Daily Archives: December 28, 2023

Harry Belafonte Used Fame to Fight for Freedom – The New York Times

Posted: December 28, 2023 at 11:54 pm

To say that Sinead OConnor never quite regained the musical heights of her 1987 debut album, The Lion and the Cobra, is not to slight the rest of her output, which contained jewels. There is no getting back to a record like that first one. It was in some sense literally scary: The label had to change the original cover art, which showed a bald OConnor hissing like a banshee cat, for the American release. In the version we saw, she looks down, arms crossed, mouth closed, vulnerable. The music had both sides of her in it.

A fuzziness has tended to hang over the question of who produced The Lion and the Cobra. The process involved some drama. OConnor clashed with the label and dropped her first producer, Mick Glossop, highly respected and the person the label wanted. In the end, she produced the album largely by herself. But not entirely. There was a co-producer, an Irish engineer named Kevin Moloney, who worked on the first five U2 albums and Kate Bushs Hounds of Love. He and OConnor went to school at the same time in the Glenageary neighborhood of Dublin, where he attended an all-boys Catholic academy next to her all-girls Catholic school. But Moloney didnt know OConnor then, though they took the same bus.

In Asheville, N.C., this fall, Moloney sat in the control room of Citizen Studios, where he is the house producer, and hit play on The Lion and the Cobra. The first song is a ghost story called Jackie. A woman sings of her lover, who has failed to return from a fishing expedition. Youre on deep Irish literary sod, the western coast and the islands. Its the lament of Maurya in J.M. Synges play Riders to the Sea, grieving for all the men the ocean has taken from her, except that the creature singing through OConnor will not accept death. Hell be back sometime, she assures the men who deliver the news, laughing at you. At the end, her falsetto howls above the feedback. She starts the song as a plaintive young widow and ends it as a demon. Gets the old hairs going up, Moloney said.

Where did she get that? I asked. Those different registers?

It was all in her head, he said. She had these personas.

And the words? Were they from an obscure Irish shanty she found in an old newspaper? Oh, no, she wrote it herself, Moloney said. Her lyrics were older than she was.

Moloneys connection with OConnor came through U2s guitarist, the Edge (David Evans). In late 1985, the band was between albums, so Evans did a solo project, scoring a film. He recruited OConnor who had just been signed to the English label Ensign Records to sing on one tune, and Moloney engineered the session. OConnor was 18, with short dark hair.

Ensign put her together with Glossop, who had just co-produced the Waterboys classic album This Is the Sea. But she spurned the results: Too pretty. Glossop remembered OConnor as reluctant to speak her mind in the studio, leading to a situation where small differences of opinion werent being addressed, leaving her alienated from the material. With characteristic careerist diplomacy, she called Glossop a [expletive] ol hippie (and derided U2, who possessed some claim to having discovered her, as fake rebels making bombastic music). Glossop recalled that when he ran into her at a club a couple of years later, she hugged him and apologized which was a nice gesture, he told me.

Nobody has ever heard those first, abandoned tracks from The Lion and the Cobra. They put a big sound, a band sound around her, Moloney said, and she was disappearing in it. Glossop remembered it slightly differently. She had a rapport with her band, he said, and I recorded them as a band. But she was turning into a solo artist.

She was also pregnant, unbeknownst to Glossop (It would have been nice to know, he said). The father was the drummer in the band, John Reynolds, whom she had known for a month when they conceived. According to OConnors autobiography, Rememberings, the label pressured her to have an abortion, sending her to a doctor who lectured her on how much money the company had invested in her.

OConnor not only insisted on keeping the baby; she also told the label that if it forced her to put out its version of the record, she would walk. They eventually caved, Moloney said. They told her, Make it your way. But with a limited budget.

Thats when she reached out to Moloney, in the spring of 1986, saying she needed someone she trusted. He started taking day trips to Oxford, where she was holed up in a rental house. We were in the living room, Moloney said. A bunch of couches and a bunch of underpaid, underloved musicians who were struggling big time.

There was a bit of a little communal hub, he said, always a few joints going around the room. Sinead loved her ganja. A lot of talking, and then somebody would start to play, and people would pick up instruments. And Sinead was, like, captain of the ship.

When they got into the studio in London, Moloney turned the earlier, band-focused approach inside out like a sock. OConnors voice was allowed to dictate. The musicians worked around it.

For the song Jackie, he said, Sinead wanted to do all of those guitar parts herself. And she wanted to do it really late at night, when everybody else was gone home. She didnt feel good about her guitar playing. I got her to do this really distorted big sound, and then we layered it and layered it. It became this sort of seething. She was like, Look at me Im Jimi Hendrix.

The most difficult challenge in recording OConnor, he said, was finding a microphone that could handle her dynamic range, with those whisper-to-scream effects she was famous for. Once we figured out the right way of capturing her vocals an AKG C12 vintage tube mic she did it really fast.

I must have looked amazed the vocals are so theatrical and swooping, OConnors pitch so precise, that I had envisioned endless takes because Moloney said, as if to settle doubts, Within a couple of takes, it was done.

The jangly guitar opening of the third track, Jerusalem, played. I remember hearing her play this for the first time, Moloney said. I got it, knowing her background. OConnor was abused psychologically, physically, sexually by her mother, who died in a car accident, and by the Catholic Church. All the systems had failed her, Moloney said, that were supposed to protect her.

If he was right that he heard trauma in Jerusalem, the song lyrics also drip with erotic angst (I hope you do/what you said/when you swore). It introduces the records main preoccupation: love and sex as they intersect with power and pain.

