Showing posts sorted by date for query Tu quoque. Sort by relevance Show all posts
Showing posts sorted by date for query Tu quoque. Sort by relevance Show all posts

Thursday, May 2, 2024

Bug

Bug (pronounced buhg)

(1) Any insect of the order Hemiptera, especially any of the suborder Heteroptera (a hemipteran or hemipteron; a hemipterous insect), having piercing and sucking mouthparts specialized as a beak (rostrum) and known loosely as the “true bug”.

(2) Any of various species of marine or freshwater crustaceans.

(3) In casual use, any insect or insect-like invertebrate (ie used often of spiders and such because of their supposed “bug-like” quality).

(4) In casual use, any micro-organism causing disease, applied especially to especially a virus or bacterium.

(5) An instance of a disease caused by such a micro-organism; a class of such conditions.

(6) In casual (and sometimes structured) use, a defect or imperfection, most associated with computers but applied also to many mechanical devices or processes.

(7) A craze or obsession (usually widespread or of long-standing).

(8) In slang, a person who has a great enthusiasm for such a craze or obsession (often as “one bitten by the bug”).

(9) In casual (and sometimes structured) use, a hidden microphone, camera or other electronic eavesdropping device (a clipping of bugging device) and used analogously of the small and effectively invisible (often a single-pixel image) image on a web page, installed usually for the purpose of tracking users.

(10) Any of various small mechanical or electrical gadgets, as one to influence a gambling device, give warning of an intruder, or indicate location.

(11) A mark, as an asterisk, that indicates a particular item, level, etc.

(12) In US horse racing, the five-pound (2¼ kg) weight allowance able to be claimed by an apprentice jockey and by extension (1) the asterisk used to denote an apprentice jockey's weight allowance & (2) in slang, US, a young apprentice jockey (sometimes as “bug boy” (apparently used thus also of young female jockeys, “bug girl” seemingly beyond the pale.)).

(13) A telegraph key that automatically transmits a series of dots when moved to one side and one dash when moved to the other.

(14) In the slang of poker, a joker which may be used only as an ace or as a wild card to fill a straight or a flush.

(15) In commercial printing, as “union bug”, a small label printed on certain matter to indicate it was produced by a unionized shop.

(16) In fishing, a any of various plugs resembling an insect.

(17) In slang, a clipping of bedbug (mostly UK).

(18) A bogy; hobgoblin (extinct).

(19) In slang, as “bug-eyed”, protruding eyes (the medical condition exophthalmos).

(20) A slang term for the Volkswagen Beetle (Type 1; 1938-2003 & the two retro takes; 1997-2019).

(21) In broadcasting, a small (often transparent or translucent) image placed in a corner of a television program identifying the broadcasting network or channel.

(22) In aviation, a manually positioned marker in flight instruments.

(23) In gay (male) slang in the 1980s & 1990s as “the bug”, HIV/AIDS.

(24) In the slang of paleontology, a trilobite.

(25) In gambling slang, a small piece of metal used in a slot machine to block certain winning combinations.

(26) In gambling slang, a metal clip attached to the underside of a table, etc and used to hold hidden cards (a type of cheating).

(27) As the Bug (or Western Bug), a river in Eastern Europe flows through Belarus, Poland, and Ukraine with a total length of 481 miles (774 km).  The Southern Bug (530 miles (850 km)) in south west Ukraine flows into the Dnieper estuary and is some 530 miles (850 km) long.

(28) A past tense and past participle of big (obsolete).

(29) As ISO (international standard) 639-2 & ISO 639-3, the language codes for Buginese.

(30) To install a secret listening device in a room, building etc or on a telephone or other communications device.

(31) To badger, harass, bother, annoy or pester someone.

1615–1625: The original use was to describe insects, apparently as a variant of the earlier bugge (beetle), thought to be an alteration of the Middle English budde, from the Old English -budda (beetle) but etymologists are divided on whether the phrase “bug off” (please leave) is related to the undesired presence of insects or was of a distinct origin.  Bug, bugging & debug are nouns & verbs, bugged is a verb & adjective and buggy is a noun & adjective; the noun plural is bugs.  Although “unbug” makes structural sense (ie remove a bug, as opposed to the sense of “debug”), it doesn’t exist whereas forms such as the adjectives unbugged (not bugged) and unbuggable (not able to be bugged) are regarded as standard.

The array of compound forms meaning “someone obsessed with an idea, hobby etc) produced things like “shutterbug” (amateur photographer) & firebug (arsonist) seems first to have emerged in the mid nineteenth century.  The development of this into “a craze or obsession” is thought rapidly to have accelerated in the years just before World War I (1914-1918), again based on the notion of “bitten by the bug” or “caught the bug”, thus the idea of being infected with an unusual enthusiasm for something.  The use to mean a demon, evil spirit, spectre or hobgoblin was first recorded in the mid-fourteenth century and was a clipping of the Middle English bugge (scarecrow, demon, hobgoblin) or uncertain origin although it may have come from the Middle Welsh bwg (ghost; goblin (and linked to the Welsh bwgwl (threat (and earlier “fear”) and the Middle Irish bocanách (supernatural being).  There’s also speculation it may have come from the scary tales told to children which included the idea of a bugge (beetle) at a gigantic scale.  That would have been a fearsome sight and the idea remains fruitful to this day for artists and film-makers needing something frightening in the horror or SF (science fiction) genre.  The use in this sense is long obsolete although the related forms bugbear and bugaboo survive.  Dating from the 1570s, a bugbear was in folklore a kind of “large goblin”, used to inspire fear in children (both as a literary device & for purposes of parental control) and for adults it soon came to mean “a source of dread, resentment or irritation; in modern use it's an “ongoing problem”, a recurring obstacle or adversity or one’s pet peeve.  The obsolete form bugg dates from circa 1620s and was a reference to the troublesome bedbug, the construct a conflation of the middle English bugge (scarecrow, hobgoblin) and the Middle English budde (beetle).  The colloquial sense of “a microbe or germ” dates from 1919, the emergence linked to the misleadingly-named “Spanish flu” pandemic.

