Saturday, June 16, 2007

Sachs Reith 2007 - Lecture Four - Social engineering

From Jeffrey Sachs' 4th Reith Lecture on alleviating poverty in Africa ...
BBC Radio 4 - Reith Lectures 2007 - Lecture 4: Economic Solidarity for a Crowded Planet:

.. .The fourth challenge, excessive population growth, is similarly susceptible of practical and proven solutions. Fertility rates in rural Africa are still around 6 children or more. This is understandable, if disastrous. Poor families are worried about the high rates of child mortality, and compensate by having large families. Poor families lack access to contraception and family planning. Girls often are deprived of even a basic education, because the family cannot afford it, and are instead forced into early marriage rather than encouraged to stay in school. And the value placed on mothers' time is very low, in part because agricultural productivity is itself so low. With few opportunities to earn remunerative income, mothers are pushed - often by their husbands or the community - to have more children.

Yet, as shown by countless countries around the world, fertility rates will fall rapidly, and on a voluntary basis, if an orderly effort is led by government with adequate resources. Investments in child survival, contraceptive availability, schooling of children, especially girls, and higher farm productivity, can result in a voluntary decline in total fertility from around six to perhaps three or lower within a single decade. But these things will not happen by themselves. They require resources, which impoverished Africa lacks...
Ahhh. I have thought so much and so long about this very topic. The story of that would take far too long to tell, so instead I shall tell a story from the year 2015. It has been 3 years since the Zorgonians first landed their saucers at the UN ...
... No more disease. Our children shall live centuries. Zorgonian technologies will allow us unlimited energy production with no greenhouse gas emissions. It is all we have dreamed of, and yet ...

... The Zorgonians have not demanded any price, but already we can see that we must change to fit their complex world. We cannot interpret their alien emotions, but it is clear they have little patience or interest in our religious traditions. They are suggesting a program of aggressive eugenics; in their world there is no tolerance for the weak or the slow. Bleeding heart liberal or NASCAR fan -- neither win the favor of these alien peoples. To run with this pack, we must abandon all but the strong.

They offer us devices that will extend our mind and reason, but those who use them seem so different, so uninterested in the things we love and treasure ....

... Is their gift worth the price?
I trust the analogy is obvious. A wonderful prize offered, but a prize with a Faustian price. African peoples who accept Sach's agenda will be transformed, and they know that well. To us the transformation is worth the prize -- we don't particularly care for genital mutilation anyway. The recipient's opinions will vary.

When I was a 1st year medical student in 1982, still reeling from the the complex adventures of a year in Asia studying fertility programs, I wrote a long and garbled paper on social engineering for a McGill medical school elective course (my first use of a word processor by the way). It was clear, even back in 1982, that dramatic fertility transitions were associated with radical changes in social structures. Women, in particular, rose quickly. Many men saw their power base shrink. Mating preferences changed. Traditions were being destroyed, new social structures were emerging. Why not face this fact, I thought, and think about how to deliberately engineer the transition to technocentric modernity? There must be many ways to covertly destroy a social order and rebuild a new one....

My poor medical anthropology elective course supervisor nearly died, and my medical career almost ended before it began. I might as well have written a paper for Opus Dei advocating sainthood for Satan. I'm not quite sure how I survived.

I was a naive idiot. Also young. And yet, 25 years later, the reality has not changed. I hope and pray Africa will emerge from poverty, undergo a demographic transition, and flourish in a technocentric world. The price, however, will be high.

Expensive toxic toy trains from ...

Well, where do you think they come from? 

Thomas the Tank Engine Toys Recalled Because of Lead Paint - New York Times

... The affected Thomas toys were manufactured in China, which has come under fire recently for exporting a variety of goods, from pet food to toothpaste, that may pose safety or health hazards. “These are not cheap, plastic McDonald’s toys,” said Marian Goldstein of Maplewood, N.J., who spent more than $1,000 on her son’s Thomas collection, for toys that can cost $10 to $70 apiece. “But these are what is supposed to be a high-quality children’s toy.”

