<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>DBMS 2 : DataBase Management System Services</title>
	<atom:link href="http://www.dbms2.com/feed/" rel="self" type="application/rss+xml" />
	<link>http://www.dbms2.com</link>
	<description>Choices in data management and analysis</description>
	<lastBuildDate>Thu, 27 Jun 2019 10:44:38 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>hourly</sy:updatePeriod>
	<sy:updateFrequency>1</sy:updateFrequency>
	<generator>https://wordpress.org/?v=4.9.26</generator>
	<item>
		<title>Political issues around big tech companies</title>
		<link>http://www.dbms2.com/2019/06/27/political-issues-around-big-tech-companies/</link>
		<comments>http://www.dbms2.com/2019/06/27/political-issues-around-big-tech-companies/#comments</comments>
		<pubDate>Thu, 27 Jun 2019 10:44:38 +0000</pubDate>
		<dc:creator><![CDATA[Curt Monash]]></dc:creator>
				<category><![CDATA[Surveillance and privacy]]></category>

		<guid isPermaLink="false">http://www.dbms2.com/?p=10400</guid>
		<description><![CDATA[The technology industry has an increasingly complex relationship to government and politics, most importantly in three areas: Privacy and surveillance. Censorship. Antitrust, general economic regulation, and other competition management. Here’s some of what I think about that, plus links to a lot more. 1. For a long time, I’ve maintained: Privacy and surveillance are very [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The technology industry has an increasingly complex relationship to government and politics, most importantly in three areas:</p>
<ul>
<li>Privacy and surveillance.</li>
<li>Censorship.</li>
<li>Antitrust, general economic regulation, and other competition management.</li>
</ul>
<p>Here’s some of what I think about that, plus links to a lot more.</p>
<p>1. For a long time, I’ve maintained:</p>
<ul>
<li>Privacy and surveillance are very big deals.</li>
<li>Ultimately, they cannot be handled effectively without direct regulation of specific permitted and forbidden uses of data.</li>
</ul>
<p>The first point is now widely accepted. The second unfortunately is not; laws and regulations generally state who may or may not record, keep or decrypt particular kinds of data, rather than what particular uses they may make of it.</p>
<p>2. Another threat to freedom has arisen as big as that from privacy/surveillance: a many-fronts push for censorship. It would ultimately be calamitous for free countries to agree that the threat of “Fake News” and other dangerous online partisanship justifies general censorship, by governments or “platform” tech companies as the case may be, yet that is exactly the path we seem to be on.</p>
<p>Fortunately, there are <a href="http://www.dbms2.com/2019/06/27/how-to-beat-fake-news/">less dangerous ways</a> to address the same challenges. I expect to make as much fuss about this issue in the upcoming decade as I have about privacy/surveillance over the past one.</p>
<p><span id="more-10400"></span>3. There are increasingly many calls to break up large internet companies, under existing antitrust laws or perhaps new ones. There is some precedent for actual breakup of technology companies, mainly the <a href="https://en.wikipedia.org/wiki/Breakup_of_the_Bell_System">1982 breakup of AT&amp;T/the Bell System</a> in telephony and a couple of rounds of divestiture by the <a href="https://en.wikipedia.org/wiki/RCA">GE/RCA/NBC</a> broadcasting/electronics companies in 1932 and 1942. More important, perhaps, have been less-than-breakup agreements to promote or allow competition, such as Bell’s 1956 agreement to license its patents for free, IBM’s 1956 agreement to compete somewhat fairly in professional services, IBM’s further agreement in 1969 to “completely” unbundle hardware, software and services, and Microsoft’s tolerance of independent web browsers.</p>
<p>As for some particular, recently suggested competition-protecting ideas:</p>
<ul>
<li>I agree with people like <a href="https://www.nytimes.com/2019/06/26/us/politics/elizabeth-warren-break-up-amazon-facebook.html">Elizabeth Warren</a> that Facebook should never have been allowed to buy Instagram or WhatsApp, because those services are all different aspects of substantially the same business. And I’d support a forced divestiture now.</li>
<li>I think Google has been a pretty responsible oligopolist, with little harmful overlap between its businesses, and doesn’t need to be broken up. But that also suggests a forced breakup, e.g. separating search from Android, wouldn’t do much harm.</li>
<li>Amazon Web Services and Amazon’s online store are two quite separate businesses. Forcing a formal separation wouldn’t have many important consequences, good or bad.</li>
<li>Here’s one where I differ strongly from Elizabeth Warren et al.: The idea of prohibiting a retailer from having “house branded” items is ridiculous. Supermarkets surely make over 100% of their profits from prepared foods that are pretty much all house branded. Companies that sell their own products online shouldn’t be prohibited from selling auxiliary third-party products as well. Amazon is no exception to this general rule.</li>
<li>Finally, I have long favored <a href="http://www.dbms2.com/2014/05/14/solve-the-network-neutrality-dilemma-and-make-money-too/">a middle course on network neutrality</a>. But if the only politically practical possibilities are the two obvious extremes, then I favor enforced neutrality by far over “any bias goes”.</li>
</ul>
<p>And whatever happens otherwise in competition enforcement, I’d support antitrust exceptions for certain technology research and study &#8212; certainly in multiple security-related efforts, and perhaps around language understanding as well.</p>
<p>4. One interesting note is how commonly tech-related policy issues turn out to be non-/bi-partisan.</p>
<ul>
<li>Privacy/surveillance issues commonly are so, most extremely in the case of the <a href="http://www.dbms2.com/2018/01/22/the-chaotic-politics-of-privacy/">Email Privacy Act</a>, which passed the House of Representatives 419-0 despite being so controversial it actually never got through the Senate.</li>
<li>Everybody’s mad at social media companies these days.</li>
<li>The populist/anti-elitist aspect of pressure on tech companies seemed mainly like a right-wing/Steve Bannon thing … and then the backlash against New York’s proposed giveaway to Amazon happened. That was mainly from the left. Ditto, I imagine, for the San Francisco and Seattle residents who oppose gentrification.</li>
</ul>
<p>Of course, there are exceptions, for example:</p>
<ul>
<li>Democrats generally support network neutrality and Republicans generally don’t.</li>
<li>The Trump Administration’s opposition to immigration sometimes extends to tech workers and to students who may some day become such.</li>
</ul>
<p>5. And finally, <a href="http://www.dbms2.com/2014/02/01/more-on-public-policy/">government procurement of technology</a> has been a costly mess for many decades, worldwide, occasional improvements such as those during the Clinton Administration in the United States notwithstanding. And the cost is not just in money; with better knowledge management technology, the FBI might have connected dots to prevent the 9/11 attacks.</p>
<p>Private-sector large-enterprise technology acquisition is no picnic either, but it’s a lot better than government’s. Government contracting procedures have got to be changed.</p>
<p><i><b>Related links</b></i></p>
<ul>
<li>I summarized many of the <a href="http://www.dbms2.com/2017/12/15/the-technology-industry-is-under-broad-political-attack/">political threats to the tech industr</a>y in December, 2017.</li>
<li>My posts directly focused on public policy in the area of privacy/surveillance include:
<ul>
<li><a href="http://www.dbms2.com/2013/07/29/very-chilling-effects/">Very chilling effects</a> (July, 2013).</li>
<li><a href="http://www.dbms2.com/2013/07/29/what-our-legislators-should-do-about-privacy-and-arent/">What our legislators should do about privacy (and aren’t)</a> (July, 2013).</li>
<li><a href="http://www.dbms2.com/2012/03/01/where-the-privacy-discussion-needs-to-head/">Where the privacy discussion needs to head</a> (March, 2012).</li>
<li><a href="http://www.dbms2.com/2010/07/04/fair-data-use/">Essential questions of fair data use</a> (July, 2010).</li>
</ul>
</li>
<li>Some of what I wrote about <a href="http://www.monashreport.com/category/public-policy-and-privacy/economic-development/">technology-related economic development</a> in May, 2006 still holds true.</li>
