Coming Soon – A List of Proposed Posts [August 2014 Edition]

The title of this post is self-explanatory, so without further ado here’s the list itself:

 

-My Collected Posts on Crypto-Anarchy

-Rational Ignorance: An Economic Analysis of Time Management

-I Joined Liberty.me and You Should Too!

-Belle Knox, College Costs, and the Signalling Theory of Education

-The Ten Universal Rules of Logic

-Burden of Proof: How You Draw the Line

-Antifragility: A Primer

-Writing That is Both Analytical and Antifragile

-Simple Math Showing that Taxing the Rich Gets Us Nowhere

-Simple Math Showing Background Checks Can be Eliminated – Seriously

-Three Reasons We Can and MUST End Anti-Discrimination Laws

-Demonstrating how “Privilege” is an Intellectual Black Hole

-Five Arguments Feminists Need to Ditch to Remain Credible

-Ten Ways Women Can Increase Pay NOW Without Government

-Five Arguments Anti-Racism Activists Must Ditch to be Credible

-Forget Disease: Single-Parenthood is the Biggest Epidemic in America

-Stop Bashing Christian Conservatives as “Anti-Science.” No really.

-News Flash: Anti-Science Liberalism Actually KILLS People

-Scrap the Precautionary Principle NOW

-The Bell Curve’s 20th Anniversary and it’s Significance

-Human Biodiversity is the Nuclear Physics of Biology and Social Science

-Why Social Justice Needs “The Bell Curve” and HBD

-Yes IQ Matters a WHOLE Lot More Than Socioeconomic Status

-Why Critical Studies Can (and Should) be Scrapped from Colleges

-How to Define Government and the Free Market

-Five Reasons Free Markets Beat Government at  [Five-part series]

-Price Controls Either Cause Shortages, or Aren’t Needed

-Ripple Effect: How Bad Price Controls Can Be

-The Simple Process That Makes Speculators a GOOD Thing

-Why Monopolies are Unlikely in the Absence of Government Intervention

-Universal Case Against Government Regulation I: Costs

-Universal Case Against Government Regulation II: Benefits

-Regulatory Capture is Inevitable – Here’s Some Examples

-Public Choice Theory: An Introduction

-Sorry Democrats, Demographic Determinism is Largely a Myth

-Buying Unowned Property: Aboriginal Reimbursement Explained

-The Many Camps Within Libertarianism – and Where I Stand

-Years Later and No Shred of Evidence Nozick Abandoned Libertarianism

-An Open Challenge to Naomi Klein Fans Who Buy Her Attacks on Milton Friedman

-How Much Would a Free Market Legal System Cost?

-Under Market Anarchy, Would the Poor Lack Protection and Legal Representation?

 

So there we go. These look like they’ll be the next forty or so posts that will appear on here. I pledge to do about 3-5 posts per week if not more. Largely this is possible because most of what I’ll write will be draft-ish material for State Exempt itself. Needless to say I will probably add some stuff to the list from time to time.

 

Sit tight, stock up on drinks, and enjoy what will soon appear!

 

Tentative Outline for Chapter Sections of “State Exempt”

I was supposed to finish a post series on Cryptography-related matters a while ago, and do a whole variety of other posts on different topics. But I pretty much began taking a bit of a break from the internet.

 

With Twitter eating up almost as much time as YouTube did a few years back, I decided to scale that back a bit and put that saved time towards working on other things. Besides taking the time to form new relationships with people in my area that I have a lot more in common with than I did several years ago, I finally got around to finishing this:

 

State Exempt Chapter Section Outline

 

Being the procrastinator that I am, I finally felt compelled to go through my written notes and make an outline that is one step closer to actual draft material. With the outline above, I now have a better idea of what I want to cover and where. From here I just need to reorganize my existing notes to fit that section outline and start reading some key books from a selected bibliography to better inform how I cover various topics.

 

When it comes to projects or tasks I do in life, I don’t plan on focusing on anything I don’t have any control over. And I sure as hell don’t plan on doing anything that won’t matter after I exit the picture altogether. One source of inspiration that really catalyzed my desire to finish the project this site was set up for is the work Cody Wilson and the rest of Defense Distributed have managed to do. At this point Cody could drop dead and his impact will still matter for decades to come.

 

 

I suppose that’s what every activist, artist, intellectual, or writer hopes to do: immortalize themselves through their own work. If I can do just half of what the likes of David Friedman or Murray Rothbard did when their key works came out, then that’s more than enough for me.

The 100th Anniversary of the Federal Reserve Act – Why It Was Misguided

December 23rd, 1913 – a day that will live in infamy. I thought I would meander from my post series on crypto matters to highlight something equally important, if not orders of magnitude more significant in the grand scheme of history.

 

Exactly one century ago, the Federal Reserve Act of 1913 was signed into law. The result was the establishment of America’s longest running central bank – which is the sole issuer of whatever currency a given government wants to have it’s taxes paid in. Since money is half the equation in the vast majority of economic exchanges, this basically put a largely unaccountable institution in the position of manipulating a large portion of the American economy.

 

In case you’re wondering what this means in practice, take a look at the following video:

 

 

Every time new money is printed (almost out of thin air), the money causes the prices of various goods and services to rise as it begins to circulate throughout the economy. The “winners” in this situation are the first people to get the freshly printed cash, because prices don’t rise until after they have spent it. These rising prices are a natural result of supply and demand – more money in circulation chasing the same amount of goods means each dollar loses purchasing power.

