Friday, June 28, 2013

Arizona vs. Colorado Voting Rules

My #3 Son, Mark, sent this along to me.   It's from the Aspen (CO) Daily News. It's fascinating in the distinction that it displays between voting laws in these two states: Exclusionary vs. Inclusive.   Suppression vs. Encouragement.  Amazing.




Polling places to be replaced by voting centers in the fall election
by Brent Gardner-Smith, Aspen Journalism
Saturday, June 22, 2013


A citizen task force convened this week by Pitkin County Clerk and Recorder Janice Vos Caudill has recommended that three required “voter service centers” be established in Aspen, Snowmass Village and Emma to replace eight traditional neighborhood polling places.

A new state law adopted in May requires that “voter service and polling centers” be established to replace polling places set up by precinct.

The new law, House Bill 13-1303, also requires that all Colorado voters this fall be sent mail-in ballots, regardless of whether a voter has requested one or not.

The voting centers are designed to help voters work through any problems casting their vote on election day, including checking the status of their mail-in ballot by accessing an online voter database managed by the Colorado secretary of state’s office.

The Pitkin County election task force recommended the service centers be set up at the Pitkin County clerk’s office in the county administration building on Main Street in Aspen, in the Snowmass Village Town Hall and at Grace Church in Emma near Basalt.

The task force was convened under the direction of Vos Caudill and includes Frieda Wallison, chair of the Pitkin County Republican party; Michael Simmons, the vice chair of the Pitkin County Democratic party; Chuck Downey, representing the Redstone area; Dorothea Farris a former Pitkin County commissioner; and Jackie Dean, an attorney who lives in Snowmass Village.

The task force reviewed criteria for a voter service center, including the public nature of the building, the proximity to public transit, the amount of parking and compliance with the Americans with Disabilities Act. The centers also have to be inside Pitkin County. 

Vos Caudill said there was no obvious choice for a downvalley location inside lower Pitkin County for a voter service center. The Basalt Town Hall, for example, is just inside the Eagle County line.

And Vos Caudill said she has not yet had time to discuss the task force’s recommendations with officials in Snowmass Village or at Grace Church, which the county once sued in an effort to prevent them from building their religious facility in Emma.

She is open to feedback about the task force’s recommendations, Vos Caudill said, and noted that she will be presenting recommendations on the location of the centers to the board of county commissioners on July 10.

The new voter service centers, wherever they end up, will replace the county’s previous eight polling places, which accommodated voters from 10 precincts.

The old polling places were in the Rio Grande building behind the county courthouse, the Red Brick building in the West End, the Schultz Health and Human Services building by the hospital, the Snowmass Village Town Hall, the Old Snowmass fire station, St. Peters Church in Basalt and Redstone Church in Redstone.

The new election rules provide voters with an array of ways to cast their vote.

Citizens can vote early beginning 15 days before the election. In Pitkin County, early voting will be at the county clerk’s office.

Mail-in ballots, which will go out at least 18 days before an election, can be returned by mail in advance or on election day.

They also can be dropped off at the clerk’s office, in advance or on election day.

Also on election day, voters can cast a replacement ballot at a voter service center if they don’t have their mail-in ballot.

The election law also allows voter registration in person or through the mail up to 22 days before an election, online up to eight days before the election, and in-person on election day at the county clerk’s office and at voting centers.

Further, the law reduces the residency requirement to vote in an election from 30 days in a precinct to 22 days anywhere in the state.


Editor’s note: Aspen Journalism and the Aspen Daily News are collaborating on coverage of issues related to land, water and wealth, among other topics, in Pitkin County. To reach Brent, email him at bgardersmith@gmail.com.

Saturday, June 22, 2013

No Call Left Behind


With a long, sweeping bow to Maureen Dowd of The New York Times, I changed the title of this entry from "Private Parts" based on her column of June 16. She mentions "that polls indicate that the overwhelming American attitude is 'Spy on me.'"  Please.

As I was saying,  “law enforcement” can be divided into at least two parts: Criminal Investigation and Crime Prevention.  One is after the act; one is before the act.  Big difference.

