Download Probability and Computing Randomization and Probabilistic Techniques in Algorithms and Data Analysis 2 Edition Edition Michael Mitzenmacher ebook All Chapters PDF
Download Probability and Computing Randomization and Probabilistic Techniques in Algorithms and Data Analysis 2 Edition Edition Michael Mitzenmacher ebook All Chapters PDF
com
https://textbookfull.com/product/probability-and-computing-
randomization-and-probabilistic-techniques-in-algorithms-
and-data-analysis-2-edition-edition-michael-mitzenmacher/
OR CLICK BUTTON
DOWNLOAD NOW
https://textbookfull.com/product/probabilistic-data-structures-and-
algorithms-for-big-data-applications-gakhov/
textboxfull.com
https://textbookfull.com/product/algorithms-design-techniques-and-
analysis-m-h-alsuwaiyel/
textboxfull.com
https://textbookfull.com/product/an-introduction-to-categorical-data-
analysis-3rd-edition-wiley-series-in-probability-and-statistics-
agresti/
textboxfull.com
Scientific Computing and Algorithms in Industrial
Simulations Projects and Products of Fraunhofer SCAI 1st
Edition Michael Griebel
https://textbookfull.com/product/scientific-computing-and-algorithms-
in-industrial-simulations-projects-and-products-of-fraunhofer-
scai-1st-edition-michael-griebel/
textboxfull.com
https://textbookfull.com/product/data-analysis-in-the-cloud-models-
techniques-and-applications-1st-edition-marozzo/
textboxfull.com
https://textbookfull.com/product/analysis-for-computer-scientists-
foundations-methods-and-algorithms-michael-oberguggenberger/
textboxfull.com
https://textbookfull.com/product/inequalities-in-analysis-and-
probability-2nd-edition-odile-pons/
textboxfull.com
https://textbookfull.com/product/topological-methods-in-data-analysis-
and-visualization-iv-theory-algorithms-and-applications-1st-edition-
hamish-carr/
textboxfull.com
Probability and Computing
Second Edition
www.cambridge.org
Information on this title: www.cambridge.org/9781107154889
10.1017/9781316651124
© Michael Mitzenmacher and Eli Upfal 2017
This publication is in copyright. Subject to statutory exception
and to the provisions of relevant collective licensing agreements,
no reproduction of any part may take place without the written
permission of Cambridge University Press.
First published 2017
Printed in the United States of America by Sheridan Books, Inc.
A catalogue record for this publication is available from the British Library.
Library of Congress Cataloging in Publication Data
Names: Mitzenmacher, Michael, 1969– author. | Upfal, Eli, 1954– author.
Title: Probability and computing / Michael Mitzenmacher Eli Upfal.
Description: Second edition. | Cambridge, United Kingdom ;
New York, NY, USA : Cambridge University Press, [2017] |
Includes bibliographical references and index.
Identifiers: LCCN 2016041654 | ISBN 9781107154889
Subjects: LCSH: Algorithms. | Probabilities. | Stochastic analysis.
Classification: LCC QA274.M574 2017 | DDC 518/.1 – dc23
LC record available at https://lccn.loc.gov/2016041654
ISBN 978-1-107-15488-9 Hardback
Additional resources for this publication at www.cambridge.org/Mitzenmacher.
Cambridge University Press has no responsibility for the persistence or accuracy
of URLs for external or third-party Internet Web sites referred to in this publication
and does not guarantee that any content on such Web sites is, or will remain,
accurate or appropriate.
To
vii
contents
viii
contents
x
contents
13 Martingales 341
13.1 Martingales 341
13.2 Stopping Times 343
13.2.1 Example: A Ballot Theorem 345
13.3 Wald’s Equation 346
13.4 Tail Inequalities for Martingales 349
13.5 Applications of the Azuma–Hoeffding Inequality 351
13.5.1 General Formalization 351
13.5.2 Application: Pattern Matching 353
13.5.3 Application: Balls and Bins 354
13.5.4 Application: Chromatic Number 355
13.6 Exercises 355
xi
contents
xii
contents
xiii
Preface to the Second Edition
In the ten years since the publication of the first edition of this book, probabilistic
methods have become even more central to computer science, rising with the growing
importance of massive data analysis, machine learning, and data mining. Many of the
successful applications of these areas rely on algorithms and heuristics that build on
sophisticated probabilistic and statistical insights. Judicious use of these tools requires
a thorough understanding of the underlying mathematical concepts. Most of the new
material in this second edition focuses on these concepts.
The ability in recent years to create, collect, and store massive data sets, such as
the World Wide Web, social networks, and genome data, lead to new challenges in
modeling and analyzing such structures. A good foundation for models and analysis
comes from understanding some standard distributions. Our new chapter on the nor-
mal distribution (also known as the Gaussian distribution) covers the most common
statistical distribution, as usual with an emphasis on how it is used in settings in com-
puter science, such as for tail bounds. However, an interesting phenomenon is that in
many modern data sets, including social networks and the World Wide Web, we do not
see normal distributions, but instead we see distributions with very different proper-
ties, most notably unusually heavy tails. For example, some pages in the World Wide
Web have an unusually large number of pages that link to them, orders of magnitude
larger than the average. The new chapter on power laws and related distributions covers
specific distributions that are important for modeling and understanding these kinds of
modern data sets.
