Can Barack Obama revive the spirit of 2008?

The return of the grassroots community organiser.

He was once hailed as the world's greatest celebrity but now the glitter is tarnished and the hero worship is barely anywhere to be found. So this week Barack Obama is going back on the road -- with just five weeks to save his Democratic Party from ignominy in November's midterm elections.

His blitz through four states is no ordinary road trip: this time the President is making a huge effort to re-discover the enthusiasm and the engagement that proved the key to his success in 2008. So there's just one rally, on Tuesday, to students at the University of Wisconsin, and a series of more informal meetings with "ordinary folks" in their own backyards.

This much more populist message aims to hit back at the Republican "Pledge to America" manifesto: and, as White House communications director Dan Pfeiffer put it, to show "why he thinks the direction the Republicans are pushing to go would be irresponsible, would be a mistake".

Instead the President will focus on the middle classes and America's public deficit, insisting it would be totally wrong to cut taxes and return to the Bush-style policies of the past, and what he's calling "the era of recklessness".

But policies aside, this trip is really meant to mark a return to the old-style Obama -- the grassroots community organiser, the one who spectacularly managed to to connect with ordinary people and fire up a political excitement they never knew they had.

It's an effort too to revive that coalition of young people and minorities that didn't just sweep him to power in 2008 -- but also seemed to usher in a completely new kind of politics, a kind based on inclusion and engagement and fuelled by the desire of individuals to make a difference.

And it's an attempt to turn around the political fortunes of the last 18 months, which has seen Obama and the Democrats beset by falling polls and disillusioned voters who simply don't want to turn out. As the Washington Post put it, Obama's much vaunted grassroots network is now "a shadow of its former self".

Latest polls in a number of key battleground states don't look good for the Democrats: as independent voters lean towards the GOP, while young people and minority voters say they're inclined to stay at home. Although "Organising for America" still has paid staffers in 50 states, trying to get out the vote and keep supporters engaged, there's a palpable "enthusiasm gap".

And hence Tuesday's speech to students in Madison -- trying to recapture just a little bit of the old magic -- and trying to get young people excited about politics again. It's being simulcast to 200 other campuses, with other youth events staged elsewhere, so there's no excuse to miss it.

Communications guru David Plouffe -- the man who forged much of the success story of 2008 -- is said to be behind the University of Wisconsin event, followed by three other old style mass political rallies in the run up to election day.

And meeting voters in their backyards is supposed to convince the country their President is not aloof and out of touch with the real problems they're facing in these tough economic times.

But it's all getting rather late for Obama to turn things around. Meantime there are murmurings about the effectiveness of the White House strategy team, who could once do no wrong, and some beleagued Democrats have insisted they don't want the President stumping for them right now, because it might just make things worse. It seems the old adage has never been more true -- the soaring poetry of campaigns is one thing, the complex and nuanced prose of government, quite another.


Show Hide image

Can Trident be hacked?

A former defence secretary has warned that Trident is vulnerable to cyber attacks. Is it?

What if, in the event of a destructive nuclear war, the prime minister goes to press the red button and it just doesn't work? 

This was the question raised by Des Browne, a former defence secretary, in an interview witht the Guardian this week. His argument, based on a report from the defence science board of the US Department of Defense, is that the UK's Trident nuclear weapons could be vulnerable to cyberattacks, and therefore rendered useless if hacked. 

Browne called for an "end-to-end" assessment of the system's cybersecurity: 

 The government ... have an obligation to assure parliament that all of the systems of the nuclear deterrent have been assessed end-to-end against cyber attacks to understand possible weak spots and that those weak spots are protected against a high-tier cyber threat. If they are unable to do that then there is no guarantee that we will have a reliable deterrent or the prime minister will be able to use this system when he needs to reach for it.

Is he right? Should we really be worried about Trident's potential cyber weaknesses?

Tangled webs 

The first, crucial thing to note is that Trident is not connected to the "internet" we use every day. Sure, it's connected to the main Ministry of Defence network, but this operates totally independently of the network that you visit Facebook through. In cyber-security terms, this means the network is "air-gapped" - it's isolated from other systems that could be less secure. 

In our minds, Trident is old and needs replacing (the submarines began patrolling in the 1990s), but any strike would be ordered and co-ordinated from Northwood, a military bunker 100m underground which would use the same modern networks as the rest of the MoD. Trident is basically as secure as the rest of the MoD. 

What the MoD said

I asked the Ministry of Defence for a statement on Trident's security, and while it obviously can't offer much information about how it all actually works, a spokesperson confirmed that the system is air-gapped and added: 

We wouldn't comment on the detail of our security arrangements for the nuclear deterrent but we can and do safeguard it from all threats including cyber.

What security experts said

Security experts agree that an air-gapped system tends to be more secure than one connected to the internet. Sean Sullivan, a security adviser at F-secure, told Infosecurity magazine that while some hackers have been able to "jump" air-gaps using code, this would cause "interference" at most and a major attack of this kind is still "a long way off". 

Franklin Miller, a former White House defence policy offer, told the Guardian that the original report cited by Browne was actually formulated in response to suggestions that some US defence networks should be connected to the internet. In that case, it actually represents an argument in favour of the type of air-gapped system used by the MoD. 

So... can it be hacked?

The answer is really that any system could be hacked, but a specialised, independent defence network is very, very unlikely to be. If a successful hack did happen, it would likely affect all aspects of defence, not just Trident. That doesn't mean that every effort shouldn't be made to make sure the MoD is using the most secure system possible, but it also means that scaremongering in the context of other, unrelated cybersecurity scares is a little unjustified. 

Barbara Speed is a technology and digital culture writer at the New Statesman and a staff writer at CityMetric.