Jim is the Director of Information Policy Studies at The Cato Institute, the Editor of Web-based privacy think-tank Privacilla.org, and the Webmaster of WashingtonWatch.com. Prior to becoming a policy analyst, Jim served as counsel to committees in both the House and Senate.
I noticed on Twitter that Google Wave was a trending topic, so I went looking to see what the hell it is. Many of you already know, I’m sure, but for those of you who don’t: It’s a hosted/’cloud’ communications platform that could supplant email, IM, chatrooms, wikis, word processors, and a few other things. Might be good for simple games too.
This video of a preview presentation to developers is long, but it takes you through a lot of the features. No idea whether Google Wave will take off, but it looks pretty neat. I’ll look forward to learning about privacy tools and portability of data.
I had some time cooling my heels in airports and a hospital over the latter part of last week and the weekend, so I thumbed a long (too long) response to Julian’s recent post discussing privacy notices. It’s over on Cato@Liberty.
Testifying in a Senate Homeland Security and Governmental Affairs Committee hearing today, Trey Hodgkins of technology trade association “TechAmerica” offered some pretty bogus excuses for resisting transparency in government contracts.
[I]f disclosure included posting to a public website the unredacted contract, a number of critical elements would be exposed. Something as simple as identifying the location where work is to be performed could reveal the geographic location of crucial components of our National and Homeland Security apparatuses, thereby exposing them to attack, disruption or destruction. Similarly, if data about program capabilities were to be disclosed as part of the public disclosure of contracting actions, adversaries could evaluate the supply chain, identify critical production components and, by attacking that component, disrupt our security. Data aggregated from published contracting actions also would allow adversaries to discern and reverse-engineer our capabilities and identify our weaknesses.
From a corporate perspective, disclosure of data from a contracting action—particularly the publication of an unredacted contract—would expose intellectual property, corporate sensitive and technical data to industrial espionage and allow corporate competitors to aggregate data, such as pricing methods, and weaken the competitive posture of a company in the government and commercial markets.
There is a remote possibility of risk to domestic security in some contracts, but the public benefits of disclosure vastly outstrip those risks. Hodgkins’ veiled pants-wetting about terrorism is a crock.
The corporate interests Hodgkins cites are balderdash. If you want to do government contracting, you are going to be involved in a public contracting process. Get over it or get out of the business.
I have not been impressed with “TechAmerica” since it was formed by the merger of several smaller trade associations. Hodgkins and TechAmerica should get on the other side of this issue, figure out how to protect what needs protecting, and disclose the rest.
I look forward to seeing something from “TechAmerica” that is actually innovative and not just slavish pursuit of government contracts, good public policies be damned.
ArsTechnica has a great write-up of WashingtonWatch.com’s earmarks project and a top earmark hunter, Andi Osiek.
Back from vacation and digging out, I will be furiously working over the weekend to check the data we collected, flag earmarks that made it into bills, and award the prizes to the top earmark hunters in the contest.
There is no better security for data than not collecting it in the first place. And when data is no longer needed, the best security for it is to destroy it.
That’s why I was surprised to see a request from the chairman and ranking member of the House Homeland Security Committee asking the Transportation Security Administration to preserve data that is scheduled for destruction.
Chairman Bennie Thompson (D-MS) attended and spoke at the first meeting of the DHS Privacy Committee four years ago. I have regarded him as a champion of privacy since then. But he and Rep. Peter King (R-NY) want biometric data collected for the defunct Registered Traveler program preserved on the chance that Registered Traveler is revived. This is an inappropriate request.
Anyone who submits data to the government should recognize the risk that it will be preserved longer than promised and put to new uses. There were merits to the Clear system within Registered Traveler. I wrote about them in my book and testified about them in 2005. One of the serious demerits is that Registered Traveler created stores of biometric data that politicians are now trying to control.
The WashingtonWatch.com project to collect congressional earmark data continues to make great strides. Over 35,000 earmark requests are in the database, and fewer than 50 representatives remain on the “wanted” list.
(I illustrated the WashingtonWatch.com post with the picture at right. Wanted to capture the all-American, do-it-yourself, shoot-for-the-moon spirit. Does that work for your inner art critic? . . .)
Also, take a look at the transparency “Hall of Shame” post published this morning. Even some appropriations committee members published their earmark disclosures as scanned PDFs. That’s transparency in name, but not in spirit.
Our job here at TLF is generally to talk about policy as opinion leaders, but I tend to be a little campaign-y sometimes. When I see something I don’t like, I’ll use this platform to sound off about it.
It appears that ProFlowers.com engages in a shady practice: handing customers who accept a “special offer” from them to a company that charges people a monthly fee for what appears to be some kind of credit monitoring service. There are write-ups of varying depth and quality here, here, here, and here.
Question: Does the Internet provide enough feedback to suppress this practice? How could the e-commerce ecosystem be changed to alert people about this kind of thing ahead of time?
Being a smart, informed, and aggressive consumer is each person’s responsibility if a free market is to operate well. The alternative is a negative feedback loop in which government authorities protect us, we rely on that protection and stop policing retailers. Thereby we abandon the field of consumer protection to government authorities, who—try as they might—can never do as good a job for us as we can for ourselves.
Should we each run a “scam” search on new online businesses before we deal with them? Maybe so. But that’s a little clunky. With the popularity of Firefox plug-ins for problem solving aroundhere, maybe one of the consumer review/complaint sites could develop a plug-in to provide people reviews of a retailer as they visit the site.
I hope that prompting a conversation around the apparent ProFlowers.com credit card ripoff scam will alert savvy shoppers to a risk of doing business with them. (For the sake of searchability, feel free to blog a little bit yourself about the apparent ProFlowers credit card ripoff scam.) Perhaps this discussion will also generate a systemic fix that preempts shady dealings of the type alleged here.
The Technology Liberation Front is the tech policy blog dedicated to keeping politicians' hands off the 'net and everything else related to technology. Learn more about TLF →