Tuesday, February 4, 2014

Fixing the NASA Piloted Program After Challenger: Views from 1989 and 1993 (plus an alternate history addendum)

Q's who's "flying" ALL that other shit around ???  huh !

Shuttle-C. Image: Morton Thiokol.
Shuttle-C. Image: Morton Thiokol.
In 1988-1990, I lived in Orlando, Florida, and back then it wasn’t all that difficult for a writer who had published for only a couple of years (in print, in those days) to get badged to watch Space Shuttle launches from the Press Site bleachers, just three-and-a-half miles from Launch Complex 39A at Kennedy Space Center (KSC). On 13 March 1989, I was there as Discovery lifted off at the start of the 28th flight of the Shuttle Program. Discovery‘s mission was to deploy Tracking and Data Relay Satellite-D. The mission, designated STS-29, was widely seen as a bit of a milk run, though it earned attention by being only the third Shuttle flight after the two-and-a-half-year post-Challenger Shuttle stand-down.
The Magellan Venus radar-mapper spacecraft was at KSC in a cleanroom at the time. The KSC Public Affairs Office provided the press covering STS-29 with an opportunity to don sterile bunny suits and visit with the Venus probe. That was so cool (seeing Magellan, not the bunny suits so much) that I talked Astronomy magazine into getting me badged for STS-30, during which the Orbiter Atlantis would launch Magellan into Earth orbit.
Magellan was the first planetary spacecraft to ride a Shuttle Orbiter, and everyone was nervous that Shuttle problems might delay its launch past the closing of its interplanetary launch window on 29 May 1989. A problem with the labyrinthine plumbing in Atlantis‘s boattail scrubbed the first launch attempt on 28 April, and many of the press packed up and went home. On 4 May 1989, however, Atlantis cleared the tower at the start of its fourth flight, and soon after attaining orbit around the Earth sent Magellan on its way. It was the first new U.S. planetary mission launch in 11 years.
While waiting for Atlantis and Magellan to get off the ground, I visited the information counters in the KSC Press Center dome. There NASA and its contractors had laid out press kits and piles of handouts for reporters. Being a packrat, I still have the stuff I collected. Among the interesting items I squirreled away were two small brochures that described ways that the Shuttle system might evolve to expand its capabilities.
The first, authored by Morton Thiokol, prime contractor for the Space Shuttle’s twin Solid-Rocket Boosters (SRBs), pitched Shuttle-C. The “C” stood for “cargo.” Shuttle-C was by then already an old idea (NASA Marshall Space Flight Center and its contractors had first floated it during the 1970s). The Utah-based company claimed that replacing the Space Shuttle Orbiter with an expendable cargo module would boost payload-to-orbit from less than 50,000 pounds to more than 150,000 pounds. The cargo module would include a Shuttle Orbiter boattail with two Space Shuttle Main Engines (not the three the Orbiter needed).
Morton Thiokol explained that Shuttle-C could launch Space Station Freedom in a few large packages. This would reduce risk to crew and save money. After finishing with Freedom, Shuttle-C could be applied to “future space planetary missions” and other advanced missions. Shuttle-C could be ready for flight in just 45 months, the company estimated.
Shuttle Orbiter prime contractor Rockwell International wrote of the “economy of evolution” in its brief brochure. First, it praised piloted spaceflight on board the Orbiter, then it offered up Orbiter upgrades. Rockwell reckoned that the Challenger replacement Orbiter, at the time designated OV-105 (and eventually named Endeavour), could be ready in 1991, the same year that Shuttle-C would begin flights (in reality OV-105 first flew in 1992).
OV-105, the three existing Orbiters (Columbia, Discovery, and Atlantis), and Shuttle-C would not, however, be enough to accomplish everything NASA had planned for the 1990s. Four Orbiters and Shuttle-C would not, for example, be capable of maintaining a flight rate of 12 Space Shuttle missions per year. To do that – and as insurance against a future Shuttle accident – Rockwell called on NASA to buy an evolved OV-106 that would first fly in 1995 and an OV-107 that would fly in 2000. Costs would peak twice, reaching to just under $1 billion in 1994 for OV-106 and in 1999 for OV-107. A five-Orbiter fleet would, Rockwell claimed, maintain an 80% probability of meeting NASA’s spaceflight requirements through the year 2008.
Rockwell continued to argue for Shuttle enhancements at least until September 1993, when I picked up two more brochures at a conference in Houston. By then I had been working as a NASA contractor in that steamy, smelly, sprawly city for a year. In the brochures, Rockwell pointed to the B-52 bomber, which had evolved continuously since its debut in the 1950s, as a model for the Shuttle’s future.
Rockwell described upgrades that could turn a Space Shuttle Orbiter into a Long-Duration Orbiter capable of operating in space for up to 90 days while docked with the Space Station. The company also proposed an automated Orbiter it dubbed the Reusable Cargo Vehicle (RCV). The unmanned RCV could be coupled with a lightweight composite External Tank and Liquid-Rocket Boosters with revived and improved Saturn F-1 engines; this would permit it to boost up to 125,000 pounds into orbit. RCV development would, Rockwell added, evolve the Space Shuttle into “a heavy-lift cargo vehicle to return to the moon and go on to Mars.”
Of course, the U.S. took a different course: we elected to develop neither Shuttle-C nor RCV, and built no new Orbiters after Endeavour. NASA’s four Orbiters did, however, undergo almost continuous upgrades. An Extended Duration Orbiter (EDO) pallet that enabled flights of up to 17 days flew first in 1992. Eleven years ago yesterday, Columbia, NASA’s oldest Orbiter, was returning to Florida at the end of STS-107 (16 January-1 February 2003), a 16-day EDO mission, when it broke apart over eastern Texas, killing its seven-member crew and setting in motion events that led to the Space Shuttle’s final flight in 2011.