<li>I’ve long been on the skeptical side about technology <a href="http://www.dbms2.com/2010/03/23/software-innovation-patent/">patents</a>.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.dbms2.com/2019/06/27/political-issues-around-big-tech-companies/feed/</wfw:commentRss>
		<slash:comments>4</slash:comments>
		</item>
		<item>
		<title>How to beat &#8220;fake news&#8221;</title>
		<link>http://www.dbms2.com/2019/06/27/how-to-beat-fake-news/</link>
		<comments>http://www.dbms2.com/2019/06/27/how-to-beat-fake-news/#comments</comments>
		<pubDate>Thu, 27 Jun 2019 10:42:50 +0000</pubDate>
		<dc:creator><![CDATA[Curt Monash]]></dc:creator>
				<category><![CDATA[Public policy]]></category>
		<category><![CDATA[Text]]></category>

		<guid isPermaLink="false">http://www.dbms2.com/?p=10402</guid>
		<description><![CDATA[Most observers hold several or all of the views: “Fake news” and the like are severe problems. Algorithmic solutions have not worked well to date. Neither have manual ones. Trusting governments to censor is a bad idea. In light of the previous points, trusting large social media corporations to censor is a bad idea too. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Most observers hold several or all of the views:</p>
<ul>
<li>“Fake news” and the like are severe problems.</li>
<li>Algorithmic solutions have not worked well to date.</li>
<li>Neither have manual ones.</li>
<li>Trusting governments to censor is a bad idea.</li>
<li>In light of the previous points, trusting large social media corporations to censor is a bad idea too.</li>
<li>Educating consumers to evaluate news and opinions accurately would be … difficult.</li>
</ul>
<p>And further:</p>
<ul>
<li>Whatever you think of the job traditional journalistic organizations previously did as news arbiters, they can’t do it as well anymore, for a variety of economic, structural and societal reasons.</li>
</ul>
<p>But despite all those difficulties, I also believe that <b>a good solution to news/opinion filtering is feasible;</b> it just can’t be as simple as everybody would like.</p>
<p><span id="more-10402"></span>1. When people think about these problems, they’re probably most focused on social media platforms such as Facebook, YouTube or Twitter. But before getting to those, let’s consider the simpler case of <b>search engines.</b><b> </b>In essence, what search engines do is:</p>
<ul>
<li>Assign a relevance score to the relationship between a site (or particular page) and your query.</li>
<li>Assign a quality score to a site.</li>
<li>Combine those two scores into an overall ranking, and serve up results accordingly.</li>
</ul>
<p>How well does this work? I’d say that search engines:</p>
<ul>
<li>Are good at directing you to information that is generally related to what you want to know. This is the technological core of what they do.</li>
<li>Are good at shielding you from the worst cheating/spammer/hacker sites. That’s also a major technical focus for them.</li>
<li>Are poor but not horrible at distinguishing between good and bad sources of information, opinion or advice. Generally, they do this via some kind of popularity contest, whether via Google’s venerable PageRank or by more directly observing which sites users seem to go to and stay at.</li>
<li>Don’t even try to filter sites according to leanings such as political bias.</li>
</ul>
<p>Lessons from that start:</p>
<ul>
<li>Huge technology companies can actually do pretty well at the parts of the problem that technology alone can solve.</li>
<li>A lot of the challenge boils down to <b>adversarial information retrieval,</b> where the adversaries range from somewhat honest polemicists or hucksters to completely awful hackers and spammers.</li>
</ul>
<p>2. When defending against bad actors, <b>scale</b> helps a lot. In my favorite example:</p>
<ul>
<li>A significant fraction of all the world’s email goes through Gmail.</li>
<li>Thus, it is very hard for email spam blasts to escape Google’s honeypots.</li>
<li>Informed by those honeypots, Google does what in my opinion is a very good job of fighting spam.</li>
</ul>
<p>Similarly, as the publisher of multiple blogs, I can tell you that much the same is true of WordPress’ Akismet’s fight against spam comments. Akismet isn’t perfect; indeed, I’ve stopped adding new content to the blog where this post would fit best &#8212; <a href="http://www.texttechnologies.com/">Text Technologies</a> – because of a multi-year spam attack. But on the whole Akismet works very well.</p>
<p>Thus, in contradiction to many observers, I believe that <b>the huge scale of social media companies is NOT the root of the problem.</b></p>
<p>3. Of course, concern is really focused on social media, and especially on the concern that <b>people </b><b>communicat</b><b>e</b><b> things they </b><b>(supposedly) </b><b>shouldn’t,</b> where:</p>
<ul>
<li>“Communicating” includes words, pictures, videos, etc.</li>
<li>“Shouldn’t” covers outright lies, great factual distortions, hate speech … or just opinions that the would-be censor doesn’t think should be spread.</li>
</ul>
<p>And even if you don’t worry so much about those problems, some kind of censorship, filtering or gatekeeping is inevitable anyway, simply because there’s vastly more information in the world than any one person can consume.</p>
<p>So what are the main options for censorship and other gatekeeping? My opinions start:</p>
<ul>
<li>Having governments be in charge of censorship is a terrible idea.</li>
<li>Having large, non-journalist corporations be directly in charge of censorship is also a bad idea, because ultimately they’ll just succumb to government or other political pressure.</li>
<li>The traditional modern gatekeepers are journalistic organizations, who both deserved and received trust that they’d do the job responsibly. But that model no longer suffices in its old form, for several sets of reasons:
<ul>
<li><i>New requirements. </i>Traditional journalistic gatekeeping boils down to organizations vetting the content they themselves produce. It doesn’t work nearly as well for third-party content, worthy efforts such as fact-checking columns notwithstanding.</li>
<li><i>Trust.</i> Walter Cronkite is long dead; journalists aren’t nearly as trusted as they used to be.</li>
<li><i>Deliberate bias. </i>Opinion and bias are now part of many “news” organizations’ business models, to a much greater extent than they were a few decades in the past.</li>
<li><i>Money.</i> Most journalistic organizations have much slimmer news budgets than they had at their peak.</li>
</ul>
</li>
</ul>
<p>4. So if we need gatekeeping, and no natural kind of gatekeeper can on its own be effective or safe, what’s left? In simplest terms, we need <b>gatekeeping by (technological) committee.</b> Mainly, what I propose comprises:</p>
<ul>
<li><b>Different kinds of gatekeeper for different aspects of the problem,</b> including at a minimum:
<ul>
<li>Human-led filters to deal with various issues in credibility and bias.</li>
<li>Technology-led filters to deal with pure fakery and false provenance.</li>
<li>Further filtering of the kinds that would be needed even in a more benign world.</li>
</ul>
</li>
<li>Multiple <b>choices</b> for at least the human-led filters.</li>
<li>Good, simple (!) <b>user interfaces</b> for combining those filters’ results.</li>
</ul>
<p>Above all, <b>people must be able to choose their own censors.</b></p>
<p>5. What I envision for the “human-led filters to deal with various issues in credibility and bias” is something like:</p>
<ul>
<li>An organization maintains slowly-changing whitelists and blacklists of information sources.</li>
<li>The same organization fact-checks or other vets specific stories, claims and content in near-real-time.</li>
<li>The results scale to other stories, claims and content via very-rapidly-retrained machine learning models, whether those are based on a single gatekeeper’s hand editing or, more likely, on multiple hand-edited training sets and other collaborative inputs at once.</li>
</ul>
<p>Here an “organization” can be anything trusted by enough people to be economically viable, for example:</p>
<ul>
<li>An offshoot of an existing journalistic organization.</li>
<li>An offshoot of an existing political party or advocacy organization.</li>
<li>A successfully started-up new entity.</li>
</ul>
<p>Obviously, there would be business issues, notably:</p>
<ul>
<li><i>Costs. </i>Who pays, in an economy where news is commonly “free”?</li>
<li><i>Chicken-egg adoption.</i> Which gets developed first: Human-led filtering services that can’t yet be integrated into actual social media filtering, or technology to integrate human-led filtering services that don’t yet exist?</li>