 

Unfortunately these rising prices do come at a cost, as the video above explains. The people who lose out every time the Federal Reserve increases the money supply are the people who receive the new money last – which almost always means entry-level workers who are at the bottom of the new money supply chain. The prices of almost every major good and service has already risen long before the amount of spending money they have at their disposal rises as well.

 

To put it bluntly, increasing the supply of fiat currency in any national economy operates like a regressive tax. This tax is basically inflation that affects the poorest people in any given situation who happen to be the last ones to have their wages adjust for the new money in circulation. It gets even worse for those who don’t have any salary whatsoever; the loose change that comes their way only looses more purchasing power due to the rising prices of everything else.

 

 

 

We can easily break this destructive process down into just five steps:

 

1. Banks and the Fed increase the money supply. Those most politically-connected are first to receive new cash.

 

2. These well-connected people/groups spend this money. With more available, they have increased buying power.

 

3. As this money circulates, prices for everything rises to adjust for the increase in total dollars in the economy.

 

4. The savings and purchasing power of those at the bottom is eroded since each dollar loses purchasing power.

 

5. Consequently, the gap between the politically-connected rich and the disenfranchised poor grows with steps 1-4.

 

 

 

The process by which the Federal Reserve and the banking system we currently have actually increases the money supply is something that could occupy an entire post altogether. For now I just want to spend time focusing on the effects this process has. In a couple future posts, I will continue explaining case against central banking and what needs to be changed.

 

 

How Asymmetric (Public Key) Encryption is Possible, and Why It Matters

This post will serve as a basic introduction to something everyone who cares about privacy or information security ought to be familiar with. At less than a thousand words, it will probably only take you fifteen minutes or so to read and understand.

 

Public key encryption has been around for decades and has served as an indispensable solution to one of the biggest problems in the secure transfer of information over the web. With the recent revelations over NSA Spying and the establishment of Bitcoin as a somewhat mainstream form of currency, I find myself in more conversations about this feature of information security lately than ever before. How does it differ from just plain old symmetric encryption and why are the two named as such? Last but not least, what major problem does public key encryption solve and how does it achieve this?

 

In my previous post on low-tech cryptanalysis, I explained how pen and paper ciphers (like substituting each letter of the alphabet with something else) are easy to break but also suffer from a critical flaw that makes them very insecure to use over the web. For someone to use any “secret code” to send messages to someone else, you must first send them the cipher for that code. If you are doing this over the internet, there’s a pretty good chance that cipher will be intercepted and used to read the messages encoded with it. Thus a more robust solution is needed that is both secure when properly implemented and is also safe to implement over a public network.

 

This is where public key encryption comes in. Public key encryption is often known as asymmetric key encryption because it depends on the use of two “keys” that serve entirely different purposes. One key is used to encrypt messages that are sent to a given recipient, while another is used to decrypt such messages. These are respectively known as the public and private key. When using public key encryption to communicate, you begin by generating a set of these keys. The public key is shared with everyone who may potentially want to send you a message.

 

 

This video above gets the basic point right, however I should note that the correct term for the kind of math functions that asymmetric encryption uses is mathematical trap, not “one-way function.” This distinction is critical because the latter term refers to a math function that isn’t just improbable to reverse, but impossible to undo.

 

So now we know asymmetric encryption takes advantage of math problems that can easily be done in one direction, but require too much computing power to reverse. Why is this important, or useful to begin with? Simply put, encryption that operates this way can be used to communicate with people over public networks without having to actually meet in person to exchange a cipher.

 

As an example, consider simple multiplication and division problems. Obviously the kind of math used in public key encryption schemes is exponentially more sophisticated that the simple examples I will show here, but the underlying concept remains the same. Take a moment to ponder the following math problems, and decide which one is easier to do:

 

1. What is the answer to the following: 10 x 100

2. Which numbers were originally multiplied together to get this result: 1,000

 

At face value, you likely would be tempted to answer the second question by saying “ten times a hundred.” But consider just how many ways there are of getting this outcome using positive integers alone: 1 x 1000, 2 x 500, 4 x 250, 5 x 200, 10 x 100, 20 x 50, 25 x 40, 1000 x 1, 500 x 2, 250 x 4, 200 x 5, 100 x 10, 50 x 20, 40 x 25, and so on. If we broke it down into decimals, the number of possibilities would be even higher. Guessing every possible answer to find the right pair is impractical. With the kinds of mathematical functions that public key encryption actually uses, it becomes nearly impossible with today’s computer hardware.

 

Multiplying two numbers has only one answer. Dividing a digit on the other hand is another story altogether, the number of ways of doing so makes it unlikely that you can use a computer to search through all the possibilities and find the pair that was actually used for the encrypted result – hence the term “mathematical trap.”

 

Now comes the final question: How does public key encryption put this feature of math functions to use?

 

Public key encryption works by having a user generate a pair of keys, one public and one private key. The public key is sent out to anyone who might want to sent them a message, while the private key – as the name suggests – is kept hidden. Remember the first of the two problems listed above that involved the simple task of multiplying two numbers together? This loosely resembles how a public key operates.

 

When someone wants to send a message to you, they will take your public key and use it to scramble the message they wish to send to you. This requires very little computational power (recall how easy multiplying two numbers was). But if someone wants to decrypt that same message, they would almost never succeed at doing so because of all computational resources required to break it. Remember the second problem listed above and how there were so many possibilities to sort through? The only way to reverse this successfully is if you have the private key, which makes it possibly to reverse the message encryption without having to sort through endless possibilities.