Machine learning is one of the great successes of computer science in recent years,
providing efficient tools for modeling, understanding, and making predictions based on
large data sets. A question that is often overlooked in practical applications of machine
learning is the accuracy of the predictions, and in particular the relation between accu-
racy and the sample size. A rigorous introduction to approaches to these important
questions is presented in a new chapter on sample complexity, VC dimension, and
Rademacher averages.
xv
preface to the second edition
We have also used the new edition to enhance some of our previous material. For
example, we present some of the recent advances on algorithmic variations of the pow-
erful Lovász local lemma, and we have a new section covering the wonderfully named
and increasingly useful hashing approach known as cuckoo hashing. Finally, in addi-
tion to all of this new material, the new edition includes updates and corrections, and
many new exercises.
We thank the many readers who sent us corrections over the years – unfortunately,
too many to list here!
xvi
Preface to the First Edition
Why Randomness?
Why should computer scientists study and use randomness? Computers appear to
behave far too unpredictably as it is! Adding randomness would seemingly be a dis-
advantage, adding further complications to the already challenging task of efficiently
utilizing computers.
Science has learned in the last century to accept randomness as an essential com-
ponent in modeling and analyzing nature. In physics, for example, Newton’s laws led
people to believe that the universe was a deterministic place; given a big enough calcu-
lator and the appropriate initial conditions, one could determine the location of planets
years from now. The development of quantum theory suggests a rather different view;
the universe still behaves according to laws, but the backbone of these laws is proba-
bilistic. “God does not play dice with the universe” was Einstein’s anecdotal objection
to modern quantum mechanics. Nevertheless, the prevailing theory today for subparti-
cle physics is based on random behavior and statistical laws, and randomness plays a
significant role in almost every other field of science ranging from genetics and evolu-
tion in biology to modeling price fluctuations in a free-market economy.
Computer science is no exception. From the highly theoretical notion of probabilis-
tic theorem proving to the very practical design of PC Ethernet cards, randomness
and probabilistic methods play a key role in modern computer science. The last two
decades have witnessed a tremendous growth in the use of probability theory in comput-
ing. Increasingly more advanced and sophisticated probabilistic techniques have been
developed for use within broader and more challenging computer science applications.
In this book, we study the fundamental ways in which randomness comes to bear on
computer science: randomized algorithms and the probabilistic analysis of algorithms.
Randomized algorithms: Randomized algorithms are algorithms that make random
choices during their execution. In practice, a randomized program would use values
generated by a random number generator to decide the next step at several branches
of its execution. For example, the protocol implemented in an Ethernet card uses ran-
dom numbers to decide when it next tries to access the shared Ethernet communication
xvii
preface to the first edition
medium. The randomness is useful for breaking symmetry, preventing different cards
from repeatedly accessing the medium at the same time. Other commonly used applica-
tions of randomized algorithms include Monte Carlo simulations and primality testing
in cryptography. In these and many other important applications, randomized algo-
rithms are significantly more efficient than the best known deterministic solutions.
Furthermore, in most cases the randomized algorithms are also simpler and easier to
program.
These gains come at a price; the answer may have some probability of being incor-
rect, or the efficiency is guaranteed only with some probability. Although it may seem
unusual to design an algorithm that may be incorrect, if the probability of error is suf-
ficiently small then the improvement in speed or memory requirements may well be
worthwhile.
Probabilistic analysis of algorithms: Complexity theory tries to classify computa-
tion problems according to their computational complexity, in particular distinguishing
between easy and hard problems. For example, complexity theory shows that the Trav-
eling Salesman problem is NP-hard. It is therefore very unlikely that we will ever know
an algorithm that can solve any instance of the Traveling Salesman problem in time that
is subexponential in the number of cities. An embarrassing phenomenon for the clas-
sical worst-case complexity theory is that the problems it classifies as hard to compute
are often easy to solve in practice. Probabilistic analysis gives a theoretical explanation
for this phenomenon. Although these problems may be hard to solve on some set of
pathological inputs, on most inputs (in particular, those that occur in real-life applica-
tions) the problem is actually easy to solve. More precisely, if we think of the input as
being randomly selected according to some probability distribution on the collection of
all possible inputs, we are very likely to obtain a problem instance that is easy to solve,
and instances that are hard to solve appear with relatively small probability. Probabilis-
tic analysis of algorithms is the method of studying how algorithms perform when the
input is taken from a well-defined probabilistic space. As we will see, even NP-hard
problems might have algorithms that are extremely efficient on almost all inputs.
The Book
with continuous probability and the Poisson process (Chapter 8). The material from
Chapter 4 on Chernoff bounds, however, is needed for most of the remaining material.
Most of the exercises in the book are theoretical, but we have included some pro-
gramming exercises – including two more extensive exploratory assignments that
require some programming. We have found that occasional programming exercises are
often helpful in reinforcing the book’s ideas and in adding some variety to the course.