</ul>
<p>But given the importance and visibility of the problem, optimism about solving the business issues is appropriate. The hardest part is the technology itself. Can machine learning models be retrained on a sub-hour or even sub-minute basis? Sure. That’s been confirmed many times. But what I’m suggesting is a pretty complex case, with global scale, intermediate results passed among organizations, with plenty of adversarial elements, all done at very high speed.</p>
<p>That is not yet a solved problem. But it certainly seems solvable. Further, it’s a problem that <b>must</b> be solved, lest liberal democracy be as doomed as some people fear it actually is.</p>
<p><i><b>Related links</b></i></p>
<ul>
<li>I wrote a bit about <a href="http://www.dbms2.com/2016/05/30/adversarial-analytics-and-other-topics/">adversarial analytics</a> in May, 2016.</li>
<li>I outlined my views about the <a href="http://www.monashreport.com/2018/02/16/the-wars-on-democracy-and-truth/">“War(s) on Truth”</a> in February, 2018.</li>
<li>Earlier this month, <a href="https://www.nytimes.com/2019/06/24/opinion/future-free-speech-social-media-platforms.html">Cory Doctorow</a> offered a hard-hitting column on the dangers of expecting internet companies to do our censorship for us.</li>
<li>More sedately but with more explanation, so did <a href="https://onezero.medium.com/the-one-rule-of-content-moderation-that-every-platform-follows-ab6323e0e293?gi=6fcd31559ea7">Will Oremus</a>.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.dbms2.com/2019/06/27/how-to-beat-fake-news/feed/</wfw:commentRss>
		<slash:comments>9</slash:comments>
		</item>
		<item>
		<title>New legal limits on surveillance in the US</title>
		<link>http://www.dbms2.com/2018/06/25/new-legal-limits-on-surveillance-in-the-us/</link>
		<comments>http://www.dbms2.com/2018/06/25/new-legal-limits-on-surveillance-in-the-us/#comments</comments>
		<pubDate>Mon, 25 Jun 2018 19:55:21 +0000</pubDate>
		<dc:creator><![CDATA[Curt Monash]]></dc:creator>
				<category><![CDATA[GIS and geospatial]]></category>
		<category><![CDATA[Surveillance and privacy]]></category>

		<guid isPermaLink="false">http://www.dbms2.com/?p=10386</guid>
		<description><![CDATA[The United States has new legal limits on electronic surveillance, both in one specific way and &#8212; more important &#8212; in prevailing judicial theory. This falls far short of the protections we ultimately need, but it&#8217;s a welcome development even so. The recent Supreme Court case Carpenter v. United States is a big deal. Let [&#8230;]]]></description>
				<content:encoded><![CDATA[<p><em>The United States has new legal limits on electronic surveillance, both in one specific way and &#8212; more important &#8212; in prevailing judicial theory. This falls far short of the protections we ultimately need, but it&#8217;s a welcome development even so.</em></p>
<p>The recent Supreme Court case <em>Carpenter v. United States</em> is a big deal. Let me start by saying:</p>
<ul>
<li>Most fundamentally, the <em>Carpenter</em> decision was<strong> based on and implicitly reaffirms the Katz test.*</strong> This is good.</li>
<li>The <em>Carpenter</em> decision <strong>undermines the third-party doctrine.**</strong> This is great. Strict adherence to the third-party doctrine would eventually have given the government unlimited rights of Orwellian surveillance.</li>
<li>The <em>Carpenter</em> decision suggests the Court has adopted an <a href="http://195sio3cgwr519n16t44azrb2yn.wpengine.netdna-cdn.com/wp-content/uploads/pdfs/vol125_kerr.pdf">equilibrium-adjustment</a> approach to Fourth Amendment jurisprudence.
<ul>
<li>The &#8220;equilibrium&#8221; being maintained here is the balance between governmental rights to intrude on privacy and citizens&#8217; rights not to be intruded on.</li>
<li>e., equilibrium-adjustment is a <strong>commitment to maintaining approximately the same level of liberty (with respect to surveillance) we&#8217;ve had all along.</strong></li>
<li>I got the equilibrium-adjustment point from <a href="https://reason.com/volokh/2018/06/22/first-thoughts-on-carpenter-v-united-sta">Eugene Volokh&#8217;s</a> excellent overview of the <em>Carpenter </em>decision.<em><br />
</em></li>
</ul>
</li>
</ul>
<p><em>*The <a href="https://en.wikipedia.org/wiki/Katz_v._United_States">Katz test</a> basically says that that an individual&#8217;s right to privacy is whatever society regards as a reasonable expectation of privacy at that time.</em></p>
<p><em>**The <a href="https://en.wikipedia.org/wiki/Third-party_doctrine">third-party doctrine</a> basically says that any information of yours given voluntarily to a third party isn&#8217;t private. This includes transactional information such as purchases or telephone call detail records (CDRs)</em></p>
<p>Key specifics include: <span id="more-10386"></span></p>
<ul>
<li>The actual issue in <em>Carpenter</em> is whether the government needs a warrant to access cell phone location data that allows a cell phone user&#8217;s movements to be quite accurately tracked. The decision on that issue was Yes.</li>
<li>This was a 5-4 decision. Chief Justice Roberts and the four liberal justices voted for it. Swing voter Justice Kennedy and the other three conservative justices voted against it.</li>
<li>The majority was united. Justice Roberts wrote the <a href="https://www.supremecourt.gov/opinions/17pdf/16-402_h315.pdf">decision</a> and there were no concurrences.</li>
<li>The dissents were not united, but did generally focus on two kinds of arguments:
<ul>
<li>Reliance on the third-party doctrine, commonly expressed as reliance on the <a href="https://en.wikipedia.org/wiki/Smith_v._Maryland">Smith</a> and <a href="https://en.wikipedia.org/wiki/United_States_v._Miller_(1976)">Miller</a> precedents.</li>
<li>Disagreement with the Katz test.</li>
</ul>
</li>
</ul>
<p>Also very relevant was the 2012 case requiring warrants for GPS tracking, <a href="https://en.wikipedia.org/wiki/United_States_v._Jones">United States v Jones</a>. But discussion of the <em>Jones</em> decision is confusing, because while some justices at the time addressed the issue of general electronic tracking of a person&#8217;s movements, others focused narrowly on the physical action of installing the GPS device.</p>
<p>Unfortunately, all the good news in <em>Carpenter </em>notwithstanding, the decision doesn&#8217;t come close to accomplishing as much as we need. I stand by my <a href="http://www.dbms2.com/2016/05/18/surveillance-data-in-ordinary-law-enforcement/">oft-repeated observations</a>:</p>
<blockquote>
<ul>
<li>Massive surveillance is inevitable.</li>
<li>Unless the uses of the resulting information are VERY limited, freedoms will be <a href="http://www.dbms2.com/2013/07/08/privacy-data-use-chilling-effects/">chilled</a> into oblivion.</li>
</ul>
</blockquote>
<p>Justice Roberts correctly wrote in the Carpenter decision:</p>
<blockquote><p>Mapping a cell phone’s location &#8230; provides an intimate window into a person’s life, revealing not only his particular movements, but through them his “familial, political, professional, religious, and sexual associations.”</p></blockquote>
<p>Justice Kennedy however rejoindered:</p>
<blockquote><p>What persons purchase and to whom they talk might disclose how much money they make; the political and religious organizations to which they donate; whether they have visited a psychiatrist, plastic surgeon, abortion clinic, or AIDS treatment center; whether they go to gay bars or straight ones; and who are their closest friends and family members.</p></blockquote>
<p>His point, also correct, was that <strong>the data that police are allowed to get without warrants is even more privacy-violating than the data <em>Carpenter</em> keeps away from them.</strong> And so, as good as the <em>Carpenter</em> decision apparently is, privacy invasion and surveillance are still among the gravest threats to liberty that we face.</p>
<p><strong><em>Related links</em></strong></p>
<ul>
<li>My January post on <a href="http://www.dbms2.com/2018/01/22/the-chaotic-politics-of-privacy/">the chaotic politics of privacy</a> is relevant both to the content of the <em>Carpenter</em> decision and to the fact that the decision-makers did not split perfectly along traditional partisan lines.</li>
