Another Word For It Patrick Durusau on Topic Maps and Semantic Diversity

September 4, 2017

GIJN’s Complete Global Guide to Freedom of Information (Attn: Activists/Journalists)

Filed under: FOIA,Journalism,News,Reporting — Patrick Durusau @ 9:18 pm

Unlocking Laws to Set Information Free: GIJN’s New Global Guide by Toby McIntosh.

From the post:

More than 115 countries worldwide have laws that require officials to turn over public records. Of course, even in the countries that have no laws it never hurts to ask. But there’s an advantage to using an access law — variously called freedom of information laws, access to information laws, right to information and right to know laws.

There are many resources for journalists seeking to file records requests in countries with laws governing access to information. To help exploit these legal tools, we’ve lined up GIJN’s Complete Global Guide to Freedom of Information, a resource with three sections:

  • Tips and Tricks: A collection of the best advice on how to use access laws.
  • Inspirational FOI: Ideas of what to ask for and stories about journalists active in using FOI.
  • Global Resources: Country-by-country guidance and links to national resources.

Government information can be obtained by:

  • liberating government information
  • insiders leaking government information
  • “laws governing access to information”

Assuming you place credence in information a government disgorges voluntarily, this is a great resource for activists and journalists around the world.

If you like these resources, be sure to visit/support freedominfo.org.

August 31, 2017

FCC Supports Malware Distribution!

Filed under: Cybersecurity,Journalism,News,Security — Patrick Durusau @ 9:50 am

Well, not intentionally.

FCC “apology” shows anything can be posted to agency site using insecure API by Sean Gallagher

Gallagher reports that with an API key (use gmail account) you can post malicious Word documents to the FCC site.

Not formal support for malware distribution but then next best thing.

The FCC has been given notice so this is probably a time limited opportunity.

Don’t despair!

Knowing what to look for, you can begin scanning other government websites for a similar weakness.

Journalist tip: As APIs with this weakness are uncovered, trace them back to the contractors who built them. Then run forward to see who the contractors are afflicting now.

August 28, 2017

Hacking For Government Transparency

Filed under: Cybersecurity,Government,Journalism,News,Reporting,Security — Patrick Durusau @ 3:37 pm

The 2017 U.S. State and Federal Government Cybersecurity Report by SecurityScorecard lacks details of specific vulnerabilities for identified government units, but paints an encouraging picture for hackers seeking government transparency.

Coverage of the report:


In August 2017, SecurityScorecard leveraged its proprietary platform to analyze and grade the current security postures of 552 local, state, and federal government organizations, each with more than 100 public-facing IP addresses, to determine the strongest and weakest security standards based on security hygiene and security reaction time compared to their peers.

Security Rankings by Industry

Out of eighteen (18) ranked industries, best to worst security, government comes in at a tempting number sixteen (16):

Financial services, with the fifth (5th) best security, is routinely breached, making it curious the government (#16) has any secrets at all.

Why Any Government Has Secrets

Possible reasons any government has secrets:

  • 1. Lack of interest?
  • 2. Lack of effort by the news media?
  • 3. Habituation to press conferences?
  • 4. Habituation to “leaks?”
  • N. Cybersecurity?

You can wait for governments to embarrass themselves (FOIA and its equivalents), wait for leakers to take a risk for your benefit, or, you could take the initiative in obtaining government secrets.

The SecurityScorecard report makes it clear the odds are in your favor. Your call.

August 23, 2017

58 Newsletters About Journalism

Filed under: Journalism,News,Reporting — Patrick Durusau @ 3:08 pm

An incomplete list of newsletters about journalism (Compiled by Joseph Lichterman, Lenfest Institiute for Journalism, joseph@lenfestinstitute.org)

Fifty-eight (58) newsletters as of today.

Some you will recognize, some you won’t.

Anything you see missing?

August 7, 2017

BuzzFeed News Searches For Hidden Spy Planes

Filed under: Journalism,Machine Learning,News,Reporting — Patrick Durusau @ 8:52 pm

BuzzFeed News Trained A Computer To Search For Hidden Spy Planes. This Is What We Found.

From the post:

Data and R code for the analysis supporting this August 7, 2017 BuzzFeed News post on identifying potential surveillance aircraft. Supporting files are in this GitHub repository.

Awesome! This is what data journalism is about!

While Musk and others are wringing their hands over AI, BuzzFeed uses machine learning to out government spy planes. How cool is that?

So, what are some of the headlines from The New York Times today?

  1. Scientists Fear Trump Will Dismiss Climate Change Report
  2. What Music Do Americans Love the Most? 50 Detailed Fan Maps
  3. Partisan C.I.A. Chief Heartens Trump and Worries the Agency
  4. North Korea Warns U.S. of Retaliation Over Sanctions
  5. Industries Are Left in the Lurch by Trump’s Stalled Trade Plans
  6. White House Won’t Say Who Is on Its Deregulation Teams
  7. Wells Fargo Faces New Inquiry Over Insurance Refunds
  8. Take the Generic, Patients Are Told. Until They Are Not.
  9. $78,000 of Debt for a Harvard Theater Degree
  10. Investigators in Israel Turn Up the Heat on Netanyahu

Four out of ten stories are about our accidental president (1, 3, 5, 6) The other six (2, 4, 7, 8, 9, 10), offer no actionable information.

Not a word about government spy planes.

Why isn’t The New York Times pressing the government hard?

Or perhaps the easier question: Why are you still reading The New York Times?