 

Naturally of course, only you have the private key in question. So the end result is that you can share a public key that can only encrypt messages (multiply two numbers) but cannot be used to reverse the result. That way you can send out a key which people in turn can use to send messages to you that any third party would fail to decipher. This makes asymmetric encryption perfect for communicating over the internet with people you never meet in person. 

 

In my next post, I will go into greater detail on RSA schemes, elliptic curve cryptography, and quantum cryptography.

 

Cryptography 101: Low-Tech Cryptanalysis Explained

Well, with Bitcoin going mainstream, public resentment against the NSA at an all-time high, and people not having a clue what Cody Wilson of Defense Distributed means by labeling himself a Crypto Anarchist, it looks like a few posts on cryptography and Crypto Anarchy are in order.  There will probably be five posts; this one will be an intro to cryptanalysis, the next will explain how public key encryption works, after that I will do another one on elliptic curve and quantum cryptography schemes. From there a post will be devoted to a primer on Crypto Anarchy and the last post will be a categorical list of software tools for any beginning Cypherpunk.

 

Now for some beginning cryptanalysis. To put it bluntly, this post will be an introduction to code breaking that will look at some very simple means of encoding and sending “secret” messages by hand. As it turns out these are pretty trivial to break, but their biggest drawback becomes apparent if you try to use such low-tech methods over the world wide web.

 

Let’s start with the traditional substitution cipher. There’s nothing very sophisticated about it; you simply take a letter of the alphabet and replace it with something else. This could be another letter, a symbol you made up, or what have you. The most famous yet very simple example is the Caesar Cipher. Each letter of the alphabet is replaced by a letter three spaces to the left of it; the letter D is written as A, E is written as B, and so forth. Here’s what the cipher looks like as well as how it “encodes” a message:

 

How a typical substitution cipher works.

How typical substitution ciphers work. A letter is replaced with something else.

 

Simple enough right? Now let’s look at another method called a transposition cipher. Rather than replacing a letter of the alphabet with something else, you simply change where the letters are actually located on the message sheet itself. Here’s a simple example:

 

One of many transposition ciphers. Location is what matters.

One of many transposition ciphers. Location is what matters.

 

So now we know the two main low-tech methods for encoding messages, but breaking them is pretty simple to do.

 

The means of breaking these two general approaches to making “secret codes” varies greatly. For substitution ciphers the longer the message is (or the more material you can intercept over time), the easier it becomes to decipher the meaning of the text. While a number of various techniques can be applied for doing so, they all usually stem from just two strategies: frequency analysis and letter pairs.

 

Frequency analysis takes advantage of the fact that each letter of the alphabet will appear at different rates; the letter “E” for example is the most commonly used letter of the alphabet and chances are the most common letters/symbols in a message will be vowels. This is why it cost money to suggest a vowel on “Wheel of Fortune” – filling in a vowel makes it much easier to guess the puzzle. Letter pairs of course tend to be two vowels as well. Plugging those in can help you decipher a message with some trial and error. The more material you have to work with (longer messages, more messages, or both) the more successful the techniques will be.

 

Transposition ciphers on the other hand are a different story. They are almost always easier to break if the message is very short. In the case of the rail fence example pictured above, it only seems easy because the visible message (25 letters) isn’t concealed by bogus letters that hide how the letters in the message (25 total) have been transposed. The obvious way to try break the cipher would be to take a given letter, and see if a pattern can be found with other corresponding letters that eventually form a word. More complicated means exist for breaking various transposition ciphers, but all that’s beside the point of this post.

 

These two approaches to encoding messages have their own distinct pros and cons. What they both have in common however is that they simply lack the level of security needed to encrypt information sent over the internet. This is because any recipient of an encoding message must have the cipher needed to decode it, and sending it over the internet where a malicious third party could intercept it defeats the whole purpose of using the cipher in the first place.

 

What we need is something that allows someone to send messages to you that are encoded that you can decrypt, but does not require you to send the necessary key for decryption over any information channel an adversary might be listening into. My next post will explain how asymmetric encryption – better known as public key cryptography – solves this dilemma.

 

November 4th, 2013 – Sixth Anniversary of Going Market Anarchist

Update: Well, okay to be fair technically I’ve only been “Market Anarchist” for half a decade. But saying so kind of sort of ignores all the time I was in denial about what I really thought could “work.” And after all this time messing around with Python I refuse to count like a programmer unless I absolutely have to. If I had to pinpoint a day when I first began the transition at all, it would have to be in 2007, when I first came across the general case for abolishing the FDA. A year later when the 2008 Presidential election was called, I finally adopted the title “Anarcho-Capitalist.” To satisfy those who don’t like the origins of the later term, “Market Anarchist” should suffice.

 

 

I can sort of remember the day. The past several months prior to it I went from being nominally conservative to total minarchist Libertarian. All government ought to do is protect people from initiation of force at home and abroad. Yeah I was pretty outside the mainstream but nothing along the lines of wanting to scrap our political system altogether.

 

At the same time I was having some doubts. After spending some time on a now defunct social networking site called “Bureaucrash Social” I had been exposed to some ideas and arguments I never knew existed. Combine this with spending some time on the Mises Institute website, skimming through the daily articles, and it wasn’t long before I started to realize just how far the arguments against government could go.

 

My breaking point ultimately was on the night of the 2008 elections. Having switched from being supportive of McCain (please forgive me for that) to being fascinated by Bob Barr’s campaign (he too defected from conservative politics), I knew I was going to be pretty dissatisfied with the results whether Barack Obama or John McCain won the presidency.

