RSS

Author Archives: Andrew Owen

About Andrew Owen

Itinerant Writer

Microcomputers

The 10 most significant machines from the microcomputer age (1977 to 1993), each of which has left a legacy that can still be felt today.

  • Acorn Archimedes
  • Amstrad PCW
  • Apple II
  • Apple Macintosh
  • Atari ST
  • Commodore 64
  • Commodore Amiga
  • IBM PC
  • Osboren 1
  • Sinclair ZX Spectrum
Advertisements
 
Leave a comment

Posted by on February 24, 2016 in Uncategorized

 

Thinking Outside the Box

Once you’ve secured the software and hardware, why you’re still vulnerable and how to address it.

INTRODUCTION

This is a non-technical article, the aim of which is to raise awareness of the threats that often get overlooked when hardening software and hardware. In practice, you can only ever mitigate against security threats. For example, Symantec’s Bryan Dye has just told the Wall Street Journal that Symantec, the biggest anti-virus vendor, is getting out of the anti-virus business because the software stops at most around 45% of viruses. He says the money is no longer in “protect”, but instead in “detect and respond”. Or consider the compromising of RSA’s SecurID. The theory at the time was that a nation state was trying to get access to secrets at a military aerospace vendor but was blocked by the vendor’s use of SecurID. So instead they sent targeted email to RSA employees, which enabled them to breach the SecurID security and get what they were really after. RSA took a lot of criticism for how it responded to this attack. As an aside, that’s why it’s important to train your staff to recognize phishing emails.

If you don’t have a disaster recovery plan then when the worst happens, and I’ll just call out the heartbleed OpenSSL vulnerability as an example of the worst happening without a disaster recovery plan, because even if you changed all your passwords you know you’ll have to do it again once all of the services you use have got their new keys in place, and you’ll still wonder if anyone managed to leave any snooping software on those services while the keys were compromised.

As IT professionals, when we talk about security we’re mostly talking about confidentiality, integrity, and availability of data. We don’t want confidential data leaving the organization so we enforce a trusted device policy to ensure all BYO devices have their data encrypted and can be remotely wiped. We block the use of file sharing applications like DropBox that can lead to confidential data being stored in the public cloud and we provide users with alternatives that keep the data within the corporate network, because users really like DropBox. We lock down all the USB ports, because corporate spies have started sending out free mice with hidden malware to employees. I’m not making this up. And we use access controls to ensure people only have access to the information they need to do their job. We look after data integrity by making regular backups, and we do periodic restores to make sure those backups are working. And we make sure the data is available by doing system maintenance while the west coast of America is asleep. Ok, so outside of California your mileage may vary. So assuming you’ve done everything you should to secure your software and hardware, what have you missed? Well, I’ll get to that later.

PART I

I’ve been interested in security since the late 1980s when I got my copy of Hugo Cornwall’s Hacker’s Handbook, where I discovered the existence of the Internet, or ARPAnet as it was then known. Prior to joining the security business I worked for a retail software company where I discovered all sorts of frightening things about how card payments are processed. For instance, did you know that when chip and PIN payment was originally introduced in the UK that there was no encryption between the mobile radio units and the base stations? Thankfully that’s now been resolved.

Or, and I’m not sure if this is still the case, but I suspect so, that all the card payment transactions in high street stores are stored and sent unencrypted to the banks. Now the reason for this is because, as I’m sure you can imagine, there are a very large numbers of transactions throughout the day’s trading. Traditionally these were sent to the bank at the end of the day for overnight processing. You’ll be glad to know that these are sent over a dedicated line rather than the public Internet. But even so, they are still sitting on the host system without any encryption. And the reason for this is that the overhead added by decrypting each transaction, because they would all have to be individually encrypted and decrypted to work with the batch processing system at the banks, would have added just enough delay to ensure that eventually the system wouldn’t be able to keep up with the number of transactions. Payments would be going into the queue faster than they could be processed.

Now you may have heard of PCI DSS, that’s the Payment Card Industry Data Security Standard. And what, among other things, that standard says, is that organizations have to restrict who has access to the folder with the card payments in it. And so already we’ve gone beyond the software and hardware and we’ve got a security policy, the PCI DSS, and that policy is based at least in part on trust. Now I could spend the rest of my allotted time talking about trust, but instead I’ll just recommend Bruce Schneier’s book Liars & Outliers.