Like the rest of us, even scientists, entomologists and zoologists generally probably say “bug” in general conversation, whether about the insects or the viruses and such which cause disease but in writing academic papers they’ll take care to be more precise.  Because to most of us “bugs” can be any of the small, creepy pests which intrude on our lives (some of which are actually helpful in that quietly and unobtrusively they dispose of the really annoying bugs which bite us), the word is casually and interchangeably applied to bees, ants, bees, millipedes, beetles, spiders and anything else resembling an insect.  That use may be reinforced by the idea of the thing “bugging” us by their very presence.  To the professionals however, insects are those organisms in the classification Insecta, a very large class of animals, the members of which have a three-part body, six legs and (usually) two pairs of wings whereas a bug is a member of the order Hemiptera (which in the taxonomic system is within the Insecta class) and includes cicadas, aphids and stink bugs; to emphasize the point, scientists often speak of those in the order Hemiptera as “true bugs”.  The true bugs are those insects with mouthparts adapted for piercing and sucking, contained usually in a beak-shaped structure, a vision agonizingly familiar to anyone who has suffered the company of bedbugs.  That’s why lice are bugs and cockroaches are not but the latter will continue to be called bugs, often with some preceding expletive.

9 September 1947: The engineer's note (with physical evidence) of electronic computing's "first bug".

In computing, where the term “bug” came to be used to describe “glitches, crashes” and such, it has evolved to apply almost exclusively to software issues and even if events are caused by hardware flaws, unless it’s something obvious (small explosions, flame & smoke etc) most users probably assume a fault in some software layer.  The very first documented bug however was an interaction recorded on 9 September 1947 between the natural world and hardware, an engineer’s examination of an early (large) computer revealing an insect had sacrificially landed on one of the circuits, shorting it out and shutting-down the machine.  As proof, the unfortunate moth was taped to the report.  On a larger scale (zoologically rather than the hardware), the problem of small rodents such as mice entering the internals of printers, there to die from various causes (impact injuries, starvation, heat et al) remains not uncommon, resulting sometimes in mechanical damage, sometimes just the implications of decaying flesh.

The idea of a bug as a “defect, flaw, fault or glitch” in a mechanical or electrical device was first recorded in the late 1800s as engineer’s slang, the assumption being they wished to convey the idea of “a small fault” (and thus easily fixed, as opposed to some fundamental mistake which would necessitate a re-design).  Some sources suggest the origin lies with Thomas Edison (1847-1931) who is reported as describing the consequences of an insect “getting into the works”.  Programmers deploy an array of adjectives to "bug" (major, minor, serious, critical & non-critical et al) although between themselves (and certainly when disparaging of the code of others) the most commonly heard phrase is probably “stupid bug”.  The “debugging” (also as de-bugging) process is something with a wide definition but in general it refers to any action or set of actions taken to remove errors.  The name of the debug.exe (originally debug.com) program included with a number of (almost all 16 & 32-bit) operating systems was a little misleading because in addition to fixing things, it could be used for other purposes and is fondly remembered by those who wrote Q&D (quick & dirty) work-arounds which, written in assembler, ran very fast.  The verb debug was first used in 1945 in the sense of “remove the faults from a machine” and by 1964 it appeared in field service manuals documenting the steps to be taken to “remove a concealed microphone”.  Although the origin of the use of “bug” in computing (probably the now most commonly used context) can be traced to 1947, the term wasn’t widely used beyond universities, industry and government sites before the 1960s when the public first began to interact at scale with the implications (including the bugs) of those institutions using computerized processes.  Software (or any machinery) badly afflicted by bugs can be called “buggy”, a re-purposing of the use of an adjective dating from 1714 meaning “a place infested with bugs”.

Some bugs gained notoriety.  In the late 1990s, it wasn’t uncommon for the press to refer to the potential problems of computer code using a two-numeral syntax for years as the “Y2K bug” which was an indication of how wide was the vista of the common understanding of "bug" and one quite reasonable because that was how the consequences would be understood.  A massive testing & rectification effort was undertaken by the industry (and corporations, induced by legislation and the fear of litigation) and with the coming of 1 January 2000 almost nothing strange happened and that may also have been the case had nothing been done but, on the basis of the precautionary principle, it was the right approach.  Of course switching protocols to use four-numeral years did nothing about the Y10K bug but a (possible) problem 8000 years hence would have been of little interest to politicians or corporate boards.  Actually, YxK bugs will re-occur (with decreasing frequency) whenever a digit needs to be added.  The obvious solution is trailing zeros although if one thinks in terms of infinity, it may be that, in the narrow technical sense, such a solution would just create an additional problem although perhaps one of no practical significance.  Because of the way programmers exploit the way computers work, there have since the 1950s been other date (“time” to a computer) related “bugs” and management of these and the minor problems caused has been handled well.  Within the industry the feeling is things like the “year 2029 problem” and “year 2038 problem” will, for most of the planet, be similarly uneventful.