References:
Shuttle Evolution: Bridge to the Future, Rockwell International, April 1989.
Expanding the National Space Transportation System, Morton Thiokol, 1989.
Space Shuttle Evolution: Thinking About Tomorrow with the Resources of Today, Rockwell International, August 1993.
Automated Orbiter Kit, Rockwell International, September 1993.
Alternate history space station design based on the addendum below. A - forward stabilization brace & solar array boom attachment point; B - forward attitude control module; C - modified Orbiter flight deck; D - five-deck space station crew module; E - wing (top surface is auxiliary radiator); F - forward inter-module tunnel; G - aft inter-module tunnel; H - rudder; I - main radiators & payload bay doors; J - modified Orbital Maneuver System engine; K - aft stabilization brace & solar array boom attachment point; L - aft attitude control module. The silhouette on the right shows the docked space station Orbiters and the deployed steerable  solar array booms with their inflatable solar arrays. Image: David S. F. Portree.
Alternate history space station design based on the addendum below. A – forward stabilization brace & solar array boom attachment point; B – forward attitude control module; C – modified Orbiter flight deck; D – five-deck space station crew module; E – wing (top surface is auxiliary radiator); F – forward inter-module tunnel; G – aft inter-module tunnel; H – rudder; I – main radiators & payload bay doors; J – modified Orbital Maneuver System engine; K – aft stabilization brace & solar array boom attachment point; L – aft attitude control module. The silhouette on the right shows the docked space station Orbiters and the deployed steerable solar array booms with their inflatable solar arrays. Image: David S. F. Portree.
Addendum, 3 February 2014, 3:10 PM EST: This morning I had occasion to sit (and sit) in a waiting room, which I find is often conducive to letting my imagination run wild. I started thinking about what our space program might be like if we had never stopped building Orbiters; if, after early test flights and the relatively rapid creation of a “starter” three-Orbiter fleet, we had sought to christen a new Orbiter, always with upgrades and improvements, about every four years.
Columbia would fly first in 1981. Enterprise, used for drop-tests in 1977-1979, would be rebuilt for spaceflight and launched for the first time in 1983, then Challenger would join the fleet in 1985.
The Shuttle booster stack of twin Solid-Rocket Boosters and large External Tank would not be immune to modification. Because of this, NASA would find and fix the Solid-Rocket Booster field joint design flaws that destroyed Challenger in our timeline. Shuttle-C missions, which would begin in 1986, would permit testing of engine, tank, and booster modifications without placing crews at risk. The Galileo Jupiter orbiter and probe and its Centaur injection stage would be among the earliest Shuttle-C payloads.
Discovery, the first Orbiter capable of fully automated flight, would reach orbit for the first time in 1989. Aurora, capable of operating in Earth orbit for up to 90 days at a time, would fly first in 1993. By 1996, flight time would be extended to six months by on-orbit resupply. NASA would have had no need of a dedicated space station built up through many flights.
With the addition of Endeavour to the fleet in 1997, Columbia would be retired to the Smithsonian. Enterprise would retire in 2001, after Pioneer joined the fleet. Explorer would replace Challenger in 2005 and Adventure would replace Discovery in 2009.
And so on, more or less indefinitely. Orbiters and crews would, regrettably, be lost to accidents, as is not infrequently the case with experimental high-performance aircraft. These would temporarily knock the fleet down to four orbiters, but a fifth would always be under construction, and Orbiter retirements could be temporarily postponed when necessary. There would be no shortage of men and women eager to face the dangers and fly into space.
An Orbiter would cost perhaps $1.5 billion, placing it in the same cost range as many other aerospace vehicles; for example, the B-2 stealth bomber. Operational costs, quite high in the early years of the program, would fall as design improvements made maintenance and processing less labor intensive. These improvements would include replacement of the thousands of heat shield tiles with a few sturdy metal panels. Liquid-Rocket Boosters would replace the Solid-Rocket Boosters by around the turn of the 21st century, improving safety and increasing payload capacity.
On this day in alternate 2014, the Shuttle fleet would comprise Endeavour, Pioneer, Explorer, Adventure, and the newest Orbiter, Constellation. Pioneer and Explorer would be capable of docking belly-to-belly, forming a 10-person space station. Endeavour and Adventure could dock unmanned with the joined Orbiters to provide resupply, or could visit them with crews and cargo. Constellation would include fittings so that it could serve as an assembly and support platform for piloted cislunar spacecraft delivered by other Orbiters and Shuttle-C. In short, we would have a very different space program.
Related Beyond Apollo Posts
Space Station Columbia (1991)
Evolutions vs. Revolution: The 1970s Battle for NASA’s Future
Shuttle with Aft Cargo Carrier (1982)
David S. F. Portree
I research and write about the history of space exploration and space technology with an emphasis on missions and programs planned but not flown (that is, the vast majority of them). My posts are based on more than 30 years of research into spaceflight history. I provide plenty of historical context. I also include lots of crunchy technical details to help the reader envision what might have been - and, in many cases, what might yet be.

