<<

Volume 10, Issue 27 July 22, 2011

Department of Defense Announces First Strategy for Operating in Cyberspace The Department of Defense released today the DoD Strategy for Operating in Cyberspace (DSOC).

By Aliya Sternstein, nextgov

It is the first DoD unified strategy for cyberspace and officially encapsulates a new way forward for DoD‘s military, intelligence and business operations.

―It is critical to strengthen our cyber capabilities to address the cyber threats we‘re facing,‖ said Secretary of Defense Leon E. Panetta.

―I view this as an area in which we‘re going to confront increasing threats in the future and think we have to be better prepared to deal with the growing cyber challenges that will face the nation.‖

Reliable access to cyberspace is critical to U.S. national security, public safety and economic well-being. Cyber threats continue to grow in scope and severity on a daily basis. More than 60,000 new malicious software programs or variations are identified every day threatening our security, our economy and our citizens.

―The cyber threats we face are urgent, sometimes uncertain and potentially devastating as adversaries constantly search for vulnerabilities,‖ said Deputy Secretary of Defense William J. Lynn III.

―Our infrastructure, logistics network and business systems are heavily computerized. With 15,000 networks and more than seven million computing devices, DoD continues to be a target in cyberspace for malicious activity.‖

The DoD and other governmental agencies have taken steps to anticipate, mitigate and deter these threats. Last year, DoD established U.S. Cyber Command to direct the day-to-day activities that operate and defend DoD information networks. DoD Figure of the week also deepened and strengthened coordination with the Department of Homeland Security to secure critical networks as evidenced by the recent DoD-DHS Memorandum of Agreement. 2 x ―Strong partnerships with other U.S. government departments and agencies, the A KLAS report finds that the number private sector and foreign nations are crucial,‖ said Lynn. ―Our success in cyberspace of functioning health information depends on a robust public/private partnership. The defense of the military will exchanges in the US has more than matter little unless our civilian critical infrastructure is also able to withstand doubled since last year, with the attacks.‖ growth in private-sector exchanges surpassing the increase in public More at http://www.defense.gov/releases/release.aspx?releaseid=14651 exchanges. Volume 10, Issue 27 July 22, 2011 Page 2

Privacy and Security

U.S. and Russia: Expanding the ―Reset‖ to Cyberspace reduce the risk of misperception and inadvertent crisis. It‘s a prime example of the ―Reset‖ in U.S.-Russia relations taking By Howard A. Schmidt, The White House on a new and important dimension. Many are familiar with our work on behalf of the President to reduce cybersecurity vulnerabilities, such as hardening Both the U.S. and Russia are committed to tackling common government systems and building public awareness about cybersecurity threats while at the same time reducing the cybersecurity for end-users. chances a misunderstood incident could negatively affect our relationship. But what you don‘t always hear about are our efforts to reduce the overall risk to our national networks through active We‘re actively working on doing so in numerous diplomacy and international technical collaboration. Both are key efforts for realizing the President‘s International Strategy ways: through regular exchanges of information on technical for Cyberspace (pdf) released in May. threats to both sides like botnets; by better understanding each other‘s military views on operating in cyberspace; and by Risk reduction is crucially important to our relationship with establishing 24/7 systems allowing us to communicate about Russia, where we continue regular policy coordination at the cybersecurity issues via our existing and highly successful highest levels, including on issues related to cybersecurity. crisis prevention communications links between our two capitals. We plan to have all three mechanisms established by Just last month we hosted a Russian delegation, led by my year‘s end. counterpart, Russian National Security Council Deputy Secretary Nikolay Klimashin, for another round of in-depth Through progress like this, our countries are leading the way in discussions here in Washington. developing pro-active bi-lateral measures that use cyberspace to more broadly enhance our national, and international Joined by senior officials from across the U.S. and Russian security. governments, our goal was to continue building mutual confidence in our two governments‘ activities in cyberspace to More at http://1.usa.gov/pLe4uo

Tech IPOs Grapple with Privacy ―These companies realize that they need to be really upfront with what they are doing with data.‖ By Cecilia Kang, Reuters Daily deals site Groupon recently changed its privacy policies For social media start-ups, going public these days involves to collect more subscriber information and share that data more than sprucing up business and financial models. with partners. Ahead of its stock listing, it told its 83 million Also showing up in the blogs and securities filings of users about the changes in a recent e-mail. companies such as Groupon, LinkedIn, Pandora and Zynga is a Gamemaker Zynga, creator of Farmville, recently made a game new consideration: privacy. out of its privacy policy to lure users to understand how their These social networking firms after all are in the business of data is being used. The company learned first-hand about the data — collecting, sharing and sometime selling user importance of privacy policy disclosures after it was sued for information for targeted ads. They want to signal to investors allegedly sharing information about Facebook users. that they have a plan to make money from the trove of Right after it went public, professional social network LinkedIn information they have on users. announced in its blog that it would allow advertisers to publish So as federal lawmakers contemplate new online privacy laws when its users recommend products. Nearly all the firms that and regulators take up investigations of consumer protection have gone public so far or are gearing up for their IPOs have violations, this year‘s flood of social networking IPOs are listed online privacy enforcement and laws as a potential risk looking anew at how those activities in Washington, D.C., to future business. could affect their stock market prospects. Online real estate service Zillow, which will list its shares on ―Privacy is now finally and appropriately being seen as a the Nasdaq this Wednesday, listed potential Internet privacy compliance risk that is real and needs attention,‖ said Lisa laws as a risk factor to its business. Sotto, head of the privacy practice of law firm Hunton& Williams. More at http://wapo.st/nbamrJ Volume 10, Issue 27 July 22, 2011 Page 3

Information Sharing

PM-ISE Releases the 2011 ISE Annual Report to the Congress By Vince Beiser, Miller-McCune

The PM-ISE has officially released its 2011 ISE Annual Report to the Congress and we are proud of the information sharing success stories featured in the Report – stories that describe the outstanding accomplishments of our mission partners across the federal, state, local, and tribal governments, the private sector, and foreign allies.

The Annual Report is required by law to provide the Congress ―a progress report on the extent to which the ISE has been implemented.‖

The Report highlights major ISE activities since July 2010 and is organized around five themes:

Strengthening Management and Oversight - The Annual Report describes the work of the Information Sharing and Access Interagency Policy Committee (ISA IPC) and its sub- committees and working groups; of particular note, the Report highlights how these bodies expanded to include representatives of non-federal organizations and are reaching out to engage the private sector in developing the ISE, as well.

Improving Information Sharing Activities - Among the state, local, and tribal law enforcement officers and analysts to many activities presented, the Report describes how the more easily access a rich variety of data services provided by Nationwide Suspicious Activity Reporting Initiative has made Assured Sensitive but Unclassified (SBU) networks. substantial progress toward streamlining reporting and analysis within fusion centers by implementing new standards, The Report also describes similar efforts for classified policies, and processes. information sharing.

Another notable interagency effort involved the Baseline Enhancing Privacy, Civil Rights, and Civil Liberties Capabilities Assessment, during which federal, state, and local Protections - Balancing the need for national security with officials completed the first nationwide, in-depth assessment the need to protect privacy and civil liberties, the Report of fusion centers to baseline their capabilities. provides information on policies and training activities designed to enhance these protections. Establishing Standards for Responsible Information Sharing and Protection - Standards are critical to powering These are only a few of the activities that are helping the nation the ISE, and so the Report describes the efforts by the PM-ISE, build a robust information sharing environment. its mission partners, and standards organizations to identify And, while the Annual Report is primarily focused on the best existing standards for reuse and implementation terrorism-related initiatives, it also describes mission partner across the ISE. accomplishments that may not have been developed explicitly to support CT, but which may ultimately become best practices Enabling Assured Interoperability across Networks - for information sharing and collaboration government-wide. The Report details the tremendous progress made toward implementing a Simplified Sign On that will enable federal, More at http://bit.ly/oQCh63 Volume 10, Issue 27 July 22, 2011 Page 4

Health IT

Helping Patients Test Treatments for Chronic Today, most patients with chronic conditions see their Illness physicians a few times a year. The doctor prescribes a new treatment, and the patient reports back weeks or months later. Customizable tools will let patients, and their doctors, Margolis and his collaborators have created a suite of tools, track various health metrics. including automated text messages, smart phone apps, and online surveys, to help patients track their symptoms more By Emily Singer, Technology Review rigorously.

A new set of tools could help patients with chronic illnesses Because the tools are designed to generate quantitative data, track their condition and monitor how they respond to "we can set up a self-experiment and see if treatments work," different treatments. The tools are designed to let physicians says Margolis. run experiments tailored to an individual patient's needs, a faster and more quantitative way than infrequent office visits The project is part of a larger trend of people using new to determine a treatment's benefits or side effects. technology to monitor their health. While much of this tracking occurs outside of the traditional health-care system "The idea is to try to make interactions between patients and (see The Measured Life), Margolis would like to create a doctors more continuous, and to provide patients with more platform that brings both doctors and patients into the information so they can participate more actively in their process. care," says Peter Margolis, a physician at Cincinnati Children's Hospital. The project is part of the Collaborative Chronic Care "The theory is that if we had more rigorous information on Network (C3N), whose goal is to collect real-time data and use patient outcomes, we would be able to adjust therapies in a it to change how chronic illnesses are managed. more scientifically rigorous way," says Richard Kravitz, a physician and health policy researcher at the University of Those involved with the project would like to see health care California, Davis, who is not involved in the Cincinnati effort. focused more on the variability of day-to-day life, and less on sporadic visits to the doctor's office. More at http://bit.ly/n5zC3J

Most Wired 2011 "We've been very methodical about how we implement Hospitals make progress on IT health, but must information technology," says Raymond Adkins, chief information officer of the Salisbury, Md., hospital. untangle meaningful use.