We have decided to restrict the material in this book to methods and techniques based
on rigorous mathematical analysis; with few exceptions, all claims in this book are fol-
lowed by full proofs. Obviously, many extremely useful probabilistic methods do not
fall within this strict category. For example, in the important area of Monte Carlo meth-
ods, most practical solutions are heuristics that have been demonstrated to be effective
and efficient by experimental evaluation rather than by rigorous mathematical analy-
sis. We have taken the view that, in order to best apply and understand the strengths
and weaknesses of heuristic methods, a firm grasp of underlying probability theory and
rigorous techniques – as we present in this book – is necessary. We hope that students
will appreciate this point of view by the end of the course.
Acknowledgments
Our first thanks go to the many probabilists and computer scientists who developed
the beautiful material covered in this book. We chose not to overload the textbook
with numerous references to the original papers. Instead, we provide a reference list
that includes a number of excellent books giving background material as well as more
advanced discussion of the topics covered here.
The book owes a great deal to the comments and feedback of students and teaching
assistants who took the courses CS 155 at Brown and CS 223 at Harvard. In particular
we wish to thank Aris Anagnostopoulos, Eden Hochbaum, Rob Hunter, and Adam
Kirsch, all of whom read and commented on early drafts of the book.
Special thanks to Dick Karp, who used a draft of the book in teaching CS 174 at
Berkeley during fall 2003. His early comments and corrections were most valuable in
improving the manuscript. Peter Bartlett taught CS 174 at Berkeley in spring 2004, also
providing many corrections and useful comments.
We thank our colleagues who carefully read parts of the manuscript, pointed out
many errors, and suggested important improvements in content and presentation: Artur
Czumaj, Alan Frieze, Claire Kenyon, Joe Marks, Salil Vadhan, Eric Vigoda, and the
anonymous reviewers who read the manuscript for the publisher.
We also thank Rajeev Motwani and Prabhakar Raghavan for allowing us to use some
of the exercises in their excellent book Randomized Algorithms.
We are grateful to Lauren Cowles of Cambridge University Press for her editorial
help and advice in preparing and organizing the manuscript.
Writing of this book was supported in part by NSF ITR Grant no. CCR-0121154.
xx
chapter one
Events and Probability
This chapter introduces the notion of randomized algorithms and reviews some basic
concepts of probability theory in the context of analyzing the performance of simple
randomized algorithms for verifying algebraic identities and finding a minimum cut-set
in a graph.
Computers can sometimes make mistakes, due for example to incorrect programming
or hardware failure. It would be useful to have simple ways to double-check the results
of computations. For some problems, we can use randomness to efficiently verify the
correctness of an output.
Suppose we have a program that multiplies together monomials. Consider the prob-
lem of verifying the following identity, which might be output by our program:
?
(x + 1)(x − 2)(x + 3)(x − 4)(x + 5)(x − 6) ≡ x6 − 7x3 + 25.
There is an easy way to verify whether the identity is correct: multiply together the
terms on the left-hand side and see if the resulting polynomial matches the right-hand
side. In this example, when we multiply all the constant terms on the left, the result
does not match the constant term on the right, so the identity cannot be valid. More
generally, given two polynomials F (x) and G(x), we can verify the identity
?
F (x) ≡ G(x)
d i
by converting the two polynomials to their canonical forms i=0 ci x ; two polynomi-
als are equivalent if and only if all the coefficients in their canonical forms are equal.
From thisdpoint on let us assume that, as in our example, F (x) is given as a product
F (x) = i=1 (x − ai ) and G(x) is given in its canonical form. Transforming F (x) to
its canonical form by consecutively multiplying the ith monomial with the product of
1
events and probability
We turn now to a formal mathematical setting for analyzing the randomized algorithm.
Any probabilistic statement must refer to the underlying probability space.
Definition 1.1: A probability space has three components:
1. a sample space , which is the set of all possible outcomes of the random process
modeled by the probability space;
2. a family of sets F representing the allowable events, where each set in F is a subset1
of the sample space ; and
3. a probability function Pr : F → R satisfying Definition 1.2.
An element of is called a simple or elementary event.
In the randomized algorithm for verifying polynomial identities, the sample space
is the set of integers {1, . . . , 100d}. Each choice of an integer r in this range is a simple
event.
Definition 1.2: A probability function is any function Pr : F → R that satisfies the
following conditions:
1. for any event E, 0 ≤ Pr(E ) ≤ 1;
2. Pr() = 1; and
3. for any finite or countably infinite sequence of pairwise mutually disjoint events
E1 , E2 , E3 , . . . ,
Pr Ei = Pr(Ei ).
i≥1 i≥1
In most of this book we will use discrete probability spaces. In a discrete probability
space the sample space is finite or countably infinite, and the family F of allow-
able events consists of all subsets of . In a discrete probability space, the probability
function is uniquely defined by the probabilities of the simple events.
Again, in the randomized algorithm for verifying polynomial identities, each choice
of an integer r is a simple event. Since the algorithm chooses the integer uniformly at
random, all simple events have equal probability. The sample space has 100d simple
events, and the sum of the probabilities of all simple events must be 1. Therefore each
simple event has probability 1/100d.