The $15 trillion shadow over Chinese banks

China analyst Charlene Chu explains why the nation is on the verge of crisis

The $15 trillion question hanging over Chinese banks
Charlene Chu is adamant that a Chinese banking collapse of some description is a certainty Photo: Bloomberg
Drawing attention to the problems at an individual bank is never likely to make you popular, but calling time on an entire financial system is another thing entirely.
For eight years, until her resignation last month, Fitch banks analyst Charlene Chu has done just that, warning of the impending collapse of China’s debt-fuelled bubble.
Born and raised in America and a graduate of Yale, she has claimed in painful detail that China has embarked on an unprecedented experiment in credit expansion that far exceeds anything seen before the financial crisis that rocked Western markets six years ago.
Working out of Beijing, Chu has developed a reputation that has seen her hailed by some of the world’s most important money managers as a “heroine” and treated as a pariah by some within China’s financial elite.
In a country where the banks, even the largest, are not known for openness, Chu has warned since 2009 about a rapid expansion in lending that has seen something close to $15 trillion (£9.1 trillion) of credit created, fuelling a property and infrastructure boom that has no equal in history.
To say her warnings have been unusual is to underestimate quite how important her contributions have been. Chu has explained the creation – from a standing start just five years ago – of a shadow banking industry in China that today is responsible for as many loans in terms of volume as the country’s entire mainstream financial system.
Speaking for the first time since her departure from Fitch last year, Chu, who has taken a new job at Autonomous, the respected independent research firm, says she remains adamant that a Chinese banking collapse of some description remains not just an outside chance, but a certainty.
“The banking sector has extended $14 trillion to $15 trillion in the span of five years. There’s no way that we are not going to have massive problems in China,” she says.
Behind these problems lie a baffling range of “trusts”, “wealth management products” and foreign-currency borrowings that have allowed indebtedness to expand even as the authorities have attempted to clamp down on mainstream lending by the big banks.
Chu’s warnings have carried particular weight in recent weeks as the Industrial and Commercial Bank of China backed away from a 3bn renminbi (£297m) trust it had sold to its customers. The move prompted fears this could become China’s “Bear Stearns moment”, a reference to the abandonment by the defunct US broker of several sub-prime funds in the early stages of the West’s 2007 credit crisis.
In the event, a default of the ICBC trust was averted, but Ms Chu remains clear that the linkage between the official banking system and its shadow twin remains a threat.
“Banks are often involved behind-the-scenes in a lot of this shadow product,” she said. “It’s one reason why I am always emphasising this idea that is often pushed by Chinese economists and academics that the shadow banking sector and the formal banking sector are separate and therefore, if the shadow banking sector falls apart, it does not matter.
“I just don’t agree with that because there is so much inter-linkage between the formal banking sector and the shadow banking sector and this product [the ICBC trust] is a good example.” Many take comfort that foreign currency reserves, estimated at close to $4 trillion, could be used to rescue the financial system in a crisis. Chu says such optimism is wishful thinking.
“The FX [foreign exchange] reserves cannot be used nearly to the extent that people think they can. There are some analysts that think they can’t be used at all, but I disagree with that.
“I believe they can’t be used in their entirety by any means because they are offset by the other side of the balance sheet of the PBOC [People’s Bank of China]. Because of that, you can’t just run down one side of the balance sheet, the asset side, and not deal with the liability side of the PBOC balance sheet.”
However, while Chu questions the ability of the authorities to throw money at the problem, she also says there are several reasons to think a Chinese crisis would not take the form of that seen in the West. “This is going to be different from other markets where market forces are allowed to play out. Here the authorities get involved and that means these kind of defaults can remain one-off and isolated for quite a while,” she says.
“The critical question is that, at some point are these one-off issues going to turn into a very big wave of defaults? That is going to be very difficult for the authorities to manage in the same way that they have been able to manage the one-offs.”
Taking such a pessimistic view of China’s banks has not made Chu popular either with the authorities or the lenders. Her previous employer, Fitch, last year became the first of the three main ratings agencies in 14 years to cut China’s credit rating, largely based on her analysis.
Fitch and Chu both remain circumspect about how her exposure of the problems of the banks has affected business.
Chu admits that her views have made her job harder, in particular the effort to uncover decent data on what is going on inside the system. On the other hand, she adds that not being beholden to the “party line” has enabled her to analyse China more dispassionately than others.
“I still feel like, in the end, being on the outside has not hurt me too much in terms of what is going on.” Not following the party line has seen Chu travel to China to inspect first-hand the building of “ghost cities” that developers claim are fully occupied, but that appear to be deserted except for a scattering of maintenance staff and increasingly despondent “entrepreneurs”.
“The odd thing is that you will certainly encounter some developments that appear to be totally empty and yet they are totally sold out,” says Chu. “It is a very mixed picture, but I do feel in the end that the amount of real estate building that has gone on over the last few years is substantial, yet there are
still a lot of projects in the works. There is definitely reason for people to be worried that we have got a real estate bubble.”
The popping of this bubble could leave behind a very different China, and it is the post-crisis economy that is Chu’s biggest concern.
Like the West, which has implemented an array of new regulations in the wake of the crash, Chu worries that China could find it difficult to adapt to a slower pace of growth.
“This isn’t a developed market with a very strong social safety net. If we get to a situation where we are having severe financial sector problems, the chances are GDP growth is much slower than it is now for a prolonged period of time,” she says. Adding: “I think that really is where the cost of a financial sector crisis comes in. To me, it’s much less about how much the sovereign issues in terms of debt to bail out the financial sector. It comes down to how much of a hit does growth take and what is the impact of that on the populace and do we start to have any other issues that arise from that?”
Chu says that many in China’s policy elite realise the Faustian pact the country has made but, with the economy and political system so dependent on maintaining a 7pc rate of growth, there is little will to take away the punchbowl any time soon.
And that is the problem. While a crisis now would be bad, allowing the current situation to persist will only make the final reckoning that much worse, particularly for the wider international financial system.
Warnings have already been raised about the increased use of offshore dollar funding by mainland Chinese borrowers. The Hong Kong Monetary Authority has pointed to the growth of foreign currency funding of China, which is believed to have more than quadrupled in the past three years to in excess of $1 trillion.
Chu says that this remains a side issue, arguing that the longer the credit boom is allowed to continue the bigger the international leg of the crisis will become.
“One of the reasons why the situation in China has been so stable up to this point is that unlike many emerging markets there is very, very little reliance on foreign funding,” she said.
“As that changes it obviously increases the vulnerability to swings in foreign investor appetite. I do think, in the end, you look at the exposure numbers from the BIS [Bank for International Settlements] and the Hong Kong banks and you’re going to encounter a few institutions that are going to have a sizeable exposure to China.”
As the problems in the Chinese financial system become harder to ignore, it is likely Chu’s opinions are going to be increasingly sought as investors look for insight on what is going on in the world’s second-largest economy.

The 12 Most Awkward Breakups To Play Out On Facebook (NSFW)

Posted: Updated:
In advance of Facebook celebrating its 10th anniversary on Tuesday, we thought we'd take a moment to recognize one of the best/worst things about Mark Zuckerberg's brainchild: all the godawful relationship drama we've seen play out on the site over the years.
Below, 12 of the most cringeworthy breakups we've had a front row seat to, thanks to Facebook.
1. The status change.
lamebook
(via lamebook.com)
2. The short-lived pity party.

(via imgur.com)
3. The passive aggressive.
lamebook1
(via lamebook.com)
4. The epic fail.
dad divorce
(via sharenator.com)
5. The TMI.
contagious
(via lamebook.com)
6. The joke gone wrong.
joke
(via lamebook.com)
7. The PSA.
lingerie
(via lamebook.com)
8. The office breakup.
Best breakup
(via imgur.com)
9. The not-so-subtle metaphor.

(via imgur.com)
10. The "engagement."
engagement
(via imgfave.com)
11. The Kanye.
imgfave
(via imgfave.com)
12. The false alarm.
false alarm
(via lamebook.com)

Bitcoin: Revolutionary Game-Changer Or Trojan Horse?

Bitcoin Is Going Mainstream

Reddit, Virgin Galactic, and Overstock.com now accept Bitcoin.
So do dating site OKCupid and travel site CheapAir.com. Zynga is now in the testing phase.
Two big Las Vegas hotels accept Bitcoin.
Congressman Steve Stockman, R-Texas, accepts Bitcoin for 2014 campaign contributions. As does a law firm in Australia.
Reuters notes:
Already, 21,000 merchants are using Coinbase to accept Bitcoin from customers.
Indeed, there are websites listing scores of businesses which now accept bitcoin.
But is Bitcoin going mainstream a good thing or a bad thing?

People Power … Challenging the Status Quo?

Andy Haldane – Executive Director for Financial Stability at the Bank of England – believes that peer-to-peer internet technology will lead to the break up of the big banks.
Bank of America said “We believe Bitcoin could become a major means of payment for e-commerce and may emerge as a serious competitor to traditional money-transfer providers”
Visa has attacked Bitcoin as being less trustworthy than its well-established payment system.
So it sounds like Bitcoin is shaking up the status quo …

Backed by … the Big Banks?

