Author: denialism_bv2x6a

  • Maastricht University's Centre for Human Rights to Hold a Conference on Denialism

    Never thought I would write this: Maastricht University is organizing a conference on the intersection of denialism and human rights. Here is a link to the conference description and the call for papers can be downloaded here.

  • Vaccines and the Boanthropy Risk

    I’m reading Jeffrey Kacirk’s delightful Forgotten English, which includes this anecdote concerning boanthropy, a condition where a person believes himself to be a cow or ox:

    In 1792, Edward Jenner successfully developed a vaccine for smallpox by injecting a boy with closely related cowpox germs. He did this despite his medical critics’ attempts to scuttle his project by circulating boanthropy scare-stores. The critics alleged that those inoculated would develop bovine appetites, make cowlike sounds, and go about on four legs butting people with their horns…

  • Samuel Hopkins Adams, Articles on the Nostrum Evil and Quackery

    As part of related research into consumer protection, I recently scanned in a copy of Samuel Hopkins Adams’ seminal articles on the patent medicine industry. These articles, which appeared in Collier’s magazine starting in 1905, helped build the record for the 1906 Pure Food and Drugs Act, and for amendments to that law in 1912.

    There are fourteen articles in the series and in them you will see how little has changed in the world of quackery. Adams focused much of his attention on the relationship between publishers and quacks, a problem that exists to this day (publishers are one of the most reliable opponents of consumer protection laws). Here, he points out the idea that publishers will lose their contracts with patent medicine quacks if “hostile legislation” is passed.

    In this first article, Denialism readers will recognize two key strategies used by today’s nutritional supplement sellers: claims of universalism/universal cures, and the idea that doctors are suppressing remedies in order to protect their professional racket. Enjoy. Uncorrected OCR follows.

    introduction_1_Page_3

    4

    5

    6

    7

    8

    9

    10

    page11

    INTRODUCTION
    This is the introductory article to a series which will contain a full explanation and expire of patent-medicine methods, and the harm done to the public by this industry, founded mainly on fraud and poison.  Results of the publicity given to these methods can already be seen in the steps recently taken by the National Government, some State Governments and a few of the more reputable newspapers.  The object of the series is to make the situation so familiar and thoroughly understood that there will be a speedy end to the worst aspect of the evil.

    Gullible .America will spend this year some seventy-five millions of dollars in the purchase of patent medicines. In consideration of this sum it will swallow huge quantities of alcohol, an appalling amount of opiates and narcotics, a wide assortment of varied drugs ranging from powerful and dangerous heart depressants to insidious liver simulauts; and, far in excess of all other ingredients, undiluted fraud. For fraud exploited by the skillfulest of advertising bunco men, is the basis of the trade. Should the newspapers, the magazines and the medical journal refuse their pages to this class of advertisements, the patent medicine business in five years would be as scandalously historic as the South Sea Bubble, and the nation would be richer not only in lives and money, but in drunkards and drug.fiends saved.
    “Don’t make the mistake of lumping all proprietary medicines in one
    indiscriminate denunciation,” came warning from all sides when this series
    was announced. But the honest attempt to separate the sheep from the
    goats develops a lamentable lack of qualified candidates for the sheepfold.
    External remedies there may be which are at once honest in their claims
    and effective for their purposes; they are not to be found among the
    mu~h-advertised ointments or applications which :fill the public prints.
    ~ut!cura may be a useful preparation, but in extravagance of advertising
    1t nvala the most clamorous cure-all. Pond’s Extract, one would naturally
    suppose, could afford to restrict itself to decent methods, but in the recent
    ep~demic scare in New York it traded on the public alarm by putting forth
    “~1aplay:• advertisements headed, in heavy black type, “Meningitis,” a
    d1aease In which witch-hazel is about as effective as molasses. ~his is
    fairly comparable to Peruna’s gh9ulish exploitation, for profit, of the yellow.
    fever. scourge in New Orleans,· aided by various southern newspapers of
    tan~mg, which published as news an “interview” with Dr. Hartman,
    president of the Peruna Company.

