It kind of reminds me of those red state/blue state maps that were so popular after the 2001 election. Here for instance is Brad DeLong's map shaded between red and blue (blue is Gore):
Note that I'm not making any strong claim about significance. I haven't done any statistical testing. It just seemed to me that there was a visual similarity.
Answers welcome.
Unfazed, Dr. Catalona began his own P.S.A. study with the support of Hybritech, in which any test result over four nanograms was considered abnormal. But that cutoff, the same as in the Hybritech paper, was adopted "just sort of arbitrarily" he said.The usual sort of study to validate a screening test would determine how likely the test is to miss a cancer that is there and how many times it points to cancer when none is present. But Dr. Catalona's test instead asked only how often cancers were found and how the men fared after treatment.
In 1991, his findings appeared in The New England Journal of Medicine. That, said Dr. Peter Albertsen, chief of urology at the University of Connecticut, convinced urologists. Four became the standard.
But some say it has resulted in way too much testing and way too many biopsies. Dr. H. Gilbert Welch, a professor of medicine at Darmouth College and at the Department of Veterans Affairs Medical Center in White River Junction, Vt., attributes the appeal of the number four to "digit preference." Doctors, he said, like whole numbers, they like clear results.
Unfortunately, he said, cancer, and prostate cancer in particular, is not like that. "If the P.S.A. gets very high, it is telling us something," he said. But lower levels, certainly levels below 10, lead to the discovery of microscopic cancers that no one understands. Most are harmless and will never grow. Some are dangerous, but there is no way of distinguishing between the two. "We just don't know what it means," Dr. Welch said.
Any testing procedure has this kind of problem, of course. You have to trade off false positives for false negatives. What's puzzling is that noone seems to have explicitly decided on what those numbers should be.
It's actually a pretty difficult problem in general to decide on such testing thresholds: a false negative means that you've failed to treat someone with cancer. They may die. A false positive means that you force some guy to undergo a biopsy and perhaps prostate removal. Not fun, but probably more fun than dying. So, you generally want to bias in favor of false positives instead of false negatives. But how many false positives is worth a single false negative? Doing that requires some model of the cost of each kind of mistake, which most people aren't prepared to explicitly assess (hence the controversy over mammography).
1. Milius, J., and Schwarzenneger, A., Conan the Barbarian, Journal of Slaughter, 1982.
There's only one problem: I didn't need any supplements and I'd just have to carry them home with me. $15 worth of protein powder comes in a tub about the size of a coffee can, which I'd have to stuff in my luggage. I asked the clerk whether I could buy a t-shirt instead. Nope, only supplements. Finally I settled on a couple of bottles of glucosamine ($7.49/each) and convinced the clerk to call it $15 and let me in.
But while rummaging through the jars of pills I started to get really annoyed. I'd come work out but that wasn't what I was doing. Instead, here I was trying to find some set of supplements that would cost me exactly $15. What a waste of my time!
But let's take a step back and think rationally: I'm sure I could have convinced them to just take $15, or in the worst case just bought $15 worth of stuff and thrown it away. When I walked in the door, I expect value proposition A:
A. I give them $15 and I work out.
Instead, I was offered value proposition B:
B. I give them $15, get some supplements, and work out.
Now, B pretty clearly dominates A, and as I just pointed out, I can turn B into A by just discarding the supplements. Yet here I was paralyzed by the decision of which supplements to buy to discharge this bogus obligation. I don't even have the excuse that I'm trying to avoid going over $15. I could easily have bought $15.50 or so worth of energy bars (which I eat anyway) and then only eaten a few. Unfortunately, some part of my brain seems to have completely bought into the sunk cost argument and won't let me just throw away the remainder. Outstanding.
That said, the actual ripping stage requires a lot of different tools but is pretty straightforward:
So far so good. I've got the MP3s on my computer. Now to copy them onto the iPod. Here's where things start to get messy. I first tried gtkpod, which is a GTK-based iTunes clone. gtkpod is a classic piece of Open Source software in that it appears to have been written by someone who's seen screenshots of iTunes, but has never actually used the thing. The most annoying thing about gtkpod is that it doesn't seem to keep any local information about the state of your music collection or of the iPod. So, when you first start up, the first thing you have to do is load up all that information, which takes forever. We're talking tens of minutes here. Not acceptable. Now, maybe there's some way to cache this data on disk, so you don't have to load it up again, but it wasn't obvious how and it sure doesn't happen on it's own the way that iTunes does. GAAAH!!!