But what I want to get across here though is that software and hardware are just part of the security solution. So all retailers in the UK are supposed to be audited for compliance with PCI DSS. But according to Financial Fraud Action UK, card fraud losses in the UK for 2013 totaled £450.4 million. Now that sounds bad, but it to put it another way it’s equal to 7.4 pence for every £100 spent. And the things we have to consider here are the risk and, the cost of mitigating that risk.

The payment card industry wants to keep fraud down, but if putting in place a solution that eliminates fraud costs more than the cost of the fraud itself then it will look for a cheaper solution. So actually, even before you secure the box, you really need a security policy. Because if there’s nothing of value in the box, then you don’t really need it to be that secure. But if what’s in the box is the most valuable thing you have, then you really need to be able to deal with a situation where all of your security measures failed.

PART II

So although that was a bit of a roundabout way to get to my point, what I’m advocating is that organizations need a security policy. And vendors of security solutions, need to help their customers to think about security in this way. So what makes a good security policy? Well first of all you need to have someone with the responsibility for the policy, the chief security officer. And one of their most important responsibilities is to keep the policy under review, because the environment is changing all the time, and a static policy can’t address that.

So how do you come up with a good security policy? Well there are various things you need to take into account. But primarily it’s about working out the risk: How likely is it that someone will walk out of this facility with all this government data on a USB pen drive? And the cost: What will be the effect if this confidential information about everyone we’re spying on gets into the public domain?

So for each risk, you work out the associated cost and then you come up with a solution proportionate to the risk. Let’s go back to the early days of hacking. I’m not sure anyone ever calculated the risk of hackers going dumpster diving for telephone engineer manuals. But I’m reasonably confident that the cost of shredding all those manuals set against the risk of someone typing the whole thing into a computer and uploading it to a bulletin board system was fairly high. Now this is in the days before cheap scanners, good optical character recognition and widespread access to the Internet, which is why everyone now securely disposes of confidential documents, don’t they?

Now in the Snowden case there were a couple of things that surprised me. First, that the NSA wasn’t using mandatory access control. Or in other words they weren’t using a trusted computing solution. They were using the same operating systems as the rest of us. I think partly that can be explained by the fact that it’s expensive to get support for Trusted Solaris and similar operating systems, because almost no-one besides governments use them. And often the applications that governments want to run aren’t available on those platforms so the cost of using them may exceed their benefit in mitigating risk. But the other thing that surprised me is the practice of password sharing.

And that brings me to the main vulnerability you face if your hardware and software are secure. Your users. Kevin Mitnick, I’m assuming you’ve heard of him, if not look him up. He asserts, and I don’t disagree with him, that humans are the weakest link in security. In fact I recommend his book “The Art of Deception” if you want to know exactly how predictable and easy to manipulate people are.

So let’s look at the password sharing issue. If you put up a big enough road block for your users to getting work done, they will find a detour around it. Is it easier to tell someone your password than jump through hoops to get that one file they need? Cisco’s own password policy states that passwords need to contain at least eight alphanumeric characters, both upper and lower case letters, at least one number, and at least one special character. It also can’t be one of the previous three passwords. So what do users do? They pick dictionary words with substitutions. And then users have to change their password every six months, or quarterly if it’s an administrative password. This leads to one of two things. They write the passwords down. Or they repeatedly change their password until they cycle back to their original password. It’s pretty easy to get a valid Cisco username. They’re in all of our email addresses. If you can actually get on to a Cisco site and physically connect to the network you can just keep trying to connect until you brute force the password.

So how do you get on site? Well, this touches on the other main vulnerability, physical security. At Cisco we use our employee badges for building access and various areas are restricted to specific groups of employees. We have a policy of not holding the door open for people we don’t recognize. Unfortunately it is in most people’s nature to be helpful. If I smile at someone as they go through a door and I’m dressed appropriately, they’re less likely to question if they should have just let me follow them. Mitnick’s book is full of these kind of social engineering techniques. But actually the easiest way to get on site at Cisco is to sign up for a training course. You might have read in the news earlier this year about the gang of crooks who stole £1.25 million by going into bank branches and attaching KVM (that’s keyboard/video/mouse) switches. Reports haven’t detailed how they got into the building, but it’s safe to assume it was low tech, and they didn’t break in.

So you need to educate staff about threats. Phishing email, social engineering, not picking up USB pen drives that you find lying around and connecting them to your corporate PC. We’re short on time so I’m not even going to cover BYOD. That’s “Bring Your Own Device”, although some have called it “Bring Your Own Disaster” because of the additional risks and management headaches it entails. Ok, well I will say that the mitigation is to require BYO devices to meet a minimum level of protection: a secure password, encrypted storage, the ability to do a remote wipe. But basically, the message is that it’s all very well having a security policy, but it isn’t much use if your staff don’t know about it.