    6
    prominent Chicago newspaper and spread before its advertising manager a full-page advertisement, with blank spaces in the center. “We want some good, strong testimonials to fill out with,” he said. “You can get all of those you want, can’t you Y” asked the newspaper
    manager. “Can youf” returned the other. “Show me four or five strong ones from
    local politicians and you get the ad.”
    Fake Testimonials That day reporters were assigned to secure testimonials with photo.graphs which subsequently appeared in the full-page advertisement as

    ——–· —–·-······—······-·····–··-··· …… ———.
    ! ~–~~H~N£Y M;:l~
    Xa:n•B of I’a.p•>:. ··-··’····-·······-‘-·–‘-‘········—-··-/
    l’ \/rtlt \
    ” r ‘ ><
    er ‘v\.i.-.. -·-···-· —–o~ua.nater.
    A CONTRACT €0NTA·I-NING THE RED CI:.AUSE ‘l’he “Red Clause” is shown in heavy type, beginning with the words “It Is mutually agreed . • .” The Gazette bus recently decided to exclude all
    patent-medicine advertising from its columns.
    promised. As for the men who permitted the use of their names for this purpose, several of them afterward admitted that they had never tasted the “Compound,” but that they were willing to sign the testimonials for the joy of appearing in print as “prominent citizens.” Another Chicago news.
    7

    A WINDOW EXHIBIT IN A CHICAGO DUUG STORE.
    8
    paper compelled its political editor to tout for fake indorsements of n nostrum. A man with an inside knowledge of the patent-medicine business made some investigations into this phase of the matter, and he declares that such procurement of testimonials became so established as to have the force of a system, only two Chicago papers being free from it. To·day, he adds, a similar “deal” could be made with half a dozen of that city’s dailies. It is disheartening to note that in the case of one important and high·class daily, the Pittsburg Gazette, a trial rejection of all patent. medicine advertising received absolutely no support or encouragement from the public; so the paper reverted to its old policy.
    One might expect from the medical press freedom from such influences. The control is as complete, though exercised by a class of nostrums some· what differently exploited, but essentially the same. Only “ethical” prepa.rations are permitted in the representative medical press, that is, articles not advertised in the lay press. Yet this distinction is not strictly adhered to. “Syrup of Figs,” for instance, which makes widespread pretense in the dailies to be an extract of the fig, advertises in the medical journals for what it is, a preparation of senna. Antikamnia, an “ethical” proprietary compound, for a long time exploited itself to the profession by a campaign of ridiculous extravagance, and is to·day by the extent of its reckless use on the part of ignorant laymen a public menace. Recently an artie!~ announcing a startling new drug discovery and signed by a physician was offered to a standard medical journal, which declined it on learning thnt the drug was a proprietary preparation. The contribution was returned to the editor with an offer of payment at advertising rates if it were printed as editorial reading matter, only to be reject~d on the new basis. Subse.quently it appeared simultaneously in more than twenty medical publica.tions as rending matter. There are to-day very few medical publica.tions which do not carry advertisements conceived in the same spirit and making much the snme exhaustive claims ns the ordinary quack “ads” of the daily press, and still fewer that are free from promises to “cure” diseases which are incurable by any medicine. Thus the medical press is as strongly enmeshed by the “ethical” druggers as the lay press is by Paine, “Dr.” Kilmer, Lydia Pinkham, Dr. Hartman, “Hall” of the “red clause,” and the rest of the edifying band of life-savers, leaving no agency to refute the megaphone exploitation of the fraud. What opposition there is would naturally arise in the medical profession, but this is discounted by the proprietary interests.
    The Doctors Are Investigating
    “You attack us because we cure your patients,” is their charge. They assume always that the public has no grievance against them, or rather, they calmly ignore the public in the matter. In his address at the last convention of the Proprietary Association, the retiring president, W. A. Tal.bot of Piso’s Consumption Cure, turning his guns on the medical profession, delivered this astonishing sentiment:
    “No argument favoring the publication of our formulas was ever uttered which does not apply with equal force to your prescriptions. It is pardon.able in you to want to know these formulas, for they are good. But you must not ask us to reveal these valuable secrets, to do what you would not do yourselves. The public and our law-makers do not want your secrets nor ours, and it would be a damage to them to ha1Je them.”
    The physicians seem to have awakened, somewhat tardily, indeed, to counter-attack. The American Medical Association has organized a Coun.cil on Pharmacy and Chemistry to investigate and pass on the “ethi~l” preparations advertised to physicians, with a view to listing those wb1ch
    9
    are founrl to     be reputable and useful TJ1at tl · · d d
    -. · us Is regar e as a directIt t)
    assau on 1e propnetary mterests is suggested b tJ t ts
    the verge of frenzy in some cases, emanatincr fro~ t~eo;ro es ‘ e oq~ent to ~an~facturers control. . Alre~dy the council has issued s:ru~r~:~:f~~~~c;r::~ 1ep01 ts on products of Imposmgly scientific nomenclature. and rno y t
    follow.     ‘ re are o
    What One Druggist Is Doing
    Largely f~r trade reason~ a few druggists have been fightin the nos.trums, but without any considerable effect Indeed •t · · ~
    tb t 1 d . · , I IS surpnsmg to see
    ~ peop e are ~o eep!y Impressed with the advertising claims put forth duly as to be Impervious to warnings even from -t A t
    · 1     exper B. cu -ratet th E
    s ore, e cononuca Drug Company of Chicago st rt d ·
    and displayed a sign in the winuow readincr · ‘ a e on a campaign
    o ·
    PLEASE DO NOT ASK US
    ANY OLD
    What is
    PATENT
    Worth?
    MEDICINE
    /<’01· you embarrass us, as our honest ans1cer must be that
    IT IS WORTHLESS
    1( you mean     to as7e at what price we sell it that is an entirely different proposition. ‘
    When sick, consult a !J.OOd physician. It is the onl ro er course. A:zd pou ~ll find it cheaper in the enJ fha! self-medtcatton 1vtth worthless “patent” nostrums.

