FAIR USE NOTICE

FAIR USE NOTICE

A BEAR MARKET ECONOMICS BLOG


This site may contain copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such material available in an effort to advance understanding of environmental, political, human rights, economic, democracy, scientific, and social justice issues, etc. we believe this constitutes a ‘fair use’ of any such copyrighted material as provided for in section 107 of the US Copyright Law.

In accordance with Title 17 U.S.C. Section 107, the material on this site is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes. For more information go to: http://www.law.cornell.edu/uscode/17/107.shtml

If you wish to use copyrighted material from this site for purposes of your own that go beyond ‘fair use’, you must obtain permission from the copyright owner.

FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates
FAIR USE NOTICE FAIR USE NOTICE: This page may contain copyrighted material the use of which has not been specifically authorized by the copyright owner. This website distributes this material without profit to those who have expressed a prior interest in receiving the included information for scientific, research and educational purposes. We believe this constitutes a fair use of any such copyrighted material as provided for in 17 U.S.C § 107.

Read more at: http://www.etupdates.com/fair-use-notice/#.UpzWQRL3l5M | ET. Updates

All Blogs licensed under Creative Commons Attribution 3.0

Creative Commons License
This work is licensed under a Creative Commons Attribution 3.0 Unported License.

Tuesday, August 12, 2014

15 Things Americans Would Know if There Were a "Liberal Media"


Home



 MEDIA  

If we have a "liberal media," as conservatives absurdly claim, why isn't it flooded with stories about US prisons, wealth inequality, outsourcing?

