#publisher Atom RSS 2.0 The Economist * Log in * Register * Subscribe * Digital & mobile * Events * Topics A-Z * Newsletters * Jobs * RSS feed * Facebook * Twitter * More social links * Google plus * Linked in * Tumblr Offline reading Search this site: _______________ Search * World politics + United States + Britain + Europe + China + Asia + Americas + Middle East & Africa * Business & finance + All Business & finance + Which MBA? + Business Books Quarterly * Economics + All Economics + Economics by invitation + Economics A-Z + Markets & data * Science & technology + All Science & technology + Technology Quarterly * Culture + All Culture + More Intelligent Life + Style guide + The Economist Quiz + Book reviews * Blogs + Latest blog posts + Feast and famine + Analects + Free exchange + Americas view + Game theory + Babbage + Graphic detail + Banyan + Gulliver + Baobab + Johnson + Blighty + Lexington's notebook + Buttonwood's notebook + Newsbook + Cassandra + Pomegranate + Charlemagne + Prospero + Democracy in America + Schumpeter + Eastern approaches * Debate + Economist debates + What the world thinks + Economics by invitation + Letters to the editor * The World in 2013 * Multimedia + World + Business & economics + Science & technology + Culture + Events + The Economist in audio * Print edition + Current issue + Previous issues + Special reports + Politics this week + Business this week + Leaders + KAL's cartoon + Obituaries This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Review our cookies information for more details This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Review our cookies information for more details This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Review our cookies information for more details This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Review our cookies information for more details This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Review our cookies information for more details This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Review our cookies information for more details This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Review our cookies information for more details This site uses cookies. By continuing to browse the site you are agreeing to our use of cookies. Review our cookies information for more details Babbage Science and technology * Previous * Next * Latest Babbage * Latest from all our blogs Cyber-security Difference Engine: Swamped with data May 11th 2012, 10:38 by N.V. | LOS ANGELES * * Tweet LET it be agreed that something serious needs to be done to contain the mounting cost of cyber-crime. Though no-one knows for sure, corporate America is believed to lose anything from $100 billion to $1 trillion a year from online theft of proprietary information—trade secrets, research findings, internal costs, marketing plans, personal information, credit-card numbers, bank-account details and much more. In many instances, digital fingerprints implicate hackers in China, Russia and elsewhere. This is a serious issue that undermines American competitiveness, costs the country jobs, hurts exports, erodes companies' bottom lines and saps the nation's entrepreneurial vigour. Without question, something has to be done. Let it also be agreed that cracking down on cyber-crime does not—and should not—require the population at large to surrender any constitutional rights. It is not beyond the wit of government sleuths to devise procedures for tracking online criminals without causing harm to the general public. That, surely, is the first commandment of law enforcement in any democracy. Let it further be agreed that Americans are among the most fortunate of people. The wisdom of the country's founders has bequeathed them a set of inalienable rights that are the envy of the world. In particular, the ten constitutional amendments promulgated in 1791 and embodied in the Bill of Rights endow the common people with sovereign authority over their own freedom and well-being. What, then, are American citizens to make of their government's latest attempt to fight online crime on their behalf? To say the Cyber Intelligence Sharing and Protection Act (CISPA), which the House of Representatives approved on April 26th by a 248-168 majority, is controversial is to put it mildly. The bill is essentially an amendment of the National Security Act of 1947, which contains no direct provisions for dealing with cyber-crime. CISPA's aim is to make it easier for the federal government and private companies to share data about online threats with one another. At present, government information about such matters is classified. As such, it is illegal for government agencies to share what they know about online threats with the private sector. Meanwhile, companies are reluctant to share their own