    This was followed up by th , . f .
    prominent nostrums that they ~::1esme: 8 In ormmg all applicants for the
    was unable to get rid of ite wa: I~g m~!l~Y· Yet, with all this that trums comprise one· third f . s . pa en .-me Icme trade, and to-day nos.thirds of that of the averaoge~:~enlltnte busmess. They comprise about two.
    . 1 ti . a s ore.
    I.egJs a on IS the most b · -d .
    Jlt’Deral public or the aw k o ~Ious/~~e .Y’ pen~ID~ the e~lightenment of the lion proceeds slow! a enmg o . 1e JOUrnalistic conscience. But legisla.lu practical termsya:n~2~~vo6oso~~amtst ~p:osition, which may be measured e last report of the Pro ;ie ‘ a s.a .e ~n the other side. I note in statement that “th P h tal!’ AssoCiations annual meeting the signifi.Most of the I . ~ t•eaviest expenses were incurred in legislative eg~s a Ion must be done by states, and we have seen
    ,
    10
    in the case of the Hall Catarrh cure contract how readily this may be con· trolled. .
    Two government agencies, at least, lend themselves to the purposes of the patent-medicine makers. The Patent Office issues to them trade-mark registration (generally speaking, the convenient term “patent medicine” is a misnomer, as very few are patented) without inquiry into the nature of the article thus safeguarded against imitation. The Post-Office Depart· ment permits them the use of the mails. Except one particular line, the disgraceful “Weak Manhood” remedies, where excellent work has been done in throwing them out of the mails for fraud, the department bas done nothing in the matter of patent remedies, and has no present intention of doing anything; yet I believe that such action, powerful as would be the opposition developed, would be upheld by the courts on the same grounds that sustained the Post Office’s position in the recent case of “Robusto,” namely:
    That the advertising and circular statements circulated through the mails were materially and substantially false, with the result of cheating and defrauding those into whose hands the statements come;
    That, while the remedies did possess medicinal properties, these were not such as to carry out the cures promised;
    That the advertiser knew he was deceiving;
    That in the sale and distribution of his medicines .the complainant made no inquiry into the specific character of the disease in any individual case, but supplied the same remedies and prescribed the same mode of treatment to all alike.
    Should the department apply these principles to the patent-medicine field generally, a number of conspicuous nostrums would cease to be patrons of Uncle Sam’s mail service.
    Some states have made a good start in the matter of legislation, among them Michigan, which does not, however, enforce its recent strong law. Massachusetts, which has done more, through the admirable work of its State Board of Health, than any other agency to educate the public on the patent-medicine question, is unable to get a law restricting this trade. In New Hampshire, too, the proprietary interests have proven too strong, and the Mallonee bill was destroyed by the almost united opposition of a “red-clause” press. North Dakota proved more independent. .After Jan. I, 1906, all medicines sold in that state, except on physician’s prescriptions, which contain chloral, ergot, morphin, opium, cocain, bromin, iodin or any _ of their compounds or derivatives, or more than 5 per cent. of alcohol, .must so state on the label. When this bill became a law, the Proprietary Association of .America proceeded to blight the state by resolving that its members should offer no goods for sale there.
    Boards of health in various parts of the country are doing valuable edu·
    cational work, the North Dakota board having led in the legislation. The
    Massachusetts, Connecticut and North Carolina boards have been active.
    The New York State board has kept its hands off patent medicines, but the
    Board of Pharmacy has made a cautious but promising beginning by
    compelling all makers of powders containing cocain to put a poison label
    on their goods; and it proposes to extend this ruling gradually to other
    dangerous compositions.
    Health Boards and .Analyses
    It is somewhat surprising to find the Health Department of New York
    City, in many respects the foremost in the country, making no use of care
    fully and rather expensively acquired knowledge which would serve to pr11·