On the other hand, a lot of major mainstream players are backing Bitcoin and other digital payment systems.
Wells Fargo wants to get into Bitcoin in a big way.
JP Morgan Chase has filed a patent for a Bitcoin-like payment system. And Russia’s largest bank is working on a Bitcoin alternative as well.
Ben Bernanke and the Department of Justice have both cautiously blessed Bitcoin.
François R. Velde, senior economist at the Federal Reserve in Bank of Chicago, labeled it as “an elegant solution to the problem of creating a digital currency.” John Browne theorizes:
While crypto-currencies remain insulated from central bank manipulation, governments have thus far been tolerant, perhaps because their capability to track transactions is more advanced than Bitcoin believers admit.
Indeed, Bitcoin is not really that anonymous, as the NSA can track Bitcoin trades.
The NSA can apparently also hack Bitcoin. And see this. Given that the NSA may be changing the amount in people’s accounts, it would be child’s play for them to change the amount in your Bitcoin wallet.
And Yves Smith argues that Bitcoin actually plays into the hands of the central bankers:
Many [Bitcoin enthusiasts] clearly relish the idea of launching a currency outside the control of central banks (plus this beats Cryptonomicon in geekery).
If you believe the hype, you’ve been had. As Izabella Kaminska of the Financial Times tells us, you all are really just doing free/underpaid R&D for central banks, since you are debugging and building legitimacy for one of their fond projects, making currencies digital and getting rid of cash altogether.
I had wondered about the complacency of Fed and SEC officials in Senate Banking Committee hearings on Bitcoin last year.
***
As Kaminska explains (boldface mine):
Central bankers, after all, have had an explicit interest in introducing e-money from the moment the global financial crisis began…
Bitcoin has helped to de-stigmatise the concept of a cashless society by generating the perception that digital cash can be as private and anonymous as good old fashioned banknotes. It’s also provided a useful test-run of a digital system that can now be adopted universally by almost any pre-existing value system.
This is important because, in the current economic climate, the introduction of a cashless society empowers central banks greatly. A cashless society, after all, not only makes things like negative interest rates possible [background here, here, here and here], it transfers absolute control of the money supply to the central bank, mostly by turning it into a universal banker that competes directly with private banks for public deposits. All digital deposits become base money.
Consequently, anyone who believes Bitcoin is a threat to fiat currency misunderstands the economic context. Above all, they fail to understand that had central banks had the means to deploy e-money earlier on, the crisis could have been much more successfully dealt with.
Among the key factors that prevented them from doing so were very probable public hostility to any attempt to ban outright cash, the difficulty of implementing and explaining such a transition to the public, the inability to test-run the system before it was deployed.
Last and not least, they would have been concerned about displacing conventional banks from their traditional deposit-taking role, and in so doing inadvertently worsening the liquidity crisis and financial panic before improving it…
Almost of all of these prohibitive factors have, however, by now been overcome:
1) Digital currency now follows in the footsteps of a “disruptive” anti-establishment digital movement perceived to be highly accommodating to the black market and all those who would ordinarily have feared an outright cash ban. This makes it exponentially easier to roll out. Bitcoin has done the bulk of the educating.
2) What was once viewed as a potentially oppressive government conspiracy to rid the public of its privacy can be communicated as being progressive and innovative as a result.
3) Banks have been given more than five years to prove their economic worth and have failed to do so. If they haven’t done so by now, they probably never will, meaning there’s unlikely to be a huge economic penalty associated with undermining them on the deposit front or in transforming them slowly into fully-funded fund managers.
4) The open-ledger system which solves the digital double-spending problem has been robustly tested. Flaws, weaknesses and bugs have been understood, accounted for, and resolved.
The balance of the article describes how the central bank digital currency would be launched, and Kazmina finds a plan developed by Miles Kimball of the University of Michigan to be thorough and viable.
Oh, and why would Bitcoin, um, central bank digital currency make it viable to implement negative interest rates? Kaminska tells us:
…the greater the negative interest rate, the greater the incentive to hold alternative coins. The greater the incentive to hold alternative coins ,the greater the incentive to produce them. The greater the incentive to produce them, the greater the chances of oversupply and collapse. The more sizeable the collapse, the more desirable the managed official e-money system ultimately becomes in comparison.
Either way, the key point with official e-money is that the hoarding incentives which would be generated by a negative interest rate policy can in this way be directed to private asset markets (which are not state guaranteed, and thus not safe for investors) rather than to state-guaranteed banknotes, which are guaranteed and preferable to anything negative yielding or risky (in a way that undermines the stimulative effects of negative interest rate policy).
So all these tales … of how liberating and democratic Bitcoin will be are almost certain to prove to be precisely the reverse. Hang onto your real world wallet.

Bottom Line: Too Early To Tell

It’s not yet clear whether Bitcoin will be a force for good or a backdoor way for big banks – and central banks – to get people to accept a cashless society.
Stay tuned …
Note: While we’re trying to figure it out, we – like a growing number of websites – accept donations in Bitcoin (see button on the right).

Revealed: The NSA’s Secret Campaign to Crack, Undermine Internet Security


The National Security Agency headquarters at Fort Meade, Md., in January 2010. (Saul Loeb/AFP/Getty Images
http://www.propublica.org/article/the-nsas-secret-campaign-to-crack-undermine-internet-encryption





Note: This story is not subject to our Creative Commons license.
Closer Look: Why We Published the Decryption Story
Sept. 6: This story has been updated with a response from the Office of the Director of National Intelligence.
The National Security Agency is winning its long-running secret war on encryption, using supercomputers, technical trickery, court orders and behind-the-scenes persuasion to undermine the major tools protecting the privacy of everyday communications in the Internet age, according to newly disclosed documents.
This story has been reported in partnership between The New York Times, the Guardian and ProPublica based on documents obtained by The Guardian.