Anyone who has watched any of the cops and robbers TV shows knows that all kinds of information is “out there.” “Out there” may mean on servers scattered around the world.  Or “right there” on your smartphone.  It remains for detectives to connect the dots and find the perp.  A crime is committed. A suspect is ferreted out.  A cellular phone is found.  After obtaining a warrant the calls are “dumped,” as they say.  All of the data about the suspect’s movements are merged.  And the person is cleared or becomes a suspect.

How about crime prevention? That is the question. How much of our lives are we willing to have “examinable” in order to stop the bad-guys in their tracks?  Is there really a need to wade through all of that data for every person in order to find a kernel of significance?

No.  It would be a waste of time.  What we do need to see is what we used to call “exception reports” when I worked in the long-distance phone business.  At one company that I worked for we offered customers the opportunity to see things that were exceptional: Calls longer than n minutes; calls during specific times; calls to certain states, cities or area codes.  Combine them and management can spot problems.  Does an employee have a family problem that needs attention?  Is someone looking for another job?

What if intelligence analysts could do the same with much of the data that is “out there”?  Enter the somewhat futuristic TV show “Person of Interest,” the premise of which is that a computer has been built that analyzes every possible piece of data and comes up with the names of two people, one of whom is going to do harm to the other.  (It’s an interesting trick that they play on us when the tables are turned.)

The point is well taken: It is really hard to stay “off the grid.”  There’s little doubt that clues exist before the fact that a bad thing is going to happen and who is going to do it:
Timothy McVeigh and Terry Nichols left plenty of clues that were used to convict them after the 1995 bombing in Oklahoma City.  Could those clues have been used to catch the plot before it was hatched?  There were dots to be connected.
The 19 people who carried out the 9/11 attacks lived among us for months, leaving trails a mile wide that were pieced together after the destruction.  People in positions to know, with their hair on fire, wrote memos starting in January, 2001,  that warned of the attacks.  There were, after all, dots to be connected.
The brothers Tamerlan and Dzhokhar Tsarnaev were known to authorities well before they burst on the scene as the Boston Marathon Bombers.  There’s probably plenty of evidence to convict the lone surviving brother.  But could connecting the dots have prevented this massacre?

As quoted in The New York Times recently, Security expert Bruce Schneier wrote that it isn’t that the Internet has been penetrated by the surveillance state; it’s that the Internet, in effect, is a surveillance state.   It’s a surveillance state in the hands of corporations. 

One question is does that mean that one gives up all sense of privacy be being “on the grid”? 

Another is whether that corporate and public data should be accessible to the government?

To the first question, in a sense, Yes.  In a sense. Even if you’re talking strictly about the electric grid, one’s usage could be significant. 
Example: If your electric bill is “substantially” higher –whatever that means—than you neighbors’ perhaps there’s something going on.
And what if your water bill is “substantially” higher –again, whatever that means – than your neighbors’ perhaps there’s something going on.

Are we a police state if some agency looks at those dots, checks your bank and ATM usage, and goes before a judge to obtain a search warrant to see if you’ve got a meth lab in your garage?

 Eric Schmidt of Google said in 2009 “If you have something that you don’t want anyone to know, maybe you shouldn’t be doing it in the first place.”  I DISAGREE IN PRINCIPLE.  There could be lots that I do that I don’t want anyone to know about.    It’s when what I’m doing is illegal that the authorities need to know about it.

For more on the structure of our intelligence apparatus see this column by Tim Shorrock: http://www.nytimes.com/2013/06/18/opinion/put-the-spies-back-under-one-roof.html?nl=opinion&emc=edit_ty_20130618&_r=1&

 Some say that you can have privacy or you can have the Internet, but you can’t have both.

It is at least possible to participate in online culture while limiting horizontal, peer-to-peer exposure.  But it is practically impossible to protect your privacy vertically –from the service providers and social media networks and now security agencies that have access to your every click and text and email.

In the olden days, when faxes were just becoming widespread, there was talk of making it impossible to re-fax a fax or of notifying the sender of an initial fax that it has been copied or re-faxed.  That never went anywhere.  But how about emails with these features:
1.              Sender notification when an email is received, and opened.
2.              Making something that you send un-forwardable.
3.              Having emails deleted from the server and the recipient’s computers in some time.