Ms. Goldstein’s 4-year-old son owns more than 40 pieces from the Thomas series, and seven of them were on the recall list, including the Sodor deluxe fire station, a footlong piece that is a little heavier than the average train...

Yawn. No surprises here. Lead Christmas light wiring, toxic fake flour in dog food, poisoned toothpaste, counterfeit medicines that don't work, counterfeit surgical supplies, fake glycerine that kills, etc, etc.

Not that there's a trend or anything.

Oh, yeah, and the toasters and such.

This time around the toy company has plausible deniability. That's not true going forward. Manufacturers now know what they can expect, if they're not assuming rampant fraud in China's marketplace then they're criminally negligent. Emphasis on the criminal part ...

More whacko terrorists - is this why we're still standing?

Schneier is back. Actually, he was never gone. The feed I was using to track him had been abandoned; I finally decided to see why he was silent and found a new feed. That's a relief, I was worried when he didn't seem to be commenting on the routine incompetence of our guardians and government. This time he's reviewing the latest news of a terrible plot foiled, and putting it in the post-9/11 context ...

Schneier on Security: Portrait of the Modern Terrorist as an Idiot

... I don't think these nut jobs, with their movie-plot threats, even deserve the moniker "terrorist." But in this country, while you have to be competent to pull off a terrorist attack, you don't have to be competent to cause terror. All you need to do is start plotting an attack and -- regardless of whether or not you have a viable plan, weapons or even the faintest clue -- the media will aid you in terrorizing the entire population.

The most ridiculous JFK Airport-related story goes to the New York Daily News, with its interview with a waitress who served Defreitas salmon; the front-page headline blared, "Evil Ate at Table Eight."

Following one of these abortive terror misadventures, the administration invariably jumps on the news to trumpet whatever ineffective "security" measure they're trying to push, whether it be national ID cards, wholesale National Security Agency eavesdropping or massive data mining. Never mind that in all these cases, what caught the bad guys was old-fashioned police work -- the kind of thing you'd see in decades-old spy movies.

The administration repeatedly credited the apprehension of Faris to the NSA's warrantless eavesdropping programs, even though it's just not true. The 9/11 terrorists were no different; they succeeded partly because the FBI and CIA didn't follow the leads before the attacks.

Even the London liquid bombers were caught through traditional investigation and intelligence, but this doesn't stop Secretary of Homeland Security Michael Chertoff from using them to justify (.pdf) access to airline passenger data.

Of course, even incompetent terrorists can cause damage. This has been repeatedly proven in Israel, and if shoe-bomber Richard Reid had been just a little less stupid and ignited his shoes in the lavatory, he might have taken out an airplane....

It's a great review, I encourage everyone to read the entire essay. Schneier has put a lot of related material in one place. So what lessons can we draw from this history?

Well, we already know our leadership is incompetent and that they inflate threats in order to further their political agendas. That's not a useful lesson. The more interesting trend is the matching incompetence of our terrorists.

The 9/11 crew had engineers among them. Engineers are dangerous. Since then we've had schizophrenics, cognitively disabled persons, people with personality disorders, and no real engineers that I know of. It's been a very unimpressive crowd. The only times they seem to get inventive is when undercover FBI agents give them ideas.

Imagine if Bruce Schneier were a terrorist. We wouldn't stand a chance. We're still standing because, as near as we can tell, our enemies have been unable to recruit geeks, intellectuals, and the nerdy special forces types that work for us. Maybe there's something about al Qaeda's 14th century agenda that doesn't appeal to anyone with insight.

I think George Bush has been (unintentionally) working very hard to recruit higher quality terrorists. I only hope he's been as unsuccessful with that effort as he's been with everything else he's touched, because the alternate theory is that we're only catching the idiots ...

Friday, June 15, 2007

Krugman again, this time syndicated

Krugman was recently caught posting on TPM Cafe. Nice, but no feed.