The streams cross with greatest emotional force in the song Troy, one of the most beautiful and ambitious pieces of mid-1980s popular music. The track sticks out production-wise, with a powerful, surging orchestral arrangement (the product of OConnors collaboration with the musician Michael Clowes, who also played keyboards on the album).

Theres a moment in the song when OConnor repeats the line, You shouldve left the light on. I had never given undue thought to what it meant. Something about tortured desire: If you had left the light on, I wouldnt have kissed you. But Moloney said it had a double meaning. When OConnor was punished as a child and made to sleep outside in the garden shed, her mother would turn off all of the lights in the house. There wouldnt be a light on for her, Moloney said.

OConnor gave birth to her son, Jake, just weeks after Moloney finished the mixes. She told Glasgows Daily Record that although the baby had kicked when she sang in the studio, he slept now when the record came on. She was so happy, Moloney said with tears in his eyes. She said: Oh, my God, I cant believe I went through all of that and Ive arrived here with a record I love. Also, heres my baby! She had two babies in one year.

John Jeremiah Sullivan is a contributing writer for the magazine who lives in North Carolina, where he co-founded the nonprofit research collective Third Person Project.

Go here to see the original:

Harry Belafonte Used Fame to Fight for Freedom - The New York Times

Posted in Freedom | Comments Off on Harry Belafonte Used Fame to Fight for Freedom – The New York Times

OP-ED: Kwanzaa, Freedom, Justice and Peace: Principles and Practices For A New World – Black Press USA

Posted: at 11:54 pm

By Dr. Maulana Karenga

Again, this year we wish for Africans everywhere throughout the world African community,Heri za Kwanzaa. Happy Kwanzaa. And we bring and send greetings of celebration, solidarity and continued struggle for an inclusive and shared good in the world. Also, in the still-held-high tradition of our ancestors, we wish for African peoples and all the peoples of the world all the good that heaven grants, the earth produces and the waters bring forth from their depths. Hotep. Ase. Heri. Moreover, among all the goods that are granted, given and gained through ceaseless striving and righteous and relentless struggle, we wish, especially for our people and all other oppressed and struggling peoples of the world, the shared and indivisible goods of freedom, justice and peace, deservedly achieved and enjoyed and passed on to future generations. Indeed, we live in turbulent times of continuing unfreedom and oppression, the enduring evil of injustice and destructive conflicts, and unjust and genocidal war. And freedom, justice and peace in the world and for the good of the world and all in it are urgent, essential and indispensable.

Nana Haji Malcolm rightly and repeatedly taught that freedom is a natural and necessary right in the pursuit and practice of justice and equality, the rightful realization of our full humanity, and the living of a good, meaningful and ever-promising life. Our honored ancestors also taught us the life-giving, life-preserving essentiality of justice, saying in the Husia, Doing justice is breath to the nose. Indeed, they taught the true balancing of the world lies in doing justice. And they said of peace and its importance to the life and community of humankind Exceedingly good is the presence of peace. And there is no blame in peace for those who practice it. But always they and history teach us it must be a peace in freedom and with justice to be a good and rightful peace. Thus, we are morally called, commanded and compelled to bear witness to truth and set the scales of justice in their proper place, especially among the voiceless and devalued, the downtrodden and defenseless, the oppressed, and the different and vulnerable.

Kwanzaa was conceived and born in transformative struggles of the Black Freedom Movement. and was also shaped by that defining decade of fierce strivings and struggles for freedom, justice and associated goods waged by Africans and other peoples of color all over the world in the 1960s. Kwanzaa thus came into being, grounded itself and grew as an act of freedom, an instrument of freedom, a celebration of freedom and a practice of freedom. It was an act of self-determination and self-authorization; a means of cultivating and expanding consciousness and commitment; a righteous reveling in our recaptured sense of the sacredness, soulfulness and beauty of our Black selves; and the practice of principles that engenders and sustains liberated and liberating ways to understand and assert ourselves in the world. And at the heart of this liberated and liberating practice are the Nguzo Saba, the Seven Principles developed and directed in the interest of African and human good and the well-being of the world.

Umoja (Unity) calls on us to work and struggle for principled, purposeful and practiced togetherness in freedom, justice and peace in our families, communities and the world. It stresses the ties that link us and cultivate in us sensitivity to each other, other humans and the world and all in it. Indeed, it is expressed in the teaching of Nana Dr. Anna Julia Cooper who affirmed this ancient and African value. She says, we take our stand on the solidarity of humanity, the oneness of life and the unnaturalness and injustice of all favoritism whether of sex, race, condition or country.

Kujichagulia (Self-Determination) reaffirms the fundamental principle and practice of the right of every people to determine their own destiny and daily lives, to live free in their own place, space and time. And it reaffirms the right to resist all forms of unfreedom, injustice and oppression. It reaffirms Nana Haji Malcolm Xs teaching that Freedom is essential to life itself (and) to the development of the human being. (And) If we dont have freedom, we can never expect justice and equality.

Ujima (Collective Work and Responsibility) reminds us and reaffirms the enduring and essential truth that we must build the good world we all want and deserve. It teaches the centrality of togetherness in our constant quest for an inclusive freedom, justice and peace. And it reaffirms the reality that only in collective work and responsibility can we achieve freedom, ensure justice and build the peace and security of persons and peoples we all long and struggle for all over the world. And as Nana Dr. Mary McLeod Bethune taught us, Our task is to remake the world. It is nothing less than this. And we must do this together, for freedom, justice, peace and other goods are indivisible and they are vulnerable and unattainable in isolation. And we know from the hard lessons of history and the irreducible requirements of our humanity that there can be no peace without justice, no justice without freedom and no freedom without the power, will and struggle of the peoples of the world to achieve and sustain these shared and vital goods.