Photo Credit: Shutterstock.com/ Artisticco
Reince Priebus (and apparently many others) still thinks there's a liberal media.
While I share Reince's frustration with the media, as a liberal, I'd like to go on record and state that the media isn't focusing on issues I care about. They seem to be far more focused on entertainment and making money.
Don't believe me?
If you know anyone who still believes in a "liberal media," here's 15 things everyone would know if there really were a "liberal media" (inspired by Jeff Bezos' purchase of The Washington Post):
1. Where the jobs went.
Outsourcing (or offshoring) is a bigger contributor to unemployment in the U.S. than laziness.
Since 2000, U.S. multinationals have cut 2.9 million jobs here while increasing employment overseas by 2.4 million. This is likely just the tip of the iceberg as multinational corporations account for only about 20 percent of the labor force.
When was the last time you saw a front-page headline about outsourcing?
Source: Wall Street Journal via Think Progress.
2.  Upward wealth redistribution and/or inequality.
In 2010, 20 percent of the people held approximately 88 percent of the net worth in the U.S. The top one percent alone held 35 percent of all net worth.
The bottom 80 percent of people held only 12 percent of net worth in 2010. In 1983, the bottom 80 percent held 18 percent of net worth.
These statistics are not Democrat or Republican. They are widely available to reporters. Why aren't they discussed in the "liberal" media?
Source: Occupy Posters
3. ALEC.
If there was a corporate organization that drafted laws and then passed them on to legislators to implement, wouldn't you think the "liberal" media would report on them?
The American Legislative Exchange Council (ALEC) is such an organization. Need legislation drafted? No need to go through a lobbyist to reach state legislatures anymore. Just contact ALEC. Among other things, ALEC is responsible for:
  • Stand Your Ground laws
  • Voter ID laws
  • Right to Work laws
  • Privatizing schools
  • Health savings account bills which benefit health care companies
  • Tobacco industry legislation
Many legislators don’t even change the proposals handed to them by this group of corporations. They simply take the corporate bills and bring them to the legislative floor.
This is the primary reason for so much similar bad legislation in different states.  
Hello ... "liberal media" ... over here!
They're meeting in Chicago this weekend. Maybe the "liberal media" will send some reporters.
4. The number of people in prison.  
Which country in the world has the most people in prison?
You might think it would be China (with more than one billion people and a restrictive government) or former Soviets still imprisoned in Russia.
Wrong. The United States has the most people in prison by far of any country in the world. With 5 percent of the world’s population, we have 25 percent of the world’s prisoners – 2.3 million criminals. China with a population 4 times our size is second with 1.6 million people in prison.
In 1972, 350,000 Americans were in imprisoned. In 2010, this number had grown to 2.3 million. Yet from 1988 – 2008, crime rates have declined by 25 percent.
Isn't anyone in the liberal media interested in why so many people are in prison when crime has dropped? WTF "liberal media"?
5. The number of black people in prison.
In 2009, non-Hispanic blacks, while only 13.6 percent of the population, accounted for 39.4 percent of the total prison and jail population.
In 2011, according to FBI statistics, whites accounted for 69.2 percent of arrests.
Numbers like these suggest a racial bias in our justice system.
To me, this is a much bigger story than any single incident like Travyon Martin. Or, at the very least, why didn't the "liberal media" ever mention this while covering the Martin story?
6. U.S. health care costs are the highest in the world.
The expenditure per person in the U.S. is $8,233. Norway is second with $5,388.
Total amount of GDP spent on health care is also the highest of any country in the world at 17.6 percent. The next closest country is the Netherlands at 12 percent.
As a liberal, I’d like to ask why the market isn’t bringing down costs. I’d think a "liberal" media might too.
7. Glass-Steagall.
Glass-Steagall separated risky financial investments from government backed deposits for 66 years.
The idea is simple. Banks were prohibited from using your federally insured savings to make risky investments.
Why is this a good idea?
Risky investments should be risky. If banks can use federally insured funds, there is no risk to them. If they win, they win. If they lose, we cover the cost.
Elizabeth Warren did a great job explaining this to the "liberal news" desk at CNBC.
8. Gerrymandering.
When was the last time you saw a front page headline about gerrymandering?
Before the 2010 election, conservatives launched a plan to win control of state legislatures before the census. The idea was to be in power when national congressional districts were redrawn in order to fix them so Republicans would win a majority of districts.
The Redistricting Majority Project was hugely successful. In 2012, Barack Obama was elected President by nearly 3.5 million votes. In Congressional races, Democrats drew nearly 1.4 million more votes than Republicans yet  Republicans won control of the House 234 seats to 201 seats.
How is this possible?
By pumping $30 million into state races to win the legislatures, Republicans redrew state maps in states such as Arizona, Michigan, North Carolina, Pennsylvania, Virginia, Texas, Florida and Ohio to place all of the Democrats into just a few districts.
In this manner, Democrats win heavily in a couple districts and lose the rest.
In North Carolina, the statewide vote was 51 percent Democrat and 49 percent Republican yet 9 Republicans won and only 4 Democrats.
Where is your coverage of this vote stealing, "liberal media"? You're willing to cover voter ID laws, why can't you cover real vote stealing?
Source: Mother Jones.
9. The number of bills blocked by Republicans in Congress.
The filibuster has been used a record number of time since Obama was elected President. From 2008-2012, 375 bills weren’t even allowed to come to a vote in the Senate because Republicans threatened the filibuster.
In 2013, during the first 6 months, Congress has only passed 15 bills that were signed into law. This is 8 fewer than in the first 6 months of 2012 and 19 fewer than 2011.
