Newer posts are loading.
You are at the newest post.
Click here to check if anything new just came in.

September 09 2010

As California goes, so goes the nation?

How will the most populous state in the nation move forward with digital elections? When California secretary of state Debra Bowen endorsed open source voting systems at yesterday's Gov 2.0 Summit, the validation naturally struck many people in O'Reilly's community as significant, given the size and prominence of the Sunshine State in the world.

"Open source election software saves us a ton of money, and can be re-used in other states," she said. Bowen's interview with Tim O'Reilly at Gov 2.0 Summit, embedded below, featured a wide-ranging discussion of trust, digital literacy and the future of electronic voting in thousands of California's precincts. While open source voting poses challenges in implementation, Bowen's perspective on the subject are worth reviewing.

As a one of the country's pioneers in open government reform, election integrity, and personal privacy rights, Debra Bowen is well positioned to comment. "How do we create an education plan in CA so that everyone has 'access'?" she asked, focusing what a continued digital divide would pose for widespread adoption of electronic voting online or using smartphone apps. Bowen pointed to the potential for new tools and apps to engage young people and save money for government, particularly as millennials make different choices for media consumption.

Integrating more efficiencies into the system isn't a theoretical or aspirational goal, either. As Brian Kalish reported in Nextgov, one of the silliest things is that officials in Los Angeles County will be transcribing by hand 30,000 to 40,000 voter registration forms every day in advance of Election Day in November 2. "Paying people to type data from a form is one of the silliest things we can do in 2010," Bowen said, and the manual process naturally creates instances where mistakes enter the system as election officials try to discern names.

When I interviewed California's Secretary of State after her conversation with Tim, she elaborated on the utility of open source software in elections and electronic voting. As California resident Alan Silberberg pointed out before our interview, Secretary Bowen de-certified electronic voting machines due to concerns over the security and validity, a decision that she enduring considerable blowback. In our conversation, she talked about on whether it will possible to deploy digital voting in California any time soon. (Spoiler: there will continue to be barriers in terms of record keeping and security in the near future.)

As California resident Ryan Alfred observed during Bowen's conversation with Tim O'Reilly, open source voting platforms sound great in theory -- but can technology increase the percentage of citizens who vote? Bowen said that it comes down to trust in the systems. In response to New York State Senate IT staffer Noel Hidalgo's question on the role does open source have in closing state budget deficit gaps, Bowen pointed to replicability and the comparable cost of proprietary systems.

On the bigger questions of how the future of civics, the digital divide information literacy relate, Bowen reflected more about how California addressing the digital divide. Both interviews with the secretary provided fascinating insight into the state of how digital democracy will evolve.

December 18 2009

Being online: Your identity in real life--what people know

But he that writes of you, if he can tell
that you are you, so dignifies his story.

(This post is the second in a series called "Being online: identity, anonymity, and all things in between.")

Long before the Internet, much of our private lives were available to
those who took an interest, and not just if we were a celebrity chased
by paparazzi or a lifelong resident of a small village. Investigators
with many good reasons for ferreting out such knowledge--non-profit
organizations, college development offices, law enforcement
professionals, private detectives--pursued their quarries with
incredibly sophisticated strategies for uncovering as much information
as they could and shrewdly deducing even more. The Internet has simply
infused these methods with new ingredients.

For background, I interviewed a development professional at a private
college. The goal of such professionals is to deduce a person's
ability to contribute, using publicly available information such as
purchases and sales of land, marriage and divorce records, and stock
prices for the companies in which prospects hold leading positions. A
few golden sources exist for tracking the most attractive fundraising
candidates:

  • Publicly traded companies reveal the compensation (salary, bonuses,
    and stock) of their five highest paid employees.


  • Law journals report the compensation of the partners at the top 200
    law firms.


  • Foundations owned by prospective donors file public reports, as Series
    990 tax forms, listing the foundation's assets and donations.


  • Salaries of public officials are open records.

More generally, Lexis-Nexis offers easy and powerful searches on
articles from which development professionals can glean valuable
biographical information and indications of how well the prospects'
companies are faring.

If your name is John Smith or Ali Khan, you may be a bit hard to track
over the decades. But casual details such as place of residence or
number of children can allow the development staff to piece together
information sources. If you provide the alumni office with even one or
two scraps of such information, you help snap the connecting rods in
place.