Today DeLong pointed to a DeLong post on an European econ site, but this site has a Paul Krugman feed. I'll track it and see what happens.

Fall of The Economist - resting with Al Jazeera?

The Economist has fallen a long way in the past ten years:
Transparency for thee but not for me | FP Passport:

... A new study out from the International Center for Media and the Public Agenda measures just how candid media are about what they do and how they do it. ICMPA's newest study looks at 25 of the world's top news sites to see which ones correct their errors, are open about their journalistic standards, and welcome reader comments and criticism.

Which were the best?

* The Guardian
* The New York Times
* The Christian Science Monitor
* National Public Radio

Which were among the worst?

* Time magazine
* Al Jazeera
* CNN
* The Economist
Back when I was a happy subscriber The Economist seemed quite able to admit a mistake. That was about ten years ago. It's been a nasty tumble ever since ...

verschärfte Vernehmung and George W. Bush

Not much gives me chills in these waning days of Cheney/Bush rule. All the outrage seems to have been spilled. What more can be said? This, though, gave me chills (via DeLong)

Scott Horton, writing in a Harper's blog ...

"Defending Enhanced Interrogation Techniques" by Scott Horton (Harper's Magazine)

Before there were “enhanced interrogation techniques,” there was verschärfte Vernehmung, (which means “enhanced interrogation techniques”) developed by the Gestapo and the Sicherheitsdienst in 1937 and subject to a series of stringent rules. Now, as we have seen previously, there were extremely important differences between the Gestapo’s interrogation rules and those approved by the Bush Administration. That’s right—the Bush Administration rules are generally more severe, and include a number of practices that the Gestapo expressly forbade...

and here Horton quotes Sullivan:

... In cross-examination BEST was shown a document which stated that the commander of the security police and SD was authorized to use verschärfte Vernehmung in Kracow. He said it was his impression that this type of interrogation was adopted in order to discover the underground movements in Poland, which had come into being at that time. Describing the use of verschärfte Vernehmung in Denmark, the witness HOFFMANN reiterated that third degree methods were based on a legal decree which authorized them. Disciplinary action was always taken against those concerned with excesses. In general, third degree was applied only when the saving of German lives required it. In this connection he instanced the use of such methods in order to find the whereabouts of arms and explosives belonging to the underground movement. The GESTAPO in general believed that other methods of interrogation, such as playing off political factions against each other, were much more effective than third degree methods. Verschärfte Vernehmung had to be approved by his head office and approximately 20 were allowed for Copenhagen (see reference to the case of Colonel TIMROTH).

and Horton concludes ...

... what was the sentence the Norwegian war crimes court deemed appropriate for those convicted of the use of verschärfte Vernehmung? Death.

This is why CIA interrogators needed Bush's legal shelters. They expect that with it they, Cheney, and Bush will all escape unscathed. They're probably right.

Still.

One day, this may be seen as a very dark time. A darker time than those who live in it now realize. We've grown accustomed to it, but our children and grandchildren may see things differently (and yes, in part I protest here in hopes it will lessen their scorn).

One day Bush, Cheney, and many others may find it difficult to fly places. There may be many nations they cannot visit with confidence. One day, they may even find a future American government is no longer willing to shelter them ...

A fraud victim's false victory and the high tech industry that supports identity theft

SFGate, a San Francisco news site, puts on optimistic spin on the chance capture of a woman who did very well as an identify thief. Alas, the reality is not at all encouraging (emphases mine)...

How victim snared ID thief / She chased down woman who had given her 6 months of hell

... Nelson took off again. In front of West Coast Growers, she dropped a wallet into an abandoned shopping cart. Lodrick, still after her, picked up the wallet -- also Prada -- and found an entire set of identification, including credit cards, a Social Security card and a debit card all in the name of Karen Lodrick. Later, when she returned to the bank that had been her original destination that morning and took possession of the lost driver's license, it was a perfect forgery -- with a hologram and a California seal -- and it had Lodrick's name but Nelson's photo and physical characteristics.

