Chase Privacy Breach

Lifting Sacks of Money

Nice. This does concern me a bit, as I do 95% of all my company’s financial transactions via Chase Online. We’ll have to monitor this situation closely. Luckily, not much information is contained via email, other than the email account itself, and perhaps a way for a hacker to change the bank password via email.

Chase is letting our customers know that we have been informed by Epsilon, a vendor we use to send e-mails, that an unauthorized person outside Epsilon accessed files that included e-mail addresses of some Chase customers. We have a team at Epsilon investigating and we are confident that the information that was retrieved included some Chase customer e-mail addresses, but did not include any customer account or financial information. Based on everything we know, your accounts and confidential information remain secure. As always, we are advising our customers of everything we know as we know it, and will keep you informed on what impact, if any, this will have on you.

We apologize if this causes you any inconvenience. We want to remind you that Chase will never ask for your personal information or login credentials in an e-mail. As always, be cautious if you receive e-mails asking for your personal information and be on the lookout for unwanted spam. It is not Chase’s practice to request personal information by e-mail.

(click here to continue reading Important Information for our Customers.)

 

Netizens Gain Some Privacy

Eye see u Willis

A small step, yet significant. I would like these to get stronger: even though the Do Not Call list is not perfect (too many loopholes, especially for political communications/surveys/etc.), it has cut down on the number of unsolicited telephone calls. Having a similar sort of list for online tracking would be welcomed.

Last week, Google and Mozilla announced new software for their Web browsers that would allow consumers to permanently opt out of the online tracking used by many advertisers to follow online activities, build consumer profiles and deliver tailored ads.

Last year, the Federal Trade Commission recommended ways to protect online privacy, including giving consumers a clear, simple way to opt out of data tracking — something akin to the do-not-call registry.

Hoping to pre-empt action from a Congress in which privacy protection is one of the very few items with strong bipartisan support, companies involved in online advertising have rushed to issue their own proposals.

The efforts are welcome. The fact that Google and Mozilla get most of their revenue from online advertising is a strong rebuttal to claims that allowing consumers to opt out of tracking would undermine ad-driven businesses and endanger the free Internet.

Still, these initiatives fall short of what is ultimately needed. The privacy plug-in for Google’s Chrome browser merely lets users opt out permanently from tracking by companies from the coalition of companies that already allow surfers to opt out. It allows them to keep their opt-out settings even if they clear their cookies.

Mozilla’s feature, which will be added to new versions of its Firefox browser, will broadcast users’ preference not to be tracked to the Web sites they visit and the tracking companies that deliver cookies from these sites. But it will be up to these companies to comply with customers’ wishes. Many advertising networks that offer opt-outs still track surfing, just not for marketing.

To close these loopholes, Congress should require all advertising and tracking companies to offer consumers the choice of whether they want to be followed online to receive tailored ads, and make that option easily chosen on every browser.

(click here to continue reading Netizens Gain Some Privacy – NYTimes.com.)

 

E-Mail and Letters Should Have Equal Legal Protection

Soviets Lithuania

Seems like a simple question, but law enforcement doesn’t want to accept that electronic communications have replaced handwritten documents. There shouldn’t be a distinction based solely on the medium the communication uses. If I have a safe in my house with personal documents,1 the police need a warrant to open it. Why should my email folder be any different?

The question boils down to this: Should personal information that people store online, from e-mail messages to photos to location updates, be treated the same as telephone calls or paper documents stored in a person’s home?

Right now, they often aren’t, in part because the Electronic Communications Privacy Act, which governs surveillance of what people do online, was written in 1986 — well before Twitter direct messages, Facebook status updates or Foursquare check-ins.

And Web users generally do not understand when and how law enforcement can access their information, said Ryan Calo, director of the consumer privacy project at Stanford Law School’s Center for Internet & Society.

“People have no idea that with a relatively small amount of process, people can get all this information that they’ve been storing for more than 180 days,” Mr. Calo said. “If they were to go and look at a privacy policy, it would say, ‘We comply with lawful requests for your information,’ but you don’t know what that means.”

(click to continue reading Should E-Mail and Letters Have Equal Legal Protection? – NYTimes.com.)