    11
    teet the public. More than two years ago analyses were made by the chemists of the department which showed dangerous quantities of cocain in a number of catarrh powders. These analyses have never been printed. Even the general nature of the information has been withheld. Should any citizen of New York going to the Health Department, have asked: “My wife is taking Birney’s Catarrh Powder; is it true that it’s a bad fhing?” the officials, with the knowledge at hand that the drug in question is a maker of cocain fiends, would have blandly emulated the Sphinx. Outside criticism of an overworked, undermanned and generally efficient department is liable to error through ignorance of the problems involved in its admin.istration; yet one cannot but believe that some form of warning against what is wisely admittedly a public menace would have been a wiser form of procedure than that which has heretofore been discovered by the formula, “policy of the department.”
    Policies ·change and broaden under pressure of conditions. The Health Commissioner is now formulating a plan which, with the work of the chem.ists as a basis, shall check the trade in public poisons more or less con.cealed behind proprietary names. .
    It is impossible, even in a series of articles, to attempt more than an exemplary treatment of the patent-medicine frauds. The most degraded and degrading, the “lost vitality” and “blood disease” cures, reeking of terroriza.tion and blackmail, cannot from their very nature be treated of in a lay journal. Many dangerous and health-destroying compounds will escape through sheer inconspicuousness. I can touch on only a few of those which may be regarded as typical: the alcohol stimulators, as represented by J:’eruna, Paine’s Celery Compound and Duffy’s Pure Malt Whiskey ( adver.tised as an exclusively medical preparation) ; the catarrh powders, which breed cocain slaves, and the opium-containing soothing syrups which stunt or kill helpless infants; the consumption cures, perhaps the most devilish of all, in that they destroy hope where hope is struggling against bitter odds for existence; the headache powders, which enslave so insidiously that the victim is ignorant of his own fate; the comparatively harmless fake as typified by that marvelous product of advertising effrontery, Liquozone; and, finally, the system of exploitation and testimonials on which the whole vast system of bunco rests, as on a flimsy but cunningly constructed foundation.

  • The Web of Web Lobbying

    The Wall Street Journal reported on a battle developing between privacy advocates and internet companies concerning AB 1291, a transparency measure that is in part based upon some of my privacy research:

    The industry backlash is against the “Right to Know Act,” a bill introduced in February by Bonnie Lowenthal, a Democratic assemblywoman from Long Beach. It would make Internet companies, upon request, share with Californians personal information they have collected—including buying habits, physical location and sexual orientation—and what they have passed on to third parties such as marketing companies, app makers and other companies that collect and sell data.

    Instead of discussing the merits of the bill, here I want to show an aspect of industry association lobbying. As noted previously, these groups are useful to companies for several reasons: they can be used to “launder” policy, they can air controversial views without attribution to any one company, they can help hide companies advocacy when it appears to conflict with previous commitments, and they defray critical reporting. They also amplify power, because they place legislators in a house of mirrors–trade groups allow companies to mask the provenance of their advocacy and to multiply it. This creates a kind of echo chamber for companies.

    The Journal’s Vauhini Vara and Geoffrey Fowler reported:

    The coalition includes such trade groups as the Internet Alliance, TechNet and TechAmerica, all of which represent major Internet companies

    This past week, Will Gonzalez, a Facebook lobbyist based in Sacramento, aired concerns in a meeting about how the bill would hurt Facebook’s business, according to a legislative aide. Mr. Gonzalez didn’t respond to requests for comment.