By Matthew Weinstock & Suzanna Hoppszallern, Hospitals & "The last few years, CPOE has received a lot of focus. We've Health Networks worked to increasingly leverage the decision support that you can have with CPOE." Like many hospitals nationwide, Peninsula Regional Medical Center has been on a seemingly never-ending information The heightened attention to and education about CPOE has technology journey. The mission: to use high-tech systems to resulted in an 85 percent overall adoption rate among improve the quality and safety of patient care and to become physicians. More impressive is what that has meant for patient more efficient. The hospital has been striving to become a care: meaningful user, if you will, since the mid-1990s when the first iteration of an electronic medical record was installed. A decrease in one year in the number of patients with elevated Through the years, components have been added international normalized ratio for blood-clotting time from systematically. In 1998, the 362-bed medical center greater than 20 percent to 10 percent. implemented point-of-care charting; in 2001, it installed A 19 percent reduction in adverse drug reactions with automated medication storage and dispensing cabinets, Dilaudid, a potentially dangerous narcotic medication. followed by bedside scanning for patient medications in 2002. The next year, a medication-management system was added in Increased compliance with heparin protocols by 60 percent. the pharmacy. And in 2005, computerized provider order entry came online. More at http://bit.ly/oRmbDk Volume 10, Issue 27 July 22, 2011 Page 5

Health IT - (cont.)

Scientists Track Health Trends on Twitter Dredze and Paul uncovered patterns about allergies, flu cases, By Molly Merrill, Healthcare IT News insomnia, cancer, obesity, depression, pain and other ailments. ―There have been some narrow studies using Twitter posts, for Twitter can be used to track important health trends, example, to track the flu,‖ said Dredze. ―But to our knowledge, according to computer scientists at Johns Hopkins University. no one has ever used tweets to look at as many health issues as we did.‖ Mark Dredze and Michael J. Paul fed two billion public tweets posted between May 2009 and October 2010 into computers, In addition to finding a range of health ailments in Twitter then used software to filter out the 1.5 million messages that posts, the researchers were able to record many of the referred to health matters. Dredze, a researcher at the medications that ill tweeters consumed, thanks to posts such university‘s Human Language Technology Center of Excellence as: ―Had to pop a Benadryl … allergies are the worst.‖ and an assistant research professor of computer science, and Paul, a doctoral student, said identities of the tweeters were Other tweets pointed to misuse of medicine. ―We found that not collected. some people tweeted that they were taking antibiotics for the flu,‖ said Paul. ―But antibiotics don‘t work on the flu, which is a ―Our goal was to find out whether Twitter posts could be a virus, and this practice could contribute to the growing useful source of public health information," said Dredze. ―We antibiotic resistance problems. So these tweets showed us that determined that indeed, they could. some serious medical misperceptions exist out there.‖

In some cases, we probably learned some things that even the To find the health-related posts among the billions of messages tweeters‘ doctors were not aware of, like which over-the- in their original pool, the Johns Hopkins researchers applied a counter medicines the posters were using to treat their filtering and categorization system they devised. symptoms at home.‖ More at http://bit.ly/puEZeM By sorting these health-related tweets into electronic ―piles,‖

Joint Commission Safety Goals Should be Part Patient Identification of EHR Certification EHRs should make patient identification more reliable – for By Molly Merrill, Healthcare IT News example, including visual reminders like a photograph and a requirement to reenter the patients initials if the system finds The Joint Commission‘s 2011 National Patient Safety Goals patients that have ―sound- or look-alike names.‖ (NPSG) for hospitals should be included in electronic health record certification and criteria for meaningful use, say Staff Communication authors of a commentary that appeared in the Journal of the American Medical Association. EHRs should go one step further when it comes to notifying physicians about abnormal test results – for example, having ―Ideally, addressing the NPSGs should be incorporated into the to respond in a certain timeframe before being directly EHR certification process, requiring each vendor to specifically notified. engineer targeted solutions and each organization to carefully implement and use these systems to improve safety,‖ wrote Safe Use of Medications Ryan P. Radecki, MD, and Dean D. Sittig, PhD, authors of a commentary that was published in JAMA on July 6. EHRs with clinical decision support and bar code medication administration are key to improving patient safety, but authors Radecki and Sittig break down each of the six NPSG goals for note that ―these interventions‖ have to be part of the clinicians‘ hospitals and how EHRs can be used to help achieve them: workflow or risky ―workarounds‖ will develop.

More at http://bit.ly/pi6QCH Volume 10, Issue 27 July 22, 2011 Page 6

Health IT - (cont.)

VA Seeks To Expand 'Blue Button' Department of Defense's Tricare program as well as patients in By Howard Anderson, GovInfoSecurity.com the Military Health System.

"The VA believes all veterans, and not just those who receive The Department of Veterans Affairs is offering a $50,000 prize all their care from the VA, would benefit from and should have to a developer who successfully demonstrates the expansion of access to a Blue Button personal health record," the VA said in the use of the "Blue Button" application to enable veterans to announcing the competition. download certain patient information from providers outside the VA. To win the prize for the competition, slated to end by Oct. 18, a developer must document a long list of details, including the About 350,000 people now use the Blue Button, including installation of the Blue Button application on websites used by 300,000 veterans who use it at the My Healthe Vet portal to 25,000 licensed clinical professionals and available for use by download certain information from VA providers, which then all patients, including veterans. can be printed or stored on a computer or portable media (see: VA, Medicare Ease EHR Downloads ). The Blue Button concept, which the Markle Foundation developed in collaboration with other groups, calls for the use Veterans then can choose to share this data with others. of a set of privacy and security policies building on the Markle Common Framework for Networked Health Information. Medicare beneficiaries also can use the Blue Button to download certain information, along with beneficiaries of the More at http://bit.ly/oT6FnL

Federal Claims Database Plan Proceeds uniformed service members, retirees and their family members who voluntarily participate in the program. By Howard Anderson, GovInfoSecurity.com The agency will use the database, which will gather patient- A revised, downsized plan to launch a national database of identifiable information from participating insurance carriers, certain federal healthcare claims data is being implemented to analyze the costs and utilization of services "to ensure the despite ongoing concerns from privacy advocates. best value for both enrollees and taxpayers," according to the revised proposal now being implemented. The revised plan for a Health Claims Data Warehouse, announced in two Federal Register notices June 15 by the U.S. Privacy Advocates' Concerns Office of Personnel Management, took effect July 15 "without any further changes," an official at the office confirmed to Privacy advocates, including the Center for Democracy and HealthcareInfoSecurity.com. In the notices, the office said it Technology, blasted the original proposal for its lack of detail would launch the plan "unless comments are received that on privacy and security issues. would result in a contrary determination." Harley Geiger, policy counsel for the center, said in June that The office, in its revised plan, called for using the database to the revised proposal provided far more details, including a help manage only the Federal Employee Health Benefit commitment to comply with HIPAA. "I think the Office of Program, rather than three federal programs as it originally Personnel Management deserves a fair amount of credit for proposed (see:Privacy Advocates Win Database Delay). being responsive to the issues that CDT raised," Geiger said.

That program includes federal employees, postal employees, More at http://bit.ly/qq2v3j Volume 10, Issue 27 July 22, 2011 Page 7

Health IT - (cont.)

Doctors Skittish about Health Technology Despite Promise of Big Federal Bucks

Cleveland area physicians worried about big hassles, big risks and a big commitment of time they don't have. By Susan Jaffe, iWatchNews.com

In Dr. Sandra Berglund‘s well-stocked waiting room, there‘s a box of children‘s toys and picture books and, on either side of a magazine rack, framed photographs of sacred places: the Cleveland area doctor Ghassan Abdallah gets help in stadiums of the Cleveland Browns and Cleveland Indians. And sifting choices for electronic records systems from government-paid contractors. Emma Schwartz/iWatch in clear view behind the receptionist‘s desk is something the News Obama Administration will actually pay her to clear out: folders of paper medical records stuffed into shelves from the floor almost to the ceiling. government‘s electronic health record initiative. The administration is offering what sounds like a pretty good deal. If Berglund, a family medicine doctor in her own practice, And yet, neither reward nor punishment has persuaded some transfers the information in those folders to an electronic small practice doctors like Berglund to dump all those folders health record system run on a computer, she could earn a or upgrade their obsolete computer systems — a troubling $44,000 bonus over the next five years tacked on to the omen for the Obama administration, which believes that payments she gets for treating patients in Medicare. Or, if she conversion of paper records to electronic form is a crucial step cares for a certain number of low-income Medicaid patients, toward health care reform. she could earn as much as an extra $63,750 over six years. Berglund is not sure she‘ll even get that bonus federal officials The doctors still have to buy the system — which can cost are offering; not much of the $27 billion has been spent yet — roughly $20,000 per physician initially — but the bonus the program has only just started — and it could become a payments are designed to get them interested. The payments tempting target as Congress struggles to tighten the federal are part of a $27 billion incentive program included in the budget. (In May, Medicare officials distributed $75 million in 2009 economic stimulus law. The program also offers health the first round of bonus payments to physicians and hospitals care providers free technical support from new regional nationwide. Another $114.5 million in Medicaid bonuses has extension centers, a certification process to highlight suitable been distributed to health care providers through May 31 ) electronic systems, workforce training and a national health She‘s also not sure a big hospital like the Cleveland Clinic, a information exchange network, among other benefits. few miles away from her Middleburg Heights office, will be The goal is to bring the last outposts of the nation‘s health care able ―to talk to me and my little system.‖ She questions system into the computer age, linking medical providers so whether there will be hidden costs for upgrades and other that they can coordinate and improve patient care and — in the things. She wonders if her staff of two will be able to learn to process—reduce unnecessary health care spending. But operate an electronic health records system. And she doesn‘t convincing everyone to use electronic health records has not think the right system is out there. been easy. ―I don‘t want to be stuck with something that seems easy but The government isn‘t forcing doctors and other providers to isn‘t going to work as time goes on,‖ said Berglund. She was make the switch. But if they don‘t, Medicare will begin sitting in one of her three exam rooms, after a grueling day deducting 1 percent of their payments in 2015. The penalty that began just before sunrise with visits to patients in the rises each year to a maximum of 5 percent in 2019. hospital. She‘ll end her day with another hospital run. She cares for about 350 patients a month. ―I feel like I‘m a part of Those who don‘t sign up ―are in danger of being left behind their family and they‘re a part of mine.‖ and that would be bad for them and bad for their patients,‖ said Dr. David Blumenthal, who until recently coordinated the More at http://bit.ly/pazSXo Volume 10, Issue 27 July 22, 2011 Page 8