Also, until the Senate recently threatened to reform the filibuster, the GOP had succeeded in holding up 79 of President Obama’s picks to the U.S. Circuit Court and Courts of Appeal. They’re blocking these appointments regardless of qualification.
Where's the coverage? Where are the reporters asking why nothing is getting done?
* crickets *
10. The Citizens' United Supreme Court decision.
In a 2011 Hart poll, only 22% of those polled had actually heard of the Citizens’ Uniteddecision before taking the survey.
If 77% believe that corporations have more control over our political process than people, why isn't the liberal media talking more about the Citizens’ United decision?
11. Nixon’s Southern Strategy.
The Southern Strategy is a strategy for gaining political power by exploiting the greatest number of ethnic prejudices. Kevin Philips, Republican and Nixon campaign strategist, speaking about this strategy in a 1970 interview with the New York Times:
From now on, the Republicans are never going to get more than 10 to 20 percent of the Negro vote and they don't need any more than that...but Republicans would be shortsighted if they weakened enforcement of the Voting Rights Act. The more Negroes who register as Democrats in the South, the sooner the Negrophobe whites will quit the Democrats and become Republicans. That's where the votes are. Without that prodding from the blacks, the whites will backslide into their old comfortable arrangement with the local Democrats.
This strategy has been used since President Johnson and Democrats in Congress passed the Civil Rights Act to build the Republican party.
Examples of this strategy were evident as recently as 2008 and 2012 as Republicans took up their assault on Medicaid, Social Security, labor unions, and Obamacare – programs which, though they benefit more white seniors, retirees, women, and children, have been sold to many Americans as handouts to lazy, undeserving blacks and minorities.
Yet you never hear the "liberal media" (at least since the 1970 NY Times) talking about the use of this strategy. At least not like this:
"P (President) emphasized that you have to face the fact that the whole problem is really the blacks. The key is to devise a system that recognizes this while not appearing to." - H.R. Haldeman's diary, President Richard Nixon’s White House Chief of Staff
12. Tax cuts primarily benefit the wealthy.
A progressive tax program is designed to tax people very little as they are starting out and progressively increase their rates as they do better.
Republican plans seem designed to do exactly the opposite: shift the tax burden off of the wealthy and onto working people.
Take the repeal of the estate tax. In Ohio this was recently repealed by Republicans. The benefit is only realized by people with estates larger than $338,000 (as the first $338k was exempt) and realized most by people with even wealthier estates.
This also explains why Republicans want to shift the system from income taxes to consumption taxes. Consumption taxes are paid most by those at the bottom as basic consumption remains the same regardless of income.
It also explains why capital gain taxes are so low. Income through capital gains is only taxed at 20% (increased from 15% in 2012) instead of at the rate of other income (closer to 35%).
It also explains why Republicans were so willing to let the payroll tax cut expire. The payroll tax cut benefited people who were getting paid, not those issuing the paychecks. How much fight did you see to save this tax cut?
While tax cuts are sold to us as benefiting everyone, they really benefit a select few at the very top.
If everyone knew who tax cuts really benefit, would so many people vote for them?
13. What's happening to the bees?
This seems like an odd one to include, why is this important?
The Agriculture Department says a quarter of the American diet depends on pollination by honeybees.
Dating from 2006, colony collapse disorder is a relatively new problem. More "liberal media" coverage might push the urgency of the issue.
Instead here's a typical media story about bees: Thousands of Bees Attack Texas Couple, Kill Horses.
14. The impact of temporary workers on our economy.
The number of temporary workers has grown by more than 50 percent since the recession ended to nearly 2.7 million.
If freelancers, contract workers, and consultants are included, the number is nearly 17 million workers not directly employed by the companies who hire them. This equals 12 percent of the workforce.
What's the impact of a "just in time" workforce on workers and our economy? How about that for a story "liberal media"?
15. Media consolidation.
Six corporations - Time Warner, Disney, News Corporation, Viacom, Comcast, and CBS -control roughly 90% of the media in the U.S.
These companies are in business to make a profit.
This is why you'll find plenty of advertisements in the media. Entertainment? Check. Sports? Definitely. Weather? Yep.
You'll also find plenty of "if it bleeds, it leads" stories designed to hook you in. Vendors, witnesses recall Venice hit-and-run horror. Fort Hood trial turns bizarre as shooter grills witnesses.
There's also plenty of political bickering: Democrats said this, Republicans said that. We let you decide (but we never weigh in with any facts or fact-checking).
What won't you hear? You won't hear the "liberal media" discuss the corporate media.
What to make of this:
If the media were "liberal," it would serve the public interest and shine a light on issues like the ones above.
More people would also have a better understanding of global warming, peak oil, population growth, political lobbying, government's role in a functioning economy, how much we spend on the military, and countless other issues.
What you’re more likely to see in the media, however, are stories designed to get you to buy their paper, or watch their show, or listen to their radio station. If it bleeds, it leads. This is why the media is concerned with scandal, celebrities, gossip, and fear.
If anything, our news consists of paid advertisements and outlets too scared of offending anyone to publish much of substance. Investigative journalism is also expensive; entertainment is cheap.
The way this corporate media behaves may not be surprising. I apologize if you feel any of this is beating you over the head.
This Buzzfeed-style list wasn't intended to introduce this idea as new (others have done a much better job), but rather to highlight the sheer absurdity of a "liberal media" for an audience who may not see it.
One way to approach the topic is to simply ask: If we have a "liberal media," where are the liberal stories?