    Representatives for Facebook and Google declined to comment on the bill.

    Vara and Fowler are on the right path–break through these groups and talk to their principals about their stance on the bill. Facebook and Google won’t comment to the Journal, I imagine, because AB 1291 is fundamentally a transparency measure. Opposition to it creates some dissonance with these companies’ rational choice/transparency/openness rhetoric.

    But back to my point–the trade groups help companies hide their advocacy positions, and amplify them. Check out my poor man’s version of the web of web advocacy below.

    This is the letterhead of the opposition letter submitted by tech companies against California's AB 1291.
    This is the letterhead of the opposition letter submitted by tech companies against California’s AB 1291.
  • Lead Industry & the Deck of Cards

    Helen Epstein has an interesting review of Lead Wars: The Politics of Science and the Fate of America’s Children by Gerald Markowitz and David Rosner, in the current New York Review of Books. The review is worth reading to better understand the public policy problem of lead in products and the environment. But I cannot help but point out that the article could be used to provide more footnotes to the Denialists’ Deck of Cards:

    … The lead companies also paid scientists who produced flawed studies casting doubt on the link between lead exposure and child health problems. When University of Pittsburgh professor Herbert Needleman first showed that even children with relatively modest lead levels tended to have lower intelligence and more behavioral problems than their lead-free peers, some of these industry-backed researchers claimed that his methods were sloppy and accused him of scientific misconduct (he has since been exonerated).

    The companies also hired a public relations firm to influence stories in The Wall Street Journal and other conservative news outlets, which characterized Needleman as part of a leftist plot to increase government spending on housing and other social programs…

  • The Good, Not So Good, and Long View on Bmail

    Denialism blog readers, especially those at academic institutions that have/are considering outsourcing email, may be interested in my essay on UC Berkeley’s migration to Gmail.  This is cross-posted from the Berkeley Blog.

    Many campuses have decided to outsource email and other services to “cloud” providers.  Berkeley has joined in by migrating student and faculty to bMail, operated by Google.  In doing so, it has raised some anxiety about privacy and autonomy in communications.  In this post, I outline some advantages of our outsourcing to Google, some disadvantages, and how we might improve upon our IT outsourcing strategy, especially for sensitive or especially valuable materials.

    Why outsourcing matters

    Many of us welcome possible alternatives to CalMail, which experienced an embarrassing, protracted outage in fall 2011.  Many of us welcomed the idea of migrating to Gmail, because we use it personally, have found it user-friendly and reliable, and because it is provided by a hip company that all of our students want to work for.

    But did we really look before we leaped?  Did we really consider the special context of higher education, one that requires us to protect both students and faculty from outside meddling and university-specific security risks?  Before deciding to outsource, we have to be sure that there are service providers that understand our obligations, norms, and the academic context.

    In part because of the university’s particular role, our email is important and can be unusually sensitive to a variety of threats.  Researchers at Berkeley are conducting clinical trials with confidential data and patient information.  We are developing new drugs and technologies that are extremely valuable.  Some of us perform research that is classified, export-controlled, or otherwise could, if misused, cause great harm.  Some of us consult to Fortune 500 companies, serve as lawyers with duties of confidentiality, or serve as advisors to the government.  Some of us are the targets of extremist activists who try to embarrass us or harm us physically.  Some of us are critical of companies and repressive governments.  These entities are motivated to find out the identities of our correspondents and our strategic thinking, through either legal or technical means.  And not least, our email routinely contains communications with students about their progress, foibles, and other sensitive information, including information protected by specific privacy laws, such as the Federal Educational Rights and Privacy Act (FERPA). We have both legal and ethical duties to protect this information.

    Our CalMail operators know these things, and as I understand it, they have been very careful in protecting the privacy of campus communications. Outsourcing providers such as Google however, may be far less likely to be familiar with our specific duties, norms, and protocols, or to have in place procedures to implement them. Outsource providers may be motivated to provide services that they can develop and serve “at scale” and that do not require special protocols. As described below, this seems to have been the case with Google’s contracts with academic institutions.

    Finally, communications platforms are powerful.  They are the focus of government surveillance and control because those who control communications can influence how people think and how they organize.  Universities have historically experienced periodic pressures to limit research, publication, teaching, and speech. Without communications confidentiality, integrity, and availability, the quality of our freedom and the role we play in society suffers.  And thus the decision to entrust the valuable thoughts of our community to outsiders requires some careful consideration.

