA data miners. But if there is more to be said about how precisely XKeyscore can do this, it’s either not in the document or is contained on the handful of slides that have been blacked out.

Derek Mead notes that at the very least, “the existence of the program contradicts claims by government officials that the NSA doesn’t have the capability to tap emails in real time”:

It’s not clear if the system is still in use, but the system’s scalability is yet another reason the NSA’s Utah data center is of concern. Also not clear is what legal checks the system has. The materials boast that an analyst can easily do a thorough search of an individual’s online history with a lone piece of identification—say an email, or an IP address. As Glenn Greenwald notes, the NSA is required to get a court order from the secret FISA court to spy on Americans, but regardless, XKeyscore appears to offer (or have offered) an incredible ability to access user data with little difficulty.