ORIGINALLY POSTED TO AKADJIAN ON WED AUG 07, 2013 AT 05:02 AM PDT.

Saturday, June 7, 2014

SHARING: SHARING IS CARING IS SHARING: (THE MEDIA OF LIFE)


THE NEW YORKER



OCTOBER 30, 2013

SHARING IS CARING IS SHARING





circle-290.jpeg
War is peace. Freedom is slavery. Ignorance is strength.
George Orwell, “1984”
Secrets are lies. Sharing is Caring. Privacy is theft.
Dave Eggers, “The Circle”
The construction begs for comparison, and yet “The Circle” is no “1984.” In the future, according to Dave Eggers, one mega social-network corporation, the namesake of his new novel, has become the technological architect of daily life—arranging conversations, restocking pantries, making payments, and ranking human beings. The company’s leaders wear zip-up hoodies, of course, and enjoy surfing, yet they are known with reverent remove as the Three Wise Men. It’s serious business—so serious that even the parties are work, since attendance is monitored by your boss—and Eggers emulates this sobriety in his writing, which plods across the corporate campus resentfully. New hire Mae Holland, the novel’s protagonist, bounds forth into the communal ethos of her overlords, embracing her first assignment, answering e-mails that provide a “human experience” to small advertisers. Eggers seems bored by the task—Oh, must we spend another day at the Customer Experience desk, minutiae un-inspected, e-mails unread? He doesn’t want to be in the grind, or even playfully tease it. Disclosure is the story of “The Circle,” yet Eggers hardly tells enough.
But even without the searing wit of “1984,” the book is capable of landing on point—when it’s at its most irksome. Where “1984” has the vigilant Police Patrol and Thought Police, “The Circle” has SeeChange and Clarification. Surveillance isn’t a bad word; it’s a gift, even a human right. “I truly believe that if we have no path but the right path, the best path, then that would present a kind of ultimate and all-encompassing relief,” Wise Man Eamon Bailey, standing in for the role of Internet missionary, tells Mae. “We can cure any disease, end hunger, everything, because we won’t be dragged down by all our weaknesses, our petty secrets, our hoarding of information and knowledge. We will finally reach our full potential.”
The speech has a familiar ring: in September, 2006, Mark Zuckerberg wrote an open letter about the launch of News Feed, and the note resurfaced with this week’s unveiling of The Zuckerberg Files, an archive of his every public utterance catalogued by Michael Zimmer and a small team at the University of Wisconsin-Milwaukee’s Digital Commons. (Zuckerberg, the social wizard who likes to keep to himself, has fittingly been made all the more transparent now that his transcripts have been neatly collected for viewing.) “When I made Facebook two years ago my goal was to help people understand what was going on in their world a little better,” Zuckerberg wrote. “I wanted to create an environment where people could share whatever information they wanted, but also have control over whom they shared that information with.” He also said that a week prior, “I created a group called Free Flow of Information on the Internet, because that’s what I believe in—helping people share information with the people they want to share it with.”
Katherine Losse, Facebook employee number fifty-one and the author of “The Boy Kings”—which, she has unsatisfactorily argued, Eggers ripped off—worked in customer support before becoming Zuckerberg’s speechwriter. By 2009, as Losse was writing e-mails on behalf of her boss, Facebook was working on adjusting its privacy settings. “We are pushing the world in the direction of making it a more open and transparent place,” she quoted Zuckerberg as saying in meetings. So, too, transparency is the guiding principle of the Circle; the company’s mantra is “ALL THAT HAPPENS MUST BE KNOWN.” (Deletion is outlawed.) But Mae, unlike Losse, is not quite a skeptic. Rather, she’s an earnest wannabe who divulges more and more over time, with less and less apprehension. Though Mae occasionally has impure thoughts about whether to keep to herself instead of hopping into the Circle, as employees are expected to do—with feeling!—she strives to post more. In doing so, she “feels a profound sense of accomplishment and possibility.”
Last year, Diana Tamir and Jason Mitchell, of Harvard’s department of psychology, published a paper titled “Disclosing information about the self is intrinsically rewarding.” As part of their study, they asked participants to undergo fMRI scans while stating opinions. The researchers found that “humans so willingly self-disclose because doing so represents an event with intrinsic value, in the same way as with primary rewards such as food and sex.”
“The sites make the process so easy, and people see their friends sharing, and that encourages them,” Jessica Vitak, an assistant professor at the University of Maryland College of Information Studies, told me.“So it’s kind of like ‘Hey, join this party.’” In research released last week, to be presented at a conference in February, Vitak and her co-author, Jinyoung Kim, followed Facebook users as they decided what to post. They found that, through “an often-complex thought process,” users weigh the pros and cons in deciding what to share, as a way of replicating the boundaries of offline conversation. As one participant, Zara, reflected of facing her invisible audience:
If you post this, are you okay with people, everyone seeing this? Is that okay with you? I think twice about it. And if I think it’s not a big deal, then I’ll go ahead and do it. But if I’m thinking about the repercussions of it; if I can think of a few, then I won’t do it.
Among American adults on Facebook, forty-four per cent update their status at least weekly, fifty-three per cent comment on a friend’s status, and forty-eight per cent comment on a photo. Sites that tell users they’ve only filled out a limited percentage of their personal pages—Where did you go to high school? Are you in a relationship?—encourage more disclosure, no matter how seemingly mundane. “Any piece of information that people share benefits these sites, because it gives Facebook, or whatever company, a more accurate profile of the user,” Vitak said. “They say there’s no such thing as bad publicity. Well, there’s no such thing as bad information, in their mind. It’s adding information that’s valuable to them.”
That data collection, of demographic details, is only half of the equation; Facebook also tracks behaviors. On Tuesday, the company announced that it would start monitoring stats like how long your cursor hovers over something on the site, or whether your News Feed is visible on your screen at any particular moment. There’s no opportunity to pause for self-censorship here, it’s just seamless sharing, along the lines of an automatic Foursquare check-in or a Google Now update to let people know you’re running late. More passive modes of personal data-gathering turn up in “The Circle” more subtly, as in a silver bracelet Mae is given at the health clinic, where a message is engraved in steel above the cabinets: “TO HEAL WE MUST KNOW. TO KNOW WE MUST SHARE.” The band monitors her heart rate, blood pressure, caloric intake, digestive efficiency, and so on. Elsewhere, in the ChildTrack lab, biochemists are working out a way to implant a chip into children’s bones, a permanent G.P.S. (They succeed.)
Not everyone in the Eggers dystopian near-future wants to be sucked up into the social vortex. Mae’s ex-boyfriend Mercer does what he can to stay off the grid, so he can focus on his antler-chandelier business. The novel’s extremes are laid out in the dialogue between the two characters. Condensed highlights from one scene:
Mercer: “Mae, I’ve never felt more that there is some cult taking over the world.”
Mae: “You’re so paranoid.”
Mercer: “I think you think that sitting at your desk, frowning and smiling somehow makes you think you’re actually living some fascinating life. You comment on things, and that substitutes for doing them.”
The Circle is as much Google as it is Facebook (though it officially stands in for neither, as the Circle is supposed to have succeeded them). Google’s motto, “Don’t be evil,” is upended in Eggers’s telling: these companies may not have started out as the clubhouses of moustache-twirling villains, but, he writes, in a return to Orwell, “We’re closing the circle around everyone—it’s a totalitarian nightmare.” The Wall Street Journal compared “The Circle” to “The Jungle,” with the caveat that the former is “not great literature. But it is a great warning.” Other critics, including Losse, have pointed out that Eggers can’t be held up as the revelatory chronicler of an industry that he isn’t immersed in; his ominous depiction isn’t backed up by thorough inquiry. It’s a novel, though, his novel, with his anxieties. It’s the account of an observer, not a participant: maybe even the kind who comments on things, which substitutes for doing them.
Losse wrote, “We film and we post and read social media constantly in order to capture something, some exciting moment or feeling or experience that we are afraid to miss, but the things about life that we most want to capture may not be, in the end, capturable.” Whether it’s a status update or a novel, the good ones can grasp hold of their subject—if not with the completion of a circle, then at least by delivering an essential sliver of truth.