New Reports and Papers adoption, including the financially well-off and well-educated, non-whites, and those under the age of 45. Smartphone Adoption and Usage Some 87% of smartphone owners access the internet or email By Aaron Smith, Pew Internet on their handheld, including two-thirds (68%) who do so on a typical day. When asked what device they normally use to Overview access the internet, 25% of smartphone owners say that they mostly go online using their phone, rather than with a In its first standalone measure of smartphone ownership, the computer. While many of these individuals have other sources Pew Internet Project finds that one third of American adults – of online access at home, roughly one third of these ―cell 35% – own smartphones.A The Project‘s May survey found mostly‖ internet users lack a high-speed home broadband that 83% of US adults have a cell phone of some kind, and that connection. 42% of them own a smartphone. That translates into 35% of all adults. About the Survey

Our definition of a smartphone owner includes anyone who The results reported here are based on a national telephone falls into either of the following two categories: survey of 2,277 adults conducted April 26-May 22, 2011. 1,522 interviews were conducted by landline phone, and 755 One-third of cell owners (33%) say that their phone is a interviews were conducted by cell phone. Interviews were smartphone. conducted in both English and Spanish. For results based on all adults, the margin of error is +/-2 percentage points; for Two in five cell owners (39%) say that their phone operates on results based on all cell owners, the margin of error is +/-3 a smartphone platform (these include iPhones and Blackberry percentage points (n=1,194); and for results based on devices, as well as phones running the Android, Windows or smartphone owners, the margin of error is +/-4.5 percentage Palm operating systems). points (n=688).

Several demographic groups have high levels of smartphone More at http://bit.ly/qa6kZV

Digital Feudalism: Enclosures and Erasers from Digital Rights Management to the Digital Divide services like YouTube, Face-book, and Twitter, structural changes threaten to foreclose many of the Inter-net‘s By Sascha D. Meinrath & James W. Losey, New America democratic possibilities. Furthermore, recent developments in Foundation & Victor W. Pickard, New York University digital rights management (―DRM‖), net neutrality, and user privacy reveal unprecedented attacks on basic Internet Introduction freedoms.

As we enter the second decade of the 21st Century, we find The Internet ecosystem includes a diverse array of ourselves at a rare historical moment—a time of great stakeholders who build and depend upon each other‘s opportunity fraught with substantial pitfalls. Numerous participation. Data transmission depends on access to the potential trajectories of the Internet may unfold before us. physical network, and application functionality depends on the While decentralized and participatory platforms have birthed a transport of data. As a result, numerous entities—such as revived movement for democratized media production, these network operators and protocol developers—have the power to phenomena depend on the common resource of the Internet; define the end-user experience. Unfortunately, this ability to common not in ownership of the integrated networks, but in intervene can have profound implications for the flow of non-discriminatory access and use of the network.1 However, information, the functionality of applications or hardware, and as markets evolve, there is a growing uncertainty that policy the specific content or messages allowed over a network. While decisions sur-rounding the Internet will benefit the general some scholars continue to herald the brave new world of public. Even as social networking and media production have digital networks, others suggest more cautionary tales of lost empowered users, less visible structural changes threaten to opportunities, market failure, and corporate mismanagement.. foreclose many of the Internet‘s democratic possibilities. Despite the popularity and political power of innovative More at http://bit.ly/p9bdy6 Volume 10, Issue 27 July 22, 2011 Page 9

Reports and Papers - (cont.)

Cybersecurity and the Future of the Internet And then there is . Some analysts argue that Beijing is mounting a sustained online effort to steal the west‘s economic The threat of cyber-attack is driving states and secrets as part of an ―unrestricted warfare‖ strategy (a term coined by two People‘s Liberation Army colonels in 1999 to corporations to devote ever-greater resources to meet refer to an undeclared, asymmetric war). GhostNet - a online the challenge. The accompanying debate about the spying conspiracy reaching into more than 100 states, scale of the risk has profound implications for the uncovered in 2009 - showed how far it was prepared to go. future of the internet. A series of intrusions at corporate and state agencies identified By Ben Schiller, openDemocracy in mid-2011 - at (among others) Citibank, Sony, the CIA, Google, Lockheed Martin, and Northrop Grumman - has When cybersecurity experts are asked why their issue is provoked officials in the United States and elsewhere into receiving so much attention these days, the reply tends to be a increasingly dark warnings. single word: Stuxnet. ―The next Pearl Harbor we confront could very well be a cyber- The computer worm, said to have been developed by the attack that cripples our power systems, our grid, our security Israelis to sabotage ‘s nuclear programme, changed systems, our financial systems, our governmental systems‖, the everything, they say: because it showed how large-scale new CIA director Leon Panetta told the US Senate's armed- facilities (and not just online targets) could be vulnerable, and services committee in June 2011. how nations can fight a ―cyber-war‖ with a high degree of deniability. The Pentagon‘s ―Defense Strategy for Operating in Cyberspace‖ (May 2011) says the US now regards online ―It was a seminal moment‖, says Chris Demchak, an assistant espionage as ―acts of war‖ that necessitate conventional as well professor in cybersecurity at the US Naval War College. as cyber-reponses. ―Before Stuxnet there were so many cyber-sceptics who would say, ‗oh, it‘s really just cyber-crime‘.‖ More at http://bit.ly/nextYc

NYT On The ‗Psychology Of Sharing‘: E-Mail Still hipsters (younger altruists and careerists), boomerangs Rules (people who share simply to stir up controversy), connectors and selectives (related to careerists and altruists, respectively). By David Kaplan, paidcontent.org While people who are younger and view themselves as more When first began talking about creating a tech-savvy have begun to eschew e-mail as a communications metered paywall for its website last year, the company was tool, for the most part, e-mail remains the most popular way quick to note that social media links would be exempt in order users choose to share news. to keep the traffic flowing. As the study reminds the technological elite, despite Hoping to get a better sense of who shares links and why, the appearances, not ―everyone‖ is on Facebook, and Twitter is still NYT commissioned a study that breaks down the types of mostly the province of media and tech people. Secondly, e-mail people who share links and offered an overview of some recent is viewed as more secure and private and therefore more marketing campaigns that appeared to hit the ―buzz‖ mark. ―personal.‖

The one big surprise—at least for those fully immersed in the As such, people tend to want to have a one-to-one conversation worlds of Twitter, Facebook and now Google+—is that e-mail about news that moves them rather than a one-to-many. Social is still the most popular sharing tool. media, the study says, is all about ―serendipity,‖ where a post can lost in the shuffle of a Twitter or Facebook stream; but an e In an online survey of 2,500 self-identified ―medium-to-heavy -mail is something that definitely will get seen and therefore, content sharers,‖ Latitude Research and the NYT found that produce a specific response. users generally fall into six ―personas‖: altruists (mostly female, attached to causes), careerists (it‘s all about the job), More at http://bit.ly/ptkTpm Volume 10, Issue 27 July 22, 2011 Page 10

Reports and Papers - (cont.)

Google Effects on Memory: Cognitive Consequences of Having Information at Our Fingertips

By Betsy Sparrow, Columbia University; Jenny Liu, University of Wisconsin & Daniel M. Wegner, Harvard University

Abstract

The advent of the Internet, with sophisticated algorithmic search engines, has made accessing information as easy as lifting a finger. No longer do we have to make costly efforts to find the things we want. We can "Google" the old classmate, find articles online, or look up the actor who was on the tip of our tongue.

The results of four studies suggest that when faced with difficult questions, people are primed to think about computers and that when people expect to have future access to information, they have lower rates of recall of the information itself and enhanced recall instead for where to access it. The Internet has become a primary form of external or transactive memory, where information is stored collectively outside ourselves. More at http://bit.ly/qwc9gS

"Do Not Track or Right on Track? – The Privacy

Implications of Online Behavioural Advertising" and assume that you are all now familiar with at least the main By Peter Hustinx, European Data Protection Supervisor lines of interest based advertising, and the technology of user choices and user control. Ladies and gentlemen, My short definition of OBA is that it is the presentation of First of all, I want to thank the University of Edinburgh, School targeted advertising on websites based on large scale tracking of Law, for the invitation to give this lecture in the context of a of consumer behavior online. larger conference on the same subject. There are different ways to do this, but it typically takes ad Although I have accepted this invitation with pleasure, I must network providers as an active link between website operators confess that this arrangement also created a sense of and advertisers. embarrassment, particularly because I was unable to attend today‘s sessions. It also involves the storing of cookies on the user‘s computer and browser settings in a mode to accept those cookies. Other So, how could I do justice to today‘s speakers and avoid the methods may be even more invasive, such as ‗deep packet risk of an undue overlap or perhaps even an overdose of inspection‘ by internet service providers, but that should privacy and OBA? perhaps be left for another occasion.