 

As soon as the election was decided, a key element of the outcome finally dawned on me. My mother was in a relationship with someone at the time who noted that millions of people who probably weren’t too happy about the outcome would probably wake up sick the next day. Because just over 50% of the people who chose to vote outnumbered the rest, that was the outcome whether people liked it or not.

 

So what was this key element you ask? I knew to some degree that arguments could be made that law and order could be provided in the absence of government thanks to a short bit that David D. Friedman posted online from his most famous work. He had posted chapter 29 from his book on how the free market might provide police and courts. Combine this with the fact that I was convinced that non-interventionism was the way to go when it came to foreign policy, and that really didn’t leave much of anything for government to do. Consequently, this meant there was next to nothing that a president or elected congress could possibly serve any legislative purpose for.

 

Why waste so much time and effort on having half the country impose certain preferences on the other half if there was so little elected officials should even be allowed to do once elected? That was when a couple months of letting some arguments against anti-trust, intellectual property, government legal systems, and government provision of various public goods finally sunk in. I had yet to figure out precisely how on a functional level a society with no government was supposed to work, but I knew that the idea of supporting one with government kind of relied on some serious double-standards. If business is so evil, why should an institution that can force payment and restrict you from other providers of various services within it’s “legal territory” be any better?

 

No need to go into detail about how my views developed after that. In a nutshell, I started gathering notes for “State Exempt” about a year later in the winter of 2009. I thought I would have it done before summer of the following year because at the time I expected it to be only 150 pages or so. Boy was that a dead wrong estimate on my part…

 

So it’s taken way longer than I thought it would. Rather than a short primer, it will be a borderline treatise even though I never once published a book before in my whole life. I would probably get fired from any job that required me to estimate the amount of time I needed to get something extensive done – no question about it. Hell, at least I have the cover finished:

 

Way less gloomy than the earlier version.

Way less gloomy than the earlier version.

 

Procrastinators of the world unite! Better late than never ought to have merit if it means a better final product.

 

State Department & DefCad: Just What Files Freaked Them Out? (Part II)

Note: This will likely be a five three-part series. I will link to all parts below this note once all are done. I am the DefCad.org user, “OpenSourceArmorer.” Contact me via the DefCad forums if you have questions, and no – don’t even ask me for the original .STL files. Unless you can verify that you’re a US citizen, I can’t share them. And in the interwebs that kind of identity verification is hard and pointless. Especially when the files themselves are not that hard to find elsewhere…

 

In the first post in the three-part series I described what the controversy is over some 3D-printable CAD files that the State Department was concerned about. I especially emphasized what the State Department’s criteria is for objects that fall under the International Traffic in Arms Regulations. Now in this post I want to go over all ten items that were listed in their letter to Cody Wilson and explain why it’s clear the State Department doesn’t have a clue about what these files actually do when printed. We begin with the most well-known of them all…

 

1 – Defense Distributed Liberator pistol

 

Courtesy of Andy Greenberg. The Liberator in assembled form.

Courtesy of Andy Greenberg. The Liberator in assembled form.

 

Okay so this first one needs little explanation aside from some clarification about it’s so-called “undetectability.” A lot of idiot journalists (and a few lawmakers) have been harping on this as being invisible to airport security, as if not a damn thing has changed in that area since 1988. Well no, we have new technologies such as backscatter x-ray, thermal imaging, and millimeter-wave scanners. These technologies make “undetectable” firearms a total impossibility.

 

 Backscatter X-ray

Backscatter X-ray Image

The new version of the Rapiscan body scanners will come with software that only highlights foreign objects, not body parts.

 

A type of X-ray that can detect plastic is known as backscatter X-ray.  These types of body scanners will penetrate clothing, but not skin. Any solid object can be picked up irrespective of what it’s made of – including a 3D-printed gun. In fact, the ability to detect “plastic guns” has been one of the selling points of Rapiscan, the company that currently makes the kind that have been used in airport security. Right now they are working on a new version of their TSA body scanners that only show a gingerbread outline of the person being scanned (to address privacy concerns) while highlighting any specific foreign objects.

 

In addition to addressing privacy concerns, the Rapiscan body scanners also produce radiation levels so minuscule that you may as well worry more about being in direct sunlight for five minutes.

 

Thermo-Conductive Imaging

Thermo-Conductive Imaging

By detecting the difference in heat and IR conductivity between clothing, human skin, and a foreign object, Iscon scanners can detect 3D-printed guns with ease.

 

Thermo-Conductive Imaging identifies objects via their heat and infrared conductivity profile. The laws of physics makes it impossible for 3D-printed objects – or a wide variety of solid objects for that matter – to transfer heat and infrared radiation at the same rate as human skin and clothing. Yes, this applies even if someone has kept an object against their body for several hours. The temperature profile of any given object will vary between the side touching human skin and the side facing away. Thus it’s impossible to disguise an object from the scanner by attempting to match it’s temperature with the rest of someone’s body or clothing. Plastic being an insulator makes this especially impossible to pull off successfully.

 

Passive Radiation Scanners

This image is an example of a tech tested in New York City to detect firearms of all materials.

 

Next we have a category of passive scanners that detect natural radiation output from a human body – such as a new kind of scanner being tested in crime-ridden areas of New York City. In particular one technology that shows some strong promise for being both from radiation and privacy concerns is passive millimeter-wave scanning. I cannot emphasize this enough: these do not fire radiation at the person being scanned. They detect obstructions in natural bodily radiation normally emitted.