Ujamaa (Cooperative Economics) teaches us the principle and practice of shared work and shared wealth. Modeled on the shared harvest, it calls for cooperative work, respect of the rights of the workers and the needs of everyone for a life of dignity and economic security and the conditions and capacities to live a free, good and meaningful life. It is rooted in the concept of kinship with and caring kindness toward others and the earth and cultivates a sensitivity for avoiding and resisting injuries to fellow humans and the natural world.

The principle and practice of Nia (Purpose) calls us to do good in and for the world, to pursue and practice freedom, justice, peace, caring, sharing and all that contributes to African and human good and the well-being of the world and all in it. Indeed, the ancestors teach us in the Odu Ifa that we should do things with joy for humans are divinely chosen and righteously challenged to do good in the world. And they remind us in the Husia that the good we do for others we are also doing for ourselves, for we are building the good and promising world we all want and deserve to live in and to leave as a storehouse of good for those who come after.

The principle and practice of Kuumba (Creativity) commits us to work and struggle for a new world and a new us that is rooted in the ancient African ethical imperative of serudj ta which is a moral obligation to constantly repair, renew and remake the world, making it more beautiful and beneficial than we inherited it in the process and practice of repairing, renewing and remaking ourselves. It teaches and urges us, in our relations with each other, others and the earth, to raise up what is in ruins, to repair what is damaged, to rejoin what is separated, to replenish what is depleted, to set right what is wrong, to strengthen what is weakened, and to make flourish that which is fragile, insecure and undeveloped.

And the principle and practice of Imani (Faith) teaches us to believe in the good and strive constantly to achieve it everywhere and in its most essential, inclusive and expansive forms. It reminds us that we must have faith in the future and the new world we seek to bring into being in order to imagine and build them. And it is a faith that teaches us to believe that through hard work, long struggle and a whole lot of love and understanding, we can with other oppressed, struggling and progressive peoples reimagine and redraw the map of the world and put in place and develop conditions and capacities for everyone to live in dignity-affirming, life-enhancing and world-preserving ways and come into the fullness of themselves.

Dr. Maulana Karenga, Professor and Chair of Africana Studies, California State University-Long Beach; Executive Director, African American Cultural Center (Us); Creator of Kwanzaa; and author of Kwanzaa: A Celebration of Family, Community and Culture and Essays on Struggle: Position and Analysis, http://www.OfficialKwanzaaWebsite.org, http://www.MaulanaKarenga.org; http://www.AfricanAmericanCulturalCenter-LA.org; http://www.Us-Organization.org.

Post Views: 144

Read this article:

OP-ED: Kwanzaa, Freedom, Justice and Peace: Principles and Practices For A New World - Black Press USA

Posted in Freedom | Comments Off on OP-ED: Kwanzaa, Freedom, Justice and Peace: Principles and Practices For A New World – Black Press USA

Webinar to give overview of Arkansas Food Freedom Act – Searcy Daily Citizen

Posted: at 11:54 pm

The Arkansas Food Freedom Act opens increased opportunities for entrepreneurs to grow their businesses, but those who create food and drink items must be sure theyre legal to sell under the act.

The popularity of homemade goods, also known as cottage foods, has seen a significant uptick in the last two decades, according to the Food Law and Policy Clinic at the Harvard Law School.

Arkansas producers are able to sell certain home-processed food items to the public without inspection from the Arkansas Department of Health, said Jeff Jackson, public health section chief II with the Arkansas Department of Health. While this will present opportunities for Arkansas producers, the details of the Arkansas Food Freedom Act should be clearly understood to ensure that food entrepreneurs know which items are eligible for sale and which are not.

Act 1040 of 2021, which became known as the Arkansas Food Freedom Act, allows Arkansas residents to sell more types of homemade food and drink products in more locations than before, and allows direct sales of certain homemade food and drink products that do not require time or temperature controls to remain safe. Some products, such as pickles, salsas and canned vegetables, may require pH testing or preapproved recipes.

On Jan. 10, Jackson will present An Overview of the Arkansas Food Freedom Act. The webinar will be held at 11 a.m. Central. Registration is free.

The webinar is the second in a three-part series called Plan. Produce. Profit, which provides information to specialty crop producers on how to operate within the Arkansas Food Freedom Act.

The third Plan. Produce. Profit. webinar will be held Feb. 14. Renee Threlfall of the Institute of Food Science and Engineering at the Division of Agriculture will present the webinar, titled Creating and Processing Value-Added Food Products in Arkansas. Registration is available online.

The first webinar, Liability Issues with Food Processing Under the Arkansas Food Freedom Act, was presented by NALC Senior Staff Attorney Rusty Rumley. The recording of the presentation is available online.

The National Agricultural Law Center and the University of Arkansas System Division of Agriculture are facilitating the webinars which are designed for Arkansas specialty crop producers. The series is funded by the Arkansas Department of Agriculture through the USDA Specialty Crop Block Grant Program.

Follow this link:

Webinar to give overview of Arkansas Food Freedom Act - Searcy Daily Citizen

Posted in Freedom | Comments Off on Webinar to give overview of Arkansas Food Freedom Act – Searcy Daily Citizen

War, Talmud, and agriculture – opinion – The Jerusalem Post

Posted: at 11:53 pm

Variations on the words unity and togetherness have become common in Israeli discourse since October 7. The slogan together we will win is evident everywhere, although apparently not in ultra-orthodox neighborhoods, in which military service is negligible to non-existent. Nevertheless, politicians from that segment of the population draw on unity in their comments and interviews. I have recently seen such by Yitzchak Goldknopf and Arye Deri, leaders of Ashkenazi and Sephardi ultra-Orthodox parties, respectively.