Wednesday, May 21, 2014

Americans Are More Likely to Be Killed by Right-Wing Terrorists Than Muslims—But the Media's Afraid to Say It



Home




  MEDIA  







May 20, 2014



When Sen. Harry Reid (D-NV) labeled cattle rancher and right-wing extremist Cliven Bundy a “domestic terrorist,” the far Right went into an apoplectic state. But the Senate majority leader may have unwittingly stumbled upon an interesting and sobering fact: that when it comes to domestic terrorism, you are far more likely to be murdered by a far Right-wing American than a Muslim American, but the term “terrorist” remains reserved exclusively for acts of political violence carried out by Muslims.
If terrorism is defined as violence against innocent civilians designed to advance a political cause, then all racist murders that occur in the U.S. are also acts of terrorism, because the perpetrators commit the violent act to send a political message to minority communities (i.e. intimidate them into a subordinate status.)
Arun Kundani, adjunct professor at New York University and author of The Muslims are Coming: Islamophobia, Extremism, and the War on Terror, writes: “The definition of terrorism is never applied consistently, because to do so would mean the condemnatory power of the term would have to be applied to our violence as much as theirs, thereby defeating the word’s usefulness.”
Violence carried out by far Right groups or individuals, which have racism as a central component of their ideology, is of similar magnitude to that of Jihadist violence. In the years 1990 to 2010, there were 145 acts of political violence committed by the American far Right, resulting in 348 deaths. By comparison, 20 Americans were killed over the same period in acts of political violence carried out by Muslim-American civilians.
“Both categories of violence represent threats to democratic values from fellow citizens. Whereas the former uses violence to foment a change in the ethnic makeup of Western countries or to defend racial supremacy, the latter uses violence to try to intimidate Western governments into changing foreign policies. Ultimately, to be more concerned about one domestic threat of violence rather than the other implies governments and mainstream journalists consider foreign policies more sacrosanct than the security of minority citizens,” writes Kundani.
It has now been 13 years since al Qaeda and its associated forces have carried out a successful attack inside the United States. National security analyst and regular CNN contributor Peter Bergen asks, “Given this, it becomes harder to explain, in terms of American national security, why violence by homegrown right-wing extremists receives substantially less attention than does violence by homegrown jihadist militants?”
To that point, right-wing extremists have carried out a great number of high profile acts of political violence since 9/11, from the shooting at the Jewish Community Center in Kansas City, to the murders at a Sikh temple in Wisconsin. Attacks that have garnered fewer headlines include the 2009 murder of Dr. George Tiller, who ran an abortion clinic in Wichita, Kansas. His killer was tied to a number of far right-wing groups, including Sovereign Citizens, a neo-confederate movement who deny the powers of the federal government.
In a recent op-ed, Bergen juxtaposes the media and national security attention devoted to the anniversary of the Boston Marathon bombing to last month’s shootings at a Jewish Community Center in greater Kansas City. On the latter, Frazier Glenn Cross, who founded the Carolina Knights of the Ku Klux Klan and the White Patriot Party, shot and killed a 14-year-old boy and his grandfather, and one other. After being taken into custody, Cross shouted, “Heil Hitler.” In both respective attacks in Kansas and Boston, three Americans were killed.
“Now let's do the thought experiment in which instead of shouting "Heil Hitler" after he was arrested, the suspect had shouted "Allah Akbar." Only two days before the first anniversary of the Boston Marathon bombings, this simple switch of words would surely have greatly increased the extent and type of coverage the incident received,” observes Bergen.
John Mueller, who is a political scientist in the field of international relations, illustrates how our conception of the terrorist threat is shaped more by ideology than objectivity: “In almost all years the total number of people worldwide who die at the hands of international terrorists is not much more than the number who drown in bathtubs in the United States.”
Despite the far Right’s history of deadly violence, it is jihadist violence that continues to dominate media headlines and the attention of policy makers. The Southern Poverty Law Center calculates there are 939 far right-wing hate groups across the country today, including neo-Nazis, Klansmen, white nationalists, neo-Confederates, racist skinheads, border vigilantes and others.
“Since 2000, the number of hate groups has increased by 56 percent. This surge has been fueled by anger and fear over the nation’s ailing economy, an influx of non-white immigrants, and the diminishing white majority, as symbolized by the election of the nation’s first African-American president…. The number of Patriot groups, including armed militias, skyrocketed following the election of President Obama in 2008 – rising 813 percent, from 149 groups in 2008 to an all-time high of 1,360 in 2012. The number fell to 1,096 in 2013,” the SPLC calculates.

Yet terrorism and racist violence are not considered to be equally significant threats by the U.S. government and the mainstream media. “When CNN’s John King commented that the person arrested for the Boston attack had been identified as a ‘dark-skinned man,’ it was not just an individual gaffe, but the making explicit of the racial subtext to the entire discourse of counterterrorism. On MSNBC, Chris Matthews asked his terrorism expert guests whether government analysts would be able to tell from the surveillance images of the suspects if they were ‘from Yemen or other parts like that.’ The suspect’s face was being asked to reveal a racial identity that would, in turn, tell us whether he was one of ‘them’ or one of ‘us,’ and therefore what kind of emotional response to the bombing would be appropriate,” writes Kundani.