<li>My 2013 series on privacy theory suggests that gaps in judicial reasoning could be filled by referencing the problem of <a href="http://www.dbms2.com/2013/07/08/privacy-data-use-chilling-effects/">chilling effects</a>.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.dbms2.com/2018/06/25/new-legal-limits-on-surveillance-in-the-us/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Brittleness, Murphy&#8217;s Law, and single-impetus failures</title>
		<link>http://www.dbms2.com/2018/06/20/brittleness-murphys-law-and-single-impetus-failures/</link>
		<comments>http://www.dbms2.com/2018/06/20/brittleness-murphys-law-and-single-impetus-failures/#comments</comments>
		<pubDate>Wed, 20 Jun 2018 09:15:44 +0000</pubDate>
		<dc:creator><![CDATA[Curt Monash]]></dc:creator>
				<category><![CDATA[Analytic technologies]]></category>
		<category><![CDATA[Text]]></category>

		<guid isPermaLink="false">http://www.dbms2.com/?p=10367</guid>
		<description><![CDATA[In my initial post on brittleness I suggested that a typical process is: Build something brittle. Strengthen it over time. In many engineering scenarios, a fuller description could be: Design something that works in the base cases. Anticipate edge cases and sources of error, and design for them too. Implement the design. Discover which edge [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>In my initial post on <a href="http://www.dbms2.com/2018/06/20/brittleness-and-incremental-improvement/">brittleness</a> I suggested that a typical process is:</p>
<ul>
<li>Build something brittle.</li>
<li>Strengthen it over time.</li>
</ul>
<p>In many engineering scenarios, a fuller description could be:</p>
<ul>
<li>Design something that works in the base cases.</li>
<li>Anticipate edge cases and sources of error, and design for them too.</li>
<li>Implement the design.</li>
<li>Discover which edge cases and error sources you failed to consider.</li>
<li>Improve your product to handle them too.</li>
<li>Repeat as needed.</li>
</ul>
<p>So it&#8217;s necesseary to understand what is or isn&#8217;t likely to go wrong. Unfortunately, that need isn&#8217;t always met.  <span id="more-10367"></span></p>
<p><strong><em>Murphy&#8217;s Law and exaggerated fears</em></strong></p>
<p>We should always bear in mind Murphy&#8217;s Law, which in its simplest form states: <strong>Anything that can go wrong, will. </strong>But also remember that Murphy&#8217;s Law is a joke; and even if it were serious, <a href="http://www.strategicmessaging.com/no-market-categorization-is-ever-precise/2011/03/01/">nothing concise is ever precise</a>.</p>
<p>People who tend to over-believe in Murphy&#8217;s Law include but are hardly limited to:</p>
<ul>
<li>Bureaucrats.</li>
<li>Worried parents, especially of only children. (Later kids tend to have it easier, as their parents have more experience.)</li>
<li>Any buyer or voter you believe has been over-persuaded toward <a href="http://www.strategicmessaging.com/stoking-a-fear-and-promising-a-fix/2017/02/15/">fear, uncertainty and doubt</a>.</li>
<li>Relational bigots who view the <a href="http://www.dbms2.com/2011/07/31/the-ted-codd-guarantee/">Ted Codd guarantee</a> as an absolute requirement for data management.</li>
</ul>
<p><strong><em>Adversaries</em></strong></p>
<p>The strongest scenarios for Murphy&#8217;s Law should be adversarial ones, in which somebody is actively trying to cause problems. But even there it doesn&#8217;t always apply. For example:</p>
<ul>
<li><strong>Information security</strong> commonly fits the Murphy model. Hackers keep outwitting defenders.</li>
<li><strong>Email spam,</strong> however, does not. It&#8217;s pretty much of a solved problem; the few spam emails that still get through hardly matter.</li>
<li><strong>Web search</strong> is somewhere in between. Both sides are partially successful in the combat over <a href="http://www.texttechnologies.com/2007/01/30/adversarial-information-retrieval/">adversarial information retrieval</a>, as &#8220;good&#8221; and &#8220;bad&#8221; sites alike are both well-represented in search results.</li>
</ul>
<p><strong><em>Single-impetus failures</em></strong></p>
<p>Since bad or scary things will happen &#8212; Murphy&#8217;s Law isn&#8217;t entirely wrong &#8212; a standard design practice is to avoid <strong>single points of failure.</strong> Brittleness has a lot to do with which single points of failure have been overlooked; improvement has a lot to do with belatedly cleaning them up. In adversarial scenarios, avoiding single points of failure relates closely to <strong>defense in depth.</strong></p>
<p>Some of the nastiest surprises occur when failures have no obvious single point, yet wind up being possible from a <strong>single impetus.*</strong> This happens when multiple points or moments of failure are somehow correlated, or when they actually <strong>cascade.</strong> Examples vary widely, including:</p>
<ul>
<li>The collapse of the World Trade Center buildings.</li>
<li>An authoritarian leader who manages to destroy a whole democratic system of government.</li>
</ul>
<p>IT examples that are relatively big deals include:</p>
<ul>
<li>Security breaches in which an attacker becomes able to fully impersonate a well-credentialed user.</li>
<li>Power outages or other whole-building breakdowns that bring down all parts of a (locally) redundant cluster.</li>
<li>Software bugs that bring down all parts of a supposedly redundant system at once.</li>
<li>Analytic failures that stem from misleading data sets. (Garbage in, garbage out.)</li>
</ul>
<p><em>*I chose the phrase &#8220;single impetus&#8221; rather than &#8220;single cause&#8221; because NOTHING has a truly single cause; things only can happen when all kinds of conditions are satisfied for them to succeed. But there can indeed be an identifiable force, plan or occurrence that sets a chain of events in motion, and that&#8217;s what I&#8217;m calling the &#8220;impetus&#8221;.</em></p>
<p><strong><em>Related link</em></strong></p>
<ul>
<li>A lot of analytics turns out to be <a href="http://www.dbms2.com/2016/05/30/adversarial-analytics-and-other-topics/">adversarial</a>.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.dbms2.com/2018/06/20/brittleness-murphys-law-and-single-impetus-failures/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Brittleness and incremental improvement</title>
		<link>http://www.dbms2.com/2018/06/20/brittleness-and-incremental-improvement/</link>
		<comments>http://www.dbms2.com/2018/06/20/brittleness-and-incremental-improvement/#comments</comments>
		<pubDate>Wed, 20 Jun 2018 09:13:56 +0000</pubDate>
		<dc:creator><![CDATA[Curt Monash]]></dc:creator>
				<category><![CDATA[Analytic technologies]]></category>
		<category><![CDATA[Buying processes]]></category>
		<category><![CDATA[Theory and architecture]]></category>

		<guid isPermaLink="false">http://www.dbms2.com/?p=10366</guid>
		<description><![CDATA[Every system &#8212; computer or otherwise &#8212; needs to deal with possibilities of damage or error. If it does this well, it may be regarded as &#8220;robust&#8221;, &#8220;mature(d), &#8220;strengthened&#8221;, or simply &#8220;improved&#8221;.* Otherwise, it can reasonably be called &#8220;brittle&#8221;. *It&#8217;s also common to use the word &#8220;harden(ed)&#8221;. But I think that&#8217;s a poor choice, as [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Every system &#8212; computer or otherwise &#8212; needs to deal with possibilities of damage or error. If it does this well, it may be regarded as <strong>&#8220;robust&#8221;, &#8220;mature(d),</strong> <strong>&#8220;strengthened&#8221;, </strong>or simply <strong>&#8220;improved&#8221;.*</strong> Otherwise, it can reasonably be called <strong>&#8220;brittle&#8221;.</strong></p>
<p><em>*It&#8217;s also common to use the word &#8220;harden(ed)&#8221;. But I think that&#8217;s a poor choice, as brittle things are often also hard.</em></p>
<p>0. As a general rule in IT:</p>
<ul>
<li>New technologies and products are brittle.</li>
<li>They are strengthened <strong>incrementally</strong> over time.</li>
</ul>
<p>There are many categories of IT strengthening. Two of the broadest are:</p>
<ul>
<li>Bug-fixing.</li>
<li><a href="http://www.dbms2.com/2009/08/21/bottleneck-whack-a-mole/">Bottleneck Whack-A-Mole</a>.</li>
</ul>
<p>1. <a href="http://www.dbms2.com/2013/03/18/dbms-development-marklogic-hadoop/">One of my more popular posts</a> stated:</p>
<blockquote><p>Developing a good DBMS requires 5-7 years and tens of millions of dollars.</p></blockquote>
<p>The reasons I gave all spoke to brittleness/strengthening, most obviously in:</p>
<blockquote><p>Those minor edge cases in which your Version 1 product works poorly aren’t minor after all.</p></blockquote>
