January 2014

Pope Francis calls the Internet ‘a gift from God’

Pope Francis declared his unambiguous support for the Web as a tool that brings humanity closer together.

"A culture of encounter demands that we be ready not only to give, but also to receive," Pope Francis said. "Media can help us greatly in this, especially nowadays, when the networks of human communication have made unprecedented advances. The Internet, in particular, offers immense possibilities for encounter and solidarity. This is something truly good. A gift from God." "The desire for digital connectivity can have the effect of isolating us from our neighbors, from those closest to us," the papal statement said. "We should not overlook the fact that those who for whatever reason lack access to social media run the risk of being left behind. While these drawbacks are real, they do not justify rejecting social media; rather, they remind us that communication is ultimately a human rather than technological achievement."

Warren Buffett Uses Open Government Data

The White House’s Deputy Chief Technology Officer Nick Sinai profiled a handful of small and large Web and mobile startups that were built off open government data during a presentation hosted by the Information Technology and Innovation Foundation.

One of the most interesting parts of Sinai’s presentation at ITIF’s Data Innovation Day, however, was a shout out to this list compiled by New York University’s GovLab. The list is a preview of a comprehensive study GovLab plans to conduct on companies that are powered in part or in whole by open government data. The 500 companies on the list include some government data-focused startups, such as PopVox, which encourages users to support or oppose congressional legislation, and Procure.io, focused on simplifying government contracting. The list also includes many behemoths, though, that digest government data for only a fraction of their operations. These include Web giants, such as Amazon, Google and Yahoo, as well as more traditional business such as IBM, Warren Buffett’s investment firm Berkshire Hathaway, Mitt Romney’s former employer Bain, the consulting and research firm Deloitte and Consumer Reports.

Members of Congress prod Target on hack

Top House Democrats are calling on Target to release documents about its holiday season data breach. Leading members of the House Commerce Committee pressed Target Chairman and CEO Gregg Steinhafel on the causes and impacts of the December hack at the retailer, which affected as many as 110 million people. “This breach is particularly significant because of its unprecedented scope and scale,” Reps Henry Waxman (D-CA), Diana DeGette (D-CO) and Jan Schakowsky (D-IL) wrote. “More than one-fifth of Americans may be affected by the Target breach.” The lawmakers are the top Democrats on the Energy and Commerce Committee and its subcommittees on Oversight and Trade.

Big Data and the Future of Privacy

President Barack Obama asked me to lead a comprehensive review of the way that “big data” will affect the way we live and work; the relationship between government and citizens; and how public and private sectors can spur innovation and maximize the opportunities and free flow of this information while minimizing the risks to privacy.

I will be joined in this effort by Secretary of Commerce Penny Pritzker, Secretary of Energy Ernie Moniz, the President’s Science Advisor John Holdren, the President’s Economic Advisor Gene Sperling and other senior government officials. We are undergoing a revolution in the way that information about our purchases, our conversations, our social networks, our movements, and even our physical identities are collected, stored, analyzed and used. The immense volume, diversity and potential value of data will have profound implications for privacy, the economy, and public policy. The working group will consider all those issues, and specifically how the present and future state of these technologies might motivate changes in our policies across a range of sectors. When we complete our work, we expect to deliver to the President a report that anticipates future technological trends and frames the key questions that the collection, availability, and use of “big data” raise -- both for our government, and the nation as a whole. It will help identify technological changes to watch, whether those technological changes are addressed by the U.S.’s current policy framework and highlight where further government action, funding, research and consideration may be required.

This is going to be a collaborative effort. The President’s Council of Advisors on Science and Technology (PCAST) will conduct a study to explore in-depth the technological dimensions of the intersection of big data and privacy, which will feed into this broader effort. Our working group will consult with industry, civil liberties groups, technologists, privacy experts, international partners, and other national and local government officials on the significance of and future for these technologies. Finally, we will be working with a number of think tanks, academic institutions, and other organizations around the country as they convene stakeholders to discuss these very issues and questions. Likewise, many abroad are analyzing and responding to the challenge and seizing the opportunity of big data. These discussions will help to inform our study.

While we don’t expect to answer all these questions, or produce a comprehensive new policy in 90 days, we expect this work to serve as the foundation for a robust and forward-looking plan of action. Check back on this blog for updates on how you can get involved in the debate and for status updates on our progress.

White House rejects privacy board findings

The White House said it rejected an analysis from the Privacy and Civil Liberties Oversight Board that found the program collecting Americans' telephone data illegal and ineffective.

White House press secretary Jay Carney said members of the administration "simply disagree with the board's analysis on the legality of the program." He also said the President believed the metadata program, "combined with the other programs and efforts that are undertaken as part of our signal intelligence collection, have had the effect of making Americans more safe, of disrupting potential terrorist plots against the United States and the American people as well as our allies, and that it is a useful tool in the effort to combat terrorists."