"You can buy the technology (to add marks and holograms) on your computer from companies that have legitimate government contracts and then make a lot of money selling the technology to people they must know are not legitimate," Fairbairn said. "Millions and millions of dollars." The black market, he said, is "a growth industry."

... In November 2006, her postal carrier told Lodrick that master keys to the neighborhood's mailboxes had been stolen. Soon afterward, Wells Fargo informed her that there was suspicious activity in her accounts.

Using the stolen keys, Lodrick believes, Nelson made off with an unsolicited mailing from the bank. Lodrick said it contained two debit/credit cards she had not requested and, worse, a statement for a certificate of deposit that included her Social Security number. Personal identification numbers for the cards were in a separate envelope.

It took only three days for Nelson to raid the accounts for about $9,000 through withdrawals and purchases, bank records show....

Dealing with the consequences of somebody pretending to be her and ringing up purchases of computers, jewelry, clothing, groceries, cigarettes and liquor took a day or two of Lodrick's time every week. There were the credit card companies to hassle with and credit agencies and banks, especially her own bank.

Lodrick calculates that as a self-employed consultant, she lost $30,000 in unearned income between November and Nelson's apprehension in late April. Wells Fargo eventually restored to her accounts all the money Nelson had withdrawn.

... "the bank was horrible. I felt they thought I was comical. I kept dealing with different people. Three different times they told me I'd have to come in and ID the (security camera) photo, that I hadn't done it."

... Lodrick changed bank accounts and identification numbers, only to find that Nelson had again broken into her mail and stolen the new information and was still after her accounts.

...What Lodrick didn't know is that they were neighbors, living only three blocks apart.

In the end, that photo of Nelson in her distinctive coat was her undoing. On June 6, she pleaded guilty to one felony count of using another person's identification fraudulently. She was sentenced by Superior Court Judge Harold Kahn to the 44 days she had already served in county jail and three years' probation...

Lodrick, who made a statement at sentencing, was dissatisfied. "I can't believe it," she said. "I went through six months of hell, and she's going to get probation? She was on probation when she victimized me. Obviously, probation's not helping."

Nor did Nelson, 31, appear to be remorseful. When she entered the courtroom in her orange jail jumpsuit and saw Lodrick, she smirked and waved at her. Judge Kahn chastised her for her attitude...

To summarize the obvious:

  • The banks (Wells Fargo in this case) don't care all that much. They'd care a lot more if they were liable for a victim's pain, suffering, and lost income.
  • The justice system isn't set up to deal with this kind of crime. Identity thief a pretty good profession for someone who doesn't mind having a criminal record. It's the same story for stealing checks btw, offenders are usually put on probation - again and again. What's new is that income opportunities are now much greater.
  • The thief was not particularly bright or inventive, but she was able to plug into a "franchise model"
  • Above all, high technology vendors are, at a minimum, closing their eyes to the crooked intermediaries who buy their products. In the case of InfoUSA, they went so far as to develop products that were primarily designed for crooks. Arms dealers in general, and gun manufacturers in particular, of course, have made an art form of this over the centuries.

It's part of this meme.

So what do we do?

  1. Make the banks liable for more than the money lost. Maybe ten times more. That would incent them to change their behavior.
  2. Go after the legitimate suppliers. That means going after companies like InfoUSA and whoever supplied the id manufacturing equipment that was used in this case. These are companies with deep pockets and a business to protect. This may require changes to laws. The arms dealer industry may provide some good lessons.

Thursday, June 14, 2007

Dyer - four new essays

Dyer has four new essays up. Enjoy.
Articles 2007
May 31 The War of Six Days and Forty Years
June 4 Don't Mention the Warming (G8 and Climate Change)
June 8 Calling the BMD Bluff
June 11 India: The Price of Choice
He takes PayPal donations, but needs to adopt Amazon instead. I don't do PayPal.

Botnets, ovarian cancer, MySpace "offenders" and Bayes

What do botnets, "symptom" definition for ovarian cancerMySpace "sex offenders", homeland security passenger screening have in common?