Unfortunately, the Supreme Court of the US currently has a reactionary majority, and will predictably side with the police over civil liberties, every time. There’s always hope…

So far, updates to the law have been piecemeal. For example, last month, the Sixth Circuit Court of Appeals, considering a fraud case, ruled that law enforcement cannot access e-mail messages stored online without a warrant because they are protected by the Fourth Amendment, which guards against unreasonable searches.

Footnotes:
  1. which I actually don’t, but I want one to store my passport and some similar papers in case of fire or other calamity []

1986 Privacy Law Inadequate For 2011 Digital Society

Popo Starry Pants

The mentality of law enforcement is that since there is information available about suspects, law enforcement officers should have free reign to sift through it, no matter what. However, if one is a suspect, and a warrant is executed for one’s home, the officers are usually limited to certain areas as precisely described by the warrant, they are not1 allowed to look through every single nook and cranny, unless the warrant has been constructed this broadly. Why isn’t digital data treated the same way?2

SAN FRANCISCO — Concerned by the wave of requests for customer data from law enforcement agencies, Google last year set up an online tool showing the frequency of these requests in various countries. In the first half of 2010, it counted more than 4,200 in the United States.

Google is not alone among Internet and telecommunications companies in feeling inundated with requests for information. Verizon told Congress in 2007 that it received some 90,000 such requests each year. And Facebook told Newsweek in 2009 that subpoenas and other orders were arriving at the company at a rate of 10 to 20 a day.

As Internet services — allowing people to store e-mails, photographs, spreadsheets and an untold number of private documents — have surged in popularity, they have become tempting targets for law enforcement. That phenomenon became apparent over the weekend when it surfaced that the Justice Department had sought the Twitter account activity of several people linked to WikiLeaks, the antisecrecy group.

Many Internet companies and consumer advocates say the main law governing communication privacy — enacted in 1986, before cellphone and e-mail use was widespread, and before social networking was even conceived — is outdated, affording more protection to letters in a file cabinet than e-mail on a server.

(click to continue reading Privacy Law Is Outrun by Speed of Web’s Progress – NYTimes.com.)

For some reason, The New York Times didn’t actually link to this Google tool, I’m not sure why. Anyway, after a few minutes of searching3, found it.

Like other technology and communications companies, we regularly receive requests from government agencies around the world to remove content from our services, or provide information about users of our services and products. This map shows the number of requests that we received in six-month blocks with certain limitations.

(click to continue reading Google Transparency Report: Government Requests.)

As of the current moment, Google has received 4287 requests for information in the United States alone4 from law enforcement in the last six months (an average of 714.5 requests a month, or nearly 24 requests a day).

Footnotes:
  1. officially []
  2. I am not a lawyer, and all my information comes from stupid television shows, so don’t laugh too loudly if I’m wrong []
  3. longer than I thought, actually []
  4. that Google is allowed to mention – perhaps not including some alleged participants in the War on Terror []

links for 2010-10-01

  • used TaintDroid to test 30 popular free Android applications selected at random from the Android market and found that half were sending private information to advertising servers, including the user’s location and phone number. In some cases, they found that applications were relaying GPS coordinates to remote advertising network servers as frequently as every 30 seconds, even when not displaying advertisements.
    McCain_Phone.jpg
    (tags: google privacy)
  • “I gather he came straight from Grand Central to Shubert Alley,” Matthau told me. “I walked out of the theater after a performance and there’s this guy shouting at me from across the street: Walter! Walter! It’s me — Bernie! I fucked Yvonne De Carlo!
    (tags: film_history)

The Web Means Everything Is On Your Permanent Record

I am lucky that I was a teen and finished college before the digital age. As far as I know, there are no permanent records of my exploits anywhere on the web, accessible by casual web searchers, or overzealous customs officials. Like most 19 year olds, I did some crazy stuff, participated in some questionable behavior with my peers, but never was actually arrested by law enforcement. Thankfully. Because otherwise, I’d worry…