For the Guardian: James Ball, Julian Borger, Glenn Greenwald
For the New York Times: Nicole Perlroth, Scott Shane
For ProPublica: Jeff Larson
The agency has circumvented or cracked much of the encryption, or digital scrambling, that guards global commerce and banking systems, protects sensitive data like trade secrets and medical records, and automatically secures the e-mails, Web searches, Internet chats and phone calls of Americans and others around the world, the documents show.
Many users assume — or have been assured by Internet companies — that their data is safe from prying eyes, including those of the government, and the N.S.A. wants to keep it that way. The agency treats its recent successes in deciphering protected information as among its most closely guarded secrets, restricted to those cleared for a highly classified program code-named Bullrun, according to the documents, provided by Edward J. Snowden, the former N.S.A. contractor.
Beginning in 2000, as encryption tools were gradually blanketing the Web, the N.S.A. invested billions of dollars in a clandestine campaign to preserve its ability to eavesdrop. Having lost a public battle in the 1990s to insert its own “back door” in all encryption, it set out to accomplish the same goal by stealth.
The agency, according to the documents and interviews with industry officials, deployed custom-built, superfast computers to break codes, and began collaborating with technology companies in the United States and abroad to build entry points into their products. The documents do not identify which companies have participated.
The N.S.A. hacked into target computers to snare messages before they were encrypted. And the agency used its influence as the world’s most experienced code maker to covertly introduce weaknesses into the encryption standards followed by hardware and software developers around the world.
“For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” said a 2010 memo describing a briefing about N.S.A. accomplishments for employees of its British counterpart, Government Communications Headquarters, or GCHQ. “Cryptanalytic capabilities are now coming online. Vast amounts of encrypted Internet data which have up till now been discarded are now exploitable.”
When the British analysts, who often work side by side with N.S.A. officers, were first told about the program, another memo said, “those not already briefed were gobsmacked!”
An intelligence budget document makes clear that the effort is still going strong. “We are investing in groundbreaking cryptanalytic capabilities to defeat adversarial cryptography and exploit Internet traffic,” the director of national intelligence, James R. Clapper Jr., wrote in his budget request for the current year.
In recent months, the documents disclosed by Mr. Snowden have described the N.S.A.’s broad reach in scooping up vast amounts of communications around the world. The encryption documents now show, in striking detail, how the agency works to ensure that it is actually able to read the information it collects.
The agency’s success in defeating many of the privacy protections offered by encryption does not change the rules that prohibit the deliberate targeting of Americans’ e-mails or phone calls without a warrant. But it shows that the agency, which was sharply rebuked by a federal judge in 2011 for violating the rules and misleading the Foreign Intelligence Surveillance Court, cannot necessarily be restrained by privacy technology. N.S.A. rules permit the agency to store any encrypted communication, domestic or foreign, for as long as the agency is trying to decrypt it or analyze its technical features.
The N.S.A., which has specialized in code-breaking since its creation in 1952, sees that task as essential to its mission. If it cannot decipher the messages of terrorists, foreign spies and other adversaries, the United States will be at serious risk, agency officials say.
Just in recent weeks, the Obama administration has called on the intelligence agencies for details of communications by Qaeda leaders about a terrorist plot and of Syrian officials’ messages about the chemical weapons attack outside Damascus. If such communications can be hidden by unbreakable encryption, N.S.A. officials say, the agency cannot do its work.
But some experts say the N.S.A.’s campaign to bypass and weaken communications security may have serious unintended consequences. They say the agency is working at cross-purposes with its other major mission, apart from eavesdropping: ensuring the security of American communications.
Some of the agency’s most intensive efforts have focused on the encryption in universal use in the United States, including Secure Sockets Layer, or SSL, virtual private networks, or VPNs, and the protection used on fourth generation, or 4G, smartphones. Many Americans, often without realizing it, rely on such protection every time they send an e-mail, buy something online, consult with colleagues via their company’s computer network, or use a phone or a tablet on a 4G network.
For at least three years, one document says, GCHQ, almost certainly in close collaboration with the N.S.A., has been looking for ways into protected traffic of the most popular Internet companies: Google, Yahoo, Facebook and Microsoft’s Hotmail. By 2012, GCHQ had developed “new access opportunities” into Google’s systems, according to the document.
“The risk is that when you build a back door into systems, you’re not the only one to exploit it,” said Matthew D. Green, a cryptography researcher at Johns Hopkins University. “Those back doors could work against U.S. communications, too.”
Paul Kocher, a leading cryptographer who helped design the SSL protocol, recalled how the N.S.A. lost the heated national debate in the 1990s about inserting into all encryption a government back door called the Clipper Chip.
“And they went and did it anyway, without telling anyone,” Mr. Kocher said. He said he understood the agency’s mission but was concerned about the danger of allowing it unbridled access to private information.
“The intelligence community has worried about ‘going dark’ forever, but today they are conducting instant, total invasion of privacy with limited effort,” he said. “This is the golden age of spying.”

A Vital Capability

The documents are among more than 50,000 shared by The Guardian with The New York Times and ProPublica, the nonprofit news organization. They focus primarily on GCHQ but include thousands either from or about the N.S.A.
Intelligence officials asked The Times and ProPublica not to publish this article, saying that it might prompt foreign targets to switch to new forms of encryption or communications that would be harder to collect or read. The news organizations removed some specific facts but decided to publish the article because of the value of a public debate about government actions that weaken the most powerful tools for protecting the privacy of Americans and others.
The files show that the agency is still stymied by some encryption, as Mr. Snowden suggested in a question-and-answer session on The Guardian’s Web site in June.
“Properly implemented strong crypto systems are one of the few things that you can rely on,” he said, though cautioning that the N.S.A. often bypasses the encryption altogether by targeting the computers at one end or the other and grabbing text before it is encrypted or after it is decrypted.
The documents make clear that the N.S.A. considers its ability to decrypt information a vital capability, one in which it competes with China, Russia and other intelligence powers.
“In the future, superpowers will be made or broken based on the strength of their cryptanalytic programs,” a 2007 document said. “It is the price of admission for the U.S. to maintain unrestricted access to and use of cyberspace.”
The full extent of the N.S.A.’s decoding capabilities is known only to a limited group of top analysts from the so-called Five Eyes: the N.S.A. and its counterparts in Britain, Canada, Australia and New Zealand. Only they are cleared for the Bullrun program, the successor to one called Manassas — both names of American Civil War battles. A parallel GCHQ counterencryption program is called Edgehill, named for the first battle of the English Civil War of the 17th century.
Unlike some classified information that can be parceled out on a strict “need to know” basis, one document makes clear that with Bullrun, “there will be NO ‘need to know.’ ”
Only a small cadre of trusted contractors were allowed to join Bullrun. It does not appear that Mr. Snowden was among them, but he nonetheless managed to obtain dozens of classified documents referring to the program’s capabilities, methods and sources.