Let me use this platform to suggest how they may express that very unity that they praise. My suggestion will enable them to generate goodwill among the general public, which at this time is doubly sensitive to unequal burden-sharing. This is not about large matters such as compulsory military service or the absence of basic schooling but about small things. How small? From an avocado to an orange, through a cucumber, and onto radishes.

It is no secret that the agricultural sector is in a severe crisis. Farmers and their laborers were murdered while others were evacuated; access to fields was limited by the army; and foreign workers have left. Volunteers attempt to fill this void. Young and old, they pick, pack, and prepare for the next cycle. They attempt to assist the landowners, both private and communal, while helping prevent a rise in the cost of living, which affects us all.

No one expects an unqualified yeshiva student to show up on the frontline and shed his blood. Instead, they could shed some sweat. About a third of some 30,000 foreign workers in the agricultural sector have left the country since October 7. There are about 150,000 full-time students in yeshivot. If they would each allocate one day a week, perhaps not all of them but most, even every fortnight, possibly only on Friday, which is a day off, they could fill the gap, at least until more workers arrive from abroad.

They would thus become a link in a historical chain of tillers of soil, headed by our patriarch Isaac, who sowed in Gerar (apparently between Netivot and Ofakim, not far from Gaza) and reaped a hundredfold. Archeology and our sources testify to our agrarian roots. True, there were limits on land ownership in the Diaspora. But the impression that our forefathers saw produce only in the market is wrong.

Thus, in Hungary last century, my late grandfather owned a threshing machine, which supplemented his earnings as a Talmud teacher, and my late father subsidized his yeshiva studies by pressing grapes for wine. As an added value, such involvement would allow yeshiva students to understand the practical meaning of many agriculture-focused discussions that they see on the page.

They cannot be expected to be as proficient as professional laborers, and work would be adapted to the personal abilities of each one. True, such an enterprise would require a little slowing of their studies. In that, they would join all Israeli students who were called up on October 7 and those whose studies have been interrupted.

Initiatives along these lines, such as those of Karlin Hassidim, are to be applauded, but they are not enough. An extensive and systematic effort by the entire sector will prove to the Israeli public that among the ultra-orthodox and the politicians who represent them, unity is not a theoretical concept that applies to others but applies to them too, as part of the nation as it faces unprecedented challenges.

The writer was Israels first ambassador to the Baltic republics after the disintegration of the Soviet Union, ambassador to South Africa, and congressional liaison officer at the embassy in Washington. She is a graduate of Israels National Defense College.

Originally posted here:

War, Talmud, and agriculture - opinion - The Jerusalem Post

Posted in Talmud | Comments Off on War, Talmud, and agriculture – opinion – The Jerusalem Post

Claims on ‘Canaan’ by Africans and Arabs in the Talmud – The Times of Israel

Posted: at 11:53 pm

For an overview of the depiction of Alexander the Great in Talmudic literature, with bibliography, see the Hebrew Wikipedia entry .

This Talmudic passage (Sanhedrin 91a (sections # 6-9)) starts with a quote from Megillat Taanit(a pre-rabbinic text, written in Aramaic): On the twenty-fourth day in Nisan it is a joyous day, since the usurpers [dimusanaei] were expelled from Judea and Jerusalem. (Jastrowsays thatdimusanaei( ) is a corruption ofdemosionai=publicani) farmers of public revenues under the Roman government. So, related to the Greek worddemospeople,and here meaning tax collector, seePublican Wikipedia, equivalent to the later rabbinic termmokhes .)

It then describes a debate led byGeviha ben Pesisa, representing the Jewish people against the claims of the Africans ( the people ofthe Roman province of Africa, the northern coast of what is now known as the African continent).

Geviha ben Pesisa requested the Sages permission to debate with the people of Africa before Alexander of Macedon. He proposed that if he were defeated, the Sages could minimize the loss by stating he was just an ordinary person (hedyot see my discussion in the next paragraph) and that a true victory would require defeating the Sages. Conversely, if he won, the victory should be attributed to the wisdom of the Torah, not to his personal abilities. The Sages agreed and gave him permission to proceed with the debate.

(Hedyot is a common loan word in Talmudic literature. It is cognate with modern Englishidiot.Idiot Wikipedia:

The word idiot comes from the Greek noun iditsa private person, individual (as opposed to the state), a private citizen (as opposed to someone with a political office), a common man, a person lacking professional skill, layman, later unskilled, ignorant, derived from the adjective idiospersonal (not public, not shared). In Latin, idiota was borrowed in the meaning uneducated, ignorant, common, and in Late Latin came to mean crude, illiterate, ignorant. In French, it kept the meaning of illiterate, ignorant, and added the meaning stupid in the 13th century. In English, it added the meaning mentally deficient in the 14th century.)

The Africans argued beforeAlexander the Greatthat the land of Israel (eretz kanaan Land ofCanaan) belonged to them, citing biblical inheritance.Clearly, these Africans were of Canaanite ethnicity. This makes historical sense, since the major city in the area known as Africa was Carthage, a Canaanite colony.

Wikipedia, Ancient Carthage:

Ancient Carthage ([] Punic: [] romanized:qart hada; lit.New City) was an ancient Semitic civilisation based in North Africa. Initially a settlement in present-day Tunisia, it later became a city-state and then an empire. Founded by the Phoenicians [=Canaanites] in the ninth century BCE, Carthage reached its height in the fourth century BCE as one of the largest metropolises in the world.

(See more on the use of the place-name Canaan at the end of this piece.)