After giving up on gtkpod, I ended up using gnupod. Gnupod is Basically, it's a series of perl scripts that let you add songs to the iPod, delete them, etc. a great example of the annoying command-line aesthetic, but at least it mostly does the job. I've got three complaints about it, one trivial and two major. The trivial one is that it doesn't work directly on the iPod database. Instead, it's got some "open" XML database format and so you've got to translate that format back and forth--because despite the fact that it's "open" neither the standard tools nor the iPod itself know about it. The documentation contains the usual justifications for this design choice which are too silly to reproduce. (You can see for yourself here. What makes this choice doubly annoying is that you need to explicitly sync the databases. Why don't the gnupod tools do that automatically? I could write wrappers, of course, but I shouldn't have to.
The two major complaints about it are as follows. First, playlist support sucks. Believe it or not, gnupod playlists are XML files and you're somehow expected to add XML playlist entries like:
<playlist name="sweet"> <add id="1" /> <add id="2" /> </playlist>
Second, there's no apparent support for synchronizing your hard drive and the iPod. Given the crappy gnupod UI, the thing that's most obvious to do is maintain a mirror of all your music on your hard drive and just say "whenever I rip something new, copy it to the iPod". Instead you're reduced to doing
find . -name '*.mp3' -print | xargs gnupod_addsong.pl
And don't forget to run mktunes.pl afterwards because if you don't the iPod won't know about all that stuff you just added!
Again, I could write tooling to do this job for me. It's almost trivially easy. And of course, in typical Open Source fashion out that there's some other script that will do it for me. Does it work with gnupod? Who knows?
To pre-empt a bunch of "it's free, so what are you complaining about" responses, yes I'm grateful that the people who took the time to write these tools, and they're certainly better than nothing. That doesn't mean they don't suck.
Yeah, yeah, I know. Get a Mac. Maybe someday, but not yet. Still too attached to the nice features of FreeBSD.
Whenever someone would ask for one of these features we'd be force to nicely explain (well, as nicely as a 23-year-old knowitall can) that although these features sounded like great ideas we simply didn't know how to do them and strongly believed them to be impossible without major restructuring of the universe. Of course, the fact that something is impossible never stopped people from trying to do it, and over the years there have been a number of attempts to do each one.
The first thing you need to do is distinguish between "cooperative" and "mandatory" systems. It's relatively easy to design a system that provides this kind of feature as long as the recipient cooperates. What's difficult is to design a system that works if the user doesn't cooperate, and that's what systems like this typically falter on.
Return Receipts
The idea behind the Return Receipt feature is simple. You want
to know if the recipient read your e-mail. Optimally you'd like
a signed receipt indicating that they had. The obvious problem
is: what stops them from just reading your message and not
generating a receipt. In general, the answer is nothing.
Sure, you can write a piece of software which always generates
a receipt but there's nothing that requires the user to use that
software and not some other to read your e-mail. Why would they
want to do that? Plausible deniability. After all, a lot of the
reason you want the receipt is to take away that deniability.
There are five basic responses to this observation:
As should be apparent, only Enforcement and Centralization really work and they unfortunately require rearchitecting most of the universe. Also, the Centralization approach only gets you a receipt the first time that someone reads the message. If you want a notification every time (as the system Ed describes tries to do), then you need Enforcement.
Self-Destructing Messages
The situation with self-destructing messages is much the same.
It's perfectly easy to add a "please destroy" token to the
message, but who says that the reader has to do it? Again,
they may well want to save a copy of the message. How do you
stop them?
The situation here is even worse than with receipts, because you can't solve the problem with crypto. Sure, it's possible to design crypto schemes which encrypt each message separately in such a way that your permanent keys don't let you read them. The idea here is that once you've read and deleted a message the government can't subpoena you and force you to decrypt their wiretapped copy. (This feature is called Perfect Forward Secrecy). But that's just a convenience to the reader to stop them from having to worry that the delete button doesn't really delete. If you have a recipient who wants to keep a copy there's nothing stopping them from doing so.
If that's the feature you actually want, then great. No problem. But if what you really want is to make it impossible (or at least very difficult) for the reader to not destroy the message, then you basically want digital rights management for your e-mail and that means Trusted Computing again.
The Bottom Line
At this point, you know everything important you need to know
about this sort of problem. When you see a company claiming to offer
one of these features, there's only one question you need to ask:
"Do you have the kind of system that involves replacing all my infrastructure
or the kind of system that doesn't work?"