<p>Similar things are true for other kinds of &#8220;platform software&#8221; or distributed systems.</p>
<p>2. The UI brittleness/improvement story starts similarly:  <span id="more-10366"></span></p>
<ul>
<li>Graphical user interfaces can present users&#8217; choices clearly, making them great antidotes to users&#8217; initial lack of system knowledge or training.</li>
<li><strong>Usability testing</strong> and engineering can lead to improvements and the removal of glitches.</li>
</ul>
<p>Unfortunately, however, as systems add or change features, <strong>UI navigation can get more difficult over time</strong> rather than easier.</p>
<p><em>In at least one scenario &#8212; plane crashes due to confused-pilot error &#8212; the consequences can be literally fatal.</em></p>
<p>3. Sometimes brittleness just doesn&#8217;t get solved.</p>
<ul>
<li><strong>Security</strong> is perhaps the most visible example. Almost every security system can be broken, and bad actors actively do so.</li>
<li>Another example was 1980s-90s <strong>CASE (Computer-Aided Software Engineering),</strong> specifically in the area of generating code from specifications. The technology was only able to generate apps that performed a limited set of functions &#8212; too limited to be useful outside of certain niches &#8212; and never successfully evolved further.</li>
</ul>
<p>4. Large organizations are riddled with screw-ups. One of the most successful large enterprises in world history was the US military of World War 2 &#8212; and that is literally the organization where the word <a href="https://en.wikipedia.org/wiki/SNAFU">snafu</a> was coined.</p>
<p>The response is often <strong>bureaucracy</strong>. Somebody makes a mistake; procedures and rules are then instituted to ensure the mistake is never repeated. Over time, many rules and procedures build up, until organizational systems are hardened. Business processes wind up taking many steps, each of which represents both a cost and a potential for failure. And sometimes the only decisions that successfully get through the process are uninspired, uncreative or flat-out wrong.</p>
<p><em>This is the classic example of &#8220;hardening&#8221; &#8212; commonly expressed via its rough synonym &#8220;calcification&#8221; &#8212; adding even more brittleness than it removes. </em></p>
<p>Outward-facing/regulatory bureaucracies can be even worse..</p>
<ul>
<li>Regulators generally have two constituencies &#8212; consumers/general public and businesses &#8212; with the benefits of regulation going to one and the costs going to the other. Anything regulators do will likely displease at least one constituency.</li>
<li>These ever-unsatisfactory regulations can often only be changed through a long administrative or legislative process.</li>
<li>Violating regulations has unpredictable but sometimes severe consequences.</li>
</ul>
<p>The whole thing is a colossal mess.</p>
<p>5. Many of the previous points apply to <strong>enterprise applications, </strong>which facilitate business processes, have UIs, and commonly involve <a href="http://www.softwarememories.com/2015/11/11/notes-on-the-technology-supporting-packaged-application-software/">platform-like technology</a> as well.</p>
<p>Changing enterprise apps can take both discontinuous and incremental forms; you can either replace your old apps outright or change something in (or in the implementation of) the ones you have.</p>
<ul>
<li>If you rip-and-replace your apps, you&#8217;re likely to also do so to your business processes, and vice-versa. Discontinuous business process change is often seen as a great virtue, sometimes under the buzzname <a href="https://en.wikipedia.org/wiki/Business_process_reengineering">business process reengineering (BPR)</a>.</li>
<li>If you want to change your processes more incrementally, you likely need one or both of two things:
<ul>
<li><em>App software with more features than you initially need.</em> That may be easy to get, but it isn&#8217;t cheap.</li>
<li><em>A nimble IT department.</em> That one is neither cheap nor easy.</li>
</ul>
</li>
</ul>
<p>6. My biggest reason for writing about brittleness and improvement is to approach some topics around analytics and AI. As previously noted:</p>
<ul>
<li>Artificial intelligence is facing public skepticism both for being too accurate (!) and <a href="http://www.dbms2.com/2018/05/20/technology-implications-of-political-trends/">not accurate enough</a>.</li>
<li>Analytics in general is often surprisingly <a href="http://www.dbms2.com/2018/05/20/some-stuff-thats-always-on-my-mind/">inaccurate</a>.</li>
</ul>
<p>Please stay tuned.</p>
<p><strong><em>Related link(s)</em></strong></p>
<ul>
<li>Most of what I wrote in my December, 2015 series about <a href="http://www.dbms2.com/2015/12/01/what-is-ai-and-who-has-it/">artificial intelligence</a> still holds true.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.dbms2.com/2018/06/20/brittleness-and-incremental-improvement/feed/</wfw:commentRss>
		<slash:comments>1</slash:comments>
		</item>
		<item>
		<title>Technology implications of political trends</title>
		<link>http://www.dbms2.com/2018/05/20/technology-implications-of-political-trends/</link>
		<comments>http://www.dbms2.com/2018/05/20/technology-implications-of-political-trends/#comments</comments>
		<pubDate>Sun, 20 May 2018 19:29:09 +0000</pubDate>
		<dc:creator><![CDATA[Curt Monash]]></dc:creator>
				<category><![CDATA[Derived data]]></category>
		<category><![CDATA[Public policy]]></category>

		<guid isPermaLink="false">http://www.dbms2.com/?p=10354</guid>
		<description><![CDATA[The tech industry has a broad range of political concerns. While I may complain that things have been a bit predictable in other respects, politics is having real and new(ish) technical consequences. In some cases, existing technology is clearly adequate to meet regulators&#8217; and customers&#8217; demands. Other needs look more like open research challenges. 1. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>The tech industry has a broad range of political concerns. While I may complain that things have been a bit <a href="http://www.dbms2.com/2018/05/20/some-stuff-thats-always-on-my-mind/">predictable</a> in other respects, politics is having real and new(ish) technical consequences. In some cases, existing technology is clearly adequate to meet regulators&#8217; and customers&#8217; demands. Other needs look more like open research challenges.</p>
<p><strong><em>1. Privacy regulations will be very different in different countries or regions.</em></strong> For starters:</p>
<ul>
<li>This is one case in which the European Union&#8217;s bureaucracy is working pretty well. It&#8217;s making rules for the whole region, and they aren&#8217;t totally crazy ones.</li>
<li>Things are more chaotic in the English-speaking democracies.</li>
<li>Authoritarian regimes are enacting anti-privacy rules.</li>
</ul>
<p>All of these rules are subject to change based on:</p>
<ul>
<li>Genuine technological change.</li>
<li>Changes in politicians&#8217; or the public&#8217;s perceptions.</li>
</ul>
<p>And so I believe: <strong>For any multinational organization that handles customer data, privacy/security requirements are likely to change constantly.</strong> Technology decisions need to reflect that reality.</p>
<p><em><strong>2.</strong></em> <strong><em><a href="http://www.dbms2.com/2012/07/15/issues-in-regulatory-compliance/">Data sovereignty/geo-compliance</a> is a big deal.</em></strong> In fact, this is one area where the EU and authoritarian countries such as Russia formally agree. Each wants its citizens&#8217; data to be <strong>stored locally,</strong> so as to ensure adherence to local privacy rules.</p>
<p>For raw, granular data, that&#8217;s a straightforward &#8212; even if annoying &#8212; requirement to meet. But things get murkier for data that is aggregated or otherwise <a href="http://www.dbms2.com/2010/11/29/data-that-is-derived-augmented-enhanced-adjusted-or-cooked/">derived</a>. <span id="more-10354"></span></p>
<p><strong><em>3. Data anonymization needs to be credibly and reliably solved. </em></strong>Reliable data anonymization, in principle, could moot multiple conflicts, including:</p>
<ul>
<li>The tension between data sovereignty and global analytics.</li>
<li>The tension between <a href="http://www.dbms2.com/2010/10/10/xldb4-xldb/">medical research and health data privacy</a><em>.</em></li>
</ul>
<p>But <strong><em>doing so will be extremely hard.</em></strong></p>
<ul>
<li>Consumer internet deanonymization is brutally effective.