Geviha ben Pesisa challenged this claim using the Torah, stating thatCanaan (son of Ham), being cursed as a slave, meant that his descendants and their possessions belonged to their masters. He argued that since the Africans had not served the Jews, they were not entitled to the land and owed debts and servitude. Unable to respond to Gevihas argument, the Africans fled, leaving their fields and vineyards, which benefitted the Jewish people, especially since it was a Sabbatical Year with agricultural restrictions.

Similar stories, with very similar literary structure are then given for a debate with Egyptians ( bnei Mitzrayim Sons of Egypt, ibid. sections #10-13) and a debate with Arabs ( bnei Yishmael ubnei Keturah Sons ofYishmaeland Sons ofKeturah, ibid. sections #14-16).

The Egyptians argue, based on the Bible: Give us the silver and gold that you took from us; you claimed that you were borrowing it and you never returned it. Geviha responds with a counter-claim: Give us the wages for the work [] whom you enslaved in Egypt for four hundred and thirty years.

The Arabs claim, based on the Bible: The land of Canaan is both ours and yours. Notice that unlike the Africans, who say that the land is exclusively theirs, the Arabs are simply claiming a share, as opposed to the Jewish exclusivist claim. Geviha responds with a rhetorical question, after citing a Biblical verse: In the case of a father [=Avraham] who gave a document of bequest [agatin ] to his sons during his lifetime and sent one of the sons away from the other, does the one who was sent away have any claim against the other? In this case, unlike in the debates with the African and the Egyptians, theres no counter-claim, but simply that the Arabs ancestor Yishmael had been disinherited by Avraham. (Jastrowexplainsagatinas a loan word stemming from Latinlegatummeaning bequest, leaving in a will. Cognate with modern Englishlegacy.)

The use of the term Canaan to refer to Eretz Yisrael is interesting. This word is the standard one in the Bible, and was the one used by the natives themselves (the Canaanites), especially those who lived on the coast of modern-day Lebanon, and those who lived in Carthage in (North) Africa (see earlier), known to the Greeks asPhoenecians.

Presumably, Alexander himself would mostly likely have referred to the area as Palestine, which was the standard term in Greek, seeTimeline of the name Palestine Wikipedia:

The term Palestine first appeared in the 5th century BCE when the ancient Greek historian Herodotus wrote of a district of Syria, called Palaistin between Phoenicia and Egypt inThe Histories. Herodotus provides the first historical reference clearly denoting a wider region than biblical Philistia, as he applied the term to both the coastal and the inland regions such as the Judean Mountains and the Jordan Rift Valley. Later Greek writers such as Aristotle, Polemon and Pausanias also used the word, which was followed by Roman writers such as Ovid, Tibullus, Pomponius Mela, Pliny the Elder, Dio Chrysostom, Statius, Plutarch as well as Roman Judean writers Philo of Alexandria and Josephus.

Its also possible that Alexander would have called it Syria or Phoenecia. See also the recent balanced overview: by Lyman Stone, Who Has Claim? 3,000 Years of Religion in the Land Between,In a State of Migration(October 27, 2023).

Its likely that the termCanaanis used by the Talmud here, because the editors were sensitive to the fact that their standard term for the landEretz Yisrael,was used only by Jews. The other natives, especially the so-called Phoenicians (a Greekexonym, meaning, a term that only non-natives used, to refer to natives), called the landCanaan, and the Greeks called itPalestine.

Ezra Brand is an independent scholar, whose research interests include the Talmudic era, medieval Kabbalah, digital humanities, and linguistics. He has a Master's degree in Medieval Jewish History from Yeshiva University, and spent a year studying in the Talmud Department in Bar-Ilan University. In addition to blogging here, he is a frequent contributor to The Seforim Blog.

Follow this link:

Claims on 'Canaan' by Africans and Arabs in the Talmud - The Times of Israel

Posted in Talmud | Comments Off on Claims on ‘Canaan’ by Africans and Arabs in the Talmud – The Times of Israel

Scientists think they’ve created the world’s 1st ‘practical’ quantum-secure algorithm – Livescience.com

Posted: at 11:52 pm

Scientists think they've created the first practical cryptographic algorithm that could protect data and communications from quantum computers.

However, other experts in the field remain skeptical, saying algorithms backed by a cutting-edge U.S.-government-funded lab have a better chance of being used widely.

Cryptography tools, like WhatsApp's end-to-end encryption, protect data like messages sent between two people by scrambling it into a secret code that only a unique digital key can unlock. If hackers intercept an encrypted message, all they'll see is jumbled-up nonsense. The hacker could try to guess the cryptographic key and decipher the message, but it would take the most powerful supercomputer millions of years to try every possible combination which these machines would perform one at a time.

Quantum computers, on the other hand, can perform several calculations at once. They aren't powerful enough to break cryptography yet, but scientists plan to develop increasingly powerful machines that could one day bypass this essential security layer within seconds.

Now, researchers say they've developed the most efficient quantum-safe proposal to date, based on existing so-called verifiable random function (VRF) technology, which they dub "LaV." They described their research in a paper, which has not yet been peer-reviewed, published Nov. 14 in the Cryptology ePrint Archive, a cryptology research preprint database.

VRF takes a series of inputs, computes them, and churns out a random number that can be cryptographically verified to be random. It's usually an add-on to encryption that boosts the security of digital platforms. It's an essential part of WhatsApp's key transparency protocol, as well as some blockchain systems.

But LaV is a quantum-safe version of VRF. Unlike its predecessor, it could theoretically provide end-to-end security from quantum computers, said lead researcher Muhammed Esgin, an information technology lecturer at Monash University in Australia.

Related link: Chinese researchers to send an 'uncrackable' quantum message to space

"Our algorithm is designed to withstand theoretical and practical attacks even by large-scale quantum computers (that can break today's classical cryptographic algorithms)," Esgin told Live Science in an email. "So it can protect against today's supercomputers as well as tomorrow's powerful quantum computers."