Three Note Oddity

Four years ago, Stacy Snyder, then a 25-year-old teacher in training at Conestoga Valley High School in Lancaster, Pa., posted a photo on her MySpace page that showed her at a party wearing a pirate hat and drinking from a plastic cup, with the caption “Drunken Pirate.” After discovering the page, her supervisor at the high school told her the photo was “unprofessional,” and the dean of Millersville University School of Education, where Snyder was enrolled, said she was promoting drinking in virtual view of her under-age students. As a result, days before Snyder’s scheduled graduation, the university denied her a teaching degree. Snyder sued, arguing that the university had violated her First Amendment rights by penalizing her for her (perfectly legal) after-hours behavior. But in 2008, a federal district judge rejected the claim, saying that because Snyder was a public employee whose photo didn’t relate to matters of public concern, her “Drunken Pirate” post was not protected speech.

When historians of the future look back on the perils of the early digital age, Stacy Snyder may well be an icon. The problem she faced is only one example of a challenge that, in big and small ways, is confronting millions of people around the globe: how best to live our lives in a world where the Internet records everything and forgets nothing — where every online photo, status update, Twitter post and blog entry by and about us can be stored forever. With Web sites like LOL Facebook Moments, which collects and shares embarrassing personal revelations from Facebook users, ill-advised photos and online chatter are coming back to haunt people months or years after the fact. Examples are proliferating daily: there was the 16-year-old British girl who was fired from her office job for complaining on Facebook, “I’m so totally bored!!”; there was the 66-year-old Canadian psychotherapist who tried to enter the United States but was turned away at the border — and barred permanently from visiting the country — after a border guard’s Internet search found that the therapist had written an article in a philosophy journal describing his experiments 30 years ago with L.S.D.

According to a recent survey by Microsoft, 75 percent of U.S. recruiters and human-resource professionals report that their companies require them to do online research about candidates, and many use a range of sites when scrutinizing applicants — including search engines, social-networking sites, photo- and video-sharing sites, personal Web sites and blogs, Twitter and online-gaming sites. Seventy percent of U.S. recruiters report that they have rejected candidates because of information found online, like photos and discussion-board conversations and membership in controversial groups.

(click to continue reading The Web Means the End of Forgetting – NYTimes.com.)

Land of the free, right.

Oh, and since Jeffrey Rosen didn’t specify the 66 year old Canadian psychologist who took LSD in 1967, his name is Andrew Feldmar, and I blogged about this travesty in 2007. He really was barred from entry to the US in May, 2007, because he wrote an article about his drug use – in 1967!

U.S. Program to Detect Cyber Attacks

Mixed feelings about this: the Federal Government probably should have some sort of cyber patrol to protect the nation’s infrastructure against attack, but am always skeptical that this isn’t just an excuse to legalize the spying upon citizens that has become the norm.

Eye see u Willis

The federal government is launching an expansive program dubbed “Perfect Citizen” to detect cyber assaults on private companies and government agencies running such critical infrastructure as the electricity grid and nuclear-power plants, according to people familiar with the program.

The surveillance by the National Security Agency, the government’s chief eavesdropping agency, would rely on a set of sensors deployed in computer networks for critical infrastructure that would be triggered by unusual activity suggesting an impending cyber attack, though it wouldn’t persistently monitor the whole system, these people said.

Defense contractor Raytheon Corp. recently won a classified contract for the initial phase of the surveillance effort valued at up to $100 million

(click to continue reading U.S. Program to Detect Cyber Attacks on Infrastructure – WSJ.com.)1

 

Footnotes:
  1. non-WSJ subscribers use this link []

AT&T Discloses serious IPad Security Breach

I have to assume I’m in this group: I have an iPad 3G, and an AT&T data plan for it1

AT&T Inc. acknowledged Wednesday that a security hole in its website had exposed iPad users’ email addresses, a breach that highlights how corporations still have problems protecting private information.

Bored with the iPad

A small group of computer experts that calls itself Goatse Security claimed responsibility for the intrusion, saying they exploited an opening in AT&T’s website to find numbers that identify iPads connected to AT&T’s mobile network.

Those numbers allowed the group to uncover 114,000 email addresses of thousands of users, including prominent officials in companies, politics and the military, Goatse said. Gawker Media LLC, which reported the breach earlier Wednesday, said 114,000 email addresses were revealed. It doesn’t appear any financial or billing information was made public.