I have decided to build on the strengths of this arrangement More at http://bit.ly/oUedVl Volume 10, Issue 27 July 22, 2011 Page 11

Reports and Papers - (cont.)

The People‘s Republic of Youtube? Interrogating Rhetorics of Internet Democracy on the video-sharing site YouTube. S.R. Sidarth, a University of Virginia student and volunteer for the Democratic By Alice E. Marwick, Microsoft Corporation challenger Jim Webb, had been assigned to shadow Allen on the campaign trail. Allen, irritated with Sidarth‗s ever-present Abstract camera, said ―Let‗s give a welcome to Macaca here… Welcome The mass media often frames YouTube as intrinsically to America.‖ A quick moment that would otherwise have been democratic, allowing ordinary citizens to act as journalists or lost in hours of campaign footage, the clip became one of the media watchdogs, participate directly in mainstream media, most-viewed videos on YouTube once it was revealed that and become celebrities themselves. While characterizing the macaca was a racial slur, used by French colonists in North internet as ―democratic‖ is nothing new, what are the Africa to refer to dark-skinned people. Allen attempted to back implications when the site of democracy is not national, but -pedal, claiming that he did not know what the word meant, commercial? This paper explores the interplay between that he was referring to Sidarth‗s Mohawk hairstyle, and finally community-based or democratic interests and YouTube‗s that he had made it up. However, once it was revealed that profit-driven nature. I maintain YouTube is subject not only to Allen learned French from his mother, a Tunisian, Allen‗s the same social forces that limit discursive egalitarianism in popularity faltered. He lost the election to Webb (CNN News the ―real world,‖ but to economic forces that act upon users in 2006; Farhi 2006, C1; Lizza 2006, 1). more complicated ways. It is therefore problematic to look to YouTube, or any other internet site, to compensate for This incident became one of the most talked-about shortcomings in the democratic process. controversies of the 2006 election. YouTube, a website that makes it simple to upload and view digital videos, was cited by Introduction the press as the central factor in rapidly spreading the event (Borger 2006; Farhi 2006; C1, Poniewoznik 2006). On 11 August, 2006, three months before midterm elections, a video of Republican Virginia Senator George Allen was posted More at http://bit.ly/rlLJxO

A Growing Digital Divide

Internet Freedom and the Negative Impact of with the US have set goals for universal broadband access (http://ec.europa.eu/information_society/activities/ Command-and-Control Networking broadband/docs/annex_2.pdf). By Sacha D. Meinrath, James Losey & Benjamin Lennett, New America Foundation While most commentators and policy makers have focused on the bene!ts of broadband and Internet connectivity, two signi! A growing international consensus holds that communication cant dilemmas receive less attention. First, the challenges the is a fundamental human right (www.un.org/en/documents/ unconnected face — the ―dark side of Metcalfe‘s law‖ — have udhr/ index.shtml). In 2010, United Nations Secretary- remained less explored. Telecommunications experts Rahul General Ban Ki-moon stressed the importance of access to the Tongia and Ernest Wilson propose that ―the more people Internet and information in his remarks to the assembly (see included within and enjoying the bene!ts of a network, the www.un.org/News/ Press/docs/2010/obv875.doc.htm), and more the costs of exclusion grow exponentially to the last September, ITU Secretary-General Hamadoun I. Touré excluded.‖ said, ―Broadband is the next tipping point, the next truly transformational technology. It can generate jobs, drive growth The second key overlooked facet is that not all connectivity is and productivity, and underpin long-term economic created equal. Where, how, and what technologies and devices competitiveness.‖ you use to connect to the Internet or broadband will increasingly determine your experience and access to digital Additionally, Spain and Finland have elevated broadband opportunities. access to a legal right (see www.bbc.co.uk/news/10461048 and http://tinyurl.com/3qp54de), and 20 EU nations along More at http://bit.ly/nuuHvq Volume 10, Issue 27 July 22, 2011 Page 12

Internet Governance granted wide-open Internet access earlier this year, and now faces its first tests of its intentions to maintain that openness. Web's Openness Is Tested in Tunisia Tunisia's military recently ordered a block on Facebook pages Post-Uprising Freedoms Are Under Pressure; Journey that called for violence. The government's Internet agency is fighting a Tunisian court order to block pornographic websites, From Internet Activist to Official—and Back Again setting up a battle that could help define the breadth of By Steve Stecklow, The Wall Street Journal censorship in the country.

Slim Amamou's struggle to end Internet censorship in Tunisia How Tunisia proceeds could provide an early sign of whether has come full circle. uprisings across the region will lead to lasting freedom of information, democracy and other protester demands—or In January, the 33-year-old online activist and software whether these windows are in danger of closing. developer was jailed after the government accused him, among other things, of attacking President Zine El Abidine Ben Ali's Mr. Amamou, a soft-spoken man from a medical family in the website. Mr. Ben Ali soon fell from power. Mr. Amamou was capital, Tunis—where his father is a professor of medicine and swept into the interim government, embodying how the youth his mother, a gynecologist—studied computer science. After who had run a revolution from the Internet had now gained a college, he and some friends launched a website-design toehold in power. company. When he began blogging, he wrote about project- management software. Now he is back on the outside, worrying about what he sees as a new threat of Web censorship. In 2008 and 2009, Tunisia increasingly censored political blogs and sites critical of its human-rights record. Mr. Mr. Amamou's experience tracks his country's halting embrace Amamou, who says he never considered himself political, grew of information freedom. Before this year's Tunisian uprising, defiant. He created a website that gave Tunisians access to the country ranked behind only Iran, Myanmar, Cuba and blocked sites. China in terms of online restrictiveness, according to Freedom House, a Washington-based, pro-democracy nonprofit. Tunisia More at http://on.wsj.com/qM5LmN

EU Warned on Broadband Targets simmering tensions between some European telecoms By Andrew Parker and Stanley Pignal, Fortune Times operators and US technology companies.

The European Union‘s ambitious targets to improve Neelie Kroes, the European commissioner for telecoms, in broadband speeds will be missed unless governments and effect, commissioned the report in March by convening a regulators enable telecoms operators to cut their costs and tap meeting of 40 companies, including telecoms operators, new revenue sources, leading chief executives warned on equipment makers and technology groups. Wednesday. It was an effort to try to find agreement on how to finance the The heads of Alcatel-Lucent, Deutsche Telekom and Vivendi internet, but the chief executives‘ report suggested it had been called on European authorities to help cut the cost of building hard to find common ground. high speed fixed-line broadband networks, and insisted regulators should not stop telecoms operators trying to take In an interview with the Financial Times, the chief executives the controversial step of charging online content providers for of Alcatel-Lucent, Deutsche Telekom and Vivendi made a delivering their material to consumers. passionate case for reforms to help the operators and therefore ensure the EU‘s broadband targets are met. However, the impact of the three chief executives‘ eagerly awaited broadband report was blunted by their being the only Ben Verwaayen, chief executive of Alcatel-Lucent, said the report contained 11 principles that could underpin reforms. signatories to it. ―If we have the present situation continuing, we will not meet Companies including Google and Facebook that were involved the targets,‖ he added. in working groups that fed into the final report did not put their names to the document, in a move that reflects More at http://on.ft.com/qSbrri Volume 10, Issue 27 July 22, 2011 Page 13

Internet Governance - (cont.)

Internet Repression on the Rise since Arab

Spring Twitter and other social networking sites in Belarus, and a By Joseph Marks, nextgov Turkish government request to Internet service providers to filter out websites that contain a list of words it considers There's been a ramp up in Internet blocking and what appears offensive. to be government-sponsored denial-of-service attacks across several repressive, non-Arab regimes since the Arab Spring Most regimes that limit citizens' Internet access today do so uprisings, a State Department official told lawmakers Friday. through either second- or third-generation censorship tools, said RafalRohozinski, a senior scholar at the Canada Center for It's not clear, though, whether those countries are cracking Global Security Studies. down in response to uprisings in the Middle East and North Africa or if they're simply responding to local issues, Deputy The first generation of Internet censorship consisted of Assistant Secretary of State for Democracy, Human Rights and powerful blocking tools that simply filtered out an ever Labor Daniel Baer told congressional members of the Helsinki growing list of Web pages, Rohozinski said. The classic Commission, an independent government agency that helps example, he said, is the so-called Great Firewall of China, guide the United States' role in the Organization for Security which blocks access to thousands of pages about Tibetan and Cooperation in Europe. nationalism, the Falun Gong religious movement and other dissident groups. Baer repeatedly demurred when Helsinki Commission Chairman Rep. Christopher Smith, R-N.J., pressed him to say "The second generation is more active measures," he said. For which nations are the worst violators of online free expression, example, a government will orchestrate distributed denial-of- either in the OSCE region or globally. service attacks that involve flooding a website with more operations than it can handle so other people can't access it. He did point to Smith's opening statement, which criticized the imprisonment of bloggers in Russia; the blocking of Facebook, More at http://on.wsj.com/qM5LmN