Once you’ve got a policy in place then you need to stress test it. This is where the “red team” comes in. This can be an internal group, or an externally hired group, the job of which is to attempt to penetrate your security, for instance by leaving USB pen drives lying around or sending test phishing emails. Penetration testing needs to be conducted on a regular basis, the frequency of which will depend on the risk and cost analysis, and the security policy updated following the findings.

But let’s come back to physical security, or location, location, location. In the aftermath of hurricane Sandy it seems fairly obvious to state that if you’re doing offsite backup to multiple data centers that at the very least you don’t want them co-located in the same flood plain. Of course since then everyone has looked at where their critical services are and ensured sufficient redundancy to deal with a major disaster. Haven’t they? Well actually I can think of one Cisco cloud service that has a single point of failure in that it’s primary data centers are located in the same city, which has historically been vulnerable to terrorist attacks.

But assuming you’ve got the location sorted out and you’re outside the 500 year flood plain, you’re going to want to consider alternate power sources, given the increasing demands being placed on the power grid. And when you’ve got your failover power supply in place it helps to test that it actually works. Your backups are only as good as your ability to recover from those backups so it’s important to perform regular testing to make sure that’s the case. Physical access can be controlled by physical barriers, locks, guards, but it can also be monitored by video cameras. Servers get hot, so you need to consider fire suppression systems. Ideally ones that will leave the data in a recoverable state.

SUMMARY

I’m afraid I haven’t had the space to go much below the surface, but hopefully I’ve given you some things to think about. So to sum up. You want a security policy that is under continual review and covers:

• Human Nature
• Disaster Recovery
• Physical Location
• Penetration Testing
• Social Engineering

And really the most important thing is to raise security awareness.

 
Leave a comment

Posted by on October 30, 2014 in Technology

 

The Poor Man’s Ferrari California?

CaliforniaGT86

Following on from an attempt to compare the Triumph GT6 to the legendary Ferrari 250 GTO, here’s an even bigger stretch: comparing the Toyota 86 (also known as the Scion FRS and the Subarau BRZ) to the outgoing Ferrari California (replaced by the California T).

Just as the GT6 has half the cylinders of the GTO, the 86 has half the cylinders of the California. However, it has a lot more in common than the previous comparison. The dimensions are not wildly different. The displacement per cylinder, compression ratios and specific output are quite close. Of course the Ferrari has about two and a half times the power and torque, but that means you are less likely to wrap it around a tree.

Ok, so driving a Toyota doesn’t give quite the same bragging rights as driving a Ferrari, but you look a lot less foolish stuck in traffic in the former.

Toyota 86 / Ferrari California
Wheelbase              : 101 in                      105 in
Track front            : 60 in                       64.2 in
      rear             : 61 in                       63.2 in
Length                 : 166.7 in                    179.6 in
Width                  : 69.9 in                     75.1 in
Height                 : 50.6 in                     52 in
Length:wheelbase ratio : 1.72                        1.83
Kerb weight            : 3682 lb                     3825 lb
Fuel capacity          : 13.2 US Gal                 20.6 US Gal
Bore x stroke          : 3.39 in x 3.39 in           3.7 in x 3.05 in
Cylinders              : boxer 4                     V8 in 90 degree V
Displacement           : 121.93 cu in                262.22 cu in
Type                   : double overhead cam         double overhead cam
Compression ratio      : 12.5:1                      12.2:1
Fuel system            : direct petrol injection     direct petrol injection
Maximum power          : 197 bhp @ 7000 rpm          483 bhp @ 7750 rpm
Specific output        : 1.62 bhp/cu in              1.84 bhp/cu in
Maximum torque         : 151 ft-lb @ 6500 rpm        372ft-lb @ 5000 rpm
bmep                   : 187 psi                     214.2 psi
Bore/stroke ratio      : 1                           1.21
Unitary capacity       : 499.5 cc per cylinder       537.13 cc per cylinder
 
Leave a comment

Posted by on October 22, 2014 in Motoring

 

Intellectual capital, and related intangible assets and intellectual property are the core assets of our time. What are the implications for management?