Dangerously, not only is the mainstream media shy in labeling right wing extremist groups as “domestic terrorists,” but also so is the government. In 2009, the Department of Homeland Security (DHS) released a report warning of violent right-wing extremism. The report had merely pointed out that some domestic extremists focused on single issues like immigration and abortion were interested in recruiting military veterans returning from Iraq and Afghanistan. Conservative columnists cried blue bloody murder, and in the face of political controversy, the report was retracted.

In a 2011 interview with the Southern Poverty Law Center, Daryl Johnson, the leader of the team that produced the report, argued that following the controversy, the Department of Homeland Security’s examination of such threats suffered, stating: "Since our report was leaked, DHS has not released a single report of its own on this topic. Not anything dealing with non-Islamic domestic extremism—whether it's anti-abortion extremists, white supremacists, 'sovereign citizens,' eco-terrorists, the whole gamut."

Like the violent acts we normally think of as terrorism, racist violence not only takes the lives of its immediate victims, but also sends a larger message of fear to the wider population. “In dedicating tens of billions of dollars a year to fighting a domestic threat of terrorist violence that is largely imagined, the U.S. government has neglected the challenge of creating a genuinely peaceful society. An ideologically-driven focus on Muslim Americans as the prime threat of violence goes hand in hand with a normalization of the fact that the in the U.S., 15,000 people are murdered each year,” writes Kundani.

The growth in far Right extremism is fueled not only by a right-wing echo chamber that legitimizes false propaganda about immigrants and other minorities, but also, in part, by liberal timidity, which is why Sen. Reid’s use of the term “domestic terrorist” is an important step forward in dealing with the threat of far Right extremism. I mean, terrorism.
CJ Werleman is the author of "Crucifying America," and "God Hates You. Hate Him Back." Follow him on Twitter: @cjwerleman

Tuesday, May 13, 2014

Google’s Snoops: Mining Our Data for Profit and Pleasure


Google’s Snoops: Mining Our Data for Profit and Pleasure


At the Google headquarters in Mountain View, CA (Denis Capellin/Flickr)
There was a running gag among fellow workers where we would walk by each other and whisper “Don’t be evil, pft!” and roll our eyes.
–Former Google employee
Google’s publicists have been working extra hard this year. Edward Snowden’s revelations have made the company look like a pawn of the NSA; Google Glass has been drawing the ire of privacy advocates around the world; and in two separate lawsuits, both of which are now moving forward over Google’s strong objections, the company has been accused of wiretapping. The first suit is testing the legality of the company’s practice (now supposedly discontinued) of collecting information from private Wi-Fi networks using its Street View vehicles, and the second is challenging its ongoing practice of analyzing the contents of all emails sent and received by Gmail users. The company defends its practice of scanning emails as a means of gathering information it uses to send people targeted ads.
Although wide-ranging, the revelations and lawsuits are overlooking an important aspect of Google’s activities that is especially worrisome—the human element. It’s not just Google’s computers that have access to those emails; employees do too, and that introduces troubling possibilities that go far beyond the mundane world of targeted advertising. Edward Snowden and Bradley Manning were just low-level workers when they got ideas. What kinds of crazy notions might be popping into the heads of the 30,000 prodigies at Google, Inc.?
I am singling out Google here, as opposed to other high-tech giants like Facebook, or, for that matter, the NSA itself, because Google has a unique business model that gives it unfettered access to and control over immensely rich individual “profiles” of information on a scale that is unprecedented. The model is exquisitely simple and sublimely deceptive: We give you free services that you are likely to use dozens of times a day while we invisibly track and record everything you do. Based on what we have learned about you, we then charge advertisers premium fees to reach exactly the right buyers for their products and services.
“Google’s dance,” as I have called it in previous writings, lies in masking the company’s business model behind the endless array of free services. On the surface, Google appears primarily to be an information provider, but it is actually a glorified advertising firm, with 97 percent of its revenues coming from advertisers. Users see only the surface, which they love, but would they be so enamored if they were more aware of what the surface was for?
Twenty-four hours a day, across more than sixty free product “platforms” such as Gmail, the Google search engine, YouTube, Google Plus, Google Maps, Street View, and Google Wallet, the company is storing, indexing, and cross-referencing information about the beliefs, tastes, and activities of a billion people—including you—and not just when you are online. If you have the Android system on your mobile device, Google can track you even if you are innocently reading your ePub version of The Motorcycle Diaries. If you use Google Voice, your calls are transcribed, analyzed, indexed, and added to your profile, just as if they were Gmails. And if, in the near future, you find yourself within spitting distance of someone wearing Google Glass, beware: what you do and say can be recorded. Think J. Edgar Hoover multiplied by, well, a google (that’s a 1 with 100 zeros after it). No other company aggregates so much individual data so aggressively, competently, and invisibly.
Just how much data does Google actually have about you? If you are active in the digital world, it probably has the equivalent of filing cabinets full—but what, exactly, is in those drawers? Google won’t say. The content is private, and Google’s privacy, unlike yours, is sacrosanct.
Google appears primarily to be an information provider, but it is actually a glorified advertising firm, with 97 percent of its revenues coming from advertisers.
Once you unknowingly give them information about yourself—even search terms you never typed fully, or draft emails you never actually sent—it is their property, which, according to their Terms of Service Agreement (to which you automatically assent when you use any Google product, even if you don’t know you’re using a Google product), they can share that information, at their discretion, with “those we work with”—or just about any agency or individual if the company has a “good faith” belief that doing so is required by law or will “protect . . . the rights, property or safety of Google.”
But not with you. Unless regulation requires it—and so far, none does—the company will never share information about you with you. Needless to say, you also have no way to spot or remove incorrect information that may have found its way into your file drawers. Many Google employees, on the other hand—especially the whiz kids on the data mining teams—can look at your personal detritus all they want.
What could possibly go wrong?
Let’s think about this in general terms, or at least in psychological terms (that’s my field). How would people behave who had easy access to the private emails of hundreds of millions of people, including those written by their ex-spouses, childhood crushes, favorite celebrities, and least favorite politicians? Would they peek now and then? And if they found some juicy tidbits, would they sometimes joke about them with office mates? If they found some serious dirt on the jerk who bullied them in high school or the blowhard right-wing congressman who is ruining America, would they be tempted to leak some info to the Guardian or the FBI?
And what if they could also view, in real time, which search terms people were using and which websites people were visiting, along with a record of all the search terms people had ever used and all the websites people had ever visited?
What if, with a few keystrokes, they could alter the contents of a dossier to make a competitor look like a pedophile or push their friends’ websites onto the treasured first page of search rankings—maybe even influence the outcome of a close election by making search rankings favor one candidate?
What if you were sitting at that desk and controlling that keyboard? Would you occasionally peek, if only to take a break from the daily grind? Would you do harmless favors for friends and family members? Would you try now and then to help the world in some small way?
Of course you would.