<ul>
<li>Birth date/zip code combinations come close to identifying people uniquely.</li>
<li>So does the computer/browser configuration information that gets communicated to any website.</li>
</ul>
</li>
<li>Ordinary citizens are only beginning to realize how not-anonymous they really are.</li>
<li>Mistrust of data-rich technology companies has recently exploded.</li>
</ul>
<p><strong><em> 4. Transparency will be demanded, in multiple forms. </em></strong>For starters:</p>
<ul>
<li>The complexity and sophistication of data privacy regulation will naturally lead to demands that compliance be straightforwardly auditable.</li>
<li>Those demands will come from regulators and consumers alike.</li>
</ul>
<p>We more or less know how to do that part already.</p>
<p>But where things get really messy is in the area of <strong>&#8220;black box&#8221; algorithms.</strong> People are concerned about potentially-untrustworthy automated decisions in many areas, such as:</p>
<ul>
<li>Self-driving cars (which occasionally kill people).</li>
<li>Junk-filled news feeds (which make democracy more difficult).</li>
<li>Various &#8220;creepy&#8221; e-commerce behaviors.</li>
</ul>
<p>In principle, I stand by my opinion from 2012: When consumers lose trust in algorithmic decision makers, it can be at least partially regained by a shift to <a href="http://www.dbms2.com/2012/02/27/translucent-modeling-and-the-future-of-internet-marketing/">translucent modeling</a>. But the mathematics of accomplishing that seem &#8212; as it were &#8212; rather unclear.</p>
<p><strong><em>Related link</em></strong></p>
<ul>
<li>Already in 2011, denanonymization and other <a href="http://www.dbms2.com/2011/01/11/the-technology-of-privacy-threats/">technologies of privacy threats</a> were very effective.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.dbms2.com/2018/05/20/technology-implications-of-political-trends/feed/</wfw:commentRss>
		<slash:comments>6</slash:comments>
		</item>
		<item>
		<title>Some stuff that&#8217;s always on my mind</title>
		<link>http://www.dbms2.com/2018/05/20/some-stuff-thats-always-on-my-mind/</link>
		<comments>http://www.dbms2.com/2018/05/20/some-stuff-thats-always-on-my-mind/#comments</comments>
		<pubDate>Sun, 20 May 2018 19:27:21 +0000</pubDate>
		<dc:creator><![CDATA[Curt Monash]]></dc:creator>
				<category><![CDATA[Data models and architecture]]></category>
		<category><![CDATA[Database diversity]]></category>
		<category><![CDATA[Predictive modeling and advanced analytics]]></category>
		<category><![CDATA[Public policy]]></category>
		<category><![CDATA[Theory and architecture]]></category>

		<guid isPermaLink="false">http://www.dbms2.com/?p=10353</guid>
		<description><![CDATA[I have a LOT of partially-written blog posts, but am struggling to get any of them finished (obviously). Much of the problem is that they have so many dependencies on each other. Clearly, then, I should consider refactoring my writing plans. 🙂 So let&#8217;s start with this. Here, in no particular order, is a list [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>I have a LOT of partially-written blog posts, but am struggling to get any of them finished (obviously). Much of the problem is that they have so many dependencies on each other. Clearly, then, I should consider refactoring my writing plans. <img src="https://s.w.org/images/core/emoji/11/72x72/1f642.png" alt="🙂" class="wp-smiley" style="height: 1em; max-height: 1em;" /></p>
<p>So let&#8217;s start with this. Here, in no particular order, is a list of some things that I&#8217;ve said in the past, and which I still think are or should be of interest today. It&#8217;s meant to be background for numerous posts I write in the near future, and indeed a few hooks for such posts are included below.</p>
<p><strong>1.  Data(base) management</strong> technology is progressing pretty much as I expected.</p>
<ul>
<li>Vendors generally recognize that maturing a data store is an important, <a href="http://www.dbms2.com/2013/03/18/dbms-development-marklogic-hadoop/">many-years-long</a> process.</li>
<li><a href="http://www.dbms2.com/2014/03/28/nosql-vs-newsql-vs-traditional-rdbms/">Multiple kinds of data model are viable</a> &#8230;</li>
<li>&#8230; but it&#8217;s usually helpful to be able to do some kind of JOIN.</li>
<li>To deal with the variety of hardware/network/storage arrangements out there, <a href="http://www.dbms2.com/2013/09/08/layering-database-technology-multiple-dmls/">layering/tiering</a> is on the rise. (An amazing number of vendors each seem to think they invented the idea.)</li>
</ul>
<p>2. Rightly or wrongly, enterprises are often quite sloppy about <strong>analytic accuracy.</strong></p>
<ul>
<li>My two central examples have long been <a href="http://www.dbms2.com/2010/07/25/alerts-metrics-dashboards/">inaccurate metrics and false-positive alerts</a>.</li>
<li>In predictive analytics, it&#8217;s straightforward to quantify how much additional value you&#8217;re leaving on the table with your imperfect accuracy.</li>
<li>Enterprise search and other text technologies are still often terrible.</li>
<li>After years of &#8220;real-time&#8221; overhype, organizations have seemingly swung to under-valuing <a href="http://www.dbms2.com/2016/09/06/real-time-is-getting-real/">real-time analytics</a>.</li>
</ul>
<p><span id="more-10353"></span>3. Outside traditional enterprises, the accuracy problem can be even worse, and the <strong>consequences of analytic inaccuracy</strong> can be severe. In some cases this is well understood; autonomous vehicle researchers, for example, seem properly attentive to the challenge of not-killing-pedestrians. But in others it&#8217;s a mess. For example, I don&#8217;t think the &#8220;fake news on social media&#8221; challenge will be resolved without new technical approaches that, to my knowledge, aren&#8217;t yet even being tried.</p>
<p>4. More generally, I&#8217;ve long argued that the technology industry would someday have to deal with a variety of public policy and social concerns. <a href="http://www.dbms2.com/2017/12/15/the-technology-industry-is-under-broad-political-attack/">That day has come</a>. In anticipation, I wrote at length about <a href="http://www.dbms2.com/2015/06/14/chilling-effects-revisited/">privacy/surveillance</a>, and a little about some other areas, including <a href="http://www.dbms2.com/2014/05/14/solve-the-network-neutrality-dilemma-and-make-money-too/">net neutrality</a>, <a href="http://www.dbms2.com/2010/03/23/software-innovation-patent/">patents</a>, <a href="http://www.monashreport.com/category/public-policy-and-privacy/economic-development/">economic development</a>, and <a href="http://www.monashreport.com/2008/11/10/obama-united-states-cto-cio/">public technology spending</a>. Missing subjects include <strong>censorship</strong> (private and public alike), and perhaps also the efforts to tie data ownership into <strong>anti-trust</strong> policy.</p>
<p>5. Given all the tech-specific public policy work that&#8217;s needed, I&#8217;m pulling back from some my broader political efforts. However, I stand by my overview opinions of last <a href="http://www.dbms2.com/2018/02/07/some-things-i-think-about-politics/">February</a>, and I delivered on some of its IOUs in a two-part series on <a href="http://www.strategicmessaging.com/modifying-beliefs/2018/03/19/">persuasion</a>.</p>
<p>6. The ongoing rise of <strong>&#8220;edge computing&#8221; </strong>and the<strong> &#8220;Internet of Things&#8221;</strong> fit into the general trend that in 2013 I summarized as <a href="http://www.dbms2.com/2013/03/24/appliances-clusters-and-clouds/">appliances, clusters and clouds</a>.</p>
<p>7. I continue to think that a huge fraction of analytics is properly characterized as <a href="http://www.dbms2.com/2017/03/26/monitoring/">monitoring</a>. That ties into a number of areas of interest. For example:</p>
<ul>
<li>Platform technologies &#8212; including distributed data management &#8212; are often compete on the maturity of their built-in monitoring.</li>
<li>My complaints about BI inaccuracy commonly relate to use cases in monitoring.</li>
<li>Privacy/surveillance issues are commonly about monitoring. It&#8217;s common to worry that such monitoring is actually too accurate.</li>
<li>But I also worry that privacy/surveillance monitoring isn&#8217;t accurate enough &#8230; and hence that it leads to people being discriminated against who absolutely don&#8217;t need to be.</li>
<li>Edge computing involves a lot of devices that need to be monitored.</li>
<li>Censorship obviously has a lot to do with monitoring.</li>
</ul>