knowledge with one another and the government for fear of running foul of anti-trust rules. Were it to become law, CISPA would facilitate the exchange of information between the two. At first glance, CISPA looks a good deal for companies confronting such threats on a daily basis. Unlike last year's Stop Online Piracy Act or the PROTECT IP Act—both of which died on the floor of Congress after being skewered by the private sector for violating free speech and raising the cost of doing business—CISPA has been widely backed by information-technology firms, including AT&T, Facebook, Microsoft, IBM, Intel, Oracle and Symantec. As Robert Holleyman of the Business Software Alliance notes, the act “unties the hands of companies on the front lines of the digital economy”. Yet companies are deluding themselves if they think CISPA is there to help them. The act's congressional sponsors have little interest in the private sector's woes over online crime. Instead, CISPA treats cyber-security as strictly an intelligence operation against individuals, rather than an attempt to thwart crime against corporations. In the circumstances, the flow of information would be almost exclusively one way—from the private sector to the central government. If CISPA were to become law, firms that collect lots of information on individuals (eg, internet service providers, phone companies, tech firms and online retailers) would quickly find themselves being coerced into helping the National Security Agency (NSA) and the Department of Homeland Security (DHS), among others, to ferret out members of the public with anti-social tendencies. Given CISPA's ability to exempt companies from prosecution, they would be pressed to hand over customers' e-mails, web-postings and even social-media musings without the latter's knowledge or consent, nor with any justifiable cause for believing them to be a danger to society. Regrettably, such government pressure is not uncommon. From 1945 onwards, the NSA ran a clandestine telegram-interception programme called Operation Shamrock. This forced telegraph companies, foreign as well as domestic, to hand over copies of all the messages sent to and from the United States. Later, President Nixon, plagued by anti-Vietnam-war protests, had Operation Shamrock eavesdrop on American citizens as well. More recently, the NSA sought, and received, billions of customer records from AT&T, Verizon and other phone companies. Only Qwest refused to comply. Verizon also turned over customer data to the Federal Bureau of Investigation without a court order. In 2008, after a whistle-blower at AT&T accused his employer of illegally opening its network to the NSA, the practice was retroactively legalised by Congress. CISPA would go further still. If it became the law of the land, it would trump all existing federal and state laws concerning privacy, wire-tapping and surveillance. In so doing, it would allow the NSA, DHS and any other government eavesdroppers to spy on private individuals without having to face criminal charges, independent oversight or the need to obtain a warrant from a judge. (The British government likewise is planning to eavesdrop on all web traffic.) Many Americans find such unrestricted collection of personal data an unwarranted intrusion by the government and more than a little scary. The First Amendment is supposed to protect citizens' freedom to say more or less whatever they like without fear of retribution. The Fourth Amendment protects them from unreasonable search and seizure. CISPA would ride roughshod over both. And, in the process, it would do little to help solve the problem of corporate cyber-crime. It is not as though it would do much for national security, either. Today, the NSA is swamped with data on American citizens. William Binney, who served with the agency for 30 years and was once director of its World Geopolitical and Military Analysis Reporting Group, reckons the NSA has already collected some 20 trillion “transactions” (ie, telephone calls, e-mail messages and other forms of personal data) from American citizens without their knowledge. That is over 60,000 items of information for every man, woman and child in the country. The data are collected mainly by NaruInsight monitoring devices, which analyse traffic at choke points on the internet. The equipment, made by Narus, a subsidiary of Boeing based in Sunnyvale, California, is alleged to have been used by AT&T to collect customer data on behalf of the NSA. The company's latest technology, codenamed Hone, uses artificial intelligence to identify the voice-prints and photographs of individuals that fit a particular target profile, and then identifies them with specific phone numbers. Meanwhile, the NSA has had to build a huge storage facility in Bluffdale, Utah, to handle the