The DOSShell, introduced with PC-DOS 4.0; this was as graphical as DOS got.  The DOSShell was bug-free.

Bugs can also become quirky industry footnotes.  As late as 1987, IBM had intended to release the update of PC-DOS 3.3 as version 3.4, reflecting the corporation’s roadmap of DOS as something of an evolutionary dead-end, doomed ultimately to end up in washing machine controllers and such while the consumer and corporate market would shift to OS/2, the new operating system which offered pre-emptive multi-tasking and access to bigger storage and memory addressing.  However, at that point, both DOS & OS/2 were being co-developed by IBM & Microsoft and agreement was reached to release a version 4 of DOS.  DOS 4 also included a way of accessing larger storage space (through a work-around with a program called share.exe) and more memory (in a way less elegant than the OS/2 approach but it did work, albeit more slowly), both things of great interest to Microsoft because they would increase the appeal of its upcoming Windows 3.0, a graphical shell which ran on top of DOS; unlike OS/2, Windows was exclusive to Microsoft and so was the revenue stream.  Unfortunately, it transpired the memory tricks used by PC-DOS 4.0 were “buggy” when used with some non-IBM hardware and the OS gained a bad reputation from which it would never recover.  By the time the code was fixed, Microsoft was ready to release its own version as MS-DOS 4.0 but, noting all the bad publicity, after a minor updates and some cosmetic revisions, the mainstream release was MS-DOS 4.01.  In the code of the earlier bug-afflicted bits, there is apparently no difference between MS-DOS 4.01 the few existing copies of MS-DOS 4.0.

Lindsay Lohan with Herbie the "Love Bug", Herbie: Fully Loaded (Disney Pictures, 2005). 

In idiomatic and other uses, bug has a long history.  By the early twentieth century “bugs” meant “mad; crazy" and by then “bug juice” had been in use for some thirty years, meaning both “propensity of the use of alcoholic drink to induce bad behaviour” and “bad whiskey” (in the sense of a product being of such dubious quality it was effectively a poison).  A slang dictionary from 1811 listed “bug-hunter” as “an upholsterer”, an allusion to the fondness bugs and other small creatures show for sheltering in the dark, concealed parts of furniture.  As early as the 1560s, a “bug-word” was a word or phrase which “irritated or vexed”.  The idea of “bug-eyed” was in use by the early 1870s and that’s thought either to be a humorous mispronunciation of bulge or (as is thought more likely) an allusion to the prominent, protruding eyes of creatures like frogs, the idea being they sat on the body like “a pair of bugs”.  The look became so common in the movies featuring aliens from space that by the early 1950s the acronym BEM (bug-eyed monster) had become part of industry slang.  The correct term for the medical condition of "bulging eyes" is exophthalmos.

To “bug someone” in the sense of “to annoy or irritate” seems not to have been recorded until 1949 and while some suggest the origin of that was in swing music slang, it remains obscure.  The now rare use of “bug off” to mean “to scram, to skedaddle” is documented since 1956 and is of uncertain origin but may be linked to the Korean War (1950-1953) era US Army slang meaning “stage a precipitous retreat”, first used during a military reversal.  The ultimate source was likely the UK, Australian & New Zealand slang “bugger off” (please leave).  The “doodle-bug” was first described in 1865 and was Southern US dialect for a type of beetle.  In 1944, the popular slang for the German Vergeltungswaffen eins (the V-1 (reprisal weapon 1) which was the first cruise missile) was “flying bomb” or “buzz bomb”) but the Royal Air Force (RAF) pilots preferred “doodle-bug”.

The ultimate door-stop for aircraft hangers: Bond Bug 700.

The popularity of three wheeler cars in the UK during the post-war years was a product of cost breakdown.  They were taxed at a much lower rate than conventional four-wheel vehicles, were small and thus economical and could be operated by anyone with only a motorcycle licence.  Most were actually genuine four-seaters and thus an attractive alternative for families and, being purely utilitarian, there were few attempts to introduce elements of style.  The Bond Bug (1970-1974) was an exception in that it was designed to appeal to the youth market with a sporty-looking two-seater using the then popular “wedge-styling” and in its most powerful form it could touch 80 mph (130 km/h), faster than any other three wheeler available.  However, the UK in 1973 introduced a value-added tax (VAT) and this removed many of the financial advantages the three-wheelers.  In an era of rising prosperity, the appeal of the compromise waned and coupled with some problems in the early productions runs, in 1974, after some 2¼ thousand Bugs had been built, the zany little machine was dropped; not even the oil crisis of the time (which had doomed a good number of bigger, thirstier cars) could save it.  Even in its best years it was never all that successful, essentially because it was really a novelty and there were “real” cars available for less money.  Still, the survivors have a following in their niche at the lower end of the collector market.

The business of spying is said to be the “second oldest profession” and even if not literally true, few doubt the synergistic callings of espionage and war are among man’s earliest and most enduring endeavors.  Although the use of “bug” to mean “equip with a concealed microphone” seems not to have been in use until 1946, bugging devices probably go back thousands of years (in a low-tech sort of way) and those known to have been used in Tudor-era England (1485-1603) are representative of the way available stuff was adapted, the most popular being tubular structures which, if pressed against a thin wall (or preferably a door’s keyhole) enabled one to listen to what was being discussed in a closed room.  Bugging began to assume its modern form when messages began to be transmitted over copper wires which could stretch for thousands of miles and the early term for a “phone bug” was “phone tap”, based upon the idea of “tapping into” the line as one might a water pipe.  Bugs (the name picked-up because many of the early devices were small, black and “bug-like”), whether as concealed microphones or phone taps, swiftly became part of the espionage inventory in diplomacy, commerce and crime and as technology evolved, so did the bugging techniques.