    The Good

    There are some clear benefits to outsourcing to Google.  They include:

    • An efficient, user-friendly communications system with a lot of storage.  The integration of Google Apps, such as Calendar, is particularly appealing, given the experience we have had with CalAgenda.  Google Drive is a pleasure compared to the awkward AFS.
    • Our communications may in some senses be more securely stored in the hands of Google.  Google has some of the best information security experts in the world.  They are experienced in addressing sophisticated, state-actor-level attacks against their network.  To its credit, Google has been more transparent about these attacks than other companies.
    • Although it is not implemented at Berkeley, Google offers two-factor authentication.  This is an important security benefit not offered by CalMail that could reduce the risk that our accounts are taken over by others.  Those of us using sensitive data, or who are at risk of retaliation by governments, hackers, activists, etc., should use two-factor authentication.
    • As a provider of services to the general public, Google is subject to a key federal communications privacy law.  This law imposes basic obligations on Google when data are sought by the government or private parties.  It is not clear that this law binds the operations of colleges and universities generally.  However, this factor is not very important with respect to the Berkeley’s adoption of bMail, as we have adopted a strongelectronic communications policy protecting emails systemwide.
    • Google recently announced that it will require government agents to obtain a probable cause warrant for user content.  This is important, because other providers release “stale” (that is, over 180 days old) data to government investigators with a mere subpoena.  A subpoena is very easy to obtain, whereas a probable cause warrant standard requires the involvement of a judge, an important check against overzealous law enforcement.  Google’s position protects us from the problem that our email archives can be obtained by many government officials who need only fill out and stamp a one-page form.

    The Not So Good

    Still, there are many reasons why outsourcing, and outsourcing to Google specifically, creates new risks.  While our IT professionals did an in-depth analysis of Google and Microsoft, it seems that the decision to outsource was taken before the reality of the alternatives available to us were evaluated.

    • We must consider issues around contract negotiations and whether services provided fulfill the requirements I set forth above. In initial negotiations, Google treated Berkeley IT professionals like ordinary consumers—it presented take-it-or–leave-it contracts.  Google was resistant to, though it eventually accepted, assuming obligations under FERPA, a critical concession for colleges and universities.  Google also used a gag clause in its negotiations with schools.  This made it difficult for our IT professionals to learn from other campuses about the nuances of outsourcing to Google.  As a result, much of what we know about how other campuses protected the privacy of their students and faculty is rumor that cannot be invoked, as it implicitly violates the gag clause.
    • On the most basic level, we should pause to consider that both companies the campus considered for outsourcing are the subject of 20-year consent decrees for engaging in deceptive practices surrounding privacy and/or security.  Google in particular, with its maximum transparency ideology, does not seem to have a corporate culture that appreciates the special context of professional secrecy.  The company is not only a fountainhead of privacy gaffes but also benefits from shaping users’ activities towards greater disclosure.
    • As discussed above, UC and Berkeley routinely handle very sensitive information, and many of us on campus have special obligations or particularized vulnerabilities.  Companies with valuable secrets do not place crown jewels in clouds.  When they do outsource, they typically buy “single-tenant” clouds, computers where a single client’s data resides on the machine.  Google’s service is a “multi-tenant” cloud, and thus Berkeley data will only be separated from others on a logical level.  Despite the contract negotiation, Google’s is a consumer-level service and our contract has features of that type of service.  There is a rumor that one state school addressed this issue by negotiating to be placed in Google’s government-grade cloud service, but because of the secrecy surrounding Google’s negotiations, I cannot verify this.
    • Third parties are a threat to communications privacy, but so are first parties—communications providers themselves.  While we may perceive cloud services as being akin to a locker that the user secures, in reality these are services where the provider can open the door to the locker.  In some cases, there is a technical justification for this, in other cases, companies have some business justification, such as targeting advertising or engaging in analysis of user data.
    • It is rumored that some campuses understood this risk, and negotiated a “no data mining clause.”  This would guarantee that Google would not use techniques to infer knowledge about users’ relationships with others or the content of messages.  Despite our special responsibilities to students to protect their information and our research and other requirements, we lack this guarantee.
    • Despite the good news about Google’s warrant requirement, we still need to consider intelligence agency monitoring of our data.  Any time data leaves the country, our government (and probably others) captures it at the landing stations and at repeater stations deep under the ocean.  And the bad news is our contract does not keep Berkeley data in the U.S.  Even while stored in the country, there are risks.  For instance, the government could issue a national security letter to Google, demanding access to hundreds or even thousands of accounts while prohibiting notice to university counsel.  Prior to outsourcing, those demands would have to be delivered to university officials because our IT professionals had the data.  Again, to its credit, Google is one of the most forthcoming companies on the national security letter issue, and its reporting on the topic indicates that some accounts have been subject to such requests.
    • Google represented that its service meets a SAS 70 standard in response to security concerns, but it is not clear to me that this certification is even relevant.    SAS 70 speaks to the internal controls of an organization, and specifically to data integrity in the financial services context.  The University’s concerns are broader–confidentiality and availability are key elements–and apply to both external and internal controls and the University’s rights to monitor and verify.  There are notable examples of SAS 70 compliant cloud services with extreme security lapses, such as Epsilon (confidentiality) and AWS (availability).  SAS 70 allows the company, which is the client of the auditor, and the auditor itself, to agree upon what controls are to be assured.
    • Google will have few if any incentives to develop privacy-enhancing technologies for our communications platform, such as a workable encryption infrastructure.  As it stands, the contract creates no incentives or requirements for development of such technologies, and in fact, such development runs counter to Google’s interests.
    • In the end, CalMail was being very effectively maintained by only a few employees. It is not clear to me that an outsourced solution—which, in order for the security and other issues to be managed properly, requires Berkeley personnel to interface with the system and with Google—is necessarily less costly. This is especially concerning in light of the fact that we appear to have lost the connection to IT personnel who understand the sensitivity of the data we handle, and moved to a much more consumer-oriented product.