LaV can be accessed through the open-source platform GitLab. Its creators claim it's a practical solution, as opposed to four candidates backed by the National Institute of Standards and Technology (NIST), which has been hunting for a quantum encryption protocol for years. However, some experts disagree.

LaV may not be the best solution to the impending quantum threat, Edward Parker, a physical scientist with The RAND Corporation, told Live Science.

"There are several existing quantum-secure cryptography algorithms that already exist," he said, and NIST is standardizing these tools, "essentially giving those four algorithms the U.S. government's stamp of approval for widespread use."

"It's widely expected that these four algorithms will become the backbone of future quantum-secure cryptography, rather than LaV or any of the dozens of other quantum-secure algorithms that have been proposed," he added. "The four algorithms that NIST selected have undergone several years of very careful vetting, and we can be very confident that they are indeed secure."

Jonathan Katz, a computer scientist at the University of Maryland's Institute for Advanced Computer Studies (UMIACS), also backsNIST's efforts. "The cryptography research community has been working on quantum-safe algorithms for well over two decades, and the NIST post-quantum cryptography standardization effort began in 2017," he told Live Science in an email.

However, Parker added that "it's certainly possible that LaV may be somewhat more efficient than other quantum-secure algorithms."

Vlatko Vedral, a professor of quantum information science at the University of Oxford, told Live Science he suspects LaV may not be the first algorithm of its type, though it may be the first released publicly.

"The industry is getting closer and closer to making a large-scale quantum computer, and it is only natural that various protections against its negative uses are being explored," Vedral said. "Code making and code breaking have always been locked into an arms race against each other."

Read more here:

Scientists think they've created the world's 1st 'practical' quantum-secure algorithm - Livescience.com

Posted in Quantum Computing | Comments Off on Scientists think they’ve created the world’s 1st ‘practical’ quantum-secure algorithm – Livescience.com

Quantum Computers Begin to Measure Up | Research & Technology | Dec 2023 – Photonics.com

Posted: at 11:52 pm

WAKO, Japan, Dec. 27, 2023 Much of the progress so far in quantum computing has been done on so-called gate-based quantum computers. These devices use physical components, most notably superconducting circuits, to host and control the qubits. The approach bears similarity to conventional, device-based classical computers. The two computing architectures are thus relatively compatible and could be used together in hybrid. Furthermore, future quantum computers could be fabricated by harnessing existing technologies used to fabricate conventional computers.

But the Optical Quantum Computing Research Team at the RIKEN Center for Quantum Computing has been taking a very different approach. Instead of optimizing gate-based quantum computers, Atsushi Sakaguchi, Jun-ichi Yoshikawa and team leader Akira Furusawa have been developing measurement-based quantum computing.

Measurement-based quantum computers process information in a complex quantum state known as a cluster state, which consists of three (or more) qubits linked together by a non-classical phenomenon called entanglement.

Measurement-based quantum computers work by making a measurement on the first qubit in the cluster state. The outcome of this measurement determines what measurement to perform on the second entangled qubit, a process called feedforward. This then determines how to measure the third. In this way, any quantum gate or circuit can be implemented through the appropriate choice of the series of measurements.

Importantly, measurement-based quantum computation offers programmability in optical systems. We can change the operation by just changing the measurement, said Sakaguchi. This is much easier than changing the hardware, as gated-based systems require in optical systems.

But feedforward is essential. Feedforward is a control methodology in which we feed the measurement results to a different part of the system as a form of control, Sakaguchi said. In measurement-based quantum computation, feedforward is used to compensate for the inherent randomness in quantum measurements. Without feedforward operations, measurement-based quantum computation becomes probabilistic, while practical quantum computing will need to be deterministic.

The Optical Quantum Computing Research Team and their co-workers from The University of Tokyo, Palack University in the Czech Republic, the Australian National University and the University of New South Wales, Australia have now demonstrated a more advanced form of feedforward: nonlinear feedforward. Nonlinear feedforward is required to implement the full range of potential gates in optics-based quantum computers.

Optical quantum computers use qubits made of wave packets of light. At other institutions, some of the current RIKEN team had previously constructed the large optical cluster states needed for measurement-based quantum computation. Linear feedforward has also been achieved to construct simple gate operations, but more advanced gates need nonlinear feedforward.

A theory for practical implementation of nonlinear quadrature measurement was proposed in 2016.3 But this approach presented two major practical difficulties: generating a special ancillary state (which the team achieved in 20214) and performing a nonlinear feedforward operation.

The key advantages of this nonlinear feedforward technique are its speed and flexibility. The process needs to be fast enough that the output can be synchronized with the optical quantum state.

Now that we have shown that we can perform nonlinear feedforward, we want to apply it to actual measurement-based quantum computation and quantum error correction using our previously developed system, Sakaguchi said. And we hope to be able to increase the higher speed of our nonlinear feedforward for high-speed optical quantum computation.

But the key message is that, although superconducting circuit-based approaches may be more popular, optical systems are a promising candidate for quantum-computer hardware, he added.

The research was published in Nature Communications (www.doi.org/10.1038/s41467-023-39195-w).

Originally posted here:

Quantum Computers Begin to Measure Up | Research & Technology | Dec 2023 - Photonics.com

Posted in Quantum Computing | Comments Off on Quantum Computers Begin to Measure Up | Research & Technology | Dec 2023 – Photonics.com

Experts warn quantum computers are overhyped and far away – Fudzilla

Posted: at 11:52 pm

Neither dead nor alive yet

While quantum computing companies have said their machines could be doing amazing things in just a few years, some top experts say they don't believe the hype.