Henry Cabot Lodge Jr (1902–1985), US Ambassador to the UN (United Nations) at a May 1960 session of the Security Council, using the Great Seal bug to illustrate the extent of Soviet bugging.  The context was a tu quoque squabble between the Cold War protagonists, following Soviet revelations about the flight-paths of the American's U2 spy planes.  Lodge would be Richard Nixon’s (1913-1994; US president 1969-1974) running mate in that year's presidential election.     

A classic bug of High Cold War was the Great Seal bug, (known to the security services as the thing), a Soviet designed and built concealed listening device which was so effective because it used passive transmission protocols for its audio signal, thereby rendering it invisible to conventional “bug-detection” techniques.  The bug was concealed inside large, carved wooden rendition of the US Great Seal which, in 1945, the Kremlin presented as a “gift of friendship” to the US Ambassador to the USSR Averell Harriman (1891-1986); in a nice touch, it was a group of Russian school children who handed over the carving.  Sitting in the ambassador’s Moscow office for some seven years, it was a masterpiece of its time because (1) being activated only when exposed to a low-energy radio signal which Soviet spies would transmit from outside, when subjected to a US “bug detection” it would appear to be a piece of wood and (2) as it needed no form of battery or other power supply (and indeed, no maintenance at all), its lifespan was indefinite.  Had it not by chance been discovered by a communications officer at the nearby British embassy who happened to be tuned to the same frequency while the Soviets were sending their signal, it may well have remained in place for decades.  Essentially, the principles of the Great Seal bug were those used in modern radio-frequency identification (RFID) systems.

Saturday, November 18, 2023

Laconic

Laconic (pronounced luh-kon-ik)

(1) Using few words; expressing much in few words.

(2) A reply or phrase of this character.

1580–1590: From the Latin Lacōnicus (Spartan) from the Ancient Greek Λακωνικός (Lakōnikós) (Laconian) from Lakōn (a Laconian).  Laconia was the region inhabited and ruled by the Spartans, noted for their economical use of language.  The alternative spelling laconick is long obsolete.  Because of the long history, there's no exact synonym but words in a similar vein include terse, brusque, pithy, brief, compact, compendious, concise, crisp, curt, sententious, short and sweet, succinct, breviloquent & brevity.  Laconic & laconical are adjectives, laconism is a noun and laconically is an adverb; the noun plural is laconisms.

Taking Hemlock with Socrates, gracefully

In Antiquity, Laconia was the region inhabited and ruled by the Spartans, known for their brevity in speech and in English, the meaning "concise, abrupt" emerged in the 1580s (although laconical was created and went extinct a decade earlier).  The origin of this sense was when Philip II of Macedon (382–336 BC; king (basileus) of Macedonia 359-336) threatened the Spartans with the words: "If I enter Laconia, I will raze Sparta to the ground." to which the Spartans' replied: "If."  Although allied when faced with the threat of Persian invasion, Athens and Sparta had a long tradition of enmity, realized most famously in the Peloponnesian War (431–404 BC).  Their differences were cultural as well as political for while the Spartans were known for their dry, understated wit (which we now call "laconic humor"), the Athenians more readily displayed their "Attic wit" (the Attic peninsula the region encompassing the city of Athens), something refined, poignant and delicate, though often not brief.

Death of Socrates (1787), oil on canvas by Jacques-Louis David (1748–1825), Metropolitan Museum of Art, New York.

In Ancient Greece, it was in Athens that art, education and literature was most valued, virtues never forgotten by modern historians, many of whom contrast the earthier Spartans unfavorably although, at the time, perhaps not all Athenians shared the view.  Socrates (circa 470–399 BC), in Plato's (circa 427-348 BC) dialogue Protagoras, detected some cleverness in the Spartans' economy of language which hid their wisdom, revealing sometimes with a brief remark a sophistication of thought and understanding.  Scholars tend however to take this with a grain of Attic salt, noting Socrates’ fondness for a little gentle irony.

Lindsay Lohan and her lawyer in court, Los Angeles, December 2011.

The Laconia Order

The Laconia-Befehl (Laconia Order) was one of the more controversial documents submitted by the prosecution to the International Military Tribunal (IMT) which in 1945-1946 presided over the trial of the leading Nazis.  The order was issued in 1942 by Grand Admiral Karl Dönitz (1891–1980; head of the German Navy 1943-1945, German head of state 1945) which he was commanding officer of the Kriegsmarine's (the German Navy) Befehlshaber der Unterseeboote (BdU) (U-boat or submarine) fleet and was pursuant to what became known as the Laconia Incident.  RMS Laconia was a Cunard ocean liner which the British Admiralty had converted to an armed merchant cruiser, making her a legitimate military target.  On 12 September 1942, she was sunk in a U-Boat attack and in the aftermath, while several U-Boats were rescuing survivors with the intention of transferring them to other vessels, they were attacked by US bombers, despite having informed Allied forces by radio that both the Allied soldiers and women and children had been rescued and were sheltering on the decks of the submarines.