In this essay I will examine patent management. According to the United Kingdom Intellectual Property Office (IPO), a patent “protects new inventions and covers how things work, what they do, how they do it, what they are made of and how they are made.” Patents give their owner “the right to prevent others from making, using, importing or selling the invention without permission.”i Patent law varies by country, but the premise is the same. The inventor is given an exclusive right to profit from the invention for a limited period of time, 20 years in the case of the UK, but the invention is made public and after the patent has expired anyone else can use the invention without paying a royalty. Thus it could be argued that the aim of the patent system is to encourage the disclosure of new discoveries. However, for some businesses, particularly those in the field of Information Communication Technology, it could be argued that the patent system in its current form is in fact a barrier to innovation.

To receive a patent in the UK, according to the IPO an invention must: “be new, have an inventive step that is not obvious to someone with knowledge or experience in the subject, and be capable of being made or used in some kind of industry.” Whereas in the past software fell under the works that could not be patented, together with scientific and mathematical discoveries and artistic works, this is no longer the case. This change brings the UK into line with the United States. In fact in 2004, Bessen and Huntii found that software patents comprised 15% of all patents issued in the US.

One of the most high profile patent disputes of recent times is that between consumer electronics companies Apple and Samsung.iii Both companies are close business partners with Samsung acting as a major supplier of components to Apple. In April 2011, Apple filed numerous claims against Samsung over design similarities between specific models of mobile telephone and tablet computer. Samsung counter-claimed that Apple had infringed on many of its related patents. In August a German court issued a preliminary injunction, which prevented the sale of Samsung’s new tablet computer in every European Union member state, except the Netherlands. In October, Australia also banned the computer, but a month later Samsung attempted to ban the sale of Apple’s new mobile telephone in Australia. The case has now been postponed until March 2012. In the mean time, Samsung has redesigned its tablet computer in an attempt to get around the injunction.

But this is just one such case in the lucrative ‘smartphone’ and burgeoning ‘tablet computer’ markets. The Samsung products that Apple took legal action against, run the Android operating system, developed by Google. On August 15, 2011, Google acquired mobile telephone company Motorola Mobility for US$12.5, ostensibly not for its products but for its patent portfolio of 17,000 patents and 7,500 pending patents.iv Google has subsequently extended the protection afforded by these patents to other manufactures of devices running the Android operating system such as HTC.

In April 2010, Microsoft announced that it had reached a patent agreement with HTC.v In practice, this meant that HTC had agreed to pay a royalty to Microsoft on every Android device it sold. Although it has not been established if Android does in fact infringe on any of Microsoft’s patents, HTC clearly felt that it made better business sense to pay the royalty than risk action in the courts.

The above examples illustrate the difficulty companies face, both in protecting their own patents and in avoiding infringement of the patents of other companies. In a market as competitive as the ‘smartphone’ one, patents play a critical role in giving companies the edge they need to succeed.

Different companies in the ‘smartphone’ market use different structures to derive value from their patents.

Microsoft licenses its Windows Phone operating system to handset manufacturers such as Nokia who build devices using the operating system. Microsoft retains control of the technology but the device manufacturer benefits from the resources of the software giant and can concentrate its efforts on building the hardware.

Google shares its Android operating system (it is licensed under an Open Source license) but derives benefit from the OS’s tight integration with its services, which are its main source of revenue. But Google’s purchase of Motorola is an example of buying patents, in this case by buying the whole company; that is the value of the company was primarily held in its patents.

Samsung and HTC both use Android on their devices, but they also pay Microsoft a licensing. This is bullying. Android may not infringe on any of Microsoft’s trademarks but the fear of its legal department is enough to compel large consumer electronics companies to sign a deal to protect them from legal action.

Although it is now in decline, the Symbian mobile operating system, is a good example of an IPR pool. The technology was originally developed by a number of companies including Nokia, and Sony-Ericsson. It was also cross-licensed to other companies who were not in the IPR pool. However, the software became less popular and Nokia decided to license a Microsoft operating system instead of spending further resources on its own effort.

Apple has used the ‘hold on’ approach. It does not license its patents and uses them to attempt to prevent competitors like Samsung from entering the market with competing products.

In a market as mature and rapidly changing as ‘smartphones’ the sheer number of patents involved in the production of a new device acts as a strong disincentive to smaller firms. This can be seen by the dominance of large consumer electronics companies and the reduction of the top end of the market to a few brands. However, Google’s sharing of its operating system and its extension of the patent protection it gained with its acquisition of Motorola Mobile to its licensees means that, at least in theory, a smaller company could enter the market with less fear of patent infringement and its associated legal costs. In most markets the costs of searches, applications and enforcement make patents an option that only larger firms can afford to pursue.