Organization for Security and Co-operation in stop restricting free flow of information on the Internet. Europe (OSCE) Media Freedom Representative The free flow of information is the oxygen of cyberspace! Without it the Internet becomes a useless tool.‖ Calls on Governments to Recognize Access to the Internet as a Human Right Mijatović spoke at a Commission hearing devoted to Internet freedom in the OSCE region. The Representative‘s Office last By Sacha D. Meinrath, James Losey & Benjamin Lennett, New America Foundation week presented the results of the first OSCE-wide study on Internet regulation. The report is available at: http:// Dunja Mijatović, the OSCE Representative on Freedom of the www.osce.org/fom/80723. Mijatović also addressed attempts Media, called on governments to treat Internet access as a by governments to block or filter online content: ―Why do human right that should be enshrined in their constitutions, in certain governments try to block, restrict and filter this flow? testimony today at the U.S. Helsinki Commission. To protect us from terrorism, extremism, child pornography, human trafficking and other forms of threats, and make our ―In order to pay tribute to the unique contribution the Internet societies more secure?‖ has given to participatory democracy, to freedom of expression and to freedom of the media, it is only fitting to enshrine the Mijatović continued: ―Or is it only to prevent criticism, satire, right to access the Internet on exactly that level where such provocative and shocking comments, differing views and rights belong, as a human right with constitutional rank,‖ tasteless or controversial content? For that they do not have Mijatović said. ―Without this basic requirement, without the permission. We as citizens that voted for them never asked means to connect, without an affordable connection, the right them or obliged them to shape our minds and opinions.‖ to freedom of expression and freedom of the media become meaningless in the online world. The second requirement is to More at http://www.osce.org/fom/81006 Volume 10, Issue 27 July 22, 2011 Page 14

Points of View

The Cost Of Lost Privacy, Part 1: How Google think it's creepy that corporations are tracking your online and Data-Mining Drive Economic Inequality activities. in Our Nation You may not have a strong "ick" factor from corporate surveillance per se -- I don't myself -- but what you should care By Nathan Newman, Huffington Post about is that lost privacy is converted by those companies into Why has economic inequality increased so radically in the information that ultimately drives greater economic inequality United States over the last generation? in our country.

General explanations range from globalization to the decline in One original promise of the Internet was that "no one knows trade unions to rising returns to education -- and therefore the you're a dog on the Internet" but we have instead evolved loss of income to the less educated. These all no doubt play a through data-mining and online surveillance into a world role, but in an age of information what is unquestionably true where not only do companies know what you are, they know is that control of that information is extremely unequal -- and where you are and what you are most interested in. For the that inequality drives broader economic inequality in our economically privileged, that may not seem like much of a economy. problem and even a benefit since companies may be able to service your needs more effectively. Information is power and as companies know more and more about us, while the products they sell become more opaque But for those who already suffer discrimination and and complicated -- think mortgage-based Collateralized Debt exploitation, whether because of race, poverty or other factors, Obligations (CDOs) -- inequality in information begets a it means that the Internet can just magnify and target that massive transfer of wealth from individuals to corporations and to their shareholders. Companies figure out not just what discriminatory treatment and exploitation. to sell you but the maximum price you and other people like you will pay for that product. Which brings us to the Federal Trade Commission antitrust investigation into Google. Privacy is About Economic Power and Inequality: The debate on privacy online is therefore not about whether you More at http://huff.to/pTMmYy

one: marketing by drugmakers. Lack of Genuine Privacy Interest Doomed Vermont Drug Marketing Law Ironically, a more comprehensive regulation of prescription data -- motivated by a genuine interest in protecting privacy By Deven McGraw, ModernHealthcare.com and drawn to serve that interest -- would have been more likely to have been upheld. On June 23, the Supreme Court issued its much anticipated decision in Sorrell v. IMS Health, striking down as Why Did the Supreme Court Strike Down This Law? unconstitutional a Vermont statute that prohibited the use of drug prescribing information for marketing purposes. In a 6-3 To begin with, it is important to recognize that patient privacy decision, the court found that the Vermont law violated the was not at issue in Sorrell v. IMS Health because the data at free speech rights of drug marketers. question did not identify patients. Instead, the data identified prescribers, primarily doctors, and their prescribing patterns. A number of privacy advocates had weighed in on the case, In a process known as "detailing," drug company sales seeing it as a showdown between privacy and corporate claims representatives use the data when they visit a doctor's office to of free speech rights. The Center for Democracy & Technology persuade the doctor to buy a particular pharmaceutical, which was skeptical of the privacy arguments made in defense of the the court noted was almost always a "high-profit brand-name" law, but we too were worried about its potential impact on a drug. range of health privacy and health IT issues. The Supreme Court found that the intent of the law was After thorough review of the opinion, it is clear that the case targeted solely at the marketing of brand-name drugs by should not be read as a threat to well-crafted privacy laws. As drugmakers. The law prohibited the sale of prescriber- interpreted by the Supreme Court, the Vermont statute was an identifying data without the prescriber's consent, but the explicit effort to control specific speech by specific speakers -- exceptions to that prohibition were so broad that they actually a double no-no in First Amendment jurisprudence. And, as a allowed sale to anyone except drugmakers. privacy law, it was ineffective because it allowed pharmacies to share the covered information with anyone for any reason save More at http://bit.ly/q7lq3h Volume 10, Issue 27 July 22, 2011 Page 15

Points of View - (cont.) Terror Threat Amplified By New Technologies agencies to track the terror threat: ―Technological change and By Helen Warrell, Financial Times the diversification of the threat is making proper intelligence coverage increasingly difficult.‖ Ability of terrorist groups such as al-Qaeda to adapt to fresh technologies will put the UK at risk of ―cyber jihad‖ attacks, the But Dave Clemente, cyber security expert at Chatham House, government warns in its new national terror strategy. downplayed the cyber threat, on the basis that the government‘s example of a 2010 computer virus launched by The plan, known as Contest, states that there will be ―more the Tariq bin Ziyad Brigades for Electronic Jihad had been cyber terrorism‖ as terror groups use ―off -the-shelf ―obscure and trivial‖. technology‖ to plan and to conduct attacks, which will make operations both more secure and possibly more lethal. ―The ―Using cyberspace to launch attacks doesn‘t fit the mode of internet and virtual space will be strategically vital,‖ the report Islamic terrorism,‖ he said. ―The idea of a cyber Pearl Harbor says. It adds that terrorists are increasingly using Google terrifies western governments and is often described in lurid Earth, Street View, Facebook and Twitter for operational terms – but it‘s actually a very limited capability,‖ he said. planning or to share extremist material. The government is this autumn to launch a separate cyber While the government analysis – which updates the UK‘s 2009 strategy, containing proposals to protect national terror strategy – makes clear that there is to date no evidence infrastructure such as Whitehall departments and utility plants of ―systematic‖ cyber terrorism, it also draws attention to Al -- funded by part of the £650m set aside for cybersecurity Qaeda‘s explicit call for acts of lone terrorism or ―cyber jihad‖ under the government‘s strategic defence and security review against the west since its leader, Osama bin laden, was killed last October. There has been increasing global concern about by US Navy Seals this year. the possibility of cyber attacks since the Stuxnet worm invaded Iran‘s nuclear plant in 2010. A senior Whitehall official said that instances of cyber terrorism are ―currently few and far between‖, the Al Qaeda The terror strategy also lays out plans to increase police statement was ―striking‖, and that cyber attacks may be a powers to prosecute terror suspects who are arrested in the UK growing issue in the future. by introducing new rules which will allow suspects to be questioned after they have been charged. Launching the report, Theresa May, home secretary, added that new technologies had made it harder for intelligence More at http://bit.ly/iEsf2b

The Importance of FIPs in Data Exchange not healthcare data. This broader consumer framework paves By Erica Naone, technologyreview the way for us to move away from our current prescriptive system, which focuses too much on regulations, toward a set of Many of the Department of Health and Human Services, Office principles that allows us to respond to innovation and of the National Coordinator, Privacy and Security Tiger Team changing technology. There is a place for regulations, but let's discussions over the past year have invoked the FTC's Fair have that dialogue after we have a solid foundation. Let's Information Practices. Why? Because the Health Insurance ponder for a moment the FIPs and how we can use them to Portability and Accountability Act (HIPAA) does not address help achieve the goals of improving individual and population one of today's most critical healthcare issues - data sharing. In health. the absence of updated regulations, the FIPs offer a comprehensive framework for moving forward. Openness and Transparency - Consumers should be able to readily access data-usage policies, understand the collection The best way to move forward is to remove the emotion from and use of their data, and be able to limit the use of their data the privacy and consent debate and instead look at this in a if they choose to do so. This can be achieved by public notices, practical, constructive fashion. Perhaps Paul Tang, vice chair website postings, social media and other more traditional of the HIT Policy committee and member of numerous approaches. Full transparency is crucial to building consumer workgroups, said it best during one of the Tiger Team trust. meetings last summer: "What would a patient expect?" Purpose Specification and Minimization - Data use The Markle Foundation submitted a letter to the Department should be specified at the time of collection and use should be of Commerce on February 18, 2011, concisely articulating the limited only to those stated purposes. And if there is a importance of FIPs in today's society. As suggested in the proposed change in the use, the consumer should be notified. letter, titled "The Need for a Coordinated Department of The classic "bait and switch" should never occur with Commerce Policy on Consumer Protection and Privacy," we consumer data. must look at data in a broader fashion and recognize that when we talk about data, we are really talking about consumer data, More at http://bit.ly/qpAUkv Volume 10, Issue 27 July 22, 2011 Page 16

Points of View - (cont.) explore new solar cells that had taken five supercomputers six Big Data‘s People-Changing Machine months to create. This time, the orchestra was the emission spectrum of electrons jumping to different orbits from the By Quentin Hardy, Forbes hydrogen.