Because events are sets, we use standard set theory notation to express combinations
of events. We write E1 ∩ E2 for the occurrence of both E1 and E2 and write E1 ∪ E2 for
the occurrence of either E1 or E2 (or both). For example, suppose we roll two dice. If
E1 is the event that the first die is a 1 and E2 is the event that the second die is a 1, then
E1 ∩ E2 denotes the event that both dice are 1 while E1 ∪ E2 denotes the event that at
least one of the two dice lands on 1. Similarly, we write E1 − E2 for the occurrence
1 In a discrete probability space F = 2 . Otherwise, and introductory readers may skip this point, since the events
need to be measurable, F must include the empty set and be closed under complement and union and intersection
of countably many sets (a σ -algebra).
3
events and probability
of an event that is in E1 but not in E2 . With the same dice example, E1 − E2 consists
of the event where the first die is a 1 and the second die is not. We use the notation Ē
as shorthand for − E; for example, if E is the event that we obtain an even number
when rolling a die, then Ē is the event that we obtain an odd number.
Definition 1.2 yields the following obvious lemma.
Notice that Lemma 1.2 differs from the third part of Definition 1.2 in that Definition
1.2 is an equality and requires the events to be pairwise mutually disjoint.
Lemma 1.1 can be generalized to the following equality, often referred to as the
inclusion–exclusion principle.
If k = 2, it seems that the probability that the first iteration finds a root is at most 1/100
and the probability that the second iteration finds a root is at most 1/100, so the prob-
ability that both iterations find a root is at most (1/100)2 . Generalizing, for any k, the
probability of choosing roots for k iterations would be at most (1/100)k .
To formalize this, we introduce the notion of independence.
Definition 1.3: Two events E and F are independent if and only if
Pr(E ∩ F ) = Pr(E ) · Pr(F ).
More generally, events E1 , E2 , . . . , Ek are mutually independent if and only if, for any
subset I ⊆ [1, k],
Pr Ei = Pr(Ei ).
i∈I i∈I
If our algorithm samples with replacement then in each iteration the algorithm chooses
a random number uniformly at random from the set {1, . . . , 100d}, and thus the choice
in one iteration is independent of the choices in previous iterations. For the case where
the polynomials are not equivalent, let Ei be the event that, on the ith run of the algo-
rithm, we choose a root ri such that F (ri ) − G(ri ) = 0. The probability that the algo-
rithm returns the wrong answer is given by
Pr(E1 ∩ E2 ∩ · · · ∩ Ek ).
Since Pr(Ei ) is at most d/100d and since the events E1 , E2 , . . . , Ek are independent,
the probability that the algorithm gives the wrong answer after k iterations is
k k k
d 1
Pr(E1 ∩ E2 ∩ · · · ∩ Ek ) = Pr(Ei ) ≤ = .
i=1 i=1
100d 100
The probability of making an error is therefore at most exponentially small in the num-
ber of trials.
Now let us consider the case where sampling is done without replacement. In this
case the probability of choosing a given number is conditioned on the events of the
previous iterations.
Definition 1.4: The conditional probability that event E occurs given that event F
occurs is
Pr(E ∩ F )
Pr(E | F ) = .
Pr(F )
The conditional probability is well-defined only if Pr(F ) > 0.
Intuitively, we are looking for the probability of E ∩ F within the set of events defined
by F. Because F defines our restricted sample space, we normalize the probabilities
by dividing by Pr(F ), so that the sum of the probabilities of all events is 1. When
Pr(F ) > 0, the definition can also be written in the useful form
Pr(E | F ) Pr(F ) = Pr(E ∩ F ).
6
1.2 axioms of probability
Because (d − ( j − 1))/(100d − ( j − 1)) < d/100d when j > 1, our bounds on the
probability of making an error are actually slightly better without replacement. You
may also notice that, if we take d + 1 samples without replacement and the two poly-
nomials are not equivalent, then we are guaranteed to find an r such that F (r) − G(r) =
0. Thus, in d + 1 iterations we are guaranteed to output the correct answer. However,
computing the value of the polynomial at d + 1 points takes (d 2 ) time using the stan-
dard approach, which is no faster than finding the canonical form deterministically.
Since sampling without replacement appears to give better bounds on the probability
of error, why would we ever want to consider sampling with replacement? In some
cases, sampling with replacement is significantly easier to analyze, so it may be worth
7
Discovering Diverse Content Through
Random Scribd Documents
would be going on a century and a half later.
4
THE PIRATES OF NEW ORLEANS
On November 24, 1813, most citizens of New Orleans were
chuckling over a new proclamation, bearing the signature of Gov.
W. C. C. Claiborne, which had been posted on bulletin boards
throughout the city. They were not so much amused because the
Governor had accused a pirate of attacking a U.S. Customs officer
(although this was amusing enough to many), but because Claiborne
actually expected someone to take seriously his offer of a $500
reward for the capture of the pirate Jean Laffite.
Invade the pirate hideout in the swamps and capture Jean Laffite
—or even his brother Pierre—for a mere $500? And Claiborne was
naive if he thought that most of Louisiana’s politicians and merchants
had any desire to halt the smuggling of pirated merchandise while a
war was being fought against Great Britain. Any kind of merchandise
was hard to obtain.