AT&T, the sole U.S. provider of wireless service for the Apple Inc. tablets, said it had fixed the security problem by Tuesday. It said it would inform all customers whose email addresses and iPad IDs may have been obtained.

(click to continue reading AT&T Discloses IPad Security Breach – WSJ.com.)

What I don’t know is what Goatse did with the data – are they planning on selling it to spammers? Or use it to compromise our email accounts in some way? My passwords are firewalled – i.e., I have different passwords for different websites, but no password is invulnerable to a determined hacker. Maybe AT&T will take a PR-friendly response, and offer a years worth of identity-theft monitoring for their customers?

Footnotes:
  1. plus my surname begins with the letter A – which was fine in school, not so good always []

Farewell, Facebook

Here’s why I’m selectively changing a lot of my information in Facebook – faking my demographic details and so forth – Facebook wants so desperately to make a dollar off of my data, they have become skeevy, and untrustworthy. I’m old enough that there isn’t too much that is embarrassing in my Facebook profile, but I don’t every corporation in America to have access to my information without my permission1

Nothing remains from the past

The chorus of pro-privacy, anti-Facebook bloggers is getting louder. Facebook wants to keep track of everything you “like” — all over the Web and even in the real world. McDonald’s has signed on as Facebook’s first geolocation partner. Whatever that means. The Observer has a deeper relationship with my Facebook page than my best friend. Today I’m deactivating my account. Here’s why.

Then I stumbled upon a list of the various third-party groups that have access to my account. In all, there were 32, including the makers of “Which Jane Austen heroine are you?” (I’m Fanny Price), The Awl, a snarky, high-brow commentary site, and Business Insider. The latter two I didn’t recall approving. The media sites, I discovered, were installed automatically when I browsed their websites while logged in to Facebook. Jane Austen, I’m afraid, I must take responsibility for. Reports are unclear as to what information applications can pull from your account. Some warn that developers have broad access and do not distinguish between what you mark as public and private, and some quizzes even get access to friends’ information.

Considering Facebook’s track record of shifting privacy settings, which the Electronic Frontier Foundation wraps up here, and you can get a visual sense of here, it seems pretty much guaranteed that user control over personal information will only get weaker. At the same time, Facebook is collecting new data based on user browsing habits across the Web. Facebook founder Mark Zuckerberg recently unveiled Facebook’s “Connect,” a tool integrated with sites across the Web so users can “like” everything from articles on major news sites such as The Washington Post, to items for sale on retailer sites. Those connections are public, and if you don’t like it, Facebook has this advice to offer: “If you are uncomfortable with the connection being publicly available, you should consider removing (or not making) the connection.”

At the same conference, Zuckerberg also announced that the company will let third parties store information longer (previously, outside developers could store user information for no longer than 24 hours). So not only do we have to worry about Facebook’s policy; we also have to worry about the huge ecosystem of parties that hold Facebook data.

(click to continue reading Farewell, Facebook | The American Prospect.)

One could just delete one’s Facebook account, or take the guerrilla warfare route, and make lots of false data points. The latter option sounds more fun, actually.

Senator Al Franken of all people, with the help of The Consumerist, has published some detailed instructions on how to modify your Facebook privacy settings, which at the very least you should glance at.

Footnotes:
  1. such as, if I purchase a new Nikon, I’ve given Nikon permission to update their records of me, and so on. McDonald’s on the other hand, shouldn’t have any information about me as I haven’t stepped into one of their restaurants in decades []

Reading Around on December 9th through December 10th

A few interesting links collected December 9th through December 10th:

  • From the Desk of David Pogue – Free Speech (Recognition) – NYTimes.com – Remember the Gmail brouhaha? … At the time, everyone was hysterical about the supposed privacy violation: Google will be reading my e-mail! Of course, no humans were looking at your e-mail. It was just a bunch of servers analyzing keywords. Today, everybody’s forgotten all about it. But now the issue rises again with Dragon Dictation.

    As for the names in your Contacts: they’re sent to Nuance so that the app will recognize the names when you dictate them. No other information (phone numbers, e-mail, addresses, etc.) is transmitted.