In response, the Germans abandoned the rescue operation and cast the survivors adrift.  The new policy was formalized on 17 September when the Laconia Order was signalled to the fleet, dictating, inter alia, henceforth no rescue attempts of survivors were to be attempted unless it was to secure prisoners of military value (captains or ships' engineers) and then only if there was no risk to the U-Boat.  The British prosecution team introduced the order as evidence of a war crime ordered by Dönitz which effectively amounted to ordering the murder of shipwrecked survivors and treated it as the beginning of "unrestricted submarine warfare".  However, the British seem genuinely to have been unaware of the circumstances which led to the issuing of the order and the Americans certainly didn't wish to discuss the conduct of their air-crews, some of whom had been awarded medals for the attack, even though their claim to have sunk the U-Boat were erroneous (though understandable, a crash dive and a sinking visually similar when viewed from the air.  The IMT noted the ambiguity in the order but in the circumstances granted Dönitz the benefit of the doubt and they were further swayed by the affidavit of Fleet Admiral Chester Nimitz (1885–1966) who commanded US forces in the Pacific.  Nimitz's submission, supported by others was that the US had conducted unrestricted submarine warfare from the point of the nation's entry into the conflict in December 1941 and that such a policy was wholly lawful under the rules of war at sea.

Defendants in the dock at Nuremberg, Dönitz (in sun glasses), sitting in the back row.

Thus the partial success of Dönitz's sophisticated variation of a tu quoque defense, an attempt by an accused to deny the legitimacy of a charge by alleging those mounting the prosecution committed exactly the same offence and thus stand equally guilty.  The IMT had explicitly banned the use of tu quoque but allowed the argument in this one case because it hung on the notion that unrestricted submarine warfare was, as practiced by both sides, entirely lawful and within the rules of war at sea.  A great many British & US sea captains and admirals agreed (“admirals are a trade union” Anthony Eden (1897-1977; UK prime-minister 1955-1957) would later remark in another context).  The judges must have been impressed but the eventual judgement was certainly murky.  Although convicted on counts two (crimes against peace) and three (war crimes), he received only a ten-year sentence, the shortest term of the seven imposed on those not hanged or acquitted.  Perhaps tellingly, one has to read the summary of the verdicts to work out against which of the indictment's four counts he had been convicted; it really isn't possible to work it out from the judgment and it wasn't until later it emerged it had been written by one of the judges who had voted for his acquittal.

Wednesday, June 28, 2023

Corrupt

Corrupt (pronounced kuh-ruhpt)

(1) Guilty of dishonest practices, as bribery; lacking integrity; crooked; willing to act dishonestly for personal gain; willing to make or take bribes; morally degenerate.

(2) Debased in character; depraved; perverted; wicked; evil.

(3) Of a text, made inferior by errors or alterations.

(4) Something infected or tainted; decayed; putrid; contaminated.

(5) In digital storage (1) stored data that contains errors related to the format or file integrity; a storage device with such errors.

(6) To destroy the integrity of; cause to be dishonest, disloyal, etc, especially by coercion, bribery or other forms of inducement.

(7) Morally to lower in standard; to debase or pervert.

(8) To alter a language, text, etc for the worse (depending on context either by the tone of the content or to render it non-original); to debase.

To mar or spoil something; to infect, contaminate or taint.

To make putrid or putrescent (technically an archaic use but there’s much overlap of meaning in the way terms are used).

(11) In digital storage, introduce errors in stored data when saving, transmitting, or retrieving (technically possible also in dynamic data such as memory).

(12) In English Law, to subject (an attainted person) to corruption of blood (historic use only).

(13) In law (in some jurisdictions) a finding which courts or tribunals can hand down describing certain conduct.

1300–1350: From the Middle English verb corrupten (debased in character), from the Middle French corrupt, from the Old French corropt (unhealthy, corrupt; uncouth (of language)) from the Latin corruptus (rotten, spoiled, decayed, corrupted (and the past participle of corrumpō & corrumpere (to destroy, ruin, injure, spoil (figuratively “corrupt, seduce, bribe” (and literally “break to pieces”)), the construct being cor- (assimilated here as an intensive prefix) + rup- (a variant stem of rumpere (to break into pieces), from a nasalized form of the primitive Indo-European runp- (to break), source also of the Sanskrit rupya- (to suffer from a stomach-ache) and the Old English reofan (to break, tear)) + -tus (the past participle suffix).  The alternative spellings corrumpt, corrump & corroupt are effectively all extinct although dictionaries sometimes list them variously as obsolete, archaic or rare.  Corrupt and corrupted are verbs & adjectives (both used informally by IT nerds as a noun, sometimes with a choice adjective), corruptedness, corruption, corruptible, corruptness, corrupter & corruptor are nouns, corruptest is a verb & adjective, corruptive is an adjective, corrupting is a verb and corruptedly, corruptively & corruptly are adverbs; the most common noun plural is corruptions.  Forms (hyphenated and not) such as incorruptible, non-corrupt, over-corrupt, non-corrupt, pre-corrupt & un-corrupt etc are created as needed.