It is also important to note the limits of patents. While Research In Motion achieved a massive success with their original BlackBerry, sales of its touch – input based devices have not been strong. The sheer momentum built up by Apple’s iPhone and iPad, their brand loyalty, and their successful marketing campaigns have all but ensured that even after the ‘patent wars’ are over, Apple will remain the dominant ‘smartphone’ and tablet computer supplier for some time. While the original iPhone was a revolutionary product, it could be argued that subsequent models have been evolutionary, rather than a radical change from the original design. Innovation in the market has come from other manufacturers and this has been generated through competition, rather than protectionism.

Patents must be renewed, and there is no global agreement on patents so that while it is possible to get EU wide protection (although local interpretation may vary as in the case of Samsung in the Netherlands), it is often necessary to file patent applications in many countries. The rules and standards vary widely. For example, prior publication is acceptable in the US, whereas in most other countries it is not. And, as we have seen, enforcement may result in multiple legal cases in multiple jurisdictions.

In summary, patents are only one aspect of intellectual property and to be useful they must be managed appropriately. In the case of ‘smartphones’, many of the available approaches have been tried at different times by different companies with varying degrees of success. It is too early to say which strategies will ultimately prove to be the most successful, but Gartner found that Android currently has a 53% share of the market, up from 44.8% last year while all other operating systems have lost share.vi This could be seen as an indication that collaboration and cross licensing is ultimately the best policy for driving both innovation and revenue.

References

i http://www.ipo.gov.uk/types/patent/p-about/p-whatis.htm
ii Bessen, J, Hunt, R. M., (2004) An empirical look at software patents, Boston University School of Law, Working Paper No. 03-17/R.
iii http://mashable.com/2011/11/23/apple-samsung-patent-wars/
iv http://news.cnet.com/8301-1035_3-20092362-94/google-to-buy-motorola- mobility-for-$12.5b
v http://www.microsoft.com/presspass/press/2010/apr10/04- 27mshtcpr.mspx
vi http://www.gartner.com/it/page.jsp?id=1848514

 
Leave a comment

Posted by on October 9, 2014 in Business

 

A Sentimental Journey

“In New York, you’ve got to have all the luck.” —Charles Bukowski

New York City Subway Map

 
Leave a comment

Posted by on October 9, 2014 in Travel

 

Zola and Dickens

“I am little concerned with beauty or perfection. I don’t care for the great centuries. All I care about is life, struggle, intensity. ” —Emile Zola

‘In the mid-nineteenth century critics routinely checked out novels for literal accuracy, as if this was understood that this was one of the products advertising promises and the novelist had better make good on it.’ He continues, ‘Novelists routinely accepted the unpleasant task of doing reporting, legwork, “digging,” in order to get it just right. That was part of the process of writing novels. Dickens travels to three towns in Yorkshire using a false name and pretending to be looking for a school for the son of a widowed friend – in order to get inside the notorious Yorkshire boarding schools to gather material for Nicholas Nickleby.

‘Social realists like Dickens and Balzac [you should read Balzac’s Le Père Goriot (1835) for a better understanding of the social and literary background of the time] seemed often to delight in realism pure and simple that it was held against them throughout their careers. Neither was regarded as a literary artist in his own lifetime (Balzac was not even invited into the French Academy). From the 1860s on, literary people – as well as critics, I should add – began to develop the following theory: Realism is a powerful device but is of trivial interest unless it is used to illuminate a higher reality … the cosmic dimension … eternal values … the moral consciousness … a road that lead them right back to the classical tradition by and by, to the idea that literature had a spiritual mission, that it “speaks to men unborn,” that it is magic, fable, myth, the mythos. By the 1920s in both France and England, the novel of social realism already seemed gauche.’ —Tom Wolfe, p55, The New Journalism, Picador, London 1990.

Naturalism and the Experimental Novel

‘New writers found the Victorian tradition both aesthetically and morally constraining, an they looked elsewhere, above all to Paris – where, in 1880, two writers well known to [Henry] James published highly influential works. Guy de Maupassant brought out his frank tale of a fat working–class girl, Boule de Suif, and Émile Zola his sexually scandalous Nana, as well as the essay Le Roman expérimental [The Experimental Novel], a literary manifesto for the rising trend of Naturalism. Zola used the term “experimental novel” in a different, more scientific, sense than we would now expect. His experiment was sociological and deterministic; he urged that, using laboratory–style methods and documentary and journalistic techniques, novelists should explore systems and processes, the laws of economics, heredity, environment and social evolution, to determine the fate of the typical, representative characters. “A symmetry is established,” he claimed, “the story composes itself out of all the collected observations, all the notes, one leading to another by the very enchainment of the characters, and the conclusion is nothing more than a natural and inevitable consequence.” This was realism schematised; individuals were subject were subject to universal systems, typified general laws; as Zola noted, “A like determinism will govern the stones of the roadway and the brain of man.”’ —Malcom Bradbury, p21, The Modern British Novel, Secker and Warburg, London 1993.