 

To put it in blunt terms, there is no such thing as an “undetectable” firearm, even if it’s a 3D-printed gun made entirely out of plastic. I will address this issue in a future post when I critique Steve Israel’s HR 1474.

 

According to the ITAR criteria for what falls under their control, it *might* be illegal for files of this pistol to be on the internet because it qualifies as a “non-automatic” firearm. My next blog post will visit the legal issues surrounding what is okay under ITAR soon. According to the official ITAR regulations, what Cody Wilson did may very well be perfectly legal since the files themselves may qualify as being under public access. This will be discussed in the next post, for now I just want to focus on what the actual files are.

 

Now it’s about time I explain in detail what the other nine CAD files are that the State Department took issue with in their letter to Cody Wilson. Prepare to be stupefied at just how trivial these objects are in printed form.

 

2 – The “.22 Electric” Concept

 

.22elecgun

No, this is not a functional gun at all – remain calm.

 

This is nothing more than the product of someone messing around with CAD design in order to make a purely conceptual pistol that as of yet has no possible way of functioning. To my knowledge the person who originally developed it abandoned the project because they concluded it was just plain unrealistic of a concept to pull off. The idea was to somehow make a printable gun that fires rounds via electrical detonation of a cartridge’s primer. The designer of this object goes by the name of “Proteus” on the DefCad forums, and despite abandoning the concept this object was supposed to utilize, he later worked on making a replica of something the State Department probably took even more seriously – but for stupid reasons of course.

 

 

3 - 125mm BK-14M high-explosive anti-tank warhead

 

123mm "Warhead"

The State Department thinks you can “print” an anti-tank warhead. Yes, they are batshit paranoid.

 

Out of all ten files, the reaction of the State Department over this one is by far the most f*ckishly hilarious of them all. This is not, I repeat, this is NOT a functional warhead. All you have here is a CAD file for making a plastic replica of a warhead that is no more harmful than a model jet. The story behind how the developer of this object achieved the task is especially noteworthy given how the State Department has chosen to define what an export is. When I first began a draft of this post several months ago (before I became busy for reasons discussed in this blog’s previous October post), I decided to get in touch with Proteus once and for all via private online chat.

 

He described to me in a nutshell how the process of designing the file played out:

 

“I designed a CAD file for a 125mm HEAT round. HEAT stands for High Explosive Anti Tank. Now, the first rule of anti tank warfare is do not fire solid pieces of ABS plastic at a tank, with no propellant, and hope it will stop the tank. It won’t. And yet this is exactly what the DOJ appears to believe regarding this design.”

 

So either the DOJ is stupid as hell, or they are overreacting to what should technically be considered under the public domain. More on why in just a moment…

 

“Opening the file finds a 3 foot tall design, too big to be printed on 99% of 3d printers. It also has NO inner workings (and I don’t even know what they are), and no fins on the back. Obviously the inner workings are critical to the functioning of a round.”

 

You heard it there folks. This file is for a solid replica that has no working internal components. Nothing anyone ought to freak out from. But what if the hardware, propellant, and all other necessary elements for a HEAT round were available in addition to this file?

 

“Alright, let’s assume that you SOMEHOW could print the round AND all the propellant etc, which is impossible with today’s technology. It is still in plastic, which would not contain the explosion as much as metal and therefore be much less potent than a standard round.”

 

The biggest blow to the idea that this file poses a special new danger to the public at large stems not just from the fact that you can’t find the inner workings of a real HEAT round along with the explosives and propellant, but where Proteus actually got the information used to make the file in the first place:

 

“And the kicker? I got everything to make this design, right here: http://en.wikipedia.org/wiki/File:125mm_BK-14m_HEAT.JPG

 

4 - 5.56/.223 muzzle brake

 

5.56/.223 Muzzle Break

Oh noes!!! A printable muzzle break that gives nothing to America’s enemies that they don’t already have!

 

So let me get this straight… A muzzle break – which comes on just about any rifle these days by default and is nearly useless when printed in ABS or PLA or any plastic for that matter – is considered a troublesome offense to the ITAR laws? This is about as relevant to a firearm as a muffler is to a car. Sure, it may be a trivial component used in conjunction with a firearm but the object itself is useless unless you already have one. Not to mention the fact that a plastic muzzle break will not withstand the pressure and heat from a gun blast.

 

 

5 – Springfield XD-40 tactical slide assembly

 

XD-40 Slide

Artistic rendition of something useless without the whole damn gun itself. Art can be pretty “life-threatening.”

 

This was designed by a DefCad forum member named “texan_eagle_scout” who presented this here: http://forums.defcad.com/showthread.php?126-My-contribution

 

Nothing people can’t already acquire. You would be hard-pressed to get a printed slide to word on an actual Springfield XD.

 

6 – Sound Moderator – slip on

 

Sound_Moderator

Yes, a sound “moderator” for a pellet gun freaked the State Department out. No, it’s not for a real gun.

 

You may recall when the Liberator was first released that Chuck Schumer flipped his lid about a printable gun that could accept “silencers.” He may have been dumb enough to simply regurgitate what the New York Daily News reported on this matter, claiming that printable “silencers” were available for the Liberator. As the picture above clearly illustrates, this is nothing of the sort.

 

 

7 – “The Dirty Diane” 1/2-28 to 3/4-16 STP S3600 oil filter silencer adapter

 

Oil Filter Suppressor

Posting CAD files for car parts could be a threat to national security – run for the f%#&ing hills!!!

 

When it comes to legal gray areas that are open to wide interpretation, this object epitomizes such dilemmas the most. This is a car part and not something distinct to firearms. Explanation for why this violates international arms trafficking laws of any kind would sure be nice.