Meta's AI boss, Yann LeCun, made a splash after saying quantum computers are not that great. Speaking at a media event to mark ten years of Meta's AI team, he said the technology is "a fascinating scientific topic". Still, he was unsure of "the possibility of actually making useful quantum computers."

LeCun is not a quantum computing expert; other big names in the field also raise doubts. Oskar Painter, head of quantum hardware for Amazon Web Services, says there is a "tremendous amount of hype" in the industry right now and "it can be hard to tell the hopeful from the hopeless."

A big problem for today's quantum computers is that they make many mistakes. Some have said these so-called "noisy intermediate-scale quantum" (NISQ) machines could still work well. But Painter says that's not likely, and quantum error-correction tricks will be needed to make practical quantum computers.

The main idea is to spread information over unreliable qubits to make "logical qubits." But this could need as many as 1,000 dodgy qubits for each good one. Some have said that quantum error correction could be impossible, but that's not popular. Either way, making these tricks work at the size and speed needed is a long way off, Painter says.

"Given the remaining technical challenges in making a fault-tolerant quantum computer that can run billions of gates over thousands of qubits, it's hard to say when it will happen, but I would guess at least ten years away," he said.

In May, top Microsoft boffin Matthias Troyer penned a paper saying that quantum computers could only do better than regular computers in a few areas.

"We discovered over the last ten years that many things people have suggested don't work. And then we found some straightforward reasons for that."

The main point of quantum computing is to solve problems much faster than regular computers, but how much quicker depends. There are two things where quantum tricks seem to give a tremendous speed up, said Troyer.

One is breaking big numbers into smaller ones, which could crack the codes that keep the Internet safe. The other is copying quantum systems, which could help with chemistry and materials.

Quantum tricks have been suggested for optimisation, drug design, and fluid dynamics. But the speed-ups don't always work out--sometimes they are only a bit faster, meaning the time it takes the quantum trick to solve a problem is the square root of the time taken by the normal one.

Troyer says these speed-ups can quickly disappear because of the enormous amount of work quantum computers need. Running a qubit is much more complicated and slower than flipping a switch. This means that for more minor problems, an average computer will always be faster, and the point where the quantum computer takes the lead depends on how fast the normal one gets more challenging.

Troyer and his mates compared a single Nvidia A100 GPU against a made-up future fault-tolerant quantum computer with 10,000 "logical qubits" and gate times much faster than today's machines.

They found that a quantum trick with a bit of a speed-up would have to run for hundreds or thousands of years before it could beat a normal one on problems significant enough to matter.

Troyer said quantum computers will only work on small-data problems with huge speed-ups. "All the rest is nice theory but will not be useful," he said.

All this is pouring cold water on the idea that Quantum computers will be here soon or that the Internet is in danger of having its codes broken by thieves or spooks using the technology.

It would appear that, for now, the cat is still only potentially dead or alive.

Go here to see the original:

Experts warn quantum computers are overhyped and far away - Fudzilla

Posted in Quantum Computing | Comments Off on Experts warn quantum computers are overhyped and far away – Fudzilla

How to Pave the Way for Quantum-Secure Encryption – Infosecurity Magazine

Posted: at 11:52 pm

The threat posed by quantum computing is no longer a distant concern but an imminent reality. Experts believe so-called Q-Day, the point at which quantum computers will be able to break existing encryption algorithms, could be just a few years away.

The power of quantum computing offers huge social and economic benefits, as highlighted in the UK governments National Quantum Strategy, published in November 2023. However, the strategy emphasized that the technologys potential to undermine current cryptography used to secure internet data is a national security challenge that must be overcome to realise this potential.

It's fair to say that the threat is real, it could break the internet, Rob Clyde, Board Director at ISACA, told Infosecurity.

The implications of attackers being able to break current public key cryptography (PKC) algorithms, which provide secure sessions on browsers, secure transactions and digital signatures, are manifold, he explained.

It means you have the double threat of attackers being able to spy on data and inject signatures into the process, noted Clyde.

In addition, experts believe that threat actors are already leveraging quantum by undertaking harvest now, decrypt later attacks.

It is crucial that organizations are aware of the data security implications of advances in quantum computing and know how to mitigate this looming danger.

Governments and the tech industry are currently engaged in efforts to facilitate the migration towards post-quantum cryptography (PQC), aiming to have these encryption protocols rolled out widely before Q-Day strikes.

This will be a massive undertaking, given the scale and reliance on the internet.

The threat that quantum computers pose to current PKC standards is global and not something that any one organization can tackle on their own, commented Marc Manzano, General Manager of Quantum Security at SandboxAQ.

One of the most significant initiatives is the US National Institute of Standards and Technologys (NIST) publication of draft post-quantum cryptography (PQC) standards in August 2023. The draft documents outline three Federal Information Processing Standards (FIPS) and incorporate the four encryption algorithms NIST had previously selected to form its PQC standard.

The encryption algorithms selected include:

It is expected that the standards will become the global benchmark for quantum-resistant cybersecurity across the world in 2024.

Clyde said that once these draft standards become official open-source and proprietary software will begin implementing the algorithms rapidly.

He added that SSL certificates for websites will be quickly updated with the new algorithms.

The UKs National Cyber Security Centre (NCSC) guidelines set out how organizations can migrate their systems to PQC based on the NIST standards.

Several industry-led entities focused on driving PQC awareness and adoption have also been created. This includes the PQC coalition, a body that aims to bring together industry, academia and governments.

Manzano explained: As of now [the coalition] has four dedicated workstreams focused on advancing standardization efforts, education, implementation and modernization of cryptography management, respectively.