They all teach us that we need to start teaching Bayesian analysis in 7th grade.

Consider the FBI's guideline for knowing your home PC is a zombie bot:

BBC NEWS | Technology | FBI tries to fight zombie hordes

...The organisation said it was difficult for people to know if their machine was part of a botnet.

However it said telltale signs could be if the machine ran slowly, had an e-mail outbox full of mail a user did not send or they get e-mail saying they are sending spam.

Of these only the last is a useful clue, and it's a stupid bot that leaves such obvious traces. Does any Windows machine not run slowly? It's the very nature of XP that machines slow as they age, a disturbingly familiar trait. The emails "you have sent spam" are either the result of forged headers or they're traps by bot harvesters to recruit victims.

In other words, these tests have weak sensitivity, very weak specificity, and no predictive value. The advice is worse than worthless because, if followed, it would cause vast expense and produce no value. (ISPs can detect bots however, and they should be held liable for failing to detect and notify.)

Ovarian cancer?

...The symptoms to watch out for are bloating, pelvic or abdominal pain, difficulty eating or feeling full quickly and feeling a frequent or urgent need to urinate. A woman who has any of those problems nearly every day for more than two or three weeks is advised to see a gynecologist, especially if the symptoms are new and quite different from her usual state of health...

Gynecologist? Sigh. Family medicine is truly dead. Anyway, this basically translates to a very inefficient but reimbursable screening program. The symptoms are completely nonspecific, so we're basically doing massive amounts of vaginal ultrasound. It would probably be better to simply start a screening program, but focus on persons with known risk factors. Lots of easy money for gynecologists though. Gee, I wonder who wrote up the recommendation?

MySpace? We've covered that one before. A test with low specificity, low sensitivity, lousy predictive value, and it may be used by law enforcement too. 

Passenger screening? See MySpace. Same techniques, same problems. The new regulations that every US traveler to Canada or Mexico have a passport, aka a true national ID card, will make matches less unreliable however. The test will then become more specific.

Bayes, Bayes, Bayes. We need to start teaching it in 7th grade.

Wednesday, June 13, 2007

The Economist on China's toxic export problem

The Economist, through teeth firmly clenched, admits that China has a product quality problem. Even so, with eyes firmly averted, they fail to note that Europe does not have problems with toxic food imports and they omit mention of cyanuric acid and melamine contamination of farm feed. Lastly, while quietly seizing, they reluctantly point out that (hurrah!) the lawyers are riding to our rescue ...
China's food safety | Economist.com

...For foreign businesses, the lack of quality control in China is not someone else's problem. Several lawyers have argued that, since Chinese regulatory bodies are demonstrably unfit for purpose, any company accepting Chinese exports with official quality or safety certificates could theoretically be held liable for problems that subsequently emerge. Once again, this dilemma highlights the importance for companies of detailed knowledge of their supply chains in China, and of not taking documentary or verbal assurances at face value. To help deal with such challenges, bigger companies should establish their own internal quality-control mechanisms. But for smaller traders, the costs of such systems could undermine their profitability. For many importers then, the best acid test may well be that if a product's price looks too good to be true, it probably is.
Poor Economist. This is hard for them. The last bit, though, is worth all the omissions. Leave it to the law to figure out a way around the offshore legal shelter. In retrospect, I suppose this is like buying stolen goods from a crooked pawnshop. A reasonable buyer should know a genuine Rolex watch costs more than twenty-five dollars, a reasonable US manufacturer or importer should know that China's supply chains are not trustworthy. US manufacturers know juries will be ... sympathetic. Sympathetic, that is, to the heroic and soon to be extremely wealthy lawyers. It's rare to be able to earn so much money in the defense of the good.

A democratic legislative majority means the GOP will not be able to blunt the legal assault. Let loose the dogs of law ...

Tuesday, June 12, 2007

Cosmic Variance's Sean Carroll on the arrow of time

I've been reading Sean Carroll's posts on Cosmic Variance, not realizing until now that he's a research associate at my alma mater. I guess blogs really are infested by amateurs destroying our culture of knowledge ...