 

 

8 – 12 gauge to .22 CB sub-caliber insert

 

subcaliber-insert

CAD files for a cylindrical tube could be illegal to post online. Whoddathunk?

 

Here is another example of something that calls into question just how broad ITAR restrictions can be applied. What this is supposed to do is turn a shotgun (a relatively lethal weapon at close range), into a .22lr rifle. For those of you who know nothing about firearms, .22lr rounds are just about the smallest cartridges you could possibly find anywhere.

 

All in all this file would allow someone to make a plastic tube that makes their shotgun less lethal than it already was.

 

 

9 – Voltlock electronic black powder system

 

Voltlock

It’s a motherfucking cylinder. How this falls under ITAR restrictions beats me. Are sex toys munitions too???

 

Now we enter even more confusing territory about what the State Department thinks could potentially violate weapons export laws. As you can see in the image above, the “Voltlock” is nothing more than a cylinder – nothing more. I checked the actual CAD files (.stl) for this and it appears that this is supposed to be turned into a tube somehow. From there a hole exists at the top to insert some kind of black powder as well as electrical wiring to ignite it in some way. Clearly this is nothing more than a concept item like the “.22 electric” listed at #2 above.

 

This file reaches the pinnacle of the “Just how f-ing far can ITAR go???” mantra, and it’s not that hard to see why.

 

 

10 – VZ-58 sight

 

Rear VZ58

The rear portion of the iron sights. Anyone with a gun that could use this probably already has some.

 

Like many – if not all of the other objects on this list, I find this one to be a peculiar addition. Yes this file is a firearm component, but all this does is function like a rear sight replacement. Anyone with a gun that could make use of this part probably already has such a thing. I mean, guns do come with rear sights by default.

 

If the events surrounding ITAR’s present effect on these files means anything, it’s the fact that the Department of State is a bigger threat (or nuisance for that matter) than any of the parts they complained about.

 

October Musings: What’s Been of Importance to Me in 2013

 

As anyone can probably tell, I have been extremely late in finishing the post series on the files that DefCad had been hosting which the State Department took issue with. Part II is just about done, and part III will come up shortly in November. But given that I haven’t been updating this site very much for the past several months, I think it might be worth it to maybe explain myself for a bit, and of course make a record of what will take up my time from here on out.

 

1. To start with: I have spent some time here and there coming up with a stopgap measure against a potential doomsday scenario for 3D-printing restrictions that may very well never come to pass. Still, it never hurts to be prepared, and anything that helps destroy the morale of nanny-state politicians who wish they could implement such measures is a plus regardless of how the legal regime plays out. Shortly after the massive publicity put towards Defense Distributed’s successful testing and release of the Liberator pistol in CAD file form (along with the State Department’s somewhat futile request that Defense Distributed take down their DefCad files), there was some short-lived talk from California senator (you knew it had to be that or New York state) Leland Yee about all these oh-so-necessary registration rules that would need to apply to 3D printers.

 

Yes, this is the same Leland Yee that wanted to treat M-rated video games the same way alcohol is treated by forbidding their sale to children.   Falsely claiming that the Liberator suddenly gave criminals some kind of magical ability to kill someone “scott-free” (which to him is somehow impossible to do with a regular gun) Yee insisted that legislative action was necessary to address this great big one-shot pistol threat. These included background checks, serialization of printers, and last but not least: possible restrictions on what they’re allowed to print.

 

The first two of those suggestions are damn-near impossible to implement effectively. If someone buys a printer for family and friends to use, is that considered a “straw purchase” if someone else uses it to help make a gun? And if printers are serialized, well… How the hell is that supposed to achieve anything? Is this something on the printer itself that can just be removed outright the way serial numbers are filed off of firearms? Or is some type of watermarking of printed parts supposed to apply? All these are anyone’s guess at this point.   It is the third one (shape restrictions) however that *might* have some degree of potency.

 

The good news is that Yee has so far backed down from much if not all of his initial proposals, so shape restrictions may very well turn out to be a non-issue. But this only applies to Yee, less so for the whole US, and certainly not at all for other countries with more authoritarian governments. Restrictions on what printers are able to print would no doubt be a 21st century step forward in the gun control regime wishes.  So despite the fact that no software existed at the time to implement such a proposal, I began pondering ways in which you could get around such measures. Thus, a thread on the DefCad forums was born devoted exclusively to this very task. In it I noted that the simply way of defeating any shape restrictions is to simply alter how you print it so the firmware in question can’t tell what you’re making. How important this information could potentially be didn’t become clear until a month later…

 

It's not like I actually made a guide on defeating such measures a month earlier. Oh wait...

It’s not like I made a guide on defeating such measures a month earlier!!! Oh wait…

 

Suddenly a thread that wasn’t getting too much attention to begin with was now getting an influx of hits. How flattering. Ever since all that took place I have decided to turn that thread into a cleaned-up PDF guide. Anyone who wants to know how to bypass shape restrictions without having to jailbreak the printer will be able to do so without any knowledge of software exploitation. Hooray!

 

In addition to shape restrictions, I have since decided to also include means of getting past DRM restrictions placed on CAD files themselves. Rather than changing how you print something, the focus turns to how you generate a DRM-free file of the object you want to print. Some back and forth discussion between me and a few other people on Twitter led me to start including material on that problem as well.

 

So this PDF guide has been one thing taking up much of my time over the past several months. I hope to have it done on the anniversary of when Thingiverse decided to take down printable gun parts, maybe.