The verb corrupt in the mid-fourteenth century existed in the sense of “deprave morally, pervert from good to bad which later in the 1300s extended to “contaminate, impair the purity of; seduce or violate (a woman); debase or render impure (a language) by alterations or innovations; influence by a bribe or other wrong motive", reflecting generally the senses of the Latin corruptus.  The meanings “decomposing, putrid, spoiled”, “changed for the worse, debased by admixture or alteration (of texts, language etc) and “guilty of dishonesty involving bribery" all emerged in the late fourteenth century.  The noun corruption was from the mid-fourteenth century corrupcioun which was used of material things, especially dead bodies (human & animal) to convey “act of becoming putrid, dissolution; decay”.  It was applied also to matter of the soul and morality, it being an era when the Church was much concerned with “spiritual contamination, depravity & wickedness”.  The form was from the Latin corruptionem (nominative corruptio) (a corruption, spoiling, seducing; a corrupt condition), the noun of action from the past-participle stem of corrumpere (to destroy; spoil (and figuratively “corrupt, seduce, bribe”.  The use as a synonym for “putrid matter” dates from the late 1300s while as applied to those holding public office being tainted by “bribery or other depraving influence” it was first noted in the early 1400.  The specific technical definition of “a corrupt form of a word” came into use in the 1690s.  The adjective corruptible (subject to decay or putrefaction, perishable) was from either the Old French corroptible or directly from Late Latin corruptibilis (liable to decay, corruptible), from the past-participle stem of corrumpere (to destroy; spoil (and figuratively “corrupt, seduce, bribe”.  In fourteenth century English, it applied first to objects and by the mid fifteenth to those “susceptible of being changed for the worse, tending to moral corruption.  The more blatant sense of “open to bribery” appears in the 1670s.

Boris Johnson, hair by Ms Kelly Jo Dodge MBE.

Corruption is probably a permanent part of politics although it does ebb and flow and exists in different forms in different places.  In the UK, the honors system with its intricate hierarchy and consequent determination on one’s place in the pecking order on the Order of Precedence has real world consequences such as determining whether one sits at dinners with the eldest son of a duke or finds one’s self relegated to a table with the surviving wife of a deceased baronet.  Under some prime-ministers the system was famously corrupt and while things improved in the nineteenth century, under David Lloyd George (1863–1945; UK prime-minister 1916-1922) honors were effectively for sale in a truly scandalous way.  None of his successors were anywhere near as bad although Harold Wilson’s (1916–1995; UK prime minister 1964-1970 & 1974-1976) resignation honors list attracted much comment and did his reputation no good but in recent years it’s been relatively quiet on the honors front.  That was until the resignation list of Boris Johnson (b 1964; UK prime-minister 2019-2022) was published.  It included some names which were unknown to all but a handful of political insiders and many others which were controversial for their own reasons but at the bottom of the list was one entry which all agreed was well deserved: Ms Kelly Jo Dodge, for 27 years the parliamentary hairdresser, was created a Member of the Most Excellent Order of the British Empire (MBE) for parliamentary service.  In those decades, she can have faced few challenges more onerous than Boris Johnson’s hair yet never once failed to make it an extraordinary example in the (actually technically difficult) “not one hair in place” style.

A corrupted fattie

Corrupt, a drug addict and a failure: The Führer and the Reichsmarschall at Carinhall, discussing beasts of the field.  Hitler once told a visitor; “You should visit the Reichsmarschall at Carinhall, a sight worth seeing.”

Hermann Göring (1893–1946; leading Nazi 1922-1945 and Reichsmarschall 1940-1945) was under few illusions about the sentence he would receive from the International Military Tribunal (IMT) at the first Nuremberg Trial (1945-1946) and resented only the method of execution prescribed was to be "hanged by the neck until dead".  Göring thought that fit only for common criminals and as Germany's highest ranked soldier, he deserved the honor of a firing squad; the death of a gentleman.  In the end, he found his own way to elude the noose but history has anyway judged him harshly as richly deserving the gallows.  He heard many bad things said of him at the trial, most of it true and much of it said by his fellow defendants but the statement which most disappointed him was that Adolf Hitler (1889-1945; Führer (leader) and German head of government 1933-1945 & head of state 1934-1945) had condemned him as “corrupt, a drug addict and a failure”.  Once that was publicized, he knew there would be no romantic legend to grow after his execution and his hope that in fifty years there would be statutes of him all over Germany was futile.  In fairness, even in that he’d been a realist, telling the prison psychologist the statutes might be “…small ones maybe, but one in every home”.  Hitler had of course been right; Göring was corrupt, a drug addict and a failure but that could have been said of many of his paladins and countless others in the lower layers of what was essentially a corrupted, gangster-run state.

Corruption is of course though something bad and corrosive to the state but other people's corruption in other states can be helpful.  In 1940, after the fall of France, the British were genuinely alarmed Spain might enter the war on the side of the Axis, tempted by the return of the Rock of Gibraltar and the acquisition of colonial territory in North Africa.  London was right to be concerned because the loss of Gibraltar would have threatened not only the Royal Navy's ability to operate in the Mediterranean but also the very presence of the British in North African and even the supply of oil from the Middle East, vital to the conduct of the war.  Indeed, the "Mediterranean strategy" was supported strongly by German naval strategists and had it successfully been executed, it would have become much more difficult for the British to continue the war.  Contrary to the assertions of some, Adolf Hitler (1889-1945; Führer (leader) and German head of government 1933-1945 & head of state 1934-1945) did understand the enormous strategic advantage which would be achieved by the taking of Gibraltar which would have been a relatively simple undertaking but to do so was possible only with Spanish cooperation, the Germans lacking the naval forces to effect a seaborne invasion.  Hitler did in 1940 meet with the Spanish leader Generalissimo Francisco Franco (1892-1975; Caudillo of Spain 1939-1975) in an attempt to entice his entry into the conflict and even after the Battle of Britain, Hitler would still have preferred peace with the British rather than their defeat, the ongoing existence of the British Empire better suited to his post-war (ie after victory over the USSR) visions. 

The Führer and the Caudillo at the French railway station in Hendaye, near the Spanish–French border, 23 October 1940.