Pertinent here is a little-known 2011 book that presents a fictionalized account of the lives of Google software engineers. Written by Shumeet Baluja, a senior staff research scientist at Google’s headquarters in Mountain View, California, The Silicon Jungle tells an unsettling story about Stephen Thorpe, an over-the-hill programmer who competes with thousands of college-age geniuses to land one of those coveted summer internships at. . . well, Google, really, even though Baluja pretends it’s not. I’ll call it “eGoogle,” for “ersatz Google.”
Unlike Dave Egger’s recent Google-bashing novel, The CircleJungle is by a knowledgeable insider. Baluja has a Ph.D. in computer science from Carnegie Mellon and used to be chief scientist at Lycos. He has also worked for Google for more than ten years, and, he tells me, has been prohibited by the company from talking about his book publicly—which is probably why you’ve never heard of it.
Here are a few important features of the culture at eGoogle, some almost dizzying in their implications:
Interns on the data mining teams necessarily have access to all eGoogle data, as do many other eGoogle employees. They need this access because their job is to find hundreds of thousands of new customers for high-rolling eGoogle customers who sell everything from ulcer medications to umbrellas. To guarantee the sale of just about anything, the interns write programs that scan the emails, search histories, and purchase histories of a billion people.
In other words, they are really mining for gold, although Baluja emphasizes that they see the challenges they are given as academic exercises; they are completely oblivious to the millions of dollars eGoogle rakes in with every new program they write. eGoogle is careful, Baluja says, to house the programmers and the accountants in separate buildings and to make sure they never meet.
What if you could view, in real time, which search terms people were using and which websites people were visiting, along with a record of all the search terms people had ever used and all the websites people had ever visited?
When the programmers are not filling coffers, they are scanning eGoogle’s massive databases for racy emails and pining over the private emails of ex-girlfriends, especially the emails with nude photos attached. When an especially titillating pic turns up, they display it on massive overhead screens for coworkers to admire. At eGoogle, everything is spectacular, even the perversions.
When, one evening, an intern is monitoring his ex-girlfriend’s online chats, he learns of a steamy party not far from the eGoogle campus, and four of the most lecherous of the interns are off and running. (We later learn who got lucky.)
Back on “campus,” one intern is made a full-time employee on the spot when he develops an app that allows eGoogle employees to zoom in on neighborhoods using eGoogle’s version of Google Earth and view, house by house, what kinds of activities people are engaged in online. When people are emailing, the houses light up brown; when they’re viewing porn, the houses light up pink. The app is an instant sensation among eGoogle employees, who are eager to see, godlike, which of their neighbors are being naughty.
Stephen’s girlfriend, meanwhile, is trying to get her doctorate at Brown University by monitoring conversations of radical Islamists on a website she’s created, but she can’t get any traffic. After Stephen mentions her dilemma to a fellow intern—one on a search-engine team—her website suddenly jumps up a gazillion slots in eGoogle search rankings, and thousands of prospective suicide bombers sign on.
The plot thickens when Stephen starts mining data for an executive at a nonprofit organization. The executive asks him to search eGoogle’s data for innocent people who are likely to turn up mistakenly on government watch lists, claiming his organization is going to help them protect themselves from overzealous government bureaucrats. Using the same techniques he uses to find widget buyers, Stephen quickly generates a list of 5,000 ideal watch-list candidates, which the scheming executive promptly sells for a seven-figure sum to Arab terrorists.
When government spooks figure out what Stephen has been doing, they make him an offer he can’t refuse: a lifetime of indentured servitude at a secret government research facility where there is no free food, the computers are clunky, and the databases are pathetically small. It’s either that or prison. How, he muses at the end of the book, can the United States ever win the war on terror when the government’s data processing resources are so paltry?
That’s the only thing Baluja gets wrong. Snowden’s revelations about the NSA’s access to the databases of Google, Microsoft, and other companies were inconceivable when The Silicon Jungle was published. Baluja tells us about individual eGoogle employees who routinely feed data to the feds, but he insists that large-scale data sharing would never be allowed by eGoogle executives. Snowden’s disclosures, which apparently are still not complete, remind us that no digital data are ever really private—that data are always vulnerable to the wiles of determined individuals or organizations.
There is also one aspect of Baluja’s tale that is ludicrous on its face, and that is his disclaimer in the book’s introduction that eGoogle (which he actually calls “Ubatoo”) isn’t really Google. In both form and function, it certainly looks like Google, and Baluja also acknowledges that the “temptations, . . . ability, brains, and computational power” necessary to do the kinds of mischief he describes are real.   