enormous spillover from its data-processing centres in San Francisco and elsewhere around the country. The additional flood of data from CISPA would bring Bluffdale and the NSA's other centres to their knees. According to IDC's Digital Universe Study, some 1.8 sextillion (10^21) bytes of data were added to the world's memory banks last year, about a third of which passed through American networks. Not even companies that specialise in “big data”, let alone government agencies, could hope to analyse such an inundation. The task of analysing the world's data to identify potential cyber-threats “has gone from difficult to impossible,” concludes “Future Tense”, a study by Arizona State University, the New America Foundation and Slate, an online magazine. “This shift completely redefines the cyber-security problem,” noted John Villasenor, a professor of electrical engineering who is also a fellow of the Brookings Institution, an American think tank, in a posting on Slate last week. “The idea underpinning CISPA—that the government should sit at the centre of the cyber-security universe, collecting all the information about cyber-threats, analysing it and dispensing solutions—will no longer work.” There are just too many data points today. The answer, surely, is to focus on specific domains where the amount of data has remained more manageable—like the electricity grid, the financial system, and the mobile-phone networks. The government has a vital role to play in securing such critical infrastructure. This much was at least recognised by the Cybersecurity Act of 2012, the Senate's alternative to CISPA. The Senate bill aims more realistically to enhance merely the reliability and resilience of America's computer and communications networks. As the “Future Tense” study concludes, the days when the government could act effectively as the cyber-security czar for all of digital America are gone. With or without legislation, those days are not coming back. The proper cyber-security strategy is one that is both agile and distributed—just like many of the threats it will need to counter. Previous Babbage: May 9th 2012: Safer than people? Next The future of customer support: Outsourcing is so last year * Recommend 198 * * Tweet * Submit to reddit * * View all comments (37)Add your comment Related items TOPIC: Politics » * American growth vs. the world: At the top of an underperforming class * Money talks: December 17th 2012: Over to you * Liberal Democrats: Cleggxistential crisis TOPIC: Political policy » * The Newtown massacre: Fake tears * A peace plan for the Philippines: The Bangsamoro roadshow * Gun control: The gun control that works: no guns TOPIC: Security policy » * Government surveillance: Little peepers everywhere * Bomb attacks: Just some stray wires * Ninjas: Can a ninja get through airport security? TOPIC: Domestic policy » * Guns in America: Broken hearted * The Senate tax bill: A dreadful third option * Monetary policy: Bernanke's two-footed driving More related topics: * United States * Computer technology * Science and technology Readers' comments The Economist welcomes your views. Please stay on topic and be respectful of other readers. Review our comments policy. * Add a comment (up to 5,000 characters): ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ ____________________________________________________________ Post Sort: * Newest first * Oldest first * Readers' most recommended * 1 * 2 * next › * last » CJ66 May 19th 2012 7:32 GMT I believe Operation Shamrock was the name of the operation to bring German children to Ireland post WWII. Correct name is Project Shamrock. * Recommend 37 * Report * Permalink * reply Anjin-San May 15th 2012 0:19 GMT One feature that I would dearly love my ISP to provide me to improve MY cyber security is the ability to cut off ALL traffic to a given domain, such as .cn, .ru, or .xxx in real time (in short, a domain-level no go list), because that would fail bulk of malware that tries to steal information from me. * Recommend 76 * Report * Permalink * reply Anjin-San in reply to Anjin-San May 15th 2012 8:34 GMT In terms of hardware, this means variable-setting DNS that could ignore certain domains for certain users only. Alternatively, ISP may decide to set up dedicated DNS that ignores worst offending country or TL domains permanently (at hardware level), and offer "China-Free", "Russia-Free" or "Porn-Free" ISP services to its customers. * Recommend 79 * Report * Permalink * reply Nirvana-bound May 14th 2012 21:27 GMT You betcha, Uncle Sam's out to getcha! Cyber security & online snooping are all about power & control that involves billions (trillions?) of dollars of public & private funding & personal information. Is it legit or does it flagrantly encroach on privacy & freedom, are clearly moot. It all