Lisa Dusseault trashed the Hubbert's Peak argument back in 2003. I just read an article Leonardo Maugeri from the Italian energy services company Eni S.p.A. along the same lines. I'm not saying that Maugeri is an objective observer, but he makes some interesting arguments including the following graph showing that Egypt didn't follow a Hubbert-style distribution.
Maugeri also argues out that estimates of the total available reserves have been continuously revised upwards, which kind of undercuts the argument that we're runing out of oil any time soon.
Remind me to get an e-ticket next time.
Now, of course these estimates are based on a completely flawed model and probably pretty far off--the authors say as much--but nevertheless there's something very interesting about them: the authors estimate that most of the damage is done by the loss of productivity when the affected machines are down for days or weeks. This suggests an obvious tactic. Rather than trying to protect our systems from worms--something we have very little idea how to do in practice--we might consider focusing on fast system recovery.
One particular approach comes to mind: a lot of the damage in the Weaver/Paxson model comes from the worm flashing the BIOS. There's almost no need for users to routinely flash the BIOS from software. So, what if we made systems so that the BIOS could only be reflashed within 5 minutes of a power cycle (not a reboot, since as Vern Paxson pointed out when I raised this idea, the virus can reboot the computer). I don't know if you could make this change with a BIOS upgrade (how much is the BIOS involved in BIOS reflashing?) but if you can, it might be worth doing.
To pass time, the inmates lifted weights, rode exercise bikes, and played soccer. Pablo would play for hours at a time. He always played center forward, even though he wasn't the quickest or most skilled player and had a bad knee. His men always let him win, sometimes arranging for him to kick the winning goal. If Pablo grew winded, which was often, he would wave in a replacement until he caught his breath, and then he'd plunge back in.
Whenever I read this kind of stuff I wonder whether the Great Man doesn't know that he's being humored or just doesn't care.
Around here it's $2.50 or so for a gallon of premium (recommended for my Audi). This is almost twice the lowest, price in the past four years (it was about $1.30 in February 02). So, how much of a difference does that make? Let's do the math.
Now, $800 isn't chump change, but when you consider the size of my Palo Alto house payment, I don't think it's going to break the bank, either.
European countries also had a consumption problem. Class structures and segmented tastes made it harder there to adopt standardized products. Even so, I would stress supply rather than demand, the attitude of producers rather than consumers. When Europeans belatedly adopted techniques of mass production, they had no trouble selling cheaper goods.To get a sense of what was involved, look at the great European industrial spurt after World War II. This mirrored earlier American advances and implicitly testified to previous class-based failure. Europe had a pent-up demand for consumer durables, whetter by film images and the American presence. Few Europeans before had thought that just about everyone might want, even need, a car or a telephone. As late as the 1970s, many French people were still going to cafes or to the post office (but only during office hours) to make their phone calls, either because they could not afford a phone at home or were waiting two or three years to get a line. Getting a dial tone could take a half-hour and more. People still reserved ahead for international calls. Business suffered and the complaints mounted to heaven: no point directing them to human beings because the authorities were imperturbably indifferent. After all, telephones were part of the postal system and the post office thought them an extravagance, a plaything for rich people. What was wrong with writing letters and buying stamps.
And then, in a footnote:
The meanness of the French post office was notorious. Until the 1990s, airmail letters overseas paid a surcharge above a weight of 5 grams, stamps included. That means using especially thin and pricey paper--a boon to the stationary industry. Even so, the post office would not always have a single stamp for the postage required and would combine two or three to make the amount, and then those would tip the scale. One had to experience these exercises in petty tyranny to understand the retardative effects of bureaucratic constipation. Fortunately for the French, the European Community has imposed new standards.
I guess I shouldn't complain that I can't get DSL here in Palo Alto.
Laurie and Clayton's argument is simple: the upper bound on the amount of work that a sender can be required to do is set by the resources available to legitimate e-mail senders with lousy, slow, computers. They then make some partially handwaving, but not implausible, arguments that spammers could afford to spend this much computational power per message and still make a profit spamming.
This argument isn't entirely persuasive, on two fronts. First, it's not an all or nothing proposition. As far as I know, generally companies pay spamming companies to promote their products. If the market is competitive, we'd expect that the fees that those companies charge would have been pushed down to approximately the cost of production (i.e. the cost to the actual spam company of doing the spamming). If that cost goes up, then spamming will be less attractive and we ought to see less of it, even if it's not eliminated completely. On the other hand, if there's less spam from the low-end advertisers, then that makes the remaining advertiser's messages stand out better, so it's not clear how much reduction the end-user would actually see.