<p>8. And finally for now, my core precepts for <a href="http://www.strategicmessaging.com/about/">strategic messaging</a> haven&#8217;t changed.</p>
<p><strong><em>Related link</em></strong></p>
<ul>
<li>As you may have already guessed, the title of this post is based on a <a href="https://www.youtube.com/watch?v=R7f189Z0v0Y">classic song</a>.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.dbms2.com/2018/05/20/some-stuff-thats-always-on-my-mind/feed/</wfw:commentRss>
		<slash:comments>5</slash:comments>
		</item>
		<item>
		<title>Some things I think about politics</title>
		<link>http://www.dbms2.com/2018/02/07/some-things-i-think-about-politics/</link>
		<comments>http://www.dbms2.com/2018/02/07/some-things-i-think-about-politics/#comments</comments>
		<pubDate>Thu, 08 Feb 2018 02:04:34 +0000</pubDate>
		<dc:creator><![CDATA[Curt Monash]]></dc:creator>
				<category><![CDATA[Public policy]]></category>
		<category><![CDATA[Surveillance and privacy]]></category>

		<guid isPermaLink="false">http://www.dbms2.com/?p=10333</guid>
		<description><![CDATA[When one tries to think comprehensively about politics these days, it quickly gets overwhelming. But I think I&#8217;ve got some pieces of the puzzle figured out. Here they are in extremely summarized form. I&#8217;ll flesh them out later as seems to make sense. 1. Most of what people are saying about modern tribalism is correct. [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>When one tries to think comprehensively about politics these days, it quickly gets <a href="http://www.dbms2.com/2018/02/07/politics-can-be-overwhelming/">overwhelming</a>. But I think I&#8217;ve got some pieces of the puzzle figured out. Here they are in extremely summarized form. I&#8217;ll flesh them out later as seems to make sense.</p>
<p>1. Most of what people are saying about modern <strong>tribalism</strong> is correct. But <strong>partisanship</strong> is not as absolute as some fear. In particular:</p>
<ul>
<li>There are populist concerns on the right and left alike.</li>
<li>Partisans of all sides can be concerned about <a href="http://www.dbms2.com/2018/01/22/the-chaotic-politics-of-privacy/">privacy, surveillance and government overreach</a>.</li>
</ul>
<p>2. The threat from <strong>Trump</strong> and his <strong>Republican enablers</strong> is indeed as bad as people fear. He&#8217;s a major danger to do terrible, irreversible harm to the US and the rest of the world. To date the irreversible damage hasn&#8217;t been all that terrible, but if Trump and his enablers are given enough time, the oldest modern democracy will be no more.</p>
<p>All common interests notwithstanding, beating Trump&#8217;s supporters at the polls is of paramount importance.</p>
<p>3. I agree with those who claim that many of our problems stem from the shredding of <strong>trust.</strong> But few people seem to realize just how many different aspects of &#8220;trust&#8221; there are, nor how many degrees there can be of <strong>trustworthiness</strong>. It&#8217;s not just a binary choice between &#8220;honest servant of the people&#8221; and &#8220;lying, cheating crook&#8221;.</p>
<p><em>These observations have strong analogies in IT. What does it mean for a system to be &#8220;reliable&#8221; or to produce &#8220;accurate&#8221; results? There are many possible answers, each reasonable in different contexts.</em></p>
<p><span id="more-10333"></span>4. I also agree with the view that much of what&#8217;s going on relates to lacks of <strong>empathy.</strong> But it&#8217;s not quite as simple as saying that liberals/Democrats/globalists have more empathy, while conservatives/Republicans/populists/nationalists have less. Populists and white nationalists likely have more empathy than I do for certain segments of the population, and anti-abortion zealots surely outshine me in empathy for fetal tissue.</p>
<p>Some say our troubles are due to a deliberate war on truth and democracy. Some say they&#8217;re just consequences of broad, long-running trends. I think <a href="http://www.monashreport.com/2018/02/16/the-wars-on-democracy-and-truth/">both views are partially correct</a>.</p>
<p>5. Much is made these days of people&#8217;s penchant for <strong>irrationality,</strong> which generally takes the forms:</p>
<ul>
<li>Irrational choices as to which factual claims to accept.</li>
<li>Irrational conclusions in light of their chosen &#8220;facts&#8221;.</li>
</ul>
<p>I think that a lot of this irrationality can be explained as people not taking the <strong>trouble</strong> to gain all the facts, to think things through, etc. Indeed, perfect rationality takes so much effort that it would be &#8230; well, that it would be a highly irrational choice. So if we want people to be more rational, perhaps we should make it easier for them to be so.</p>
<p>That challenge has many different facets. I hope to have something useful to say about it later on.</p>
<p>6. Outright changing somebody&#8217;s mind is very, very hard. But making them less sure of their opinion? That&#8217;s a lot easier. Making them more sure of it? That&#8217;s a reasonable goal as well.</p>
<p><em>This too will be spelled out in a future post.</em></p>
<p>7. Much of the prevailing irrationality can be modeled by describing which <strong>contradictions/doublethink</strong> people accept, and in which cases they think a contradiction actually proves that something is untrue. And people&#8217;s views are sometimes actually influenced by a pull to be more <strong>consistent.</strong> Real-life examples include:</p>
<ul>
<li>Some traditionally &#8220;law and order&#8221;/authority-following right-wingers who believe the current allegations about the &#8220;Deep State&#8221; are more open to doubting FBI claims in general.</li>
<li>Similarly, the recent FISA legislation needed bipartisan support to pass, because some generally government-skeptical Republicans were in particular skeptical of the alleged national-security reasons for domestic snooping.</li>
<li>States-rights supporters (who usually are conservatives) can extend that to disapproving of Federal marijuana laws and crackdowns.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.dbms2.com/2018/02/07/some-things-i-think-about-politics/feed/</wfw:commentRss>
		<slash:comments>3</slash:comments>
		</item>
		<item>
		<title>Politics can be overwhelming</title>
		<link>http://www.dbms2.com/2018/02/07/politics-can-be-overwhelming/</link>
		<comments>http://www.dbms2.com/2018/02/07/politics-can-be-overwhelming/#comments</comments>
		<pubDate>Thu, 08 Feb 2018 02:03:58 +0000</pubDate>
		<dc:creator><![CDATA[Curt Monash]]></dc:creator>
				<category><![CDATA[Public policy]]></category>
		<category><![CDATA[Surveillance and privacy]]></category>

		<guid isPermaLink="false">http://www.dbms2.com/?p=10337</guid>
		<description><![CDATA[Like many people, I&#8217;ve been shocked and saddened by recent political developments. What I&#8217;ve done about it includes (but is not limited to): Vented, ranted and so on. That&#8217;s somewhat therapeutic, and also let me engage the other side and try to understand a little better how they think. Tried to understand what&#8217;s happening. I [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Like many people, I&#8217;ve been shocked and saddened by recent political developments. What I&#8217;ve done about it includes (but is not limited to):</p>
<ul>
<li><strong><em>Vented, ranted and so on.</em></strong> That&#8217;s somewhat therapeutic, and also let me engage the other side and try to understand a little better how they think.</li>
<li><strong><em>Tried to understand what&#8217;s happening.</em></strong> I probably have had more available time to do that than most people. I also have a variety of relevant experiences to bring to bear.</li>
<li><strong><em>Neglected my work somewhat while doing all that. </em></strong>This neglect has now stopped. After all, the future is quite uncertain, so we should probably work hard in the present while business is still good.</li>
<li><strong><em>Written up some of what I&#8217;ve figured out.</em></strong> Of course. That&#8217;s what I do. But it&#8217;s only &#8220;some&#8221;, because &#8230; well, the entirety of politics is overwhelming.</li>
<li><strong><em>Tried to find specific, actionable ways to help.</em></strong> Stay tuned for more on that part.</li>
</ul>
<p>As for those writings: <span id="more-10337"></span></p>
<ul>
<li>I just posted a very high-level overview of <a href="http://www.dbms2.com/2018/02/07/some-things-i-think-about-politics/">modern political complexities</a>. Please read it.</li>