depends on which side of the coin one views & needless to say, wide open to abuse by vested interests in the government, if given carte blanche powers. * Recommend 82 * Report * Permalink * reply shubrook May 14th 2012 14:18 GMT Great article. I agree, effective security must be agile, but if you were to compile a list of history's most agile 'security' organizations you would have a list of some pretty nasty groups. The most common alternative to a small infringement of rights for a large number of people is a large infringement of rights for a small number of people. Reformer beware. * Recommend 80 * Report * Permalink * reply Anjin-San May 14th 2012 10:17 GMT The problem of cyber crime arises primarily from the fundamental shortcomings of TCP/IP network, therefore only an entirely new generation of network architecture, completely independent and incompatible from the Internet, could eradicate it. Call it Biznet or Commercenet or whatever, but only a fully encrypted and real-ID network backed up by biometric registry could wipe out cyber crimes. * Recommend 84 * Report * Permalink * reply InfoSec in reply to Anjin-San May 14th 2012 14:37 GMT Anjin-San, Yes, a fully encrypted, trusted root system would go a long way to fixing the problem, but privacy and anonymity are paramount in order for it to be truly secure. If criminals (state sponsored or independent) don't know which device is responsible or connected to which service or to which other device, it makes their whole cyber operation useless. So it is only when privacy and anonymity combine with encryption that we get a secure and robust enviroment in which we can communicate and transact safely away from all prying eyes and malicious actors. * Recommend 83 * Report * Permalink * reply T.Ware May 14th 2012 5:09 GMT First off I would take the Canadian Charter of Rights and Freedoms over the US constitution any day. To start an argument with the throw-away idea that people would prefer freedom to possess a gun then give equal rights to people regardless of their sexual preference is ludicrous. But ignoring that, I am curious as to what the net costs to society are when corporate espionage leads to corporations losing $100b - $1t. Presumably this is proprietary information that leads to not just asymmetrical information to the detriment of the consumer but also leads to some monopolistic pressures. I wonder if the people who steal this information and use it to produce imitation products in developing nations might be doing some good. Don't get my wrong, I understand that proprietary information, and patents are necessary to promote research into new products but somehow I doubt the net cost to society is as high as it is to the victim corporations. * Recommend 83 * Report * Permalink * reply Anjin-San in reply to T.Ware May 15th 2012 0:15 GMT ”somehow I doubt the net cost to society is as high as it is to the victim corporations.” Tell that to the newly unemployed workers at the manufacturing plant somewhere in US which was forced to shut down due to Chinese imitators... * Recommend 77 * Report * Permalink * reply edwardong May 13th 2012 16:22 GMT And how many data items has the US collected on non-citizens, given it is not restrained by Congress here? * Recommend 95 * Report * Permalink * reply Anjin-San in reply to edwardong May 15th 2012 0:16 GMT Conversely, how many foreign governments are collecting information on US citizens, given THAT is also not restrained by congress (if there are any) over there... * Recommend 74 * Report * Permalink * reply Artificial Intelligence in reply to Anjin-San Jul 14th 2012 17:18 GMT Probably less information, if only for budget reasons. The US military/industrial complex is in a class of its own - off the top of my head I think US military spending is the size of the next seventeen countries put together. No other country pours so much money down the barrel of a gun, or its cyber equivalent, so my assumption would be that other countries are relatively budget-constrained when it comes to trying to monitor the entire internet. I'd be interested if anyone knows differently. * Recommend 3 * Report * Permalink * reply Looch May 12th 2012 12:58 GMT I am very skeptical of the doomsday assertion of enormous costs to businesses and individuals caused by cybercrime. There is no reliable measure of this. The numbers used to illustrate this are so far apart -- 100 billion to 1 trillion this Economist article states -- that this by itself shows we have no idea and just guess, throwing numbers around. In turn, these reckless, inflated and unsupported claims are used by powerful interests to justify totally demolishing our privacy and our constitutional protections. CISPA is another blow to the supposed constitutional guarantees we have in the USA and another victory