Ties to Internet Companies

When the N.S.A. was founded, encryption was an obscure technology used mainly by diplomats and military officers. Over the last 20 years, with the rise of the Internet, it has become ubiquitous. Even novices can tell that their exchanges are being automatically encrypted when a tiny padlock appears next to the Web address on their computer screen.
Because strong encryption can be so effective, classified N.S.A. documents make clear, the agency’s success depends on working with Internet companies — by getting their voluntary collaboration, forcing their cooperation with court orders or surreptitiously stealing their encryption keys or altering their software or hardware.
According to an intelligence budget document leaked by Mr. Snowden, the N.S.A. spends more than $250 million a year on its Sigint Enabling Project, which “actively engages the U.S. and foreign IT industries to covertly influence and/or overtly leverage their commercial products’ designs” to make them “exploitable.” Sigint is the abbreviation for signals intelligence, the technical term for electronic eavesdropping.
By this year, the Sigint Enabling Project had found ways inside some of the encryption chips that scramble information for businesses and governments, either by working with chipmakers to insert back doors or by surreptitiously exploiting existing security flaws, according to the documents. The agency also expected to gain full unencrypted access to an unnamed major Internet phone call and text service; to a Middle Eastern Internet service; and to the communications of three foreign governments.
In one case, after the government learned that a foreign intelligence target had ordered new computer hardware, the American manufacturer agreed to insert a back door into the product before it was shipped, someone familiar with the request told The Times.
The 2013 N.S.A. budget request highlights “partnerships with major telecommunications carriers to shape the global network to benefit other collection accesses” — that is, to allow more eavesdropping.
At Microsoft, as The Guardian has reported, the N.S.A. worked with company officials to get pre-encryption access to Microsoft’s most popular services, including Outlook e-mail, Skype Internet phone calls and chats, and SkyDrive, the company’s cloud storage service.
Microsoft asserted that it had merely complied with “lawful demands” of the government, and in some cases, the collaboration was clearly coerced. Executives who refuse to comply with secret court orders can face fines or jail time.
N.S.A. documents show that the agency maintains an internal database of encryption keys for specific commercial products, called a Key Provisioning Service, which can automatically decode many messages. If the necessary key is not in the collection, a request goes to the separate Key Recovery Service, which tries to obtain it.
How keys are acquired is shrouded in secrecy, but independent cryptographers say many are probably collected by hacking into companies’ computer servers, where they are stored. To keep such methods secret, the N.S.A. shares decrypted messages with other agencies only if the keys could have been acquired through legal means. “Approval to release to non-Sigint agencies,” a GCHQ document says, “will depend on there being a proven non-Sigint method of acquiring keys.”
Simultaneously, the N.S.A. has been deliberately weakening the international encryption standards adopted by developers. One goal in the agency’s 2013 budget request was to “influence policies, standards and specifications for commercial public key technologies,” the most common encryption method.
Cryptographers have long suspected that the agency planted vulnerabilities in a standard adopted in 2006 by the National Institute of Standards and Technology, the United States’ encryption standards body, and later by the International Organization for Standardization, which has 163 countries as members.
Classified N.S.A. memos appear to confirm that the fatal weakness, discovered by two Microsoft cryptographers in 2007, was engineered by the agency. The N.S.A. wrote the standard and aggressively pushed it on the international group, privately calling the effort “a challenge in finesse.”
“Eventually, N.S.A. became the sole editor,” the memo says.
Even agency programs ostensibly intended to guard American communications are sometimes used to weaken protections. The N.S.A.’s Commercial Solutions Center, for instance, invites the makers of encryption technologies to present their products and services to the agency with the goal of improving American cybersecurity. But a top-secret N.S.A. document suggests that the agency’s hacking division uses that same program to develop and “leverage sensitive, cooperative relationships with specific industry partners” to insert vulnerabilities into Internet security products.

A Way Around

By introducing such back doors, the N.S.A. has surreptitiously accomplished what it had failed to do in the open. Two decades ago, officials grew concerned about the spread of strong encryption software like Pretty Good Privacy, or P.G.P., designed by a programmer named Phil Zimmermann. The Clinton administration fought back by proposing the Clipper Chip, which would have effectively neutered digital encryption by ensuring that the N.S.A. always had the key.
That proposal met a broad backlash from an unlikely coalition that included political opposites like Senator John Ashcroft, the Missouri Republican, and Senator John Kerry, the Massachusetts Democrat, as well as the televangelist Pat Robertson, Silicon Valley executives and the American Civil Liberties Union. All argued that the Clipper would kill not only the Fourth Amendment, but also America’s global edge in technology.
By 1996, the White House backed down. But soon the N.S.A. began trying to anticipate and thwart encryption tools before they became mainstream.
“Every new technology required new expertise in exploiting it, as soon as possible,” one classified document says.
Each novel encryption effort generated anxiety. When Mr. Zimmermann introduced the Zfone, an encrypted phone technology, N.S.A. analysts circulated the announcement in an e-mail titled “This can’t be good.”
But by 2006, an N.S.A. document notes, the agency had broken into communications for three foreign airlines, one travel reservation system, one foreign government’s nuclear department and another’s Internet service by cracking the virtual private networks that protected them.
By 2010, the Edgehill program, the British counterencryption effort, was unscrambling VPN traffic for 30 targets and had set a goal of an additional 300.
But the agencies’ goal was to move away from decrypting targets’ tools one by one and instead decode, in real time, all of the information flying over the world’s fiber optic cables and through its Internet hubs, only afterward searching the decrypted material for valuable intelligence.
A 2010 document calls for “a new approach for opportunistic decryption, rather than targeted.” By that year, a Bullrun briefing document claims that the agency had developed “groundbreaking capabilities” against encrypted Web chats and phone calls. Its successes against Secure Sockets Layer and virtual private networks were gaining momentum.
But the agency was concerned that it could lose the advantage it had worked so long to gain, if the mere “fact of” decryption became widely known. “These capabilities are among the Sigint community’s most fragile, and the inadvertent disclosure of the simple ‘fact of’ could alert the adversary and result in immediate loss of the capability,” a GCHQ document outlining the Bullrun program warned.

Corporate Pushback

Since Mr. Snowden’s disclosures ignited criticism of overreach and privacy infringements by the N.S.A., American technology companies have faced scrutiny from customers and the public over what some see as too cozy a relationship with the government. In response, some companies have begun to push back against what they describe as government bullying.
Google, Yahoo and Facebook have pressed for permission to reveal more about the government’s secret requests for cooperation. One small e-mail encryption company, Lavabit, shut down rather than comply with the agency’s demands for what it considered confidential customer information; another, Silent Circle, ended its e-mail service rather than face similar demands.
In effect, facing the N.S.A.’s relentless advance, the companies surrendered.
Ladar Levison, the founder of Lavabit, wrote a public letter to his disappointed customers, offering an ominous warning. “Without Congressional action or a strong judicial precedent,” he wrote, “I would strongly recommend against anyone trusting their private data to a company with physical ties to the United States.”
Update (9/6): Statement from the Office of the Director of National Intelligence:
It should hardly be surprising that our intelligence agencies seek ways to counteract our adversaries’ use of encryption. Throughout history, nations have used encryption to protect their secrets, and today, terrorists, cybercriminals, human traffickers and others also use code to hide their activities. Our intelligence community would not be doing its job if we did not try to counter that.
While the specifics of how our intelligence agencies carry out this cryptanalytic mission have been kept secret, the fact that NSA’s mission includes deciphering enciphered communications is not a secret, and is not news. Indeed, NSA’s public website states that its mission includes leading “the U.S. Government in cryptology … in order to gain a decision advantage for the Nation and our allies.”
The stories published yesterday, however, reveal specific and classified details about how we conduct this critical intelligence activity. Anything that yesterday’s disclosures add to the ongoing public debate is outweighed by the road map they give to our adversaries about the specific techniques we are using to try to intercept their communications in our attempts to keep America and our allies safe and to provide our leaders with the information they need to make difficult and critical national security decisions.
John Markoff contributed reporting for The New York Times.