Naturalism and Realism were the emerging forms of literature. Tom Wolfe compares these forms to the emergence of the New Journalism and points to similar criticisms levelled at both. The Naturalist view is that man is simply a part of nature and as such there is no need to seek explanations of man’s existence outside the physical world. This goes against the tradition of magic, fable, myth and mythos Wolfe talks about which came out of the Romatic period of literature. The Naturalists refuse to accept cosmological, religious, or super-natural explanations for man’s behaviour. Both Dickens’s and Zola’s work is predominantly a study of the working–class in a very real sense. They went out into the world and observed, condensing what they saw into novels such as Hard Times, Bleak House, Nicholas Nickleby by Dickens and Nana, Thérèse Raquin and Germinal by Zola. Their work coincided with a general increase in literacy that allowed their novels to reach a wide audience. Both worked as journalists and Dickens’s fiction first appeared as serials in the periodicals of the day. So as far as research is concerned their methodology was very similar. However their narrative techniques are quite distinct, though neither was readily accepted during the authors’ lifetimes.

Zola

Zola saw himself as what today we might call a ‘social scientist’. In his preface to the second edition of Thérèse Raquin he says: ‘I had only one aim, which was: given a powerful man and an unsatisfied woman, to seek within them only the animal, to plunge them together in a violent drama and then take scrupulous note of their sensations and their actions. I simply carried out on two living bodies the same analytical examination that surgeons perform on corpses’ — p2, Thérèse Raquin, Émile Zola, Oxford University Press, 1992.

The introduction to the French edition sums up the portrait he paints: ‘Violence, fureur impitoyable, cannabalisme, sauvagerie, passion vivent cachés, nichés au plus creux des viscères de l’homme, de l’homme qui se targue justement (et pourtant) d’être supérieur, voire l’être supérieur. Mais qu’un petit grain de sable, qu’un vent chaud, qu’une passion vienne malgré les interdits de la société et de l’éducation, qu’une passion vienne à affleure jusqu’à la lumière des lèvres ou du cœur, c’est alors un raz de marée, un cataclysme qui s’empare du bipède le plus convenu, le plus dressé soit–il.’ — p5, Thérèse Raquin, Émile Zola, Le Livre du Poche, France.

Zola often suffers in translation to English because of his creative use of the wide variety of tenses of French prose. However the consistency of his technique can be demonstrated by comparing two sections from the begininng and middle of the book. Again this works better in French.

French p19-20, ‘Au bout de la rue…’ p99-100, ‘Laurent se donna…’
English p7 ‘At the end…mahogany boxes.” p74-75 ‘Laurant gave…grim laughter.’

Zola’ smain device is the massive use of metaphor. Germinal (Émile Zola, Penguin Books, London.) is itself one big metaphor for life with the miners being the ‘seeds’ planted in the ground to germinate. For example: p67 – the metaphor of ponies for miners, p47 – trains as phantom animals, p28 – the mine as a best devouring the miners.

‘Then, with the quiet skill of a good workman who has carefully thought out the job, he set to work. He began by sawing a panel out of the partition separating the escape shaft from the main winding shaft. By the short-lived flame of one or two matches he was able to ascertain the state of the lining and the extent of recent repairs.

‘Between Calais and Valenciennes the sinking of pit shafts met with appalling difficulties because they had to pass through enormous subterranean lakes that lay at the level of the deepest valleys. The only way to hold back these gushing springs was to construct linings of pieces of timber joined to each other like the staves of a cask. These linings isolated the shafts in tunnels through the middle of the lakes, the dark and mysterious waves of which lapped against the outside of th orlds. When Le Voreux was sunk two distinct linings had to be made; one for the upper part of the shaft where it went through the shifting sands and white clays found near chalky soils, and these were riddled with fissures and soaked with water like a sponge; and the other lower down, immediately above the coal measures, through yellow sand as fine as flour, flowing like liquid. Behind his lower lining was the Torrent, the underground sea that was the terror of the pits in the Nord department – a sea with its own storms and wrecks, unexplored, unfathomable, the black rollers of which heaved more than three hundred metres below the ground.’ p432.