    What I don’t understand is: Why don’t these same people worry that Verizon or AT&T is listening in to their cellphone calls every single day? Why don’t they worry that MasterCard is peeking into their buying habits? How do they know Microsoft and Apple aren’t slurping down private documents off the hard drive and laughing their heads off?

    I mean, if you’re gonna be paranoid, at least be rational about it.

  • Jon22 » today’s grammar lesson: rob enderle – Rob Enderle is the Sarah Palin of the technology world, minus all the fun jokes about the front-door view of Russia.
  • Facebook’s New Privacy Changes: The Good, The Bad, and The Ugly | Electronic Frontier Foundation – privacy option telling Facebook to “not share any information about me through the Facebook API.”

    That option has disappeared, and now apps can get all of your “publicly available information” whenever a friend of yours adds an app.

    Facebook defends this change by arguing that very few users actually ever selected that option — in the same breath that they talk about how complicated and hard to find the previous privacy settings were. Rather than eliminating the option, Facebook should have made it more prominent and done a better job of publicizing it. Instead, the company has sent a clear message: if you don’t want to share your personal data with hundreds or even thousands of nameless, faceless Facebook app developers — some of whom are obviously far from honest — then you shouldn’t use Facebook.

Our Bank Lost Our Data

Received a disturbing letter from our bank on Saturday:

Reserved Light

Dear Customer:

The security of your information is important to us and we strive to handle it with care and discretion at all times. We are writing to let you know that we are unable to locate a computer tape at a secure offsite storage facility. The tape is used as a backup for system information. Electronic files on the tape may have included your company name, address and Tax Identification Number(s), but did not include any banking or financial information.

The vendor that operates the offsite storage facility confirmed that it received and maintained the tape, and its facility has been searched. Unfortunately, the tape could not be located. However, the information on the tape can be read only with special equipment and software and we have no evidence to indicate any of the information has been viewed or used inappropriately.

Please accept our apology for any concern this may cause. As a precaution, make sure to monitor your account statements carefully to make certain no unauthorized transactions are made. If you have any questions concern ing this matter, please call us at

Doesn’t sound good, but maybe I worry too much.

On the other hand, why is our bank sending us this form letter? We have several accounts with this bank actually, a couple of credit cards, a few checking accounts, etc., but this letter doesn’t specify which account is suspected of being lost. Is it all of our data? Or just one particular account? Does our bank’s lawyers think that by writing this letter, we won’t be able to sue the bank if something actually is amiss? Should we change our Tax ID #?

We are considering moving all of our accounts elsewhere, as a sort of preemptive move; can’t decide if this is hasty, or prudent. What do you think?

If we can get through to a person, and get some clear answers, I’ll append to this post.

Reading Around on February 21st

Some additional reading February 21st from 09:24 to 11:36:

Reading Around on February 19th

A few interesting links collected February 17th through February 19th:

  • CBS Falsely Portrays Stanford as Democratic Scandal – But as Public Citizen, Huffington Post, ABC News and Talking Points Memo all reported, Stanford and his Stanford Financial Group PAC contributed to politicians and political action committees of both parties (including $448,000 in soft money contributions from 2000 to 2001 alone) to advance his agenda of banking and money-laundering deregulation. Many others journeyed on Stanford's junkets to Antigua and elsewhere, prompting TPM to brand his company "a travel agent for Congress." (TPM has a slide show of one of those of Stanford getaways.)

    As it turns out, the list of Stanford beneficiaries is long – and bipartisan.

  • Remembering Gene – Roger Ebert's Journal – Gene died ten years ago on February 20, 1999. He is in my mind almost every day. I don't want to rehearse the old stories about how we had a love/hate relationship, and how we dealt with television, and how we were both so scared the first time we went on Johnny Carson that, backstage, we couldn't think of the name of a single movie, although that story is absolutely true. Those stories have been told. I want to write about our friendship. The public image was that we were in a state of permanent feud, but nothing we felt had anything to do with image. We both knew the buttons to push on the other one, and we both made little effort to hide our feelings, warm or cold. In 1977 we were on a talk show with Buddy Rogers, once Mary Pickford's husband, and he said, "You guys have a sibling rivalry, but you both think you're the older brother."
  • TidBITS iPod & iPhone: iPhone to Add Location Logging? – Could the iPhone soon be able to track your location in the background as you walk around? A hint that such a capability is in the works at Apple comes from a programmer friend who spent some time spelunking around inside iPhoto '09, which shows traces of being able to associate such GPS log data with photos.
  • Daily Kos: Chocolate Covered Cotton – billmon – The fatal innovation…was the rise of so-called collateralized obligations, in which the payment streams from supposedly uniform pools of assets (say, for example, 30-year fixed prime mortgages issued in the first six months of 2006 to California borrowers) could be sliced and diced into different securities (known as tranches) each with different payment characteristics.