The Allosphere is a tool for new ways of seeing enormous You could look at data like this through columns of numbers, amounts of data – and quite possibly, ourselves. of course, but the use of color, sound and time makes for a vastly quicker and more comprehensive understanding. As we The machine is egg-shaped, three stories tall, and located on pile up information of all sorts, new tools for understanding the campus of the University of California, Santa Barbara. like the Allosphere will become commonplace. Scientists stand on a catwalk that runs through its middle, and wearing 3D glasses look at enormous representations of ―Information technology systems, and the association of human brains, molecular bonds, economic data, even the visualization with meaning, make the computer into a kind of invisible manifestations of quantum physics. The visuals stretch around vision‘s periphery to simulate immersion in an instrument,‖ says JoAnn Kuchera-Morin, the Allosphere‘s object, and sound from banks of speakers provide other creator. ―This will allow us to work with real information in pathways to information. close to real time. The more scenarios you have, the more you speed up discovery.‖ If a picture is worth a thousand words, the Allosphere is an appropriate response to living in a world where, as Google Since then, Kuchera-Morin has added the number of pixels in chairman Eric Schmidt likes to say, we create as much data as the mix, for sharper visualization, and brought in colleagues in all conversation, ever, in a couple of days. In itself, and for from other data-rich fields to try and create new what efforts to see big data mean, the Allosphere is among the understanding of what they are doing. Names You Need To Know In 2011. These fields include areas of nanotechnology, where the On a recent visit, I stood in the middle of a giant human brain, categories of physics, chemistry and biology overlap and constructed from 256 MRI images. We moved over folds and collapse on each other so as to create new kinds of science, and through color-coded lobes, the density of blood flow around us quantum mechanics, where experimental outcomes are usually reflected in the pitch of a background thrum – higher pitches seen only in blackboard-based probability formulas. for higher densities. I explored the bonds of 2000 zinc, hydrogen and oxygen atoms, an experimental lattice created to More at http://onforb.es/niAL6D

back and forth that emerges between states too. For instance, The United States of Connectedness Alabama and Louisiana are sister states because of the cellular By Ryan Kim, GigaOm traffic between the two, while parts of Tennessee, like Chattanooga, break away from the rest of Tennessee and join Mobile phones have helped close the gap between people, other neighboring states. connecting friends, family and co-workers across wide distances. But the lines of communication don‘t follow Looking at the map, you can see how mobile phone traffic traditional state and city boundaries and instead reflect occurs between the New York and San Francisco regions, different social influences and relationships that are which are very connected, but are not so related to Texas, sometimes harder to understand. another major population hub. Looking at SMS messages also yields slightly different results, emphasizing closer physical But a new data and visualization project called the Connected connections than phone calls, which can occur over wider States of America helps bring some focus into the way mobile distances. phones facilitate communications and shows how conversations and text-messages bind areas and regions This is pretty cool, though some of this is intuitive. I know, for together, even ones that are far apart. Researchers at the MIT instance, that many parts of the country make calls to Los Senseable City Lab, AT&T Labs-Research and IBM Research Angeles or New York, just because they‘re such big places. But showed off their work Wednesday, which takes it‘s interesting to see some of the less obvious connections. aggregated AT&T mobile phone data and creates interactive And it can have social implications that can help our maps illustrating where calls and text messages are placed and government better understand how to reach out to people. The where they connect to. lesson is that while mobile phones can create instant communications across the entire country, they‘re just tools in The maps show what areas are likely to be in communication our hands, and our use of them is guided by many of our with each other and how some places, sometimes in the same existing social relationships, cultural backgrounds and state, remain separated. Metropolitan regions, even ones that affinities. spill over state lines, understandably facilitate a lot of communications among people in one area. But there is a lot of More at http://bit.ly/nCu70V Volume 10, Issue 27 July 22, 2011 Page 17

Points of View - (cont.) Nations with fewer civil liberty protections, including China, Former CIA Director: Build a New Internet use "deep packet inspection" to search all Internet traffic for to Improve Cybersecurity viruses -- as well as anti-government content, noted James Mulvenon, a China and cybersecurity specialist. Due to privacy By Aliya Sternstein, Forbes laws, the United States cannot monitor private network traffic using this approach. Mulvenon questioned whether such The United States may seriously want to consider creating a restrictions give other nation states the upper hand in cyber new Internet infrastructure to reduce the threat of defense. "We still believe that anonymity is possible," he said cyberattacks, said Michael Hayden, President George W. of America's attitude toward freedom of expression on the Bush's CIA director. Internet.

Several current federal officials, including U.S. Cyber Mulvenon, an executive at Defense Group Inc., a government Command chief Gen. Keith Alexander, also have floated the contractor that provides agencies with intelligence analysis, concept of a ".secure" network for critical services such as has in mind a three-level network. "If you want to do banking, banking that would be walled off from the public Web. there's no anonymity," and users would need to enter true Unlike .com, .xxx and other new domains now proliferating the names and digital credentials to operate in the space, he said. Internet, .secure would require visitors to use certified The middle level, perhaps applicable to the .edu domain, credentials for entry and would do away with users' Fourth would require fewer personal details from visitors. Amendment rights to privacy. Network operators in the financial sector, for example, would be authorized to scan "At the bottom, you can run around like a hobbit," he said. account holders' traffic content for signs of trouble. The "How can you have a multilevel system that allows you to play current Internet setup would remain intact for people who up here and down there and doesn't compromise your ability prefer to stay anonymous on the Web. to play?" is the challenge.

"I think what Keith is trying to suggest is that we need a more Sen. Sheldon Whitehouse, D-R.I., chairman of the Judiciary hardened enterprise structure for some activities and we need Crime and Terrorism subcommittee, has cited Alexander's to go build it," Hayden said during a roundtable on backing of the idea to urge that his fellow lawmakers help cybersecurity hosted by the Potomac Institute for Policy create a .secure domain. Studies. "All those people who want to violate their privacy on Facebook -- let them continue to play." More at http://bit.ly/pzCG7W

The Internet Can Still Save the Economy the mobile Internet, this model couldn't work. Wireless data By Rob Atkinson, InformationWeek links connect the bike racks to a bike-tracking and billing database, and smartphone apps show riders where rental Big job-creating innovations are the result of "innovation stations are and how many bikes are available. platforms" that enable entrepreneurs and companies to build new devices, networks, and applications. In the 1990s, the new This mobile platform--the 4G network, easy-to-use devices, platform was the Internet. Businesses invested billions of and great apps--opens the door to new applications and dollars and created millions of jobs, even after accounting for business models. San Carlos, Calif., is using mobile networks the dot-com bust. Today's next big job-creating innovation to send construction schematics to firefighters en route to a platform is the 4G mobile Internet. blaze. Amtrak conductors use mobile devices to read tickets. The owners of "smart homes" can use their mobile devices to We've come a long way since car phones were in car trunks. remotely control the lights, adjust the air conditioner, and Today, 5 billion smartphones and other mobile devices have program the digital video recorder. Obstetricians can use the more computing power than the 1980s supercomputers. But AirStrip OB system to monitor the fetal heartbeat and over the next five years, the mobile economy will to rise to a maternal contraction patterns of their hospital delivery-room whole new level as 4G mobile broadband comes on the scene patients directly from their smartphones. Even our with speeds equaling or exceeding today's wired speeds and as transportation infrastructure is getting smart: A new bridge in hundreds of millions of people adopt smart mobile devices, Minneapolis is equipped with wireless sensors that enable from tablets to smartphones to e-book readers. The result will engineers to remotely monitor its condition. And the mobile be an array of new applications, services, and business models Internet is allowing new implementations of augmented reality that will create millions of U.S. jobs and power America's to digitally enhance our interaction with the physical world. growth. Individuals can point the camera of their smartphones at a building and instantly see relevant data, such as restaurant Let's take one example. In the past two years, bike-sharing reviews or real-estate listings. programs that enable people to rent bicycles by the hour have sprung up in many cities. Think Zipcar for bikes. But without More at http://bit.ly/n9c6vl Volume 10, Issue 27 July 22, 2011 Page 18

Points of View - (cont.) Despite this known danger, the security firm McAfee and the A Gold Standard in Cyber-Defense Center for Strategic and International Studies found in 2010 that only 35 percent of the owners of critical systems had By Joe Lieberman, Susan Collins and Tom Carper, The checked to see if Stuxnet had invaded their networks, even Washington Post though 40 percent of those that did check found their systems were infected. The history of Internet security is both worrisome and instructive. When the first virus — the ―Morris worm‖ — was At his Senate confirmation hearing last month, Defense launched in 1988, the Internet was a closed system of 60,000 Secretary Leon Panetta warned that the ―next Pearl Harbor we computers used almost exclusively by academic, government confront could very well be a cyber-attack that cripples our and military researchers. Morris used known vulnerabilities in power systems, our grid, our security systems, our financial communications software to knock offline about 10 percent of systems, our governmental systems.‖ the computers tied to the Web. The cry immediately went out for greater security, but complacency soon set back in. Legislation we have proposed would help strengthen our digital infrastructure against these kinds of exploits by creating Today, the Internet has more than 2 billion users — one in a ―gold standard‖ in cyber-defenses from the most sensitive every three people on the planet. It is a nearly indispensable networks to personal computers. tool of modern life. But consider just a few high-profile victims of successful computer intrusions in recent months: Sony, We would start by giving the Department of Homeland Citigroup, the International Monetary Fund, the Gmail Security (DHS) statutory authority to work with industry to accounts of high-ranking U.S. officials and the computer identify and evaluate the risks to the country‘s most critical security company RSA — an intrusion that seems to have cyber-infrastructure — those systems that control power played a part in later attacks on Lockheed Martin and perhaps plants, electric grids and pipelines, all of which, if hacked, other defense contractors that use RSA products. could lead to human and physical destruction and economic havoc. Also lurking in the digital ether are computer viruses and worms, like Stuxnet, that could commandeer industrial control Once those risks have been identified, owners and operators systems used to operate the valves and switches in nuclear would select security measures to safeguard their systems. power plants, pipelines, commercial manufacturing facilities These plans would be reviewed by DHS cyber-experts to and other critical infrastructure, and force them to shut down ensure they improve security. or perform dangerous operations. More at http://wapo.st/qODMT8