Why We Published the Decryption Story


Sept. 6: This Closer Look has been updated with a response from the Office of the Director of National Intelligence.
ProPublica is today publishing a story in partnership with the Guardian and The New York Times about U.S. and U.K. government efforts to decode enormous amounts of Internet traffic previously thought to have been safe from prying eyes. This story is based on documents provided by Edward Snowden, the former intelligence community employee and contractor. We want to explain why we are taking this step, and why we believe it is in the public interest.
The story, we believe, is an important one. It shows that the expectations of millions of Internet users regarding the privacy of their electronic communications are mistaken. These expectations guide the practices of private individuals and businesses, most of them innocent of any wrongdoing. The potential for abuse of such extraordinary capabilities for surveillance, including for political purposes, is considerable. The government insists it has put in place checks and balances to limit misuses of this technology. But the question of whether they are effective is far from resolved and is an issue that can only be debated by the people and their elected representatives if the basic facts are revealed.
It’s certainly true that some number of bad actors (possibly including would-be terrorists) have been exchanging messages through means they assumed to be safe from interception by law enforcement or intelligence agencies. Some of these bad actors may now change their behavior in response to our story.
In weighing this reality, we have not only taken our own counsel and that of our publishing partners, but have also conferred with the government of the United States, a country whose freedoms give us remarkable opportunities as journalists and citizens.
Two possible analogies may help to illuminate our thinking here.
First, a historical event: In 1942, shortly after the World War II Battle of Midway, the Chicago Tribune published an article suggesting, in part, that the U.S. had broken the Japanese naval code (which it had). Nearly all responsible journalists we know would now say that the Tribune’s decision to publish this information was a mistake. But today’s story bears no resemblance to what the Tribune did. For one thing, the U.S. wartime code-breaking was confined to military communications. It did not involve eavesdropping on civilians.
The second analogy, while admittedly science fiction, seems to us to offer a clearer parallel. Suppose for a moment that the U.S. government had secretly developed and deployed an ability to read individuals’ minds. Such a capability would present the greatest possible invasion of personal privacy. And just as surely, it would be an enormously valuable weapon in the fight against terrorism.
Continuing with this analogy, some might say that because of its value as an intelligence tool, the existence of the mind-reading program should never be revealed. We do not agree. In our view, such a capability in the hands of the government would pose an overwhelming threat to civil liberties. The capability would not necessarily have to be banned in all circumstances. But we believe it would need to be discussed, and safeguards developed for its use. For that to happen, it would have to be known.
There are those who, in good faith, believe that we should leave the balance between civil liberty and security entirely to our elected leaders, and to those they place in positions of executive responsibility. Again, we do not agree. The American system, as we understand it, is premised on the idea -- championed by such men as Thomas Jefferson and James Madison -- that government run amok poses the greatest potential threat to the people’s liberty, and that an informed citizenry is the necessary check on this threat. The sort of work ProPublica does -- watchdog journalism -- is a key element in helping the public play this role.
American history is replete with examples of the dangers of unchecked power operating in secret. Richard Nixon, for instance, was twice elected president of this country. He tried to subvert law enforcement, intelligence and other agencies for political purposes, and was more than willing to violate laws in the process. Such a person could come to power again. We need a system that can withstand such challenges. That system requires public knowledge of the power the government possesses. Today’s story is a step in that direction.
Update (9/6): Statement from the Office of the Director of National Intelligence:
It should hardly be surprising that our intelligence agencies seek ways to counteract our adversaries’ use of encryption. Throughout history, nations have used encryption to protect their secrets, and today, terrorists, cybercriminals, human traffickers and others also use code to hide their activities. Our intelligence community would not be doing its job if we did not try to counter that.
While the specifics of how our intelligence agencies carry out this cryptanalytic mission have been kept secret, the fact that NSA’s mission includes deciphering enciphered communications is not a secret, and is not news. Indeed, NSA’s public website states that its mission includes leading “the U.S. Government in cryptology … in order to gain a decision advantage for the Nation and our allies.”
The stories published yesterday, however, reveal specific and classified details about how we conduct this critical intelligence activity. Anything that yesterday’s disclosures add to the ongoing public debate is outweighed by the road map they give to our adversaries about the specific techniques we are using to try to intercept their communications in our attempts to keep America and our allies safe and to provide our leaders with the information they need to make difficult and critical national security decisions.

Next-gen tablets with Minority Report-like controls in development

Credit: Dreamworks Pictures
Tablets are about to get a serious and overdue upgrade. For years now, you've been able to play 3D games on handheld devices like the Nintendo 3DS. You've been able to flail about haphazardly before your TV playing games through either Kinect and Wii. Now, a new display in development is aiming to marry these two gaming realities into one sleek new interface that's straight out of Minority Report.
The new screen tech is being called "3D Air-Touch". It's a pretty straightforward name for a tech that creates 3D objects in the space before you and lets you physically interact with them. You won't even need Tom Cruise's silly half-gloves to play along. You won't need a controller of any sort, actually — not even a Leap Motion sensor. Instead, all the tech you'll need to interact with your 3D images is built into the screen itself.
The problem with sensors like the Leap Motion is that they require certain levels of ambient light to be effective. 3D Air-Touch provides its own light, thanks to an infrared backlight built into your tablet. Similarly, the optical sensors that track your hand gestures are embedded directly into your tablet's 3D display. Additional angular scanning illuminators around the screen's edge work to triangulate your hand's position, ensuring an accurate 3D interface.
At its current stage, the 3D Air-Touch screen is a single-touch, four-inch screen with only three centimeters of depth in its air-touch control field. The good news is that we're still dealing with a proof-of-concept model and not some design concept or production model. Once a few yield rate and sensor uniformity bugs are worked out, the researchers can move on to building a better, more interactive model — one which they're confident will become available in the near future.
Tablets are about to get a serious and overdue upgrade. For years now, you've been able to play 3D games on handheld devices like the Nintendo 3DS. You've been able to flail about haphazardly before your TV playing games through either Kinect and Wii. Now, a new display in development is aiming to marry these two gaming realities into one sleek new interface that's straight out of Minority Report.
The new screen tech is being called "3D Air-Touch". It's a pretty straightforward name for a tech that creates 3D objects in the space before you and lets you physically interact with them. You won't even need Tom Cruise's silly half-gloves to play along. You won't need a controller of any sort, actually — not even a Leap Motion sensor. Instead, all the tech you'll need to interact with your 3D images is built into the screen itself.
The problem with sensors like the Leap Motion is that they require certain levels of ambient light to be effective. 3D Air-Touch provides its own light, thanks to an infrared backlight built into your tablet. Similarly, the optical sensors that track your hand gestures are embedded directly into your tablet's 3D display. Additional angular scanning illuminators around the screen's edge work to triangulate your hand's position, ensuring an accurate 3D interface.
At its current stage, the 3D Air-Touch screen is a single-touch, four-inch screen with only three centimeters of depth in its air-touch control field. The good news is that we're still dealing with a proof-of-concept model and not some design concept or production model. Once a few yield rate and sensor uniformity bugs are worked out, the researchers can move on to building a better, more interactive model — one which they're confident will become available in the near future.
IEEE Xplore, via Phys.org