for military-intelligence-business establishment that sees us more and more as totally subservient entities devoid of rights to be milked for profit, information and power. * Recommend 126 * Report * Permalink * reply terrestri in reply to Looch May 12th 2012 17:31 GMT Agreed. And now we're both marked by the NSA and DHS for "anti-social behavior". * Recommend 124 * Report * Permalink * reply MarkDowe May 12th 2012 12:44 GMT CISPA reminds me of an overarching objective to remove "Chinese Walls" between all the facilitators of those who hold personal information on individuals. How exactly that could be achieved with efficiency in combating cyber threats must remain very unclear and one would expect Congress (and others looking on with interest such as Britain given its desire to implement a snooping bill) to consider the costs involved in running what surely would amount to a very extensive and complex operation. Realistically, the Cybersecurity Act of 2012 is more pragmatic and rational in its approach. Segmentation at least helps providers to better identify and act upon where those threats have originated from. * Recommend 185 * Report * Permalink * reply teacup775 May 12th 2012 4:39 GMT That's the Legislature for us, hand wads of money away for homeland "security", erase constitutional rights and abdicate protecting the nation. What a country. * Recommend 121 * Report * Permalink * reply SomeDude May 12th 2012 1:59 GMT It always find ironic that some of the biggest promoters of 'small government' who makes all kind of empty BS rhetoric about 'freedom' and 'liberty' are only to have to constantly vote 'Yes' as they did today in the House that dramatically expand the ability and authority of the US gov't to monitor its citizens. Looked quickly at a dozen of the Tea Party members who came in with the House class of 2010 and only 2 voted against it. Typical. Tea Party pukes who say they support libertarian ideas but voted this week to not cut a single dollar from the defense budget and voted 'yes' for yet another bill which massively expands govt-monitoring authority. Bloated defense spending, endless war, and massive gov't oversight over its citizens. Sure doesn't sound very libertarian to me and more like how a fascist would think. * Recommend 138 * Report * Permalink * reply blue asgard in reply to SomeDude May 13th 2012 16:12 GMT "Sure doesn't sound very libertarian to me and more like how a fascist would think." That is because the Tea Party is at heart, a Fascist movement! Fascism, as I'm sure many readers will know, was defined by George Orwell as the politics of the bully. What he actually wrote was this: "Except for the relatively small number of Fascist sympathizers, almost any English person would accept ‘bully’ as a synonym for ‘Fascist’. That is about as near to a definition as this much-abused word has come." And the essence of bullying is to collapse your empathy for the bullied. If you do have empathy for the bullied you'll be disarmed as a bully. The same applies to Fascism. Hitler succeeded in collapsing his followers empathy for a particular human tribe - the Jews. As a result he succeeded in establishing a particularly egregious form of Fascism in his country. By contrast 'St' Paul made Christianity into the exact opposite - an empathy bomb intended to destroy Roman Fascism, which oppressed his country (he was a Roman Citizen but born a Jew). This is what the exhortations to 'love thine enemies', 'do good to those who would do evil unto you', and 'turn the other cheek' would encourage, if people genuinely adhered to them. How could you be a Fascist if you empathised like that with your victims? Arguably you shouldn't call yourself a Christian if you don't but who - really - does this? Well, the tea-partyist would say they were Christian -indeed fundamental Christianity, with its very un-Christian attitudes towards non-fundamentalists, seems to be bound up in what passes for their philosophy (maybe that's a word with too many letters for what they believe in). Well, the Christians have the saying that ‘by their fruits shall ye know them’.. Apparently, on the day that the Obamacare bill was passed, a bunch of tea-partyists in Philadelphia came across a man begging in the street. He had Parkinson’s disease, no healthcare and no money. Far from showing anything remotely like the Christian charity Americans claim to be proud of, these tea-partyists proceeded to abuse this beggar, at first verbally, advising him that he ‘was in the wrong part of town’ for this sort of thing, then they started kicking him. Eventually someone stepped in, claiming to ‘buy this man’ and showered one dollar bills all over him. It was not exactly a charitable gesture but at least they stopped there, maybe interrupted because someone recorded the whole thing