NIST and other entities involved in this space have worked to homogenize security and interoperability with the new PQC algorithms and concepts. Nevertheless, Philip George, Executive Technical Strategist at Merlin Cyber,noted that even small-scale cryptographic transitions have proven to be complex undertakings to plan and execute.

The migration to PQC will be the largest cryptographic migration in the history of computing, so the potential for the loss of availability for affected systems remains high, he outlined.

Much of the migration will be completed automatically, for example in browsers. However, Clyde said that organizations implementing software must ensure they have a process for picking up the new algorithms as they come through.

The first step organizations should take is to educate themselves on the guidance offered by the entities involved in the development of quantum-secure cryptography. For example, George advised referencing the CISA/NSA Quantum-Readiness factsheet, which recommends organizations pull together key representatives across their risk management program to establish a quantum readiness project team.

Another crucial action that should be taken now is to build a cryptographic inventory. This requires identifying every instance of cryptographic assets within the IT infrastructure, whether embedded in applications, filesystems or elsewhere.

Manzano noted: This will enable compliance and governance teams to control what cryptography is being used while, at the same time, offer remediation alternatives for the identified vulnerabilities present in the systems.

George emphasized that this inventory of cryptographic dependencies should include organizations supply chains.

In addition, having an understanding of the cryptographic systems being used across an enterprises systems will help address the very live threat of harvest now, decrypt later attacks. Clyde noted that quantum computers will struggle to decrypt certain types of symmetric encryption algorithms currently available, particularly AES 256.

Theres no need to wait on this, look for reencryption programs that will quickly move you into quantum-resistant symmetric algorithms such as AES 256, advised Clyde.

Following the inventory and discovery process, organizations need to incorporate cryptographic agility into targeted assets and systems. Manzano noted that organizations that require high-speed, low-latency operations, such as financial institutions and telecommunications providers, may have concerns about the impact PQC algorithms will have on network performance, operations, cost and the user experience.

Being able to conduct accurate benchmarking can give these organizations deeper insights into which algorithms offer the best balance of performance and security, enabling them to make informed business decisions and solidify their corporate cryptographic policies, he said.

George added that taking these steps now will reduce the time and effort to shift from one cryptographic standard to another and introduce new standards seamlessly.

There will be a lot of announcements to come regarding quantum computing both in terms of the threat posed by this technology and the initiatives to protect against such dangers.

Clyde said it is vital all organizations keep a close eye on updates from tech firms involved in this space, such as IBM and Google. In particular, pay attention when they state they are close to building a quantum computer that can break existing encryption algorithms.

Pay attention to the makers of quantum computing so youre not caught off guard when a sudden breakthrough occurs, Clyde said.

He noted that this is what happened with AI, where many people were taken by surprise by the launch of OpenAIs ChatGPT generative AI tool in November 2022.

Follow this link:

How to Pave the Way for Quantum-Secure Encryption - Infosecurity Magazine

Posted in Quantum Computing | Comments Off on How to Pave the Way for Quantum-Secure Encryption – Infosecurity Magazine

4 steps to prepare for the coming quantum onslaught – Nextgov/FCW

Posted: at 11:52 pm

When it comes to the cyber and tech landscape, a storm is brewing one that threatens to dismantle the very fabric of our digital security. This storm is known as Q-Day, shorthand for the impending quantum computing era, when the capabilities of quantum computers will render even the most sophisticated encryption algorithms obsolete.

This quantum revolution is approaching at an alarming pace, possibly within the next few years, and it is imperative for governments and organizations across sectors to begin adapting and preparing in 2024.

The magnitude of this issue extends far beyond the confines of cyberspace it poses an existential threat to the protection of our most critical national security secrets and systems.

The scope of the problem reaches into the heart of our nation's security. Protecting critical assets such as infrastructure, healthcare systems, advanced weapons and intelligence assets becomes nearly impossible in the face of quantum advancements. It's not just about safeguarding data; it's about securing the very pillars that uphold the security and functionality of our society.

What should government agencies do to prepare in 2024?

In 2024, governments, as stewards of national security, must take the lead in acknowledging and addressing the quantum threat. This entails allocating resources for research, development and the implementation of strategies to counter the impending challenges posed by quantum computing.

The transition to a quantum-ready future revolves around the adoption of post-quantum cryptography and other quantum-resistant protocols. Unlike traditional cryptographic methods, PQC is designed to withstand the computational prowess of quantum computers. Embracing these protocols is not a choice but a necessity, a fundamental step towards ensuring the continued integrity of our digital systems.

Policies, like the Quantum Computing Cybersecurity Preparedness Act, that incentivize the adoption of quantum-resistant technologies are crucial to creating a resilient security framework.

How can the private sector help?

Companies and organizations, often on the front lines of technological integration, must recognize their role in this quantum paradigm shift. The need for major changes in security protocols is not just a suggestion; it's a mandate for survival in the digital age. Investing in the research and development of quantum-resistant technologies is not only a proactive approach but also a strategic imperative for long-term sustainability.

4 ways to prepare for the quantum threat In 2024

As we head into a new year, the imminent arrival of Q-Day demands our collective attention and immediate action. It's a call to arms for governments, companies, and organizations to adapt and prepare for a future where quantum computing reshapes the very foundations of cybersecurity. As the storm approaches, those who heed the warning and take proactive measures today will be the architects of a secure and resilient digital future. Q-Day is not a distant conceptit's the reality knocking on our digital doorstep, and our preparedness over the next year will determine the security landscape of tomorrow.

View original post here:

4 steps to prepare for the coming quantum onslaught - Nextgov/FCW

Posted in Quantum Computing | Comments Off on 4 steps to prepare for the coming quantum onslaught – Nextgov/FCW