The Internet has sprung upon the development field like a geyser--with
particularly rich pools of information in Zillow.com's real estate
listings, corporate biography sites, and donor lists for philanthropic
organizations--while the new social networks make fund-raising
professionals even giddier. For instance, social network traffic makes
it much easier for development offices to keep track of alumni's
family members, which offer indications of their financial
means. Weblogs where a prospective donor trumpets his or her passions
can help shape the right appeal to loosen the purse strings.

If any of this has made you nervous, let me stake out the position
that legitimate development research is crucial for social progress.
Colleges and non-profits depend on the donations of those fortunate
enough to have disposable income. People whose incomes render them
subjects of this sort of tracking know the score; dealing with
fund-raisers is just part of the responsibility of wealth management.
And the fund-raisers have high professional standards, such as the

Association of Professional Researchers for Advancement's statement of
ethics
.

The general population is less well informed than the rich about the
public aspects of their private lives, which is why I've chosen this
section to begin my survey of identity. I myself run into surprise
from ordinary citizens I call up when I'm volunteering for a political
campaign and trying to mobilize potential supporters. Some people
express annoyance that I know they voted in a Democratic or Republican
primary. Indeed, although their choice of candidate on the ballot is a
secret, the fact that they voted on that ballot is public information.
(Forty-eight states in the US provide it to anybody who asks, while
the other two have ways of getting it less directly.)

Democracy relies the use of voter rolls by campaign workers like me to
reach out to our neighbors, drum up the vote, and convey our
message. The extensive time we put into these pursuits is one of the
few counterbalances to the dominance of TV and radio ads in
determining public opinion. Those who don't understand the value of
open records in voting might be even more upset to know that anyone
can easily find out what candidates they gave money to, and how
much. But get used to it: your actions matter to society, and our
right to know often trumps your right to be left alone.

Of course, I haven't recounted the ways banks, retail chains, and
insurance companies track us; we're all aware of it. A section of this
article is devoted to the slice of this activity that makes up
behavioral advertising online. When WIRED journalist

Evan Ratliff gave a up month of his life to be voluntarily hunted
,
ditching his identity and trying to hide
behind a new one, he discovered that savvy investigators, working
with cooperating vendors but with no help from law enforcement, could
decipher when and where he got money from ATMs, made routine
purchases, and arranged air flights.

Ultimately, you can be most reliably identified through your DNA, but
the methodology and data are usually available only to law
enforcement. The police used to trace you through fingerprints, but
we've learned over the decades how unreliable those are. So DNA is the
gold standard for identity.

The British police have been using any excuse to take a DNA sample
from everyone they come across. Recently, upon being told by the
European Court of Human Rights that preserving samples for indefinite
lengths of time were a violation of privacy, the police grudgingly
agreed to destroy the samples taken from innocent people after six
years.

In many British localities--and a number of American ones as
well--your identity is extended to include your automobile. These are
areas where governments have installed cameras to capture license
plates, and where the traffic ticket will come to you if some other
person driving your car goes through a red light or exceeds the speed
limit.

To the security system at your workplace, you may be your key card, or
the numeric code you enter on a touchpad, or your facial bone
structure or iris image. Security experts like to distinguish three
kind of identifying traits that correspond to these security checks:
something you possess, something you know, and something you are.

Even anonymized data such as census figures can be associated with
individuals through a little--surprisingly little--bit of additional
information. In the most famous and dramatic demonstration of the
power of joined data, a

Carnegie Mellon student obtained the health records of a public
figure

simply by combining publicly available information. Such exploits are
fodder more for identity thieves than for fund-raisers or advertisers,
but they show how exposed you can become when tiny pieces of your life
float around on public sites. The Internet provides an enormous,
integrated platform for retrieving identities.

The next post in this series, turning to our presence on the
Internet itself, reduces our focus to the minimal data technically
available on the Internet. As we'll see, while it restricts what web
servers know about us, it compensates by providing immediate, dynamic
exploitation of that information.

The posts in "Being online: identity, anonymity, and all things in between" are:


  1. Introduction


  2. Your identity in real life: what people know (this page)


  3. Your identity online: getting down to basics (to be posted December 20)


  4. Your identity to advertisers: it's not all about you (to be posted December 22)


  5. What you say about yourself, or selves (to be posted December 24)


  6. Forged identities and non-identities (to be posted December 26)


  7. Group identities and social network identities (to be posted December 28)


  8. Conclusion: identity narratives (to be posted December 30)

Older posts are this way If this message doesn't go away, click anywhere on the page to continue loading posts.
Could not load more posts
Maybe Soup is currently being updated? I'll try again automatically in a few seconds...
Just a second, loading more posts...
You've reached the end.

Don't be the product, buy the product!

Schweinderl