 

 

2. In addition, I have been working on my book. Yes, that book. The one this site is named after. The one I thought I was going to finish in 2010, and would be under 200 pages long. The one that is now looking to possibly be twice as long as that, with tinier font. The one I decided to start putting notes together for almost four years ago. Yes, “State Exempt: Guide to a Voluntary Society.”

 

Rather than rant on about the pathetic reasons why it won’t be done until early 2015, allow me to show some progress that actually has been made on the whole thing.

 

Several months ago, I was searching Google Images for some possible cover designs that were likely in the public domain. Looking for pictures of cities was of prime focus; any major center of commerce would do. So low and behold, I came across an image of Hong Kong:

 

One of the most *economically* free parts of the world.

One of the most *economically* free parts of the world.

 

Wow, pretty image! So I thought, “Hey, why not try to make a cover design out of it?” After messing around in Paint.Net (a favorite open-source alternative to paint for anyone who happens to be stuck on Windows), this is what I came up with:

 

Cover Concept 2.0 - The final won't be as dark.

Cover Concept 2.0 – The final won’t be as dark and heavily contrasted.

 

Yeah, it does look a little gloom and doom. My next version will be an attempt to correct this (probably by lowering the dark florescence caused by heavy contrast), but for now this is just a sample to give readers of this blog an idea of what I might end up doing, and to put everyone at ease who thinks I am neglecting to work on the darn thing.

 

Along with new cover designs, I also finally scanned all the composition notes I’ve made that are so valuable that losing them would mean the end of this project altogether. Fortunately I now have 200 DPI high-def ultra-realism scans are now backed up in almost a half-dozen locations, so that risk is no longer an issue. At this point it’s just a matter of making a bullet-point outline of every specific topic that will be discussed in each segment of each part of each section of each chapter of the book. Yep, I have it whittled down to the specifics, and soon it will be just a matter of actually writing the first draft.

 

This draft won’t take too long to do since I already have a clear idea of what I intend to write. Stringing together sentences is really half the task of writing a book. Or at least that’s the way it plays out for me. From there I just need to format it, make sure all the citations are accurate, make an index (easy to do: just search every letter with Ctrl+F and find any key words from there), finalize the cover, submit it, get a proof copy, and wash rinse repeat a couple times until the result looks good.

 

Until then, one of the bigger tasks I have is to get some reading done. The series I started on the selected bibliography for “State Exempt” will continue soon as well, and I do plan comprehend every last tidbit of wisdom from those works to hopefully enhance my own. However I think about 66-75% or so of the final draft of “State Exempt” will remain the same regardless of what I read until it gets done.

 

 

3. And for autodidacts… Speaking of reading necessary works that I find relevant to anything political I might write about, I have teamed up with a few people online to make what could be considered a Libertarian reading syllabus. Included will be study outlines for many of the most basic or necessary reads. The final result will be posted on a site called FreedomFiles.Info that appears to still be under construction. As the site makes clear, it does not cover anarchist topics. Free market anarchy is not relevant there because the site will deal with *government* policy, so far as I know.

 

In the process of this, I downloaded dozens (literally) of books off of Mises.org, and I recently bartered for a tablet that makes it way easier to finally read through them all. I can say it’s been a thrill to finally have countless books that can easily be read on the go while commuting. Wasted time is no longer as much of an issue.

 

Along with self-education through books, I have word that a group of people will soon be working on a software application that takes OpenCourseWare to a whole new level…

 

Ron Paul (or someone writing in his name) now has a new book out entitled, “The School Revolution: A New Answer for Our Broken Education System” which is basically a critique of government’s role in education. I can already tell I will enjoy it when I finally get a copy, and in addition to it, there is yet another book in the works by an economist I admire deeply that treads similar ground.

 

Bryan Caplan, probably best known as being the author who wrote the work of genius that is “The Myth of the Rational Voter: Why Democracies Choose Bad Policies” has another book in the works. The working title so far appears to be “The Case Against Education” with a subtitle of some kind that (rightfully) implies that the cost of schooling in the US is vastly overpriced compared to what you get in return. If this book turns out to be half as good as any of his prior books, then this is something I refuse to miss. School choice has been gaining some headway over the past couple decades and I do get the feeling that it will only continue to grow.

 

That being said, I cannot ignore the fact that there have been some setbacks from time to time under the Obama administration:

 

 

And not to mention the DOJ’s absurd lawsuit over the Louisiana voucher program. But despite these setbacks, the trend as a whole seems to be in favor of greater school choice. One successful program in Arizona has been getting some excellent legal headway in terms of whether or not the program is constitutional (of course it is, no religion is forced on anyone). And I could go on about the growth of charter schools and of course, homeschooling (which is growing seven times faster than traditional public schooling).

 

It’s that last trend that has me especially giddy as hell, for reasons that warrant a whole new post (maybe even a series) altogether. In short, the annual cost of homeschooling is typically around $500 for curricular materials. If such information could be delivered for free, than that would annihilate one of the biggest objections that teacher’s unions and the misinformed people who support them have towards any school choice measure: “OMG! Privatization meanz profit which is teh most evulzist thang eva cuz they get compensashun in raturn fo edjucating peoplez!!!”

 

Honestly, I feel somewhat optimistic about the future. In no way am I in any Pollyanna state of mind, but I do think the collapse of higher and lower education as we know it will be a key catalyst for other political reforms in the long run. More on that in a future post…

 

Until then I need to finish the shape restriction guide,  as well as that damn Defcad object series that never got done. And of course, the book this site was set up for in the first place. If procrastination paid well, then I think Occupy Wall Street would’ve hung me by now.