    The long view

    Looking ahead, we should carefully consider how we could assume the best posture for outsourcing. Instead of experimenting with Google, we would be better served by an evaluation of the campus needs that includes regulatory and ethical obligations and that captures the norms and values of our mission.  Provider selection should be broader than choosing between Google and Microsoft.

    As a first step, we should charge our IT leadership with forming formal alliances with other institutions to jointly share information and negotiate with providers.  Google’s gag provision harmed our ability to both recognize risks and to address them.

    We need to be less infatuated with “the cloud,” which to some extent is a marketing fad.  Many of the putative benefits of the cloud are disclaimed in these services’ terms of service.  For instance, a 2009 survey of 31 contracts found that, “…In effect, a number of providers of consumer-oriented Cloud services appear to disclaim the specific fitness of their services for the purpose(s) for which many customers will have specifically signed up to use them.”  The same researchers found that providers’ business models were related to the generosity of terms.  This militates towards providers that charge some fee for service as opposed to “free” ones that monetize user data.

    We should charge our IT professionals with the duty of documenting problems with outsourced services.  To more objectively understand the cloud phenomenon, we should track the real costs associated with outsourcing, including outages, the costs of managing the relationship with Google, and the technical problems that users experience.  Outsourcing is not costless.  We could learn that employees have simply been transferred from the operation of CalMail to the management of bMail.  We should not assume that systems mean fewer people—they may appropriately require meaningful staffing to fulfill our needs. As the expiration date ofsystem wide Google contract approaches in June 2015, these metrics will help us make an economical decision.

    Finally, there are technical approaches that, if effective, could blunt, but not completely eliminate, the privacy problems created by cloud services.  Encryption tools, such asCipherCloud, exist to mask data from Google itself.  This can help hide the content of messages, reduce data mining risks from Google, and cause the government to have to come to Berkeley officials to gain access to content.  The emergence of these services indicates that there is a shared concern about storing even everyday emails in cloud services.  These services cost real money, but if we continue to think we can save money by handing over our communications systems to data mining companies, we are likely to end up paying in other ways.

  • Katie Couric Picking Up Where Oprah Left Off

    Gawker reports that on the first day of Katie Couric’s new show, Sheryl Crow discusses her theory that cell phone use caused her to have a brain tumor.

    Update: The Chronicle reports that the show is just a celebrity infomercial, with softball questions, and no critical discussion:

    You would be forgiven for mistakenly thinking you’d tuned in to an infomercial for Weight Watchers in the first half hour of Katie Couric’s new syndicated talk show, “Katie,” which premiered Monday afternoon…

  • $15 To Turn off "Special Offers" Bravo Amazon.com!