on their camera-phone and the footage went up on a website. ‘By their fruits shall ye know them’, indeed! * Recommend 93 * Report * Permalink * reply Truly Yours May 12th 2012 1:25 GMT These outlandish claims of business losses due to online piracy probably include the presumptive losses of sales of CD's and DVD's--as if all the world's media thieves were to actually pay retail prices for the music and movies they "share" so freely. These numbers are being used to create the public justification for destroying American's privacy to protect business profits. The real reason for these draconian laws--that so blatantly violate our Constitutional rights--is the insatiable desire of NSA, CIA, FBI, Federal, State, County, and Local civil servants to listen to all our conversations, record all our online activities, capture all our financial transactions, and track all our physical movements without any bothersome warrants or supervision. Massive data mining by US government agencies has been a reality for quite some time, enabled by required hooks into the telecom network and legal immunity for the companies who provide this access. You thought this only occurs in China? Big Brother is watching you, America. * Recommend 125 * Report * Permalink * reply newphilo May 12th 2012 0:11 GMT The enemies, whoever they are, can flood NSA with zillions of garbage bytes - e.g. meaningless but strongly encrypted messages - to keep it busy and overworked at a faster pace than NSA would make sense of it. * Recommend 119 * Report * Permalink * reply Ancient Submariner May 11th 2012 20:07 GMT This just thelatest, of many examples (a huge number originating in th United States, sad to say) of the words of Benjamin Franklin ... a man who know a thing ot two ... "Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety." Historical Review of Pennsylvania, 1759 * Recommend 134 * Report * Permalink * reply Ancient Submariner May 11th 2012 20:05 GMT This just thelatest, of many examples (a huge number originating in th United States, sad to say) of the words of Benjamin Franklin ... a man who know a thing ot two ... Those who would give up essential liberty to purchase a little temporary safety deserve neither liberty nor safety. Historical Review of Pennsylvania, 1759 * Recommend 122 * Report * Permalink * reply DavidShayer May 11th 2012 19:59 GMT "More recently, the NSA sought, and received, billions of customer records from AT&T, Verizon and other phone companies. Only Qwest refused to comply." And a little while later, the CEO of Quest was convicted and jailed on unrelated criminal charges. What a coincidence. * Recommend 149 * Report * Permalink * reply Boot_Dirt May 11th 2012 17:41 GMT I'm wondering if the author has read the bill because this: "If CISPA were to become law, firms that collect lots of information on individuals would quickly find themselves being coerced into helping the National Security Agency." Is expressly forbidden in the bill. This argument is a joke. * Recommend 122 * Report * Permalink * reply InfoSec May 11th 2012 17:00 GMT The comments are missing the most salient point, which is that we need to be very mindful and proceed down a path that does not sacrifice privacy for the illusion of security. We need to focus on our behavior and develop technology that protects privacy (both for our institutions and for each of us as individuals) so that we can have more robust and genuine security. The way to think about this is to think about herd immunity as an epedimiologist would. From an epedimiological perspective, each individual is protected and so the herd becomes more secure. Mass surveillance is not the answer, in fact it becomes a force multiplier to the problem because it just exposes even more information. We need to focus on hardening the weak points (end point and mind point devices) and eliminating the security holes by developing new architecture, and coupling that with informed behavior, rather than leaving a gaping hole through which the vast majority of information and communication can be monitored and surveilled. Because you can count on the fact that if the NSA knows, so does every other sophisticated nation and criminal organization. Privacy and security are intertwined, with more privacy comes more security. * Recommend 131 * Report * Permalink * reply jomiku May 11th 2012 15:06 GMT I found this post to be written with an excess of enthusiasm. For example, other countries have Constitutions that proclaim rights. We studied the USSR's when I was a kid and it was a model of rights. It isn't what is written down but what the society does that counts. Like another commenter, I was struck by the absurdity of the numbers. A trillion dollars. You mean the losses to US companies are more than half the GDP India or 3/4 the GDP of Russia