New Theory of Harm in Data Breach Cases The use of this theory is currently being tested in Alan Claridge By Andrew Clearwater, CIPP v. RockYou Inc. RockYou is a developer of social games used with social In the United States, 515 million records have been lost in data networking sites. In late 2009, due to a SQL injection flaw and breaches since 2005. Customers seeking recovery after the loss a failure to use other common methods for protecting stored of their personal information in data breaches have not been passwords, the e-mail and social networking login credentials successful in recovering damages if they are not victims of of approximately 32 million customers were exposed in a data identity theft. This lack of success can be attributed to an breach. Claridge was a RockYou customer who lost personal inability to articulate a concrete or particularized harm. information in the breach. Claridge brought nine causes of Despite past setbacks, customers continue to search for legal action, including breach of contract, breach of implied theories to hold companies accountable. contract, negligence and negligence per se. He claimed damages under these causes of action by stating that The claims that proceed the furthest through the legal process customers of the RockYou programs and services bought use are negligence, breach of contract and breach of implied and access by providing their personal information, which contract. Under these legal theories, arguments have often constituted valuable property in that exchange. emphasized three forms of harm: (1) lost time and effort for actions taken to mitigate the risk of identity theft or to restore The damages theory here is novel. It also has a certain logical accounts, (2) the expense of credit and identity-monitoring appeal. Nothing is free, so services must be paid for with services that were obtained as a reaction to the data breach something of value. The value exchanged was personal and (3) the emotional distress that accompanies loss of information. RockYou filed a motion to dismiss the case before personal information. Given the lack of success under current evidence was gathered, but the judge allowed the contract and theories, a new theory that claims a property right in personal negligence claims to continue given the initial showing of information has recently been tried. Under this theory, a data damages under this new theory. breach causes a loss of personal information property and therefore a concrete or particularized harm has been realized. More at http://bit.ly/qHDcql Volume 10, Issue 27 July 22, 2011 Page 19

Points of View - (cont.) generated in 50 years. This is a clear jobs issue — particularly Foreign Policy of the Internet in the United States.

By Karen Kornbluh and Daniel J. Weitzner, The Washington Over the past five years, the Internet has been responsible for Post 21 percent of the growth in mature economies and has created 2.6 jobs for every job it has displaced. Its power to generate Iran‘s recent announcement that it plans to disconnect Iranian innovation is rivaled only by its potential to help people realize cyberspace from the rest of the world was another dramatic their rights and democratic aspirations. sign that the Internet is at risk of being carved up into national mini-Internets, each with its own rules and restrictions. In The Internet is so productive — and powerful — because no contrast, the United States has staked out a clear position of centralized authority governs it and no nation owns it. You do leadership in building a global consensus around the benefits not need permission to share ideas or associate with others of an open, interconnected Internet. around the globe. Instead, a decentralized system of public and private actors collaborates to ensure its function and In May, President Obama issued the U.S. International expansion. Strategy for Cyberspace, our agenda for safeguarding the single Internet. Secretary of State Hillary Rodham Clinton has But this means that nations that choose to take a heavy- developed a groundbreaking Internet freedom agenda, a handed approach to regulating the Internet can reduce its principled approach to preserving the freedom to connect — value for every other nation and user. the freedoms of expression, association and assembly online — and to ensuring that the Internet can be a platform for For this reason, collective action is needed to safeguard this commerce, debate, learning and innovation in the 21st century. global treasure. A foreign policy that accounts for the Internet Senior government officials and stakeholders, meeting at the has become essential. Organization for Economic Cooperation and Development (OECD) this month, took a major step toward these goals by We need to work with other countries and stakeholders to committing to Internet policymaking principles. build a global consensus on the importance of open communications online among all users — everywhere in the The Internet is a powerful tool for innovation and expression world. And we must build consensus around norms and because it allows information and ideas to flow freely. expectations of behavior essential to that vision. According to McKinsey, the Internet has generated as much growth over the past 15 years as the Industrial Revolution More at http://wapo.st/ouFnE5

America Faced With Wave of Chinese Espionage Defense Department officials are struggling to and in response officials have been brutally cracking down on plan for a massive cyber-attack from Beijing – dissidents. In addition, according to security experts, officials have been ramping up their efforts to spy on the United and fend off spies in the meantime. Tara States. McKelvey reports on the secret warfare. ―They‘ve been engaging in large-scale, almost automated By Tara McKelvey, The Daily Beast espionage,‖ says Indiana University‘s David Fidler, who writes about cyber-security issues. Deputy Defense Secretary William Lynn III never said the word China in his speech on Thursday about ―Cyber Beijing‘s leaders have ramped up spying operations partly Strategy,‖ but he didn‘t have to. The threat of a cyber-attack because they are angry at the United States, and they have from Beijing weighs heavily on the minds of military been especially peeved at State Department officials; China commanders. And while officials have not said publicly who believes that the Americans have tried to empower dissidents was behind the newly disclosed theft of 24,000 files from a and to influence domestic politics. Indeed, Secretary of State defense contractor in March, one of the worst cyber-assaults Hillary Clinton has pushed for greater access to the Web for in Pentagon history— it may well have been a Chinese dissidents, giving a speech in February in which she called for operation. And even if Beijing officials were not involved in ―a global commitment to Internet freedom,‖ a phrase that the theft, they have been implicated in other matters—so officials in Beijing found particularly galling. many, in fact, that federal officials are discussing publicly what do to about cyber-attacks, without saying explicitly who The Chinese officials resented her proclamations about the their number-one villain is. Net, which they believed are an underhanded way of trying to meddle in their affairs. ―For them, this is a very aggressive Meanwhile, people in Beijing are going through an even interventionist policy,‖ Fidler explains. rougher time. Government officials are nervous about the Arab Spring, which they fear will inspire their own citizens, More at http://bit.ly/pGY2v7 Volume 10, Issue 27 July 22, 2011 Page 20

Points of View - (cont.)

Seeing Promise and Peril in Digital Records difficult to use, cluttered and distracting, causing more harm than good in health care. By Steve Lohr, The New York Times ―This is an issue that potentially affects the health and safety of Technical standards may seem arcane, but they are often every American,‖ says Ben Shneiderman, a computer scientist powerful tools of economic development and social welfare. at the University of Maryland. They can be essential building blocks for innovation and new The controversy points to the delicate balancing of interests industries. The basic software standards for the Web are involved when creating technical standards that inherently striking proof. limit some design choices yet try to keep the door open to Safety is also a potent argument for standards. History innovation. It also raises the question of the appropriate role abounds with telling examples, like the Baltimore fire of 1904. for government in devising such technology requirements. That inferno blazed for 30 hours, destroying more than 1,500 At issue is the Obama administration‘s plan to develop buildings across 70 city blocks. Fire engines from other cities standards to measure how effective and easy digital patient came to help, but could not. Their hose couplings — each a records are to use — applying a research discipline known as different size — did not fit the Baltimore fire hydrants. Until human-computer interaction or human factors. (The then, cities saw little reason to adopt a standard size coupling, International Organization for Standardization, which is based and local equipment manufacturers did not want competition. in Geneva, defines the usability of a product by three So competing interests undermined the usefulness of, and attributes: ―effectiveness, efficiency and satisfaction.‖) investment in, the technology of the day.

Today, the matter of standards for electronic health records is The need to improve the usability of computerized records is raising similar concerns, prompting heated debate in recent clearly evident — and has been for some time. A 2009 study by meetings of representatives from medicine, industry, academia the National Research Council, an arm of the National and government. Academy of Sciences, found that electronic health record systems were often poorly designed, and so could ―increase the The stakes, they say, could scarcely be higher. They agree that, chance of error, add to rather than reduce work flow, and when well designed and wisely used, digital records can deliver compound the frustrations doing the required tasks.‖ the power of better information to medicine, improving care and curbing costs. But computer forms, they add, can also be More at http://nyti.ms/r9audD

Do Robots Take People's Jobs? interested in robots during college. ―A publication by IEEE got By Erico Guizo, ieee spectrum me into robotics,‖ he says. ―It talked about the personal robotics revolution, how it was going to be bigger than the Last month, President Barack Obama announced the National computer industry, and I said, I want to go into robots.‖ Robotics Initiative, a major program to develop next- generation robots for manufacturing, healthcare, and other Dulchinos says that automation, though it might take some areas. The robotics community received the new initiative with people‘s jobs in the short term, is essential for keeping enthusiasm, but some observers expressed concern about an companies competitive, and thus able to expand and hire more expansion in automation, raising a perennial question in workers. That's why more and more companies in industries as robotics: Do robots take people‘s jobs? varied as food packaging and electronics manufacturing are embracing robots. ―The real purpose of automating manufacturing is to eliminate skilled workers and replace them with low paid button ―If you look out far enough, machines are going to win," he pushers—preferably offshore,‖ commented one IEEE says. "The human body is not a machine. It wears out. It was Spectrum reader who‘s worked as a control engineer for 25 not designed to be a factory machine. It was designed to be a years. Said another: "As jobs at all levels, from McDonald's to thinking machine." college-educated knowledge-workers, are increasingly automated, there will be more unemployment." Other readers Dulchinos believes that "robotics is going to be one of the voiced similar concerns. transformative technologies of the 21st century." The entire robotics industry is only a 5 billion dollar market today, he o hear what the pro-robots camp has to say, I spoke to John says, but according to some estimates it will grow to 100 billion Dulchinos [photo, right], president and CEO of Adept by 2020. He envisions future domestic robots helping people Technology, the largest U.S. industrial robotics company. at home and factory robots that are not job takers but rather Adept, based in Pleasanton, Calif., offers a variety of robotics robotic assistants that work alongside human workers. products, including SCARA, parallel, linear, and mobile robots. Dulchinos, a mechanical engineer by training, says he became More at http://bit.ly/mXrLJp Volume 10, Issue 27 July 22, 2011 Page 21