Two days after the posting of the proclamation, a wave of
raucous laughter sounded in the coffee houses, taverns and drawing
rooms of New Orleans. The laughter exploded over a proclamation
posted throughout the city which was a parody of the Claiborne
document. It offered a reward of $1,500 for the arrest of Governor
Claiborne and his delivery to the pirate hideout at Grande Terre in
the bayou country south of New Orleans. The proclamation was
signed by Jean Laffite.
Laffite’s arrogance was no laughing matter to government
officials in Louisiana and Washington. Not only were the pirates
openly defying Federal and state authority, but a legitimate merchant
had little chance to compete against those who purchased their
goods at the pirates’ auctions. The auctions were held regularly on
islands in the swamps near New Orleans. Hundreds of thousands of
dollars’ worth of merchandise—captured on the high seas—could be
bought cheaply and with no payment of Customs duties.
The enemies of the Laffites and their cutthroat crew were in the
minority. Everyone knew—including Claiborne—that a majority of the
people were sympathetic to the Laffites. The general view was that
the pirates actually were performing a patriotic service when they
attacked ships of the enemy countries, England and Spain, and then
made their booty available to Louisiana citizens at ridiculously
reduced prices.
Before Claiborne issued his proclamation, the general attitude of
the citizenry was fairly summed up in a letter received by the
Louisiana Gazette and signed “The Agent of the Freebooters.” There
had been a complaint against piracy and smuggling in the
newspaper, and the freebooter (perhaps it was Jean Laffite) wrote a
reply saying:
Gentlemen:
Your paper of Wednesday contained a letter written by some
idiot ... (who) makes a great outcry against a few honest fellows
of us, who are using extraordinary exertions to punish the
common enemy, the British and their allies, the Spaniards....
Does he wish to discourage our profession and put an end to
trade altogether?...
Cannot the booby perceive that without us there would not
be a bale of goods at market; and does he not see, by the open
manner in which our business is done, that the government of
the United States has no objection either to the fitting out of our
prizes and the sale of their cargoes, without troubling ourselves
about the payment of duties; which I assure you we would find
extremely inconvenient when we sell so low for real cash in
these hard times....
MonSieur:
... I offer to return to this State many citizens who perhaps
have lost to your eyes that sacred title. I offer ... their efforts for
the defense of the country.
This point of Louisiana that occupies great importance in the
present situation, I offer myself to defend it ... I am the lost sheep
who desires to return to the flock ... for you to see through my
faults such as they are....
In case, MonSieur Le Gouverneur, your reply should not be
favorable in my ardent wishes I declare to you that I leave
immediately so not to be held to have cooperated with an
invasion.... This cannot fail to take place, and puts me entirely on
the judgment of my conscience.
I have the honor to be, MonSieur Le Gouverneur,
Laffite.
Jean Laffite had put loyalty to the United States before profit in
this time of peril. But even as Captain Lockyer conferred with Laffite,
Claiborne was going forward with plans for a land-sea operation
against the pirate stronghold.
After receiving Laffite’s letter, Claiborne called his military
advisers into conference. These were Major General Jaques Villere,
Commodore Patterson of the U.S. Navy, and Colonel Ross of the
regular U.S. Army. The questions they discussed were whether the
documents sent by Laffite were genuine and whether the governor
should enter into correspondence with Laffite. Villere thought the
documents genuine and that the Governor should reply immediately
to the Laffite letter. However, Ross and Patterson voted against
Villere. The majority favored an attack on the pirate stronghold.
Peculiarly enough, the morning after this meeting at the
Governor’s mansion, newspapers carried notices that Pierre Laffite
had mysteriously escaped from jail. A notice was posted offering
$1,000 reward for his capture.
Eight days after Laffite wrote to Claiborne, the Ross-Patterson
expedition set out for Barataria. Three barges were loaded with men
and ammunition. It left the levee at New Orleans before dawn and
drifted silently downstream with the current. Near the mouth of the
river, the barges joined forces with Colonel Ross’ fleet of six
gunboats and the schooner Carolina. The pirate hideout on the
islands of Grande Terre and Grande Isle was sighted on the early
morning of September 16.
There were indications at first that the Baratarians were going to
resist. They began placing cannon into position and arming
themselves. But then apparently they saw the American flag on the
approaching ships. They broke ranks and ran. Without firing a shot,
the expeditionary force captured the pirate fleet, guns, and stores of
merchandise valued at more than $500,000.
When news of the attack on Barataria was received in New
Orleans, there was much criticism of the expedition. And there was
even more indignation when it was learned that the expedition was
launched after Laffite had offered his services and those of his
companions to the government in the defense of New Orleans
against the expected attack by the British.
The British bribe offer to Laffite came as General Andrew
Jackson arrived in New Orleans to arrange for the defense of the
city. Claiborne sent copies of Laffite’s documents to Jackson on the
chance that they were genuine and contained military information
which would be important. Jackson made it quite clear he wanted no
traffic with “this hellish banditti” and he rebuked Claiborne for having
permitted Laffite and his men in the past to visit the city.