    This began as a tool for managing (or speculating on) changes in interest rates, which are a particular problem for mortgage lenders, since homeowners usually have the right to repay (i.e. refinance) their loan when rates fall, forcing lenders to put the money back out on the street at the new, lower rates. This means mortgage-backed securities can go down in value when rates fall as well as when they rise. By shielding some tranches from prepayments (in other words, by directing them to other tranches) the favored tranches are made less volatile and thus can be sold at a higher price and a lower yield.

  • An old habit dies… hard. « chuck.goolsbee.org – "I stumbled across a likely little application that seems to fit the bill: Gyazmail. It has a very flexible UI that allows me to make it behave very Eudora-like when I want it to. It has very good search, rules, and filters. It can import all my old mail(!)

    I’m test driving it at the moment and liking it so far. Switched my work mail to it late last week, and my personal mail is still coming over one account at a time. So far so good. If you regularly contact me via email be patient while I work through this transition period."

    I'm still using Eudora on three of our most used Macs (since 1995 probably -only 14 years), but the writing is on the wall. Have to check out Gyazmail.

  • Hands on: Drop.io's private, easy file sharing with a twist – Ars Technica – Sharing information online is getting more complex than it sometimes should be. If you want to share pictures, files, plain ideas, or even faxes with friends or businesses, you can try the old e-mail standby, but you may end up joining a social network, agree to a dense privacy policy, and then track down an app made by who-knows-who to get the job done. Even starting a simple blog usually involves more time than most users can afford‚ and more features than they'll ever need. Drop.io is an intriguing, but simple, new service that is part wiki, part file sharing, and part personal secretary, with an emphasis on privacy and ubiquitous access, requiring no signup or account activation.

    Upon visiting Drop.io—pronounced as a seamless single word: "drop-ee-o"—the site presents a basic elevator pitch about its services and a short form with which to get started uploading files.

  • Fat Tire Ale Downed Near Load Of Burgers – A Good Beer Blog – Motorists on Interstate 15 were impeded by a piles of hamburgers after a truck spilled a load of the patties, blocking the northbound lanes for four hours. The driver of a tractor-trailer carrying 40,000 pounds of hamburger patties dozed off around 5 a.m., said Utah Highway Patrol trooper Cameron Roden. The truck driver's rig drifted to the left side of the freeway near 2300 North and crashed into a wall and an overhead sign, which ripped open his trailer, spilling hamburger over the north and southbound lanes of the interstate…A second truck spill east of Morgan caused minor delays. Before 7:30 a.m., a truck was heading westbound on Interstate 84 about a half-mile east of Morgan… The truck slipped off to the left, hit a guardrail, and flipped over on its side. The impact split the truck open, spilling Fat Tire Beer being shipped from Colorado, Roden said.
  • The Associated Press: Chimp owner begs police in 911 call to stop attack – Police said that the chimp was agitated earlier Monday and that Herold had given him the anti-anxiety drug Xanax in some tea. Police said the drug had not been prescribed for the 14-year-old chimp.

    In humans, Xanax can cause memory loss, lack of coordination, reduced sex drive and other side effects. It can also lead to aggression in people who were unstable to begin with, said Dr. Emil Coccaro, chief of psychiatry at the University of Chicago Medical Center.

    "Xanax could have made him worse," if human studies are any indication, Coccaro said.

  • Facebook | Home – Over the past few days, we have received a lot of feedback about the new terms we posted two weeks ago. Because of this response, we have decided to return to our previous Terms of Use while we resolve the issues that people have raised. For more information, visit the Facebook Blog.