More importantly, Laurie and Clayton's argument implicitly assumes that the only anti-spam mechanism being used is proof of work and that therefore every message will need proof of work attached. But that's not necessarily true. In general, most people's mail traffic is mostly to/from people they already know. So, what you do is combine proof of work with whitelists:
Note that I'm not saying that this hybrid solution is a definite fix to the spam problem. There are still the obvious problems of spam zombies and making the transition. The transition problem is always particularly tricky. (People often bring up the forgery problem but that's easy to solve by associating self-signed certs with each sender and then signing the messages. It's just a software problem). However, I do think you need a more sophisticated argument than Laurie and Clayton have made to show that it can't work.
To make matters worse, when a message is filed as spam, it's silent, so the sender has no way of knowing that the false positive happened. Not that it would matter, though, because the second problem with spam is that bounces get masked. Back in the old days, when you sent an e-mail to an address that didn't exist, you'd get a "bounce message" which told you about it. Unfortunately, modern spammers often forge sender addresses. And when someone forges your address on a spam and it bounces, you're the one who gets the bounce message. As a consequence, your mailbox fills up with fake bounces and the bounces from the messages you actually sent get lost in the noise.
If you want your message to get through, then, you can't treat e-mail as reliable, you need to keep re-sending it until you get the expected answer. Back in 1981, Saltzer and Clark wrote a classic paper arguing that if you wanted to reliably transfer data from point A to point B you couldn't trust the network to do it for you--if only they'd known how right they were.
Radisson Metrodome Minneapolis: $99/night.
Days Inn Minneapolis: $79/night.
On the other hand, the Marriott that I paid $149 for didn't. Interesting...
eEye Digital Security has discovered a critical remote vulnerability within the Symantec firewall product line. A buffer overflow exists within a core driver component that handles the processing of DNS (Domain Name Service) requests and responses. By sending a DNS Resource Record with an overly long canonical name, a traditional stack-based buffer overflow is triggered. Successful exploitation of this flaw yields remote KERNEL access to the system.With the ability to freely execute code at the Ring 0 privilege level, there are literally no boundaries for an attacker.
It should also be noted, that due to a separate design flaw in the firewalls handling of incoming packets, this attack can be successfully performed with all ports filtered, and all intrusion rules set.
Helpfully, eEye provides a complete description of the vulnerability, which, as Nick points out, should enable any programmer with an IQ higher than their shoe size to craft an exploit in a matter of hours. Outstanding!
A patch is available for this vulnerability. If you're running Norton Firewall I advise you to apply it.
Currently, the only incentive you currently have is the internal costs. That incentive clearly isn't that strong, as lots of people don't upgrade their systems. The point of liability is to get you to also bear the external costs, which helps give you the right incentive to secure your systems.
That said, it's still not clear that people will secure their systems. Security is still expensive and it may be still be more expensive to secure your system than to bear the risk of a breach. We need to be prepared for the situation in which people bear the full external risk of intrusions on their own systems and still don't secure their systems--and that may be the right thing!
Fritz Attaway, the MPAA's vice president who shows up at all the DRM meetings, explains to the press how the world works in Bizarroland, where being able to make a backup of your DVDs is bad for you."There is no right in the copyright law to make backup copies of motion pictures, so the whole argument that people should have the right to make backup copies of DVDs has no legal support whatsoever," said Fritz Attaway, executive vice president of the MPAA."It's against consumers' interests to permit devices that make backup copies," he added, "because there is no way that a device can distinguish between a backup copy for personal use and making a copy for friends, family acquaintances or even selling on the street corner."
It's a pity that Doctorow decided to scoff rather than to try to engage Attaway's argument, which isn't crazy at all, and in fact is at the core of the debate about copyright. Consider the following thought experiment of a future not too unlike the present:
Now, in this situation, the prospective artist can make the album, sell it for $5.00 each, and come out $5.00 ahead. Each consumer comes out $.01 ahead, for a total surplus of $55 ($50 for the consumers and $5 for the producer.)
Now, imagine a world which is otherwise identical, except that as soon as the first consumer gets a copy they start selling it for $2.50 and all the other consumers (being rational) download it for half-price. In this case, the producer stands to sell only one copy (for $5), thus losing $4995. Clearly, no rational producer will take this deal, with the result that the album isn't produced. This leaves everyone poorer, the producer having foregone $5 and each consumer having foregone $.01. In other words, this situation is Pareto-dominated by the one in which the album isn't duplicated.