Points of View - (cont.) Why the US Needs a Data Privacy Law—and without a comprehensive law protecting consumer privacy. European citizens have privacy rights, Asian citizens have Why It Might Finally Get One privacy rights, Latin American citizens have privacy rights. In the US, however, in lieu of a comprehensive approach, we have By Justin Brookman , ars technica a handful of inconsistent, sector-specific laws around particularly sensitive information like health and financial With the understandable exceptions of the national debt and data. For everything else, the only rule for companies is just the deployments of our troops abroad, privacy is possibly the ―don‘t lie about what you‘re doing with data.‖ hottest issue in Congress today. After ten years of limited interest in the subject, we‘ve recently seen a spate of legislation The Federal Trade Commission enforces this prohibition, and introduced to give consumers rights over how their does a pretty good job with this limited authority, but risk- information is collected and shared. averse lawyers have figured out that the best way to not violate this rule is to not make explicit privacy promises at all. In the House of Representatives, Reps. Bobby Rush (D-IL) and Cliff Stearns (R-FL) have each introduced separate For this reason, corporate privacy policies tend to be legalistic comprehensive bills. In the Senate, John Kerry (D-MA) and and vague, reserving rights to use, sell, or share your John McCain (R-AZ) recently introduced the "Commercial information while not really describing the company‘s Privacy Bill of Rights" with similar goals. The (Democrat-led) practices. Consumers who want to find out what‘s happening Senate Commerce Committee recently held a hearing on the to their information often cannot, since current law actually topic of privacy; the next week, the (Republican-led) House incentivizes companies not to make concrete disclosures. Energy and Commerce Committee looked at the same thing. This has been the case for years, of course, but in the modern In a town where positions on issues are often deeply divided era of constant connectivity, social networking, and cheap data along partisan lines, it‘s encouraging to see that there appears storage and processing, the stakes are remarkably higher. to be at least one issue that both parties recognize as a problem Before the advent of the Internet, there were only so many data that needs to be addressed. points for marketers and information brokers to collect about you, and bookstores and libraries didn‘t share what you were Not much company reading.

Here‘s why Congress is interested: today, the United States More at http://bit.ly/poyIS8 and Turkey are the only developed nations in the world

―The platforms of social media are built around weak ties,‖ he A Brave New Networked World wrote. ―Twitter is a way of following (or being followed by) By Philip Delves Broughton, Fortune Times people you may never have met. Facebook is a tool for efficiently managing your acquaintances, for keeping up with We are under siege by social networks, from Facebook to the people you would not otherwise be able to stay in touch LinkedIn to school, university and even corporate alumni with. That‘s why you can have a thousand ‗friends‘ on organizations, which are ever more aggressive and Facebook, as you never could in real life.‖ sophisticated in their networking efforts. While the significance of social networks for political activists Facebook has more than 750m users, LinkedIn 100m, and may be open to question, companies are starting to find real Twitter is handling 1bn tweets a week. Technology-driven value in mapping and analyzing the strength and frequency of social networks have been credited with propelling the connections between employees and customers, and their revolutionaries of the Arab spring. behavior.

Marketers and venture investors salivate over any company Social network analysis is being used to measure job promising to identify and assemble networks of like-minded performance and forecast turnover, to rate employees for consumers. Social network analysis software has become a fast promotion, monitor their ethical standards and improve the -growing sector of IT services. IBM alone has spent $11bn in systems for collaboration. It is now a standard diagnostic and the past five years buying makers of such software. prescriptive tool for management consultants advising companies. But there are sceptics questioning the power of these networks. Malcolm Gladwell wrote in The New Yorker last year that the By measuring who talks to whom, when and for how long, impact of new forms of communication in fomenting political companies can uncover hidden stars. They can develop an change was exaggerated. He distinguished between the strong index that reveals where real power lies – and it may not be ties that bind groups of revolutionaries and the weak ties that with the people who hold the grandest titles. link 1m Facebook fans. More at http://on.ft.com/oBGcha Volume 10, Issue 27 July 22, 2011 Page 22

July Sun Mon Tue Wed Thu Fri Sat Calendar of Events

26 27 28 29 30 01 02 JULY 26 03 04 05 06 07 08 09 9:30 AM - 4:45 PM. The DC Bar Association will host an event titled Legal Cybersleuth's Guide. The morning session is titled "Mastering Google and 10 11 12 13 14 15 16 Beyond for Investigative Legal Research". The afternoon session is titled "Using Social Networking Sites for Investigative Legal Research While 17 18 19 20 21 22 23 Avoiding Ethical Pitfalls". The speakers will be Carole Levitt and Mark Rosch (Internet for Lawyers). CLE credits. The DC Bar has a history of barring reporters 24 25 26 27 28 29 30 from its events. For more information, call 202-626-3488. Prices vary. Location: Washington, D.C.

More at http://bit.ly/qFgKgz

Featured Conference JULY 26 of the Week 10:00 - 11:30 AM. The Institute for Policy Innovation (IPI) will host an event titled "Mobile Health: Innovations in Care & the Spectrum Challenge". The Vancouver SIGGRAPH 2011 speakers will include Anand Iyer (COO-Well Doc, Inc.), Paul McRae (AT&T Make it Home Emerging Healthcare Technologies), and Merrill Matthews (IPI). This event is free and open to the public. Refreshments will be served. Register by contacting Erin AUGUST 7-11, 2011 Humiston at erin at ipi dot org or 972-874-5139. Location: Washington, D.C Get up-close and hands-on with the newest hardware systems, software More at http://bit.ly/oKayAw tools, and creative services from hundreds of companies. Explore the JULY 26-27 products, systems, techniques, ideas, Meaningful Use, Electronic Health Records and Analytics. Learn how and inspiration that are creating the organizations have achieved meaningful use and how the payments are being next three generations of computer structured. Understand how IT fits into physician work flow to improve health care graphics and interactive techniques. efficiencies. Discover ways to share information with management in a way that gives an "at a glance‖ picture of how the operation is performing. SIGGRAPH 2011 hosts the year's Location: Denver, CO largest, most comprehensive exhibition of products and services for the More at http://ihealthtran.com/denverhome.html computer graphics and interactive techniques marketplace, featuring the JULY 28-29 industry's established leaders and The World Congress 3rd Annual Leadership Summit on mHealth will offer emerging challengers. strategies for harnessing emerging mHealth technologies for both provider- and consumer-directed initiatives. Applying mobile technology for clinical decision Location: Vancouver, British support for anytime, anywhere connectivity and generating consumer engagement Columbia, Canada with the newest wearable, wireless biometric sensors as well as mobile devices for improving health will be highlights of the event.

More at http://www.siggraph.org/ Location: Cambridge, MA s2011/ More at http://bit.ly/oLEFKy Volume 10, Issue 27 July 22, 2011 Page 23

Sites Compendium Book Review www.arstechnica.com Boulevard of Broken Dreams: Why Public www.theatlantic.com Efforts to Boost Entrepreneurship and Venture www.thedailybeast.com www.defense.gov Capital Have Failed — and What to Do About It www.edps.europa.eu By Josh Lerner www.forbes.com www.ft.com Silicon Valley, Singapore, Tel Aviv — the global hubs of entrepreneurial activity–all bear the marks of government www.gigaom.com investment. Yet, for every public intervention that spurs www.govinfosecurity.com entrepreneurial activity, there are many failed efforts that www.healthcareitnews.com waste untold billions in www.hhnmag.com taxpayer dollars. When has governmental sponsorship www.huffingtonpost.com succeeded in boosting www.ihealthbeat.org growth, and when has it www.ise.gov fallen terribly short? www.iwatchnews.org Should the government be www.latimes.com involved in such www.newamerica.net undertakings at all? www.nextgov.com Boulevard of Broken www.nhinwatch.com Dreams is the first www.nytimes.com extensive look at the ways www.osce.org governments have www.papers.ssrn.com supported entrepreneurs and venture capitalists www.pewinternet.org across decades and www.privacyassociation.org continents. www.sciencemag.org www.spectrum.ieee.org Josh Lerner, one of the foremost experts in the field, provides valuable insights into www.technologyreview.com why some public initiatives work while others are hobbled by www.washingtonpost.com pitfalls, and he offers suggestions for how public ventures www.whitehouse.gov should be implemented in the future.

Discussing the complex history of Silicon Valley and other pioneering centers of venture capital, Lerner uncovers the extent of government influence in prompting growth. He examines the public strategies used to advance new ventures, points to the challenges of these endeavors, and reveals the common flaws undermining far too many programs — poor design, a lack of understanding for the entrepreneurial process, and implementation problems. Lerner explains why governments cannot dictate how venture markets evolve, and why they must balance their positions as catalysts with an awareness of their limited ability to stimulate the

entrepreneurial sector. Research and Selection: Stefaan Verhulst Production: Kathryn Carissimi & Lauren Hunt As governments worldwide seek to spur economic growth in ever more aggressive ways, Boulevard of Broken Dreams Please send your questions, observations and suggestions to offers an important caution. The book argues for a careful [email protected] approach to government support of entrepreneurial activities, so that the mistakes of earlier efforts are not repeated. The views expressed in the Weekly Digest do not necessarily reflect those of the Markle Foundation. More at http://bit.ly/rp5pK1