In the latest battle to profit from control of the Internet, the consumer is stuck in the middle

[Commentary] Comcast customers are complaining about the poor quality of Netflix streaming during evening hours and wondering what’s going on. Their comments are both a reflection of Comcast’s previous bad behavior -- blocking peer-to-peer (P2P) content on its network back in 2008 -- and evidence of frustration that they can’t get the content they want on the broadband network they pay for. What these consumers may not realize is that their frustration and complaints are actually a key element in negotiations between Comcast and the giants of the Internet. It’s a negotiation playing out with greater frequency as many ISPs (not just Comcast) try to enforce their vision of how the Internet should be paid for, and it’s a vision that Internet content companies don’t share. Some ISPs believe they should be able to charge companies like Google or Netflix -- which send the ISP a large amount of traffic -- a fee for sending that traffic over the ISP’s network.

While this may sound like a network neutrality issue, it’s not. It’s a far more hidden and seemingly capricious problem: It’s a peering dispute. Peering governs how networks directly connect to each other on the Internet, and most people like it because it’s an efficient way to exchange traffic across networks, so providers don’t have to build capacity to every single location in the world. And when it comes to peering disputes the customer always loses, because the customer becomes a pawn in the negotiations between Internet superpowers (or wannabe superpowers).

The Challenge of Open Access -- Lessons Learned Part III

[Commentary] In an open access approach, the local government would build the network out to connect all residents and businesses but not directly deliver services. Instead, multiple independent Internet Service Providers (ISPs) would compete on the network for business, ideally specializing in different niches - some providing great video game optimizations and others focusing on meeting small business needs. Unfortunately, there are reasons we have not seen this approach gain widespread traction. The model is more difficult than is readily apparent. A large part of the difficulty comes from incumbent providers that refuse to use the fiber network. The cable and the telephone companies claim that they don't want to abandon their assets, but that is not the main reason they have refused to participate in these networks. The big cable and telephone companies know that they have terrible reputations and would be slaughtered in a competitive market - so they put great effort in ensuring that they face as little competition as possible. Allowing the open access market to develop would all but ensure mighty Comcast would have to compete against local providers that offer much better customer service, lower prices, and more.

[Christopher Mitchell is the Director of the Telecommunications as Commons Initiative with the New Rules Project of the Institute for Local Self-Reliance]

Why Companies Want Congress To Tell Them What To Do After Data Breaches

It's the kind of top-down, one-size-fits-all, heavy-handed regulation that corporate America despises. The exact type of mandate that businesses pay lobby shops millions to tweak and twist into oblivion. Except this time, America's big-box stores are begging Congress to boss them around.

Reeling from high-profile privacy fumbles at Target and Neiman Marcus, retailers are asking Congress to require them to notify customers when shoppers' information has been put at risk. Currently, when firms spill data, they're subject to a patchwork of state rules: 46 states, plus the District of Columbia, have their own privacy-breach notification laws. For a company like Target, which has stores in every state save Vermont, that means a massive compliance struggle. Backers of a unified standard say a federal requirement would not only make companies' lives easier but would also help firms serve their customers better by giving businesses a quick and comprehensive way to address hacks. And with tens of millions of Target and Neiman Marcus customers wondering if their credit cards are about to be used for someone else's shopping spree, the issue has new momentum in an otherwise gridlocked Congress.

Payment card data theft jumps five-fold

Well north of 740 million records were exposed in 2013, making it the worst year in terms of data breaches recorded. That's a very conservative number derived by analyzing approximately 500 breaches listed on the Privacy Rights Clearinghouse Chronology Data Base, according to the Online Trust Alliance.

That list is comprised of publicly disclosed data breaches and includes the 40 million records Target disclosed losing on Dec 13. Target's official estimate is now up to 110 million. And many of the breach cases listed for 2013 show an unknown or undisclosed number of records taken. So 740 million is a low number. "Consumers and businesses are both victims of rapidly escalating hacking attacks, and as stewards of consumer data it's incumbent on businesses to adopt best practices to help protect consumers from harm," says Craig Spiezle, executive director and president of the Online Trust Alliance. "Companies that fail to do so need to be held accountable." Even so, the Clearinghouse's tally shows a five-fold Increase in credit card and social security numbers lost, year over year. But here's the real kicker: the OTA has determined that fully 89 percent of breaches were avoidable if basic security controls and best practices been enforced.

Neiman Marcus: 1.1 million in-store customers affected by breach

Neiman Marcus Group said that about 1.1 million customers have been affected by a three-month security breach that the retailer initially disclosed in early January 2014.

So far, credit card companies have told the high-end retailer that about 2,400 cards from Neiman Marcus customers have been used in fraudulent transactions linked to the breach. This is the most detailed accounting of the incident, which occurred between July and October of 2013, the firm has released to date. Neiman Marcus said online customers were not affected by the intrusion and sensitive information such as social security numbers, birth dates and PIN numbers were not taken in the cyberattack. The scope of the Neiman Marcus attack is far more limited than a similar breach at Target, where a December breach might ultimately affect more than 100 million customers. Though Neiman Marcus says it has “no knowledge” of a connection to the Target breach, the incidents are striking similar.