At last Jean Laffite made a secret trip to see Jackson himself.
There is no record of what went on between the two men and what
was said in that conference. It became known that Laffite offered to
put in Jackson’s hands a supply of 750,000 pistol flints and some of
the most skilled artillerymen in the world, including Laffite’s
lieutenants, Dominique You and Beluche.
Jackson relented and accepted Laffite’s offer of help. The
General made You and Beluche captains and they were given
command of batteries on the right side of the American line.
On January 8, 1815, the decisive battle of New Orleans was
fought. As dawn was breaking, Jackson visited the troops along the
front lines and stopped at a battery where the Baratarians were
making coffee in an old iron pot.
“That smells good,” Jackson said. “It’s better coffee than we get.
Where did it come from? Did you smuggle it in?”
Dominique You grinned. “That may be,” he said, and he ordered
a cup filled for the General. As Jackson sat on his horse sipping the
strong, black coffee, he remarked to an aide, “I wish I had fifty such
guns on this line, with five hundred devils such as those fellows
behind them.”
The British advanced on the American positions to be mowed
down by withering fire. At the height of the battle, Jackson again
visited Dominique You’s battery to see how things were going.
“Ah, we do not make much damage,” You said.
“Why is that?” Jackson demanded.
“The powder!” You replied. “It is not good. The cannon balls, they
fall short.”
Jackson said, “I’ll remedy that!” He ordered an aide to see to it
that the Baratarians received the best ammunition possible. The
General was heard to say later, “Were I ordered to storm the very
gates of hell with Dominique You as my lieutenant, I would have no
misgivings as to the outcome.”
Jean and Pierre Laffite acquitted themselves with honor in the
battle for New Orleans. They and their men were given Presidential
pardons, clearing the slate of past crimes, and for some time after
the city was saved, they were great heroes. They were wined, dined,
and cheered wherever they went.
Perhaps the brothers became bored with respectability. At any
rate they drifted back into piracy. They pulled out of their old haunts
and moved to Galveston to set up operations, and for several years
they carried on business in the slave trade. In 1820, Jean Laffite
boarded his favorite boat, The Pride, and sailed away into legend.
There were stories that he died in Yucatan. Some claimed that he
carried on his piracy in the Mediterranean. Still others said that he
settled in France and lived to be an old man. All recorded history of
Jean Laffite ended when he sailed from Galveston. Pierre Laffite was
said to have lived in Louisiana to an old age and to have died a poor
man.
The quality and the quantity of piracy subsided along with the
fortunes of the brothers Laffite. But not smuggling. Smuggling was to
continue to plague the Customs Service, and some of the smuggling
would make the Laffites look like amateurs.
5
THE DARK YEARS
Slavery was the issue which exploded into the Civil War in 1861, but
twenty-eight years before the first shot was fired on Fort Sumter, the
nation was on the edge of open war over a dispute involving the
Federal government’s right to force the collection of customs duties.
The spirit of revolt flamed high in South Carolina in 1832–1833.
It was fed, too, by sympathy in Virginia and Georgia and other
agricultural states which bitterly opposed the system of protective
tariffs as being oppressive to the farm states.
Did the central government have the Constitutional right to force
the collection of duties in a state which opposed such collections?
No! said the “Nullifiers,” who favored striking down the Federal tariff
laws. They insisted that any state had the right to withdraw from the
Union if it so desired.
The Nullifiers gained control of the government of South Carolina
and a call was issued for a convention to meet and abolish by formal
state action the collection of duties. There also were loud demands
from some state leaders for mobilization of South Carolina troops to
oppose any Federal intervention. Customs officers, more
sympathetic to the state of South Carolina than to the Union, refused
to collect duties. This convention call was the aftermath of a previous
convention at which a grim resolution was adopted saying in part:
“The state looks to her sons to defend her in whatever form she may
proclaim to Resist.”
The tariff collection issue became so divisive that reports
reached President Jackson in August and September, 1832, that the
loyalty of army officers in command of Federal troops at Charleston
was suspect.
It was reported to Jackson that in event of Federal “aggression”
against South Carolina to enforce tariff collection and oppose
secession, these officers were ready to surrender their troops to the
state rather than fight to protect the Charleston forts. These same
reports said overtures had been made “perhaps not without success”
to switch the allegiance of the naval officer in command at
Charleston, in order to prevent a Federal blockade of the port.
Jackson advised his Secretary of State, Edward Livingston, that
“the Union must be preserved, without blood if this be possible, but it
must be preserved at all hazards and at any price.” He changed the
garrison at Charleston and sent Maj. Gen. Winfield Scott to take over
the command. He warned Secretary of War Lewis Cass that a
surprise attack would be made on the Charleston forts by South
Carolina militia and directed that such an attack must be “repelled
with prompt and exemplary punishment.”
While taking these precautions, Jackson argued that if the
doctrine of nullification of customs duties by the states were ever
established, then every Federal law for raising revenue could be
annulled by the states. He denied the right of secession, declaring
that “to say that any state may at pleasure secede from the Union is
to say that the United States is not a nation.”