When Souvarine is about to destroy the pit the detail adds to the tension:

“Look at these hands of mine – if they could do so they would take hold of the world like this and shake it into little pieces so as to bury the lot of you under the wreckage.” Souvarine – p383.

Catherine is suffocating in foul air: ‘She knew all about this foul air – dead air, miners called it – heavy asphyxiating gases at the bottom, light, explosive gases at the top which can blow up all the teams in a mine, hundreds of men, in one thunderclap. She had swallowed so much of it since early childhood that she was surprised to be taking it so badly n, with noises in her ears and a burning throat.’ p296.

Jeanlin after his accident – “he undressed the child himself, unfastening his ca, pulling down his trousers and lifting off his shirt with the skill of a nurse. And the pathetic little boy came into view , as thin as an insect, soiled with black dust and yellow earth and mottled with bloody stains. It was impossible to see anything; he had to be washed as well. The sponging seemed to make him thinner than ever, his flesh was so pallid and transparent that the bones showed through. It was pitiful to see this last decadent specimen of a race of starving toilers, this mere wisp of suffering, half crushed by the rocks. (p.189)

Dickens

By the nineteenth century the serfs had become the ‘working class’, the aristocracy remained but a new ‘business class’ had arisen and were dubbed the ‘middle class’. The working class itself could be divided into the agrarian and urban, those who still worked on the farms, and those who had moved to the cities in search of work in the new industries that were being founded at this time. The only problem with this definition is that at times the distinction between the upper-middle-class and the upper class or aristocracy becomes blurred. Dickens concentrates on the plight of the working class. Hard Times was one of his more successful novels after a low patch in the 1840s despite the success of A Christmas Carol (1843), and Dombey and Son (1848). It has been said in Hard Times and his other writings Dickens captured the contemporary popular imagination ‘as no other novelist done’.

‘The chapters of the novels Dickens wrote for weekly serial publication, like Hard Times and Great Expectations, are much shorter than those in novels like Dombey and Son or Bleak House, originally published in monthly parts. The magazine instalments often had to meet a very precise and uniform length requirement.’ — David Lodge, p167, The Art of Fiction, Secker and Warburg, London 1992.

Dickens is a very visual author. This is his description of Jacob’s Island in Oliver Twist (1838): ‘To reach this place, the visitor has to penetrate through a maze of close, narrow, and muddy streets, thronged by the roughest and poorest of the waterside people … The cheapest and least delicate provisions are heaped in the shops; the coarsest and commonest articles of wearing apparel dangle at the salesman’s door, and stream form the house–parapet and windows … he walks beneath tottering housefronts projecting over the pavement, dismantled walls that seem to totter as he passes, chimneys half–crushed, half–hesitating to fall, windows guarded by rusty iron bars that time and dirt have almost eaten away, every imaginabel sign of desolation and negelct.’

One accusation leveled at Dickens is that his characters are somewhat two dimensional but they are made three dimensional and given colour by the environments they inhabit which are described in rich detail. Dickens also uses symbolism as in Dombey and Son when describing the railway: ‘The power that forced itself upon its iron way – its own – defiant of all the paths and roads, piercing through the heart of every obstacle, and dragging living creatures of all classes, ages, and degrees behind it, was a type of the triumphant monster, Death.’

Description weather can play an important role when aided by metaphor in setting the mood and aiding the description of the scene as in Bleak House: ‘London. Michaelmas term lately over, and the Lord Chancellor sitting at Licoln’s Inn Hall. Implacable November weather. As much mud in the streets, as if the waters had but newly retired from the face of the earth, [a possible biblical reference] and it would not be wonderful to meet a Megalosaurus, forty feet long or so, [a reference to Darwinism] waddling like an elephantine lizard up Holborn Hill. Smoke lowering down from chimney-pots, making a soft balck drizzle with flakes of soot in it as big as full-grown snowflakes – gone into mourning, one might imagine, for the death of the sun. Dogs, undistinguishable in the mire. Horses, scarcely better; splashed to their very blinkers. Foot passengers, jostling one another’s umberellas, in a general infliction of ill temper, and losing their foot–hold at street corners, where tens of thousands of other foot passengers have been slipping and sliding since the day broke (if this day ever broke), adding new deposits to the crust upon crust of mud, sticking at those points tenaciously to the pavement, and accumulating at compound interest.’ p49, Bleak House, Charles Dickens, Penguin Books, London 1985.