Franco however was a professional soldier and knew Britain remained an undefeated, dangerous foe and one able to draw on the resources both of her empire and (increasingly) assistance from the US and regarded a victory by the Axis as by no means guaranteed.  Additionally, after a bloody civil war which had waged for four years, the Spanish economy was in no state to wage war and better than most, Franco knew his military was antiquated and unable to sustain operations against a well equipped enemy for even days.  Like many with combat experience, the generalissimo also thought war a ghastly, hateful business best avoided and Hitler left the long meeting after being unable to meet the extraordinary list of conditions demanded to secure Spanish support, declaring he'd "sooner have three teeth pulled than go through that again".  Franco was a practical man who had kept his options open and probably, like the Duce (Benito Mussolini (1883-1945; Duce (leader) & prime-minister of Italy 1922-1943)) would have committed Spain to the cause had a German victory seemed assured.  British spies in Madrid and Lisbon soon understood that and to be sure, the diplomatic arsenal of the UK's ambassador to Madrid, Sir Samuel Hoare (1880-1959), was strengthened with money, the exchequer's investment applied to bribing Spanish generals, admirals and other notables to ensure the forces of peace prevailed.  Surprising neither his friends or enemies, "slippery Sam" proved adept at the dark arts of disinformation, bribery and back-channel deals required to corrupt and although his engaging (if unreliable) memoirs were vague about the details, documents provided by his staff suggest he made payments in the millions at a time a million sterling was a lot of money.  By 1944, the state of the war made it obvious any threat of Spanish belligerency was gone and he returned to London.

The dreaded corrupted FAT

Dating from the mid-1970s, the file allocation table (FAT) is a data structure used by a number of file systems to index and manage the files on storage devices.  First associated with 8 inch (200 mm) floppy diskettes, it became familiar to users when introduced by Microsoft in the early days of PC (personal computer) operating systems (OS) and was used on the precursors to the PC-DOS & MS-DOS OSs which dominated the market during the 1980s.  Over the years there have been a number of implementations, the best known of which are FAT12, FAT16 & FAT32, the evolution essentially to handle the increasing storage capacity of media and the need to interact with enhancements to OSs to accommodate increasing complexities such as longer file names, additional file attributes and special files like sub-directories (now familiar as folders which technically are files which can store other files).

A FAT is almost always stored on the host device itself and is an index in the form of a database which consists of a table with records of information about each file and directory in the file system.  What a FAT does is provide a mapping between the logical file system and the physical location of data on the storage medium so it can be thought of as an address book.  Technically, the FAT keeps track of which clusters (the mechanism by which the data is stored) on the device are linked to each file and directory and this includes unused clusters so a user can determine what free space remains available.  Ultimately, it’s the FAT which maintains a record of the links between the clusters which form a file's data chain and the metadata associated with each file, such as its attributes, creation & modification timestamps, file size etc.  In the same way that when reading a database a user is actually interacting primarily with the index, it’s the FAT which locates the clusters associated with a request to load (or view, delete etc) a file and determine their sequence, enabling efficient read and write operations.  The size, structure and complexity of FATs grew as the capacity of floppy diskettes and then hard disks expanded but the limitations of the approach were well-understood and modern operating systems have increasingly adopted more advanced file systems like NTFS (New Technology File System) or exFAT (Extended File Allocation Table) although FAT remains widely used especially on lower capacity and removable devices (USB drives, memory cards et al), the main attraction being the wide cross-platform compatibility.

A corrupted image (JPEG) of Lindsay Lohan.  Files can be corrupted yet appear as correct entries in the FAT and conversely, a corrupted fat will usually contain may uncorrupted files; the files are content and the FAT an index.

The ominous sounding corrupted FAT is a generalized term which references errors in a FAT’s data structure.  There are DBAs (database administrators) who insist all databases are in a constant state of corruption to some degree and when a FAT becomes corrupted, it means that the data has become inconsistent or damaged and this can be induced by system crashes, improper shutdowns, power failures, malware or physical damage to the media.  The consequences can be minor and quickly rectified with no loss of data or varying degrees of the catastrophic (a highly nuanced word among IT nerds) which may result in the loss of one or more files or folders or be indicative of the unrecoverable failure of the storage media.  Modern OSs include tools which can be used to attempt to fix corrupted FATs and when these prove ineffective, there are more intricate third-party products which can operate at a lower level but where the reported corruption is a symptom of hardware failure, such errors often prove terminal, thus the importance of data (and system) backups.

The grey area between corruption and "just politics"

As an adjective, corrupt is used somewhat casually to refer to individuals or institutions thought to have engaged in practices leading to personal gain of some sort (not necessarily financial) which are either morally dubious or actually unlawful and a corrupt politician is the usual example, a corrupted politician presumably one who was once honest but tempted.  The synonyms of corrupt are notoriously difficult to isolate within set parameters, perhaps because politicians have been so involved in framing the definitions in a way which seems rarely to encompass anything they do, however corrupt it may to many appear.  The word dishonest for example obviously includes those who steal stuff but is also used of those who merely lie and there are circumstances in which both might be unlawful but wouldn’t generally to thought corrupt conduct except by the most morally fastidious.  The way politicians have structured the boundaries of acceptable conduct is that it’s possible to be venal in the sense of selling patronage as long as the consideration doesn’t literally end up as the equivalent of cash in the pocket although such benefits can be gained as long as there’s some degree of abstraction between the steps.

Once were happy: Gladys Berejiklian and Daryl Maguire, smiling.