    If you want to share your thoughts on what should be in the new terms, check out our group Facebook Bill of Rights and Responsibilities.

  • Big Tuna – Chicago — Anthony 'Big Tuna' Accardo, reputed crime syndicate figure, and his wife are shown as they arrive at the St. Vincent Ferrer Church in suburban River Forest to attend wedding of their son Anthony Jr, who was married to the former Janet Hawley, 1961 Miss Utah. Many top gangland bosses and other underworld figures attended the wedding under the watchful eye of law enforcement agencies
  • Home | Recovery.gov – Recovery.gov is a website that lets you, the taxpayer, figure out where the money from the American Recovery and Reinvestment Act is going. There are going to be a few different ways to search for information. The money is being distributed by Federal agencies, and soon you'll be able to see where it's going — to which states, to which congressional districts, even to which Federal contractors. As soon as we are able to, we'll display that information visually in maps, charts, and graphics.
  • George Will: Liberated From the Burden of Fact-Checking | The Loom | Discover Magazine – In an opinion piece by George Will published on February 15, 2009 in the Washington Post, George Will states “According to the University of Illinois’ Arctic Climate Research Center, global sea ice levels now equal those of 1979.”

    We do not know where George Will is getting his information, but our data shows that on February 15, 1979, global sea ice area was 16.79 million sq. km and on February 15, 2009, global sea ice area was 15.45 million sq. km. Therefore, global sea ice levels are 1.34 million sq. km less in February 2009 than in February 1979. This decrease in sea ice area is roughly equal to the area of Texas, California, and Oklahoma combined.

    It is disturbing that the Washington Post would publish such information without first checking the facts.

  • Wonk Room » George Will Believes In Recycling – Will’s numerous distortions and outright falsehoods have been well documented by Joe Romm, Nate Silver, Zachary Roth, Brad Plumer, Erza Klein, David Roberts, James Hrynyshyn, Rick Piltz, Steve Benen, Mark Kleiman, and others. They recognized that George Will is recycling already rebutted claims from the lunatic fringe, and offer the excellent suggestion that Washington Post editors should require some minimum level of fact-checking.

    But I haven’t seen anyone comment that Will is also recycling his own work, republishing an extended passage from a 2006 column — which Think Progress debunked — almost word for word. Take a look:

Reading Around on February 16th

Some additional reading February 16th from 14:41 to 16:17:

  • U.S. Food Policy: Evidence on declining fruit and vegetable nutrient composition – found that fertilized plants contained larger absolute amounts of minerals than the unfertilized plants, but these amounts were sufficiently diluted by the increased dry matter that all mineral concentrations declined, except for phosphorus, which is the common fertilizer.

    Next, Davis looked at historical food composition data derived from three quantitative reports. While these studies are limited by their ability to be compared due to variation in methods, they found:

    apparent median declines of 5% to 40% or more in some minerals in groups of vegetables and perhaps fruits; one study also evaluated vitamins and protein with similar results.

  • I’m Done With Facebook : Edward Champion’s Reluctant Habits – But the Facebook language clearly dictates that you are giving Facebook an irrevocable and perpetual right to distribute and make derivative copies of content you upload to Facebook for any purpose. ANY. Whether it be a book, a film, or whatever other options Facebook may have cooked up. … (If you’ve already granted Facebook the irrevocable right to give up your content and likeness, then how can you still have “all rights and permissions?” Perhaps an IP attorney can sort out this thorny language.) Since Facebook has demonstrated no reservations in sharing private data with developers, the company’s history suggests that this same recurring invasion of privacy will carry forth under the new Terms of Service. The only difference is that Facebook now intends to profit from the content you upload, and they can now use it in any way they want, because you’ve capitulated all your rights to it.

Reading Around on February 15th

Some additional reading February 15th from 09:57 to 21:10:

  • Having It Both Ways: Republicans Take Credit for ‘Pork’ – In Stimulus Bill They Opposed | Crooks and Liars – Rep. John Mica was gushing after the House of Representatives voted Friday to pass the big stimulus plan.

    “I applaud President Obama’s recognition that high-speed rail should be part of America’s future,” the Florida Republican beamed in a press release.