or nearly half the GDP of Britain? Then there are references to bringing data centers to their knees when what is meant is that data won't be analyzed. Do we actually analyze what we get now? I doubt it. To what degree do we analyze? No one knows so no one knows if this material will be piled up, ignored or probed for something useful. With digital data, it's not the volume but the tools used to dig into it. We don't have to lift this stuff by hand. So for example, let's say they have data and they want to pursue that further. The availability of more data may mean they can get somewhere useful in identifying actual threats. They don't otherwise need to analyze every freaking thing. * Recommend 130 * Report * Permalink * reply Sinouk May 11th 2012 14:42 GMT This article seems forgetting to mention the threat to US Cyber security from their own indigenous Hackers. * Recommend 125 * Report * Permalink * reply * 1 * 2 * next › * last » * Comment (37) * Print * E-mail * Permalink * Reprints & permissions * About Babbage Reports on the intersections between science, technology, culture and policy, in a blog named after Charles Babbage, a Victorian mathematician and engineer Follow us on Twitter @EconSciTech RSS feed Advertisement Economist video Explore trending topics Comments and tweets on popular topics Latest blog posts - All times are GMT [_0013_free-exchange.png] Recommended economics writing: Link exchange Free exchange 26 mins ago [_0018_sport-theory.png] African football: Nigerian heroes Game theory 2 hrs 45 mins ago [_0015_prospero.png] Kraftwerk at Tate Modern: A blast from the futuristic past Prospero February 11th, 18:43 [_0017_baobab.png] African football: Nigerian heroes Baobab February 11th, 18:24 [_0013_free-exchange.png] Mobility: There is nothing inevitable about low rates of economic mobility Free exchange February 11th, 18:02 [_0001_newsbook.png] Pope Benedict XVI’s resignation: Vatican ragged Newsbook February 11th, 17:48 [_0000_schumpeter.png] Mail-free Saturdays in America: No magazine today—and, perhaps, tomorrow Schumpeter February 11th, 17:29 More from our blogs » Most popular * Recommended * Commented Recommended * A tale of two Davoses 1The World Economic ForumA tale of two Davoses * 2The Nordic countries: The next supermodel * 3Spain’s government: Another blow * 4Northern lights * 5The World Economic Forum in Davos: Leaders without followers Commented * Locked on 1China and JapanLocked on * 2Italian politics: Gaffe or provocation? * 3John Brennan: The debate over drones * 4Israeli and Palestinian textbooks: Teaching children to hate each other * 5Battle of the EU budget: Cameron's budget blinder Sponsored by Advertisement Economist blogs * Analects | China * Americas view | The Americas * Babbage | Science and technology * Banyan | Asia * Baobab | Africa * Blighty | Britain * Buttonwood's notebook | Financial markets * Cassandra | The World in 2013 * Charlemagne | European politics * Democracy in America | American politics * Eastern approaches | Ex-communist Europe * Feast and famine | Demography and development * Free exchange | Economics * Game theory | Sports * Graphic detail | Charts, maps and infographics * Gulliver | Business travel * Johnson | Language * Lexington's notebook | American politics * Newsbook | News analysis * Prospero | Books, arts and culture * Pomegranate | The Middle East * Schumpeter | Business and management Products & events Stay informed today and every day Get e-mail newsletters Subscribe to The Economist's free e-mail newsletters and alerts. Follow The Economist on Twitter Subscribe to The Economist's latest article postings on Twitter Follow The Economist on Facebook See a selection of The Economist's articles, events, topical videos and debates on Facebook. Advertisement Classified ads IFRAME: http://ad.doubleclick.net/adi/teg.ckau/obba;subs=n;wsub=n;sdn=n;pos=but ton1;sz=125x125;tile=18;ord=251065493? IFRAME: http://ad.doubleclick.net/adi/teg.ckau/obba;subs=n;wsub=n;sdn=n;pos=but ton2;sz=125x125;tile=19;ord=251065493? IFRAME: http://ad.doubleclick.net/adi/teg.ckau/obba;subs=n;wsub=n;sdn=n;pos=but ton3;sz=125x125;tile=20;ord=251065493? IFRAME: http://ad.doubleclick.net/adi/teg.ckau/obba;subs=n;wsub=n;sdn=n;pos=but ton4;sz=125x125;tile=21;ord=251065493? IFRAME: http://ad.doubleclick.net/adi/teg.ckau/obba;subs=n;wsub=n;sdn=n;pos=but ton5;sz=125x125;tile=22;ord=251065493? IFRAME: http://ad.doubleclick.net/adi/teg.ckau/obba;subs=n;wsub=n;sdn=n;pos=but ton6;sz=125x125;tile=23;ord=251065493? * About The Economist * Media directory * Advertising info * Staff books * Career opportunities * Subscribe * Contact us * Site index * [+] Site Feedback * Copyright © The Economist Newspaper Limited 2013. All rights reserved. * Accessibility * Privacy policy * Cookies info * Terms of use * Help Quantcast