<li>I&#8217;m working on posts drilling down on various parts of that. <del>Closest to readiness</del> <em>(Edit: Now written)</em> are ones on <a href="http://www.strategicmessaging.com/modifying-beliefs/2018/03/19/">&#8220;Modifying beliefs</a>&#8221; (which will include some technology marketing advice) and <a href="http://www.monashreport.com/2018/02/16/the-wars-on-democracy-and-truth/">&#8220;The war on truth and democracy&#8221;</a> (which will argue that part &#8212; and only part &#8212; of what&#8217;s going on is properly described by the &#8220;war&#8221; metaphor).</li>
<li>I recently posted that the tech industry is under <a href="http://www.dbms2.com/2017/12/15/the-technology-industry-is-under-broad-political-attack/">broad political attack</a>. That&#8217;s even more true than I realized. Two recent and indicative developments are:
<ul>
<li>Roger McNamee et al. have started an <a href="https://www.pcmag.com/news/359009/facebook-google-vets-form-coalition-to-fight-tech-addiction">organization</a> to combat the addictive evils they perceive the tech/internet industry as doing.</li>
<li><a href="https://www.washingtonpost.com/news/the-switch/wp/2018/01/26/facebook-and-google-are-doomed-george-soros-says/">George Soros</a> &#8212; whose organization was once my best-paying investment client &#8212; thundered at Davos that the tech/internet industry should and will be brought down by antitrust regulators.</li>
</ul>
</li>
<li>I also posted recently about the chaotic <a href="http://www.dbms2.com/2018/01/22/the-chaotic-politics-of-privacy/">politics of privacy</a>. If anything, the ongoing FBI/FISA firestorm suggests that I understated the matter.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.dbms2.com/2018/02/07/politics-can-be-overwhelming/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
		<item>
		<title>The chaotic politics of privacy</title>
		<link>http://www.dbms2.com/2018/01/22/the-chaotic-politics-of-privacy/</link>
		<comments>http://www.dbms2.com/2018/01/22/the-chaotic-politics-of-privacy/#comments</comments>
		<pubDate>Mon, 22 Jan 2018 15:23:58 +0000</pubDate>
		<dc:creator><![CDATA[Curt Monash]]></dc:creator>
				<category><![CDATA[Surveillance and privacy]]></category>

		<guid isPermaLink="false">http://www.dbms2.com/?p=10325</guid>
		<description><![CDATA[Almost nobody pays attention to the real issues in privacy and surveillance. That&#8217;s gotten only slightly better over the decade that I&#8217;ve written about the subject. But the problems with privacy/surveillance politics run yet deeper than that. Worldwide The politics of privacy and surveillance are confused, in many countries around the world. This is hardly [&#8230;]]]></description>
				<content:encoded><![CDATA[<p>Almost nobody pays attention to <a href="http://www.dbms2.com/2015/06/14/chilling-effects-revisited/">the real issues in privacy and surveillance</a>. That&#8217;s gotten only slightly better over the decade that I&#8217;ve written about the subject. But the problems with privacy/surveillance politics run yet deeper than that.</p>
<p><strong><em>Worldwide</em></strong></p>
<p>The politics of <strong>privacy and surveillance</strong> are confused, in many countries around the world. This is hardly surprising. After all:</p>
<ul>
<li>Privacy involves complex technological issues. Few governments understand those well.</li>
<li>Privacy also involves complex business issues. Few governments understand those well either.</li>
<li>Citizen understanding of these issues is no better.</li>
</ul>
<p>Technical cluelessness isn&#8217;t the only problem. Privacy issues are commonly framed in terms of <strong>civil liberties, national security, law enforcement </strong>and/or general<strong> national sovereignty. </strong>And these categories are inherently confusing, in that:</p>
<ul>
<li>Opinions about them often cross standard partisan lines.</li>
<li>Different countries take very different approaches, especially in the &#8220;civil liberties&#8221; area.</li>
<li>These categories are rife with questionably-founded fears, such as supposed threats from terrorism, child pornographers, or &#8220;foreign interference&#8221;.</li>
</ul>
<p><strong>Data sovereignty</strong> regulations &#8212; which are quite a big part of privacy law &#8212; get their own extra bit of confusion, because of the various purposes they can serve. Chief among these are:  <span id="more-10325"></span></p>
<ul>
<li>Preventing foreign governments or businesses from impinging citizens&#8217; privacy.</li>
<li>Helping their own governments impinge on citizens&#8217; privacy.</li>
<li>Providing a pretext to favor local companies at the expense of foreign ones.</li>
</ul>
<p><strong><em>The United States</em></strong></p>
<p>Specifically in the United States, I&#8217;d like to drill into two areas:</p>
<ul>
<li>An important bit of constitutional confusion.</li>
<li>Just how bipartisan this all gets in our generally hyper-partisan times.</li>
</ul>
<p>The constitutional confusion goes something like this:</p>
<ul>
<li>A new communication technology is invented, such as telephones or email.</li>
<li>The courts rule that there is no Fourth Amendment expectation of privacy in using such optional services, because:
<ul>
<li>Given how the technology works, the information is temporarily under a third party&#8217;s control.</li>
<li>If you weren&#8217;t willing to give up your privacy, you wouldn&#8217;t have used the technology in the first place.</li>
</ul>
</li>
<li>Later the technology becomes so central to everyday life that courts start finding the previous reasoning to be inaccurate, and extend the Fourth&#8217;s protection of your &#8220;papers and effect&#8221; to the new communication medium.</li>
<li>In the meantime, laws are passed regulating privacy for that particular medium.</li>
</ul>
<p>For example:</p>
<ul>
<li>The <a href="https://en.wikipedia.org/wiki/Electronic_Communications_Privacy_Act">Electronics Communications Privacy Act</a> of 1986 (ECPA) &#8212; specifically in its section known as the <a href="https://en.wikipedia.org/wiki/Stored_Communications_Act">Stored Communication Act</a> (SCA) &#8212; gives authorities <strong>warrantless access</strong> to online information more than 180 days old.</li>
<li>The <a href="https://en.wikipedia.org/wiki/United_States_v._Warshak">Warshak</a> decision of 2010 rendered the ECPA/SCA unconstitutional in the Sixth District.</li>
<li>The <a href="https://en.wikipedia.org/wiki/Email_Privacy_Act">Email Privacy Act</a> was supposed to make <em>Warshak</em> the general law of the land.</li>
</ul>
<p><em>Those links are all to Wikipedia. At the time of this writing, the ones on </em><a href="https://en.wikipedia.org/wiki/United_States_v._Warshak">Warshak</a><em> and the <a href="https://en.wikipedia.org/wiki/Stored_Communications_Act">SCA</a> go into considerable constitutional depth.</em></p>
<p>The Email Privacy Act is also the single best example of this post&#8217;s premises about the general chaos of privacy politics.</p>
<ul>
<li>It passed the House of Representatives <strong>unanimously</strong> in 2016 &#8212; 419-0 &#8212; which is an honor usually reserved for such noncontroversial subjects as renaming post offices.</li>
<li>Even so, it was shot down in the Senate, under opposition from Senators of <a href="http://thehill.com/policy/national-security/282862-email-privacy-update-at-an-impasse-in-the-senate">both parties</a>,* never coming up for vote.</li>
<li>It was passed by voice vote in the House again in 2017.</li>
<li>It again didn&#8217;t come up for vote in the Senate.</li>
</ul>
<p>Last week&#8217;s <a href="https://www.truthdig.com/articles/senate-passes-fisa-reauthorization-act-help-democrats/">FISA reauthorization</a> is another example; it wouldn&#8217;t have passed without senior-level Democratic support in the House and Senate alike.</p>
<p><em>*A chief opponent among the Democrats was Diane Feinstein, who despite representing California is commonly hostile to technological good sense. She voted for FISA reauthorization as well.</em></p>
<p>Like many folks, I&#8217;ve been distracted by all the other political calamities that have befallen since November, 2016. But the time to refocus on privacy/surveillance is drawing near.</p>
<p><strong><em>Related links</em></strong></p>
<ul>
<li>I wrote about similar subjects in May, 2016, and offered many <a href="http://www.dbms2.com/2016/05/18/surveillance-data-in-ordinary-law-enforcement/">links</a> then.</li>
</ul>
]]></content:encoded>
			<wfw:commentRss>http://www.dbms2.com/2018/01/22/the-chaotic-politics-of-privacy/feed/</wfw:commentRss>
		<slash:comments>2</slash:comments>
		</item>
	</channel>
</rss>