Sean's presentation is pretty readable for the interested layperson ...

Sean Carroll: Why Is the Past Different From the Future?

... In such a universe, everything we think we "remember" ... about the past is ... a mistake.

Dinosaur skeletons arose spontaneously out of dirt.

It's been a busy road to reading material like Sean's. It started when I came across this comment in Wired  last February:

Even the best theories to explain how entanglement gets around this problem seem preposterous. One, for example, speculates that signals are shot back through time. Ultimately, the answer is bound to be unnerving: According to a famous doctrine called Bell’s Inequality, for entanglement to square with relativity, either we have no free will or reality is an illusion. Some choice.
- Lucas Graves, New York City-based writer

As near as I can tell Lucas was simplifying a bit. The complete absence of free will (aka. life in God's movie or the Tralfamadorian perspective) goes back originally to Newton (determination by mechanics) then to Einstein (determination by time slice perspectives) and returned with the transactional interpretation of QM. The good news for the non-Calvinists among us is that the evidence (as I read of it) favors the non-existence of independent reality over the kind of absolute determinism where not only dinosaurs arise from dirt, but all of space and time arise spontaneously and (seemingly) coherently.

So what does all this have to do with Carroll's talk? Well, it seems plausible that the "arrow of time" has something to do with predetermination or non-determination and that it should also have equivalences in both cosmology and quantum mechanics. Here's Carroll's conclusion about where time comes from in the view cosmology - it involves the infinite multiverse ...

...If the universe lasts forever but has no equilibrium
state, we naturally obtain an arrow of time.

It’s crucial that the way in which the multiverse
creates more entropy is to make universes like ours...

Further I cannot go! So where does the arrow of time come from in QM? I'm imagining at the moment that it comes from decoherence...*

* Ok, how did I know that "Decoherence, Quantum Measurement and the Arrow of Time" existed? I didn't, of course. I hypothesized that the arrow of time emerges as a universe of infinite possibilities collapses as the past interacts with it -- an idea that's appeared in at least one science fiction story I've read. I knew decoherence is the technical term used for the interpretation of QM most consistent with this model, so I searched on "decoherence" and "arrow of time". Easy. (The alternate explanation, of course, is that the conference didn't really exist until I thought of it, which led the quantum chaos of the past to collapse.... :-)

Monday, June 11, 2007

Sex offender madness, Minnesota version

A few weeks ago I commented on the lunacy of MySpace's sex offender identification process. I know something about the way these matching algorithms work, and in the MySpace environment the test will have a low sensitivity and a low specificity. A substantial portion of those they identify will be false matches, and they'll miss most offenders.

When I ended my comments I predicted we'd see the authorities treating these lists as real, so that a false match by MySpace may mean a visit from the police. That was an easy one ...
Minnesota asks MySpace for list of sex offenders
... On Tuesday, Swanson became one of a number of state attorneys general to ask MySpace for the names of sex offenders from the 7,000 it says it has identified and expelled from its popular social networking website...
The best we can hope for is that MySpace is massively sued.

Sunday, June 10, 2007

GOP: party of the stone age candidate

Throughout most of human history, the leader was probably the surviving male with the highest testosterone levels as manifested by jaw, shoulder, and voice. The GOP is electing the candidate best suited to the stone age....
Talking Points Memo: by Joshua Micah Marshall

Rep. Zack Wamp (R-Tenn.), one of Fred Thompson's boosters on the Hill, recently suggested the actor/senator/lobbyist would make a good president, in part because of his speaking voice.

"He has a commanding voice," Wamp said. "He has a commanding presence. He makes people feel secure. He makes us feel confident."

Sen. George "Macaca" Allen (remember him?) apparently feels the same way. (via Steve M.)

Former Sen. George Allen is bullish about former Republican Sen. Fred Thompson of Tennessee, the actor who hasn't even gotten into the 2008 presidential race yet....