It should be apparent at this point that if there were some way to be sure that noone would duplicate the album, then it would again be efficient for the producer to make albums, thus improving everyone's life. Now, I suppose that all the consumers could promise not to make copies, but you can't necessarily trust them. This is especially true if they can sell discount copies for $1.50 or so. So, how can they promise? One easy way is to make copying illegal. It's even easier if you make the equipment necessary for copying illegal. Since, as Mr. Attaway points out, it's hard to make equipment that can be used for backups but not piracy, this probably means all copying equipment. In other words, it can be in the consumer's interest to stop them from making backup copies.
Now, this is obviously a contrived example. In particular, we've assumed that there's only one content producer, that all consumers are willing to pay one price, and that once an album is copied once noone will buy it. None of these things are true, and taking these factors into account makes the analysis a lot more complicated. However, the general principle adduced by Mr. Attaway isn't necessarily wrong: widespread copying of content potentiallly dramatically reduces the revenues received by the content provider. Any reduction in their potential revenus reduces their incentive to produce new content, which is bad for consumers as well. Now, it may well be that the ability to make backup copies and get cheap copies of the content that's still available more than offsets the foregone value of content but that's not something we know to be true by any means.
In other words, we don't know that Mr. Attaway is right, but we don't know he's wrong, either, and what he said certainly isn't crazy. Yes, it's counterintuitive that you can improve your situation by restricting your choices but that doesn't mean it's not true. In fact, the ability to make credible commitments to behave against your short-term interest is essential to serving your long-term interests. For not understanding this important point, Mr. Doctorow is hereby sentenced to buy and read Schelling's Strategy of Conflict.
Fox News and other media outlets are distributing the Tugabe report (spelling is approximate for reasons which will become obvious momentarily). Someone has given the news media classified information and they are distributing it. THE INFORMATION CONTAINED IN THIS REPORT IS CLASSIFIED. ALL ISD CUSTOMERS SHOULD:1) NOT GO TO FOX NEWS TO READ OR OBTAIN A COPY
2) NOT comment on this to anyone, friends, family etc.
3) NOT delete the file if you receive it via e-mail, but
4) CALL THE ISD HELPDESK AT 602-2627 IMMEDIATELY
This leakage will be investigated for criminal prosecution. If you don't have the document and have never had legitimate access, please do not complicate the investigative processes by seeking information. Again, THE INFORMATION CONTAINED IN THIS REPORT IS CLASSIFIED; DO NOT GO TO FOX NEWS TO READ OR OBTAIN A COPY.
In other words: we're investigating who leaked this classified and embarassing memo. Anyone who has a copy of the report is a suspect in the leak investigation.
At this point you should ask yourself:
In April 2003, the Defense Department approved interrogation techniques for use at the Guantanamo Bay prison that permit reversing the normal sleep patterns of detainees and exposing them to heat, cold and "sensory assault," including loud music and bright lights, according to defense officials....
According to two defense officials, prisoners could be made to disrobe for interrogation if they were are alone in their cells. But Col. David McWilliams, a spokesman for the U.S. Southern Command, said stripping prisoners was not part of the permitted interrogation techniques. "We have no protocol that allows us to disrobe a detainee whatsoever," he said. Prisoners may be disrobed in order to clean them and administer medical treatment, he said.
Several officials interviewed for this article, including two lawyers who helped formulate the guidelines, declined to be identified because the subject matter is so sensitive.
With the proper permission, the guidelines allow detainees to be subjected to psychological techniques meant to open them up, disorient or put them under stress. These include "invoking feelings of futility" and using female interrogators to question male detainees.
Some prisoners could be made to stand for four hours at a time. Questioning a prisoner without clothes is permitted if he is alone in his cell. Ruled out were techniques such as physical contact -- even poking a finger in the chest -- and the "washboard technique" of smothering a detainee with towels to threaten suffocation. Placing electrodes on detainees' bodies "wasn't even evaluated -- it was such a no-go," said one of the officials involved in drawing up the list.
Ah, I get it now. Sleep disruption and being stripped naked: OK. Smothering and electrodes: not OK. I'm glad we got that cleared that up.
As a consequence of this, I ended up getting an extra four ounces of Slurpee and paying $.10 less. Plus, the Big Gulp cup fits better in my cupholder. Bonus!