    With the announcement of the Kindle Fire HD, some users were upset to learn that Amazon was going to stuff “special offers” on the device. But the company quickly retreated, and now is offering the option to turn of the ads for a mere $15.

    This is a good development for consumers. We should have the choice to move away from ad-supported business models. As I explain with my co-author Jan Whittington, there is a cost to free business models. “Free,” ad-supported services are packed with hidden costs to privacy and other consumer interests.

    While the ads are gone, there is still no word on whether Amazon will reduce tracking of Kindle users. Without backing off on tracking, this is not a pure privacy play.

    And an interesting data point–how is it that Amazon is willing to give up these special offers for only $15, given that “customers love our special offers“?

  • How Did You Get My Facebook?

    Facebook watchers are reporting that the service is about to launch a new feature for merchants that will allow merchants to target ads to users based upon users’ email and phone numbers. That’s a little confusing. Let me explain with a hypo–

    As I understand it, it might work like this: ABC Corp. has an extensive database of consumer email addresses, but is concerned that no one is reading the company’s spam. So ABC uploads its consumer email database to Facebook, which identifies Facebook members who are customers of ABC. ABC Corp can then send its marketing through Facebook so that it lands in the Facebook Feeds of its existing customers.

    The service has some privacy safeguards, because some hashing will be in place to stop Facebook from just copying the customer databases held by merchants (too bad they don’t do this for address book scanning!), and because the targeting will be based upon phone numbers and email addresses already in possession of the merchant. Thus, the idea is that this is marketing only to people with a business relationship with the advertiser.

    This is a great model for businesses trying to communicate with their existing customers. It lets them reach customers through a new channel (Facebook) that is very popular. It avoids the hassle of telemarketing and possibly the regulatory regime associated with email marketing.

    The Enhancement Problem

    But here’s the catch–two core privacy assumptions are flawed. Merchants have difficulty getting phone numbers and email addresses from customers. Sometimes, instead of asking customers for personal information, they find ways to trick consumers into providing it, or they simply buy emails/phones/home address about a customer based upon whatever data they already possess. This practice is known as data enhancement, it happens where a company links more information about consumers to an existing database.

    A recent case explored this practice at Williams-Sonoma: “After acquiring this information [zip code from Jessica Pineda at the register], the Store used customized computer software to perform reverse searches from databases that contain millions of names, e-mail addresses, residential telephone numbers and residential addresses, and are indexed in a manner that resembles a reverse telephone book. The Store’s software then matched Pineda’s now-known name, zip code or other personal information with her previously unknown address, thereby giving the Store access to her name and address.” That’s how you end up with dead trees in your mailbox.

    The whole point of data enhancement is to get information about the consumer that she is otherwise unwilling to provide. It’s really sneaky and it contravenes transparency and fairness principles. Enhancement obviates many attempts to protect privacy through selective revelation.

    How Did They Get My Facebook?

    There’s a second problem here. Many people do not want to be contacted by the companies that they frequent. In a recent survey, I found with colleagues that 74 percent of Americans thought that a merchant should not be able to call them, even if they gave their phone number to the merchant! Consumers want specific permission controls over direct marketing.

    Finding a new channel to contact people may be great for advertisers, but for users, contact through some new, unexpected channel, can be a bit unwelcome.

    A Fix?

    Perhaps Facebook could correct this problem by requiring merchants using this new service to guarantee that they collected email addresses and phone numbers directly from the consumer, with their consent that the information be used for marketing. Otherwise, this new service will create incentives for companies to engage in more enhancement, and it will further junk up Facebook.

  • Is Lynda Resnick's Admiration Good or Bad for Fareed Zakaria?

    Earnest reporting or catty criticism? Fareed Zakaria, according to the Times, is on the short list of Lynda Resnick’s dinner parties, along with “Queen Noor of Jordan, George Soros, the financier, and Senator Dianne Feinstein, Democrat of California.”

    Is the Times’ Christine Haughney critiquing Zakaria or not? Resnick is well known for being a marketing personality, one that makes broad, unsubstantiated health claims about “POM,” her silly juice that you should not waste your money on. Nor should you ever buy anything from her former business, the Franklin Mint, or Fiji, her overpriced water (see a theme here?).

    Is a Resnick endorsement a thumbs up or down?