...He likened Thompson's voice to that of a "modern-day Rex Allen," drawing a reference to a now-deceased cowboy actor.

... On a related note, interest in Mitt Romney's appearance is apparently still high among conservative political observers, with the Politico's Roger Simon applauding Romney for having "shoulders you could land a 737 on."

This, of course, follows Bill O'Reilly praising Romney's jaw and hair, and NewsMax celebrating the former Massachusetts governor's "sensational good looks."

We are primates, most regrettably. This can work, humans are programmed to follow people who look and sound this way. Alas, it's not the stone age any more. That's the way of the cliff.

Saturday, June 09, 2007

Liberating public goods from the NTIS - radical

The National Technical Information Service charges absurd amounts for data that's part of the public domain, including various data sets used in healthcare. A small company has noticed that there's an opportunity here ...
Marginal Revolution: The private provision of public goods

...Public.Resource.Org takes non-copyrighted documents that the federal government charges the public for and puts them into the public domain. Not much is available now but the service wants to make available for free all of the millions of documents, videos and other material from National Technical Information Service. To build their library Public.Resource.Org are asking people who want a government document to buy it through their service. They will then make the document available to everyone else for free....
Currently the web site lists dozens of $100 healthcare videos that nobody with free will would be interested in. They don't list code sets yet, it may be the ones I'm thinking of are not truly owned by the feds ...

Polonium - an update

Slate features excerpts from a book on the "Sasha" Litvinenko murder:
Who killed Alexander Litvinenko? - By Alex Goldfarb and Marina Litvinenko - Slate Magazine

.... Whoever chose polonium to kill Sasha did so because the chances of its ever being discovered were close to zero. It could not be easily identified chemically: the toxicology lab found only low levels of thallium, a minor contaminant of polonium production. Polonium was unlikely to be detected by its radioactivity, since common Geiger counters were not designed to detect alpha rays. Polonium is perhaps the most toxic substance on earth: a tiny speck is a highly lethal dose, and one gram is enough to kill half a million people. But it is absolutely harmless to a handler unless it is inhaled or swallowed. Most important, polonium had never been used to murder anyone before, so practically no one in the expert community—toxicologists, police, or terrorism experts—would have been looking for it or expecting it. It was sheer luck, plus Sasha's phenomenal endurance, that it was found. He had received a huge dose. Had he died in Barnet Hospital within the first two weeks, his death would have been attributed to thallium, meaning that anyone could have given it to him.

The irony is that once it was detected, polonium became a smoking gun. No amateur killer—even one awash with money—could have used it...

....Within hours of Sasha's death, HPA radioactivity hunters identified and closed off several contaminated sites in London, including Itsu, the sushi restaurant on Piccadilly where Sasha met Mario Scaramella, and the bar in the Millennium Hotel where he had tea with the Russians. As the investigation progressed, they added dozens of other places to the polonium map; the eventual list included offices, restaurants, hotel rooms, homes, cars, and airplanes in several countries. Hundreds of people all over Europe showed varying degrees of polonium contamination, spreading from the epicenter of the "tiny nuclear bomb" exploded in London. When the dust settled, the investigators had a pretty complete understanding of how to read the map. As the Scotland Yard liaison officer told Marina, "We know exactly who did it, where, and how."
Here's the quick summary:
1. Putin ordered Litivenko killed.

2. Lugovy was part of the hit, but there were two poisoning attempts. The second one might have involved someone else.

3. Polonium is actually quite a reasonable murder weapon.

4. Litvinenko knew nothing.

5. Russia adores Putin.
Hmpph. Polonium still seems to be a ridiculous murder weapon. Surely there must be equally undetectable poisons that wouldn't point so clearly to Putin. The motive still makes no sense to me, unless one assumes Putin is batty.

Perhaps the most credible explanation is that Putin ordered Litvinenko killed by Polonium because Putin's even battier than Bush. Bush has proven that you can be a leader loon; we have to be ready to assume Putin's no better.