It turns out that this is some sort of child-safety precaution. [*]. Unfortunately, it's also EKR-proof. Outstanding.
A New York Times article reports that a tape recording made on 9/11/01 containing statements from "at least six air traffic controllers who dealt with two of the hijacked airliners .. was destroyed by a supervisor without anyone making a transcript or even listening to it."The quality-assurance manager was said to have "crushed the cassette in his hand," before disposing of it.
I just tried to crush a cassette in my hand. I couldn't do it. I know my upper body strength isn't what it ought to be, but I don't see how any normal human could crush a cassette in his or her bare hand.
I therefore conclude that the manager is not human. He is probably a very smart, shaved, and clothed chimp. Supporting evidence: In 1924, the Bronx Zoo tested the grip strength of people and chimpanzees using a dynamometer. A 160-pound male human had a grip strength of 210 pounds. But a 135-pound female chimp had a grip strength of 1260 pounds. Anybody have a pet chimp so we can test this out? I'll pay for the cassette. Link
I'm no chimp, but I just broke an audio cassette by hand. First, I squeeezed it with one hand and got some flex but wasn't able to get it to actually break. However, I was able to fairly easily break it in half using both hands. I don't have unusual grip strength, though: I can almost do the Captains of Crush Number 1 (140 lbs). They go up to Number 4 (365 lbs), which is supposedly incredibly hard (I can barely move the Number 2 (195 lbs). I wouldn't be surprised if an ordinary human who had worked their grip a bit could break a cassette one-handed.
In a letter to Barr Laboratories, the agency said yesterday that the application was denied because only 29 of the 585 women studied by the company were younger than 16 -- a sample that was too small to assess safety.The agency held out the possibility of a future approval if the company could prove the drug is safe for young girls or devise a plan that would keep Plan B on by-prescription-only status for girls younger than 16. In its letter, the FDA said keeping the drug prescription-only for adolescents had been discussed with the company, but that not enough information was provided on how that might be accomplished.
Let me see if we have this right:
Outstanding. Of course, it's just a coincidence that the Bush administration was being heavily lobbied by a bunch of conservative groups. I don't know why we even bother having expert review panels. Let's just let Karl Rove make all drug review decisions.
Initial outraged consumer response: I'm paying $150/night, can't I get a free toothbrush? I've certainly had hotels for which I was paying less give me free toiletries like this.
More rational economic response: Wait a minute. That stuff isn't free. It's prepaid. It's just built into the cost of the hotel (assuming it's a competitive market) Since the free stuff typically isn't very good and isn't any cheaper than the stuff at the drugstore, I'd be better off buying it myself.
Rational self-interest response: I probably forget my toiletries more often than the average person, so even if it's prepaid, I probably have an expected value higher than the premium that's built into my hotel price.
Academic economist's response: Does the cost of toiletries really get built into the price? Practically nobody knows in advance when picking a hotel whether it will give you free stuff like this. I suspect that each chain has a uniform policy, but even though I travel a lot, I don't really know which ones are which and even if I did, 90% of my hotel decisions are driven by what's close to whatever event I'm attending. And the kind of people who travel enough to keep track of this kind of thing are probably precisely the kind of people who are organized enough not to need free toiletries.
Educated outraged consumer response: Sure, most people probably don't predicate any of their hotel-staying decisions on whether they get free toiletries, there probably isn't a competitive market in toiletry provision at all. What there may be is a a competitive market in hospitality in the general sense. And people certainly do choose hotels based on that sort of thing (Marriott vs. Best Western, for instance). When I chose a Marriott, I thought part of the implicit value proposition was good hospitality and they let me down. So where the heck is my free toothbrush?!?!
The question, actually, is what we can do to avoid this kind of behavior. The incentives of the situation are generally to be more rather than less brutal, especially if, as it seems, the soldiers had an unofficial mandate to soften the prisoners up for interrogation. Without some pretty explicit controls--stronger than those used in US prisons--we're just going to get more of the same.
cat old new | sort | uniq -u
This gives us every line that appears only once, which means every line that appears in only one of the files. But this also tells you about things that are in old but not new. So, we we want to suppress those. That's easily done, just do:
cat old old new | sort | uniq -u
Now every line that's in old appears at least twice and every line that's in new appears once (if it's in new but not old) or three times if it's in both). As uniq -u gives us every line that only appears once, this pipe gives us the result we want.