In Australia, news the New South Wales (NSW) Independent Commission against Corruption (ICAC) had handed down a finding that former premier Gladys Berejiklian (b 1970; NSW Premier (Liberal) 2017-2021) had acted corruptly was of course interesting but mystifying to many was that despite that, the commission made no recommendation that criminal charges be considered.  It transpired that was because the evidence Ms Berejiklian was required to provide to the ICAC wouldn’t be admissible in a court because there, the rules of evidence are different and a defendant can’t be compelled to provide an answer which might be self-incriminating.  In other words a politician can be forced to tell the truth when before the ICAC but not before a court when charged.  That’s an aspect of the common law’s adversarial system which has been much criticized but it’s one of the doctrines which underpins Western law where there is a presumption of innocence and the onus of proof of guilt beyond reasonable doubt lies with the proposition.  Still, what unfolded before the ICAC revealed that Ms Berejiklian seems at the least to have engaged in acts of Billigung (looking the other way to establish a defense of “plausible deniability”).  How corrupt that will be regarded by people will depend on this and that and the reaction of many politicians was to focus on the ICAC’s statement that criminal charges would not be pursed because of a lack of admissible evidence as proof that if there’s no conviction, then there’s no corruption.  Politicians have little interest in the bar being raised.  They were less forgiving of her former boyfriend (with whom she may or not have been in a "relationship" and if one did exist it may or may not have been "serious"), former fellow parliamentarian Daryl Maguire (b 1959, MLA (Liberal) for Wagga Wagga 1999-2018).  Despite legal proceedings against Mr Maguire being afoot, none of his former colleagues seemed reluctant to suggest he was anything but guilty as sin so for those who note such things the comparative is “more corrupt” and the superlative “most corrupt”, both preferable to the clumsy alternatives “corrupter” & “corruptest”.

The release of the ICAC’s findings came a couple of days before the newly created federal equivalent (the National Anti-Corruption Commission (NACC)) commenced operation.  Although the need for such a body had be discussed for decades, it was during the time the government was headed by Scott Morrison (b 1968; Australian prime-minister 2018-2022) that even many doubters were persuaded one would be a good idea.  Mr Morrison’s background was in marketing, three word slogans and other vulgarities so it surprised few a vulgarian government emerged but what was so shocking was that the pork-barreling and partisan allocation of resources became so blatant with only the most perfunctory attempts to hide the trail.  Such conduct was of course not new but it’s doubtful if before it had been attempted at such scale and within Mr Morrison’s world-view the internal logic was perfect.  His intellectual horizons defined by fundamentalist Christianity and mercantilism, his view appeared to be that only those who voted (or might be induced to vote) for the Liberal & National Parties were those who deserved to be part of the customer loyalty scheme that was government spending.  This tied in nicely with the idea those who accept Jesus Christ as the savior getting to go to Heaven, all others condemned to an eternity in Hell.  Not all simplicities are elegant.

As things stand, such an attitude to public finance (ie treating as much spending as possible as party re-election funds) is not unlawful and to most politicians (at least any with some reasonable prospect of sitting on the treasury benches) should not be thought “corrupt”; it’s just “politics” and in NSW, in 1992 it was confirmed that what is “just politics has quite a vista.  Then the ICAC handed down findings against then premier Nick Greiner (b 1947; NSW (Liberal) premier 1988-1992) over the matter of him using the offer of a taxpayer funded position to an independent member of parliament as an inducement to resign, the advantage being the seat might be won by the Liberal party in the consequent by-election.  As the ICAC noted, Mr Greiner had not acted unlawfully nor considered himself to be acting corruptly but that had been the result.  Indeed, none doubted it would never have occurred to Mr Greiner that doing something that was “just politics” and had been thus for centuries could be considered corrupt although remarkably, he did subsequently concede he was “technically corrupt” (not an admission which seems to have appealed to Ms Berejiklian).  The ICAC’s finding against Mr Greiner was subsequently overturned by the NSW Court of Appeal.

So the essence of the problem is just what corruption is.  What the public see as corrupt, politicians regard as “just politics” which, in a practical sense, can be reduced to “what you can get away with” and was rationalized by Ms Berejiklian in an answer to a question by the ICAC about pork-barrelling: "Everybody does it".  Of course that's correct and the differences between politicians are of extent and the ability to conceal but her tu quoque (translated literally as "thou also" and latterly as "you also"; translation in the vernacular is something like "you did it too") defense could be cited by all.  The mechanism of a NACC has potential and already both sides of politics are indicating they intend to use it against their political enemies so it should be amusing for those who enjoy politics as theatre although, unfortunately, the politicians who framed the legislation made sure public hearings would be rare.  One might suspect they want it to be successful but not too successful.  Still, the revelations of the last ten years have provided some scope for the NACC to try to make the accepted understanding of corruption something more aligned with the public’s perception.  Anomalies like a minister’s “partner” being a “partner” for purposes of qualifying for free overseas travel (business class air travel, luxury hotels, lavish dinners etc) yet not be defined a “partner” for purposes of disclosing things which might give rise to a possible conflict of interest for the minister is an example of the sort of thing where standardization might improve confidence.  It probably should be conceded that corruption can’t be codified in the way the speed limits for a nation’s highways can but it’s one of those things that one knows when one sees it and if the NACC can nudge the politicians’ behavior a bit in the direction of public expectation, it’ll be a worthy institution.  On a happier note, Mr Greiner went on to enjoy a lucrative corporate career and Ms Berejiklian (currently with telco Optus) is predicted to follow in his tracks although suggestions posted on social media she'd been offered a partnership at PwC (PricewaterhouseCoopers International Limited) on the basis of her experience making her a "perfect fit for the company" are thought mischievous rather than malicious.