The controversial tariff laws had been a national issue long
before Jackson entered the White House in 1828. The major issue in
the Presidential campaign of 1823–1824 revolved around tariffs and
the use of Federal funds for such internal improvements as roads,
harbors, and like projects. The leading candidates for the Presidency
that year were John C. Calhoun of South Carolina, Henry Clay of
Kentucky, John Q. Adams of Massachusetts, William H. Crawford of
Georgia, and finally, Andrew Jackson—with Jackson and Adams
emerging as the showdown antagonists.
Adams won the election when Henry Clay threw his support to
the New Englander. Under the leadership of Clay and Daniel
Webster a high-duty system of tariffs was adopted, which was
termed the “Act of Abominations” by its opponents.
When Jackson entered the White House in 1828 the tariff issue
was still the most important and also the most divisive issue of the
day. In January, 1830, Senator Robert Y. Hayne of South Carolina
launched a strong attack in the Senate against the excessively high
tariffs. The young Senator sought a coalition between the West and
the South, the agricultural areas, to oppose the duties favored by the
industrial states.
Hayne’s argument rested on the states’ rights questions which
were to plague the nation for many years to come. Hayne contended
that “no evil was more to be deprecated than the consolidation of this
government.” He argued for the right of any state to set aside
“oppressive” Federal legislation, including tariffs.
Daniel Webster picked up the argument against Hayne. He
contended that “the Constitution is not the creature of the state
government. The very chief end, the main design, for which the
whole constitution was framed and adopted was to establish a
government that should not ... depend on the state opinion and state
discretion.” He said it was folly to support a doctrine of “liberty first
and union afterwards,” and he spoke the famous line: “Liberty and
union, now and forever, one and inseparable.”
By 1832, the South Carolina Nullifiers were openly led by Vice
President Calhoun. The extremists were in control in South Carolina
to push events toward the crisis which forced Jackson to rush back
to Washington from Nashville. The state’s legislature proclaimed that
any effort by Federal authorities to collect the duties after February
1, 1833, would cause South Carolina to secede from the Union.
When news of this proclamation reached Jackson, he ordered
seven revenue cutters and a warship dispatched to Charleston. Maj.
Gen. Winfield Scott set his men to work preparing harbor defenses
against attack from the land. The situation was at the stage where
only recklessness was needed to set off a conflict. At this time
Jackson wrote a friend that “no state or states has the right to
secede ... nullification therefore means insurrection and war; and
other states have a right to put it down....”
Jackson issued a proclamation warning the citizens of South
Carolina not to follow the Nullifiers, whose “object is disunion.” He
warned that “disunion by armed force is treason” and that those who
followed this path must suffer the “dreadful consequences.” The
proclamation spread excitement throughout the country. Many men
volunteered for military duty in case of a conflict. Several state
legislatures met to denounce nullification. But in South Carolina
Robert Y. Hayne—who had resigned from his Senate seat to
become governor of the state—issued his own proclamation in which
he vowed to maintain South Carolina’s sovereignty or else to perish
“beneath its ruins.” Hayne called for the organization of “Mounted
Minute Men,” which, he said, would permit him to place “2,500 of the
elite of the whole state upon a given point in three or four days....”
The only concession held forth by Jackson in this cold war was
his approval of a bill for introduction in the House which would call
for a reduction of tariff rates. His willingness to go along with this
measure did not eliminate the threat of a shooting conflict.
While holding an olive twig of compromise in one hand, Jackson
held a sword in the other. He sent a request to Congress asking
authority to use Federal troops if necessary to collect the customs.
Even as the cheers and curses sounded over this move, Jackson
sent a letter to Gerald R. Poinsett, a Unionist leader in South
Carolina, outlining his plans to use strong measures to enforce
Federal authority. No doubt he intended his letter to reach the hands
of the Nullificationists. He said should Congress fail to act on his
request for authority to use military force, and should South Carolina
oppose with armed force the collection of the customs duties, then “I
stand prepared to issue my proclamation warning them to disperse.
Should they fail to comply I will ... in ten or fifteen days at fartherest
have in Charleston ten to fifteen thousand well organized troops well
equipped for the field, and twenty or thirty thousand more in their
interior. I have a tender of volunteers from every state in the Union. I
can if need be, which God forbid, march 200,000 men in forty days
to quell any and every insurrection that might arise....”
Not only would he take these measures against South Carolina,
Jackson added, but if the governor of Virginia should make any
move to prevent Federal troops from moving through the state
against South Carolina then “I would arrest him....” The President
also was prepared to call on Pennsylvania, New York, Virginia, North
Carolina, Ohio, Tennessee, Alabama, Georgia and South Carolina to
furnish 35,000 troops to carry out his orders.
Jackson’s request of Congress for authority to use troops in
forcing the collection of customs was immediately called the “Force
Bill.” To the extremists it was known as the “Bloody Bill.” Vice
President John Calhoun said darkly that if the bill should pass then
“it will be resisted at every hazard, even that of death.”