Construction planned for super-laser more powerful than the Sun

Credit: Lucasfilm
From cat toys to Blu-Ray players, we humans like our lasers, but a new crazy-powerful laser under construction in the Czech Republic will have even the likes of Dr. Evil turning red with jealousy. The Extreme Light Infrastructure (ELI) Beamlines project is an EU-funded lab that astrophysicists and evil masterminds alike will covet the world over.
Due to be switched on by 2017, ELI Beamlines will construct a laser called the High-Repetition-Rate Advanced Petawatt Laser System (HAPLS). This bad boy will emit a short laser burst with an intensity of 1023 watts per square centimeter. That's 100,000 times more power than all the power stations in the world can put out — combined. It's as if all the energy of the Sun were focused into a single beam about as big as coaster.
These laser bursts will last only 1/100,000th of a billionth of a second. Still, within that short time they'll afford researchers unprecedented access to the workings of the cosmos. Through the ELI Beamlines project, we could emulate the radiation given off by pulsars or learn how matter behaves within brown dwarf stars and massive exoplanets. Just don't go standing in the way of a blast from the HAPLS once it's ready to fire, or you might find out just what Shakespeare meant when he wrote "...the white-hot heat of a thousand suns."
ELI Beamlines, via Science and Technology Review

Philip Seymour Hoffman Is Just The Tip Of The Iceberg Of The Raging Heroin Abuse Epidemic In America

Philip_Seymour_Hoffman - Photo by Georges BiardAccording to the federal government, the number of heroin addicts in the United States has more than doubled since 2002.  Yes, you read that correctly.  In fact, it is being reported that heroin-related overdose deaths have risen 84 percent just since 2010.  The truth is that the recent death of Philip Seymour Hoffman is just the tip of the iceberg of the raging heroin abuse epidemic in America.  Heroin is cheap, it is potent, and it is very similar to the legal painkillers that millions of Americans are currently addicted to.  According to ABC News, Hoffman was found “with five empty heroin bags as well as many as 65 more bags that were still unused” when his body was discovered on Sunday in his New York apartment.  It is a great tragedy, but the reality is that tragedies like this are happening all across the United States every single day.  Heroin is the the number one killer of illegal drug users, and as heroin use continues to rise so will the number of dead bodies.
Philip Seymour Hoffman was at the peak of his career and seemingly had so much to live for when he died.  The following is how the New York Times described what was found in his apartment…
Detectives found dozens of small packages in the West Village apartment where Philip Seymour Hoffman, the actor, died on Sunday. Most were branded, some with purple letters spelling out Ace of Spades, others bearing the mark of an ace of hearts. At least five were empty, and in the trash.
Each of the packages, which can sell for as little as $6 on the street, offered a grim window into Mr. Hoffman’s personal struggle with a resurgent addiction that ultimately, the police said, proved fatal. And the names and logos reflect a fevered underground marketing effort in a city that is awash in cheap heroin.
According to the Daily Mail, the Ace of Spades brand of heroin “is responsible for close to 100 deaths from New Hampshire to Washington State – including 37 in Maryland since September.”
It is suspected that the heroin that killed Hoffman was laced with a deadly narcotic known as fentanyl.  The following is an excerpt from a recent Raw Story article
For the past three weeks, authorities have been tracking batches of deadly fentanyl-laced heroin that has been moving east from Pittsburgh.
Twenty-two people in western Pennsylvania died of overdoses in the past week. Authorities believe that most of the deaths were related to heroin laced with fentanyl, a powerful narcotic typically prescribed to terminal cancer patients as means of pain management.
It is 100 times more powerful than morphine, and in combination with heroin can shut down the respiratory system of users.
The laced heroin went by the street names “Theraflu” and “Bud Ice” in Pennsylvania, but as it made its way to Long Island it was re-branded as “24K.”
The northeast quadrant of the country has been hit particularly hard by this heroin epidemic.  According to the DEA, heroin seizures in the state of New York State have increased 67 percent over the last four years, and according to the Daily Beast, the number of heroin overdose deaths is rising “like wildfire”…
In the last month alone, Maryland, Vermont, New York, and even Florida have each reported an unprecedented number of deaths. It’s spreading like wildfire. The National Institute on Drug Abuse is still crunching the numbers, but from what we’ve seen, this could be the worst year yet.
Things have gotten so bad that the governor of Vermont recently used his entire State of the State address to discuss the heroin abuse epidemic…
Vermont Gov. Peter Shumlin recently spent his entire 34-minute State of the State address talking about the state’s “full-blown heroin crisis,” and law enforcement officials in small cities across New England have noted an increase in heroin use.
And as I mentioned above, the number of heroin addicts nationally has more than doubled since 2002
“Heroin is pummeling the Northeast, leaving addiction, overdoses and fear in its wake,” said James Hunt of the Drug Enforcement Administration’s New York Office.
A 2012 survey by the federal Substance Abuse and Mental Health Services Administration (PDF) found that about 669,000 people over age 12 had used heroin at some point in the year. About 156,000 of those were first-time users, and roughly 467,000 were considered heroin-dependent — more than double the number in 2002.
So don’t be stupid.
Using heroin can kill you.
In fact, according to the Centers for Disease Control, heroin is the number one killer of illegal drug users in the United States.
We need our young people to understand this, because right now the use of heroin is exploding among the youth of America…
“We can’t overshadow the fact that there is a public health crisis that is raging across this country. Scenarios like this are playing out in families and communities with alarming regularity and increased frequency,” Scott Hesseltine, operations director at Hazelden Treatment Center, said.
Unfortunately, so far people don’t seem to be getting the message.  Those buying and selling heroin just continue to become even more bold.
In fact, as I have written about previously, heroin is being sold in broad daylight in front of public schools in the city of Detroit while kids wait to board their school buses.
When you are addicted to heroin, you will do just about anything for another hit.  Addicts will beg, borrow, steal and commit violence to get the money that they need.
Heroin abuse doesn’t just destroy those that are addicted to it.  It destroys entire communities.
As the economy continues to decline, selling heroin will seem like an easy way to make some extra cash to many people.
And many people will use the stuff in order to forget their problems.
But in the end, thousands more will die and millions of lives will be deeply affected by this rising epidemic.
America is dying, and this is just another symptom of our steady decline.
Philip_Seymour_Hoffman - Photo by Georges Biard