Google’s privacy violations vary from the petty and mundane to the truly spectacular. On the mundane side, in July 2010, a careless twenty-seven-year-old software engineer named David Barksdale was fired by Google for spying on at least four underage teens through their various Google accounts. While still employed, according to a September 2010 report by Gawker.com, he showed a friend the power he had over private information by pulling up his friend’s “email account, contact list, chat transcripts, Google Voice call logs—even a list of other Gmail addresses that the friend had registered but didn’t think were linked to his main account—in seconds.”
Why isn’t your massive personal profile heavily encrypted so prying eyes can’t see it—or at least not “in seconds”? Public statements in recent years by senior Google employees explain why. According to Vint Cerf, Google’s Chief Internet Evangelist, “we couldn’t run our system if everything in it were encrypted because then we wouldn’t know which ads to show you.” In other words, their business model depends on lightning-quick connections between the insecure data in your digital filing cabinet and the ads supplied by their paying customers, which makes your data easy pickings for rutting David Barksdales.
In July 2010, a careless twenty-seven-year-old software engineer named David Barksdale was fired by Google for spying on at least four underage teens through their various Google accounts.
I have been a programmer most of my life and a research psychologist for more than thirty years. I can tell you with certainty that the kinds of questionable activities Baluja describes are not only plausible but inevitable in the hyper-casual high-tech environment Google maintains, no matter what internal rules may be in place. Google openly takes pride in hiring independent thinkers and letting them frolic; software engineers are officially allowed to play a whopping 20 percent of their work time. In that kind of world, anyone with sufficient password authority or technical expertise can do exactly the kinds of things Baluja depicts—and worse.
When it was revealed in 2010 that Google Street View vehicles had been secretly collecting personal information from personal Wi-Fi networks in more than thirty countries for several years, the company claimed that this was a pet project of a single software engineer—Marius Milner. Although outed in 2012, Milner, who identifies his profession as “hacker” on LinkedIn, is still employed by Google.
Its public denials notwithstanding, Google has, from the top down, consistently shown little respect for privacy. In 2009, Google’s CEO, Eric Schmidt, expressed the philosophy that drives the enterprise: “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.” In other words, all information is fair game.
This helps explain projects like Buzz, a social network service that Google unveiled in 2010. Without anyone’s permission, the company instantly created an online community intended to overwhelm Facebook, just as its Gmail rollout had quickly overwhelmed Hotmail and Yahoo. The company created Facebook-like pages, already complete with friends, based on who its Gmail users—175 million of them at the time—emailed most frequently. People were so outraged by this blatant incursion into their personal lives that the platform was shut down after eighteen months.
Perhaps more outrageous, it was revealed in 2012 that Google engineers had for several years been hacking into Apple’s Safari browser, allowing them to surreptitiously monitor the search activities of millions of iPhone, iPad, and Mac users. For that little caper, Google was fined $22.5 million by the FTC—the largest fine in the agency’s history.
Comments like Schmidt’s and projects like Buzz are indicative of a kind of culture that both nurtures and encourages daring exploits like the ones in Baluja’s book, with each swashbuckling employee acting out mischievous impulses, large and small, every day. Google offers its employees an unconstrained world that is rich in resources in order to maximize creativity, and research on the creative process that I have been conducting since the 1980s shows that Google is doing things exactly right in this regard. But that kind of culture also magnifies just about every human tendency you can think of, including voyeurism, grandiosity, and greed.
How many David Barksdales and Marius Milners—individuals with the power to alter the course of a life or an industry in seconds—are, at this very moment, toying with Google’s massive, unregulated databases in ways we cannot even imagine? How many of them are getting ideas?
Computers are programmed and controlled by people, and nothing will ever change that simple fact. As soon as a Google computer “scans” an email—an obfuscating word for “reads”—any Google employee with sufficient password authority or technical savvy can too. When Google’s computers track and monitor people’s internet activities, so can its employees.
How much private information does Google have about you? They know, but they won’t say.
How is that information being used by the brash young techies the company takes such pride in hiring? Most likely, exactly as they please.
And how might their use of that information affect our lives in the future? No one knows—not even Google’s top executives—but Murphy’s law probably applies.

Robert Epstein is Senior Research Psychologist at the American Institute for Behavioral Research Technology in Vista, CA, and the former editor-in-chief of Psychology Today magazine. A Ph.D. of Harvard University, he has published fifteen books and more than 250 articles on artificial intelligence, creativity, and other topics.