The Internet has changed everything. I could stop right there.  You know me better than that.  There is, however a divide between information about ourselves that we readily divulge and information about us that we have no idea is out there.

People are posting running commentaries on where they are, what they are drinking and with whom. It’s amazing.  But it’s all voluntary.  Even bragging.

Let’s take a look at the other stuff, and then try to figure out what, if anything, to do about it.

To begin with, most people have no idea how much information is contained in their computer hardware.

Some examples:

Computers all over the world know the house that I live in, and the car that was parked in my driveway when Google’s camera-car drove by.
Computers know when I make a cellular phone call, to whom, for how long and what towers it was relayed through.  Ditto emails and text.
Computers know what products and services that I search for online.  On the bottom of my screen I’m even told that “people who bought that also bought this.” Should I be surprised that when I am on FaceBook there are ads on the right side of my page that show the results of my recent searches. 

How do they know that?
Each computer has two identifying numbers: One is an Internet Protocol (IP) address; one is a Media Access Control (MAC) address.

Some specifics:
A few years ago I was dumb and fell for one of those scams that resulted in my Hotmail account being hijacked.  It took a while but I was able to demonstrate to Hotmail that I was who I said that I was even though I didn’t match the recently-changed identifiers of mother’s maiden name, etc.  How?  For years I’d been accessing my emails from one laptop, now it was being accessed from another.  And I was sitting at the older one while the hijacker was sitting at a newer one. I regained control of my email account.

I was in Europe recently.  I did some online searches for where to eat, places to visit and travel directions.  All in Munich, with answers in German.  I even read The NY Times in Munich –albeit in English.

Back in the US of A my new searches stopped having German-oriented results and being written in German.

Have you ever accessed a discount-air-travel website to check out pricing, surfed away, and then returned –only to find out that the price had gone up? Their server recognized your computer. That’s their way of teaching you to “buy now” next time.

Here’s an experiment.  You and a friend check pricing from two different computers –one a Windows device and one a Mac.  Many items that you shop for will show different prices.  Typically, Mac users will be shown higher prices.  Go figure.

Since you are reading this blog let me tell you a few things about people who come to this site.  Anytime I want to I can check my account and find out the following:
  • How many people visited the blog today?
  • What countries did they log in from?
  • What were the operating systems of their computers (Windows, Mac, other)?
  • What browsers did they use (Explorer, Safari, FireFox, other)?
  • Last but not least, what site were they on before coming to this blog?
And that’s for free.  Imagine what information someone could buy?

You may have heard the term “megadata,” referring to the bare bones of computer data.  In digital cameras megadata includes the make and model of the camera, the date and time the pix was taken, and the location.  Privacy?  Forget-about-it.

I recently uploaded pix on FaceBook that I had taken at an event, using my iPhone.  Later I uploaded pix that I had taken with my Panasonic and uploaded to my iMac  and then sent to FaceBook.  There they are, in two separate albums, identified as being taken using IOS (the iPhone) and Aperture (an improved iPhoto on my iMac).  Privacy?

There are so many facts about us that are collected on a daily basis: Credit card payments for fuel and food; MetroCards on subways and highway toll-booths; online and in-store purchases; bank deposits and withdrawals; online searches on Google, Bing and others.

When you stop to think about it, there’s an absolutely amazing amount of data out there about each of us.  It used to be a segmented, incomplete paper trail. 

Now it’s an all-encompassing trove of precise, track-able data. 

The question is, should we allow our government to know that much about us?   
To further complicate matters, I just returned from seeing "War On Whistleblowers" at a showing by MoveOn.org at the Burton Barr Library in Phoenix.  It's an interesting and informative movie --a "must see."  Some viewers tried to tie it to Edward Snowden, formerly of NSA.  I'm not sure that he's a whistleblower, because, a) he was complicit in what is going on, and, b) what was going on is exactly as Congress established and the President signed.  I'm not sure that he's a spy, either, although that's what he's being charged with.    To coin a phrase, "It's complicated." 
 
What's your take on this subject?