    Yet Mica had just joined every other GOP House member in voting against the $787.2 billion economic recovery plan.

  • Facebook’s New Terms Of Service: “We Can Do Anything We Want With Your Content. Forever.” – Facebook’s terms of service (TOS) used to say that when you closed an account on their network, any rights they claimed to the original content you uploaded would expire. Not anymore.

    Now, anything you upload to Facebook can be used by Facebook in any way they deem fit, forever, no matter what you do later. Want to close your account? Good for you, but Facebook still has the right to do whatever it wants with your old content. They can even sublicense it if they want.

  • Grasping Reality with Both Hands: Michael Isikoff: Yoo Disbarment Proceedings Now Visible on the Horizon – Torture Report Could Be Trouble For Bush Lawyers: An internal Justice Department report on the conduct of senior lawyers who approved waterboarding and other harsh interrogation tactics is causing anxiety among former Bush administration officials. H. Marshall Jarrett, chief of the department’s ethics watchdog unit, the Office of Professional Responsibility (OPR), confirmed last year he was investigating whether the legal advice in crucial interrogation memos “was consistent with the professional standards that apply to Department of Justice attorneys.” According to two knowledgeable sources who asked not to be identified discussing sensitive matters, a draft of the report was submitted in the final weeks of the Bush administration. It sharply criticized the legal work of two former top officials—Jay Bybee and John Yoo—as well as that of Steven Bradbury, who was chief of the Office of Legal Counsel (OLC) at the time the report was submitted, the sources said.
  • Gutless Wonders: Specter Admits GOP’s Political Calculus On Stimulus Bill | Crooks and Liars – DCCC head Chris Van Hollen puts it into perspective (if only the media would actually frame it this way):

    “Americans will hold House Republicans accountable for just saying no to saving and creating three to four million jobs and the largest tax cut in American history.

    “House Republicans are fast becoming party of No-bama. Americans will hold Republicans accountable for being the party of no – no to President Obama’s economic recovery, no to children’s health care, and no to equal pay for women doing equal work.”

  • Talking Points Memo | The Big Disconnect – But there’s a very big problem with this strategy above and beyond the absurdity of the argument. “Congress” may be really unpopular. And the Democrats now control Congress. But politics is a zero sum game. At the end of the day, in almost every case, you’ve got to pick a Republican or a Democrat when you vote. And if you look at the numbers, congressional Democrats are pretty popular. And congressional Republicans are extremely unpopular. If you look at the number, the Dems are at about 50% or higher in most recent polls, while the GOP is down in the 30s.

    The city remains wired for the GOP. Not that it’s done them a great deal of good of late. But it remains a key part of understanding every part of what is happening today.

  • Google Jumps Into Organizing Smart Meter Energy Data « Earth2Tech – “Just as Google’s CEO Eric Schmidt hinted over the past few months, Google is moving from managing the world’s information to managing your personal energy data. On Monday night Google tells us it is developing an online tool called “PowerMeter” that will allow users to monitor their home energy consumption. For now Google is testing the web-based software with Google employees, but the search engine giant is looking to partner with utilities and smart energy device makers and will eventually roll out the tool to consumers.”
  • Energy Information – “Google PowerMeter, now in prototype, will receive information from utility smart meters and energy management devices and provide anyone who signs up access to her home electricity consumption right on her iGoogle homepage. The graph below shows how someone could use this information to figure out how much energy is used by different household activites.”

    Oooh, I want one of these so-called smartmeters

  • MyDD :: The Beltway Games Don’t Really Matter – “Perhaps more than ever, there is a real divide between what the chattering class inside the Beltway is saying and what the people of this country are saying. We saw the beginnings of this during the campaign, when despite the fact that John McCain was deemed to be winning the news cycles — indeed, his campaign seemed to care more about winning “Hardball” than it did about reaching 270 electoral votes — Barack Obama nevertheless continued to lead in the polls, both nationwide and in the key states. Now we’re seeing it again, as the establishment media focuses on the less meaningful back and forth while at the same time overlooking the larger picture being grasped by the public — that is that President Obama is succeeding, in terms of both moving forward his policy agenda and bringing two-thirds of the country along with him in his effort.”