 

 

State Department & DefCad: Just What Files Freaked Them Out? (Part I)

Note: This will likely be a five-part series. I will link to all parts below this note once all are done. I am the DefCad.org user, “OpenSourceArmorer.” A big thank you to twitter user @PrintedGunInfo for helping me verify that these are in fact the original screenshots of the objects in question. Contact me via the DefCad forums if you have questions, and no – don’t even ask me for the original .STL files. Unless you can verify that you’re a US citizen, I can’t share them. And in the interwebs that kind of identity verification is hard and pointless. Especially when the files themselves are not that hard to find elsewhere…

 

I’m trying as hard as possible to grasp the state of current affairs right now. Whether it’s the IRS’s recent scandal in the way they handled certain legal applications, or the fact that Eric Holder thinks he deserves special access to Associated Press phone records…

 

 

…the gangsterism of those in power seems nothing short of profound. Then again, a lot of my time has been spent couch-surfing along the west coast now that I have the free time to do so and some people to collaborate with. Maybe the resulting lack of sleep is what makes me think this is just the cold opening to some kind of sci-fi movie. One only beginning to unfold.

 

Which brings me to Defense Distributed, DefCad.org, and the State Department’s recent decision to tell Cody Wilson to (temporarily?) remove certain files from public access. Well, at least from the Mega.co.nz download links. As for the rest of the internet? Well, let’s just say I’m sure Steve Israel will be thrilled at the results. More on him later…

 

Streisand Effect on Liberator Files

Yeah, how’s that restriction from public access going for ya?

 

Someone I kinda sorta know via deep web encrypted chat rooms told me they got a call from some douche at the New York Daily News telling them the State Department had begun taking action against DefCad.org. When I heard the news, I checked the site and it looked like it was being shut down altogether. In fact, it was actually issues with the heavy amount of traffic they were getting. And I think it’s no secret where that same traffic is now directed at – see the image above. :-]

 

Andy Greenberg of Forbes magazine recently wrote an awesome piece on the 3D-Printed Liberator pistol and later did a piece on the State Department’s request that ten files be pulled for their review. In an update on that article, Greenberg included the letter that was sent directly to Cody Wilson which happened to include a particular list I found of interest…

 

This list was ten items that the DoS thought were potentially in violation of the International Traffic in Arms Regulations (ITAR) laws. Given the fact that I’ve had the joy of seeing every Mega Pack release from DefCad (even before files where categorized and a README became standard) and watching it mature with every new version, I couldn’t help but take a look at what the files were that the State Department Office of Defense Trade Controls Compliance were so horrified by:

 

1. Defense Distributed Liberator pistol

2. .22 electric

3. 125mm BK-14M high-explosive anti-tank warhead

4. 5.56/.223 muzzle brake

5. Springfield XD-40 tactical slide assembly

6. Sound Moderator – slip on

7. “The Dirty Diane” 1/2-28 to 3/4-16 STP S3600 oil filter silencer adapter

8. 12 gauge to .22 CB sub-caliber insert

9. Voltlock electronic black powder system

10. VZ-58 sight

 

Now comes the fun part: Can anyone take a guess just how many of those objects listed are actually capable of killing anyone? Keep your guess in mind, because I would like to have the joy of highlighting the State Department’s fuckery first hand by showing what each of these actually are. Let us begin!

 

First, let me clarify what is actually classified as being under the State Department’s control:

Guess just how many of the ten files they were ticked about actually fall under this critera.

Guess just how many of the ten files they were ticked about actually fall under this criteria.

 

This is the checklist if you will of what the ITAR deems to be under their control. The screenshot comes from this document.

 

Now in the next post I will begin with the first two objects. The next will cover objects three through five, and then part four will cover parts six through ten. I shall conclude the series with some questions I have for the State Department about this matter. Hopefully all five posts will be done by the end of the week.

 

Selected Bibliography for State Exempt: Part III

Well, I mean to have this post scheduled to be auto-posted but it looks like I failed to set the draft up for that purpose. Anyhow, here it is.

 

Now the third part of a series of posts detailing a list of selected readings related to the subject matter of “State Exempt.”

 

1. The P.I.G. to Capitalism

2. Concise Guide to Economics

3. Economics in One Lesson

4. How Capitalism Saved America

5. Economic Facts and Fallacies

6. Freedomnomics

7. Free to Choose

8. P.I.G. to the Great Depression and the New Deal

9. The Creature from Jekyll Island

10. New Deal or Raw Deal

11. FDR’s Folly

12. The Case for Legalizing Capitalism

13. The Big Ripoff

14. Myth of the Robber Barons

15. Myths of Rich and Poor

16. Markets Not Capitalism

17. Hidden Order

18. Liberty Versus the Tyranny of Socialism

19. What’s Yours is Mine

20. Future Imperfect

21. The Left, the Right, and the State

22. The Triumph of Conservatism

23. Crisis and Leviathan

24. Losing Ground

25. In Our Hands

26. Priceless

27. From Mutual Aid to Welfare State

28. The Tragedy of American Compassion

29. Man, Economy, & State w/Power & Market

30. Out of Work

31. Free Market Cure

32. Shadow Bosses

33. Meltdown

34. Why Men Earn More

35. How Privatized Banking Really Works

 

Out of the five lists I have planned, this one is likely to grow by at least another additional ten books by the time State Exempt hits the shelves. Economics in general involves quite a bit of things to take into account, so I guess I can’t complain.