It was at this point that the Great Compromiser, Henry Clay,
moved to seek the solution which would avoid bloodshed and
perhaps civil war. He introduced in the House his own bill to lower
tariffs by 20 per cent over a period of ten years. The Clay bill was
pushed through Congress along with the Jackson Force Bill and both
were sent to the President for his signature. Jackson won his
demand for authority to send troops to South Carolina to put down
any move toward secession or nullification of the tariff laws, and he
signed the compromise tariff bill even though it was, in a measure,
appeasement of the Nullificationists. Clay’s tariff bill was a face-
saving measure for South Carolina. The head-on conflict between
Federal and state forces was averted—at least for the time being.
In Jackson’s administration there was one man whose name
appears mostly in the footnotes of that turbulent period, but it is a
name that deserves special mention in this chronicle. The man was
Samuel Swartwout, Collector of Customs in New York City during
Jackson’s two terms in the White House. He rates special mention
and a shadowy niche in American history because he was the first
and only man to steal a million dollars from the Treasury of the
United States. In fact, he stole $1,250,000.
Swartwout was a young man when he plunged into New York
politics. He was a dark-haired, personable man who made himself
useful by running errands for the political bosses until he reached a
position of backroom fixer and schemer with no small amount of
influence. He was the bluff, hearty type who made friends easily. And
while he never was a central figure in the making of history, he was
one of those men whose names continually cropped up in the affairs
of the men who did make history in his time.
Swartwout was a protege and confidante of Aaron Burr during
the period of Burr’s shady adventure in the West when he was
accused of treason in an alleged plot to establish an empire in the
southwestern United States. And when Jackson’s star began to rise
as a Presidential candidate, Swartwout attached himself to the cause
of the Tennessean.
Many of Jackson’s friends and followers resented Swartwout’s
close association with Jackson because they regarded him as a
doubtful character smeared by the tar of the Burr affair. But when
Jackson entered the White House in 1828, Swartwout was among
the honored guests at the celebrations.
Jackson’s friends were concerned when it became known that
the New Yorker had easy access to the office of the President and
was seen coming and going as though he were one of Jackson’s
intimate advisers—which he wasn’t. The concern became dismay
when rumors spread that Swartwout had come to town seeking from
Jackson the nomination as Collector of Customs for New York City, a
post of no little prestige and political influence in those days.
Jackson’s Secretary of State, Martin Van Buren, was so upset by the
reports that he refused to admit Swartwout to his office or to enter
into correspondence with him.
Jackson must have felt he owed a political debt to Swartwout
because on April 25, 1829, during a recess of Congress, he handed
the New Yorker the political plum he had been seeking. Swartwout
continued in the office until March 29, 1838, with never any public
suspicion that he was involved in thefts of money collected by the
Customs House in New York. Only when the records were checked
by his successor was the discovery made that his accounts were
short by $1,250,000.
The scandal which followed broke like a storm over the young
Customs Service. Demands were made in Congress for safeguards
to prevent any such future looting of the Treasury. Enemies of
Jackson attacked the “spoils system” of appointments and centered
much of their assault on Customs.
As for Swartwout, he had foreseen the storm that was to come.
He had bade his friends farewell and boarded a ship for Europe
several weeks before the shortages in his accounts were discovered.
He was in France, safely out of reach of the law, when the scandal
broke—and he didn’t bother to return.
By 1849, the Customs Service spanned the continent. It reached
the coast of California in the person of John Collier, who was
appointed as the first Collector of Customs for San Francisco just as
the state was clearing the way for entry into the Union. Collier
reached San Francisco on November 13, 1849, after a perilous trip
across the country. He arrived at the beginning of the gold rush to
find the city and the customs situation in a state of disorganization
and confusion.
Collier was overwhelmed by the amount of business being
carried on in San Francisco, by the number of vessels arriving and
leaving the harbor, by the smuggling which was going on, and by the
high prices he found in the city. He advised Secretary of the Treasury
W. M. Meredith in a long, rambling letter: “I am perfectly astounded
at the amount of business in this office.... The amount of tonnage ...
on the 10th instance in port, was 120,317 tons; of which 87,494 were
American, and 32,823 were foreign. Number of vessels in the harbor
on that day, 10th instance, 312, and the whole number of arrivals
since the first of April, 697; of which 401 were American, and 296
foreign. This state of things, so unexpected, has greatly surprised
me....”
He found that Customs clerks were being paid from $1800 to
$3000 per annum but that the salaries were not particularly attractive
in a city gripped by the get-rich-quick fever. Flour was selling for $40
per barrel and pork for $60. Board was $5 a day and a room with a
single bed was $150 a month. Wood was $40 a cord and prices for
Welcome to our website – the ideal destination for book lovers and
knowledge seekers. With a mission to inspire endlessly, we offer a
vast collection of books, ranging from classic literary works to
specialized publications, self-development books, and children's
literature. Each book is a new journey of discovery, expanding
knowledge and enriching the soul of the reade
Our website is not just a platform for buying books, but a bridge
connecting readers to the timeless values of culture and wisdom. With
an elegant, user-friendly interface and an intelligent search system,
we are committed to providing a quick and convenient shopping
experience. Additionally, our special promotions and home delivery
services ensure that you save time and fully enjoy the joy of reading.
textbookfull.com