This continues: ‘Fog everywhere. Fog up the river, where it lows among green aits and madows; fog down the river where it rolls defiled among the tiers of shipping, and the waterside pollution of a great (and dirty) city. Fog on the Essex marshes, fog on the kentish heights. Fog creeping into the cabooses of collier brigs; fog lying out on the yards, and hovering in the rigging of great ships; fog drooping on the gunwales of barges and small boats. Fog in the eyes and throats of ancient Greenwich pensioners, wheezing by the firesides of their wards; fog in the stem and bowl of the afternoon pipe of the wrathful skipper, down in his close cabin; fog cruelly pinching the toes and fingers of his shivering little ‘prentice boy on deck. Chance people on the bridges peeping over the parapets into a nether sky of fog, with fog all around them, as if they were up in a balloon , and hanging in the misty clouds.’ p49 Bleak House.

‘The raw afternoon is rawest, and the dense fog is densest, and the muddy streets are muddiest, near that leaden-headed old obstruction, appropriate ornament for the threshold of a leaden-headed old corporation: Temple bar. And hard by Temple Bar, in Lincoln’s Inn Hall, at the very heart of the fog, sits the Lord high Chancellor in his High Court of Chancery.’ p50, Bleak House.

But Dickens is whimsical too: ‘Jarndyce and Jarndyce drones on. This scarecrow of a suit has, in the course of time, become so complicated, that no man alive knows what it means.’ p52, Bleak House.

He also uses the device of repetition. For instance in Bleak House describing the death of the crossing sweeper: ‘Dead, your Majesty. Dead, my lords and gentlemen. Dead, Right Reverends and Wrong Reverends of every order. Dead, men and women, born with Heavenly compassion in your hearts. And dying thus around us every day.’

Dickens uses realism to good effect but it can become strained. This is the scene in Hard Times where Stephen Blackpool refuses to join in a Trade Union strike on conscientios grounds, note the use of vulgar speech: ‘“Stephen Blackpool,” said the chairman, rising, “think on’t agen. Think on’t agen lad, afore thour’t shunned by aw owd friends.”

‘There was a universal murmor to the same effect, though no man articulated a word. Every eye was fixed on Stephen’s face. To repent of his determination, would be to take a load from all their minds. He looked around him, and knew that it was so. Not a grain of anger with them was in his heart; he knew them, far below their surface weaknesses and misconceptions, as no–one but their fellow labourer could.

‘“I ha thowt on’t, above a bit sir. I simply canna come in. I mun go th’way as lays afore me. I mun tak my leave o’aw heer.”’ — Hard Times, Charles Dickens, Oxford University Press, 1989.

 
Leave a comment

Posted by on July 24, 2011 in Literature

 

Nomadism

“We see in order to move; we move in order to see.” —William Gibson

Nomadic herding takes place throughout North Africa and much of Asia in areas where the climate is too extreme to support permanent settled agriculture. There are two forms of nomadism; Total nomadism, where the nomad has no permanent home, and semi-nomadism, where the nomad may have a seasonal home.

The Sahel, a semi-arid belt of tropical grassland and desert shrub land on the southern edge of the Sahara is home to 25 million people. Most of the land is used by pastoral nomadic herdsmen. The nomads live in individual tribes and raise herds of cattle, sheep, goats and camels. These herds provide them with meat, milk, skins and transport. They camp in one place until the pasture is exhausted and then migrate in search of fresh vegetation.

Good pasture depends upon rainfall. There is no clear migratory pattern but migration routes increase in size under adverse conditions. In the Sahel the drought which began in 1968, providing less and less water and grass, has meant that the animals are the source of life. In dire conditions, the nomads will not part with their animals.

As the Sahel drought got worse the nomads drifted southwards, competing for water and pasture with livestock of the farming villages. This created shortages for nomad and farmer alike. Other factors aggravating this problem are increases in the number of people and livestock due to the spread of medicine and veterinary services. The population increase created a demand for more food. The increase in livestock made water and pasture necessary. As pasture shrinks overgrazing becomes inevitable.

In northern Kenya the Rendille nomadic herders find that rainfall is too low and unreliable to support settled agriculture. The Rendille have learnt how to survive an extreme environment. They rely on their animals for everything. Once they hear there is more rain elsewhere they pack their limited possessions and move on. Camels and to a lesser extent goats can survive for the time it takes to reach this destination, however this cannot continue indefinitely.

Their way of life is changing because land is becoming overpopulated and resources over-stretched as the numbers of people and animals increase. Consequently as droughts continue, pastoralists are forced to move to small towns.

 
Leave a comment

Posted by on July 24, 2011 in Society