August 6, 2017

New spearphishing technique – Phishing for Leaks

Filed under: Cybersecurity,Journalism,News,Phishing for Leaks,Reporting,Security — Patrick Durusau @ 8:30 pm

Timo Steffens tweeted:

New spearphishing technique: Targeted mail contains no links or exploits, but mentions report title. Googling title leads to exploit site.

Good news for wannabe government/industry leakers.

This spearphishing technique avoids question about your cybersecurity competence in evaluating links in a phishing email.

You did a search relevant to your position/task and Google delivered an exploit site.

Hard to fault you for that!

The success of phishing for leaks depends on non-leak/spoon-fed journalists.

August 5, 2017

No Fault Leaking (Public Wi-Fi, File Sharing)

Filed under: Cybersecurity,Journalism,News,Reporting,Security — Patrick Durusau @ 10:51 am

Attorney General Sessions and his League of Small Minds (LSM) seek to intimidate potential leakers into silence. Leakers who are responsible for what transparency exists for unfavorable information about current government policies and actions.

FOIA requests can and do uncover unfavorable information about government policies and actions, but far too often after the principals have sought the safety of the grave.

It’s far better to expose and stop ill-considered, even criminal activities in real time, before government adds more blighted lives and deaths to its record.

Traditional leaking involves a leaker, perhaps you, delivering physical or digital copies of data/documents to a reporter. That is it requires some act on your part, copying, email, smail, etc., which offers the potential to trace the leak back to you.

Have you considered No Fault Leaking? (NFL)

No Fault Leaking requires only a public Wi-Fi and appropriate file sharing permissions on your phone, laptop, tablet.

Public Wi-Fi: Potential Washington, DC based leakers can consult Free Wi-Fi Hotspot Locations in Washington, DC by Rachel Cooper, updated 7/28/2017. Similar listings exist for other locations.

File Sharing Permissions: Even non-techies should be able to follow the screen shots in One mistake people make using public Wi-Fi that lets everyone see their files by Francis Navarro. (Pro tip: Don’t view this article on your device or save a copy there. Memorize the process of turning file sharing on and off.)

After arriving at a Public Wi-Fi location, turn file sharing on. It’s as simple as that. You don’t know who if anyone has copied any files. Before you leave the location, turn file sharing off. (This works best if you have legitimate reasons to have the files in question on your laptop, etc.)

No Fault Leaking changes the role of the media from spoon-fed recipients of data/documents into more active participants in the leaking process.

To that end, ask yourself: Am I a fair weather (no risk) advocate of press freedom or something more?

July 26, 2017

Weaponry on the Dark Web – Read The Fine Print

Filed under: Dark Web,Journalism,News,Reporting — Patrick Durusau @ 2:01 pm

The NextGov headline screaming: 3D-Printed Gun Designs Are Selling For $12 On The Dark Web is followed by this pic:

But the fine print in the caption reads:

The additive-manufactured RAMBO system includes an NSRDEC-designed standalone kit with printed adjustable buttstock, mounts, grips and other modifications—modifications made possible by the quick turnaround time afforded by 3D printing. // US Army

So….

  1. This is NOT a printable gun from the Dark Web
  2. Printable parts ARE buttstock, mounts, grips, not the gun itself

Just so you know, the RAND paper doesn’t include this image. 😉

In fact, Behind the curtain: The illicit trade of firearms, explosives and ammunition on the dark web by Giacomo Persi Paoli, Judith Aldridge, Nathan Ryan, Richard Warnes, concede trading of weapons on the Dark Web is quite small beside non-Dark Web trafficking.

Missing in the discussion of 3-D weapons plans is a comparison of the danger they pose relative to other technologies.

The Cal Fire map leaves no doubt that $12 or less in gasoline and matches can produce far more damage than any 3-D printed weapon. Without the need for a 3-D printer.

Yes?

All weapons pose some danger. Decisions makers need to know the relative dangers of weapons vis-a-vis each other.

A RAND report on the comparative danger of weapons would be far more useful than reports on weapons and their sources in isolation.

July 11, 2017

Media Verification Assistant + Tweet Verification Assistant

Filed under: Journalism,News,Reporting,Verification — Patrick Durusau @ 7:39 pm

Media Verification Assistant

From the welcome screen:

Who

We are a joint team of engineers and investigators from CERTH-ITI and Deutsche Welle, aiming to build a comprehensive tool for image verification on the Web.

Features

The Media Verification Assistant features a multitude of image tampering detection algorithms plus metadata analysis, GPS Geolocation, EXIF Thumbnail extraction and integration with Google reverse image search.

Alpha

It is constantly being developed, expanded and upgraded -our ambition is to include most state-of-the-art verification technologies currently available on the Web, plus unique implementations of numerous experimental algorithms from the research literature. As the platform is currently in its Alpha stage, errors may occur and some algorithms may not operate as expected.

Feedback

For comments, suggestions and error reports, please contact verifymedia@iti.gr.

Sharing

The source code of the Java back-end is freely distributed at GitHub.

Even in alpha, this is a great project!

Even though images can be easily altered, Photoshop and Gimp, they continue to be admissible in court, so long as a witness testifies the image
is a fair and accurate representation of the subject matter.

This project has spawned a related project: Tweet Verification Assistant, which leverages the image algorithms to verify tweets with an image or video.

Another first stop before retweeting or re-publishing an image with a story.

July 7, 2017

New York Times, Fact Checking and Dacosta’s First OpEd

Filed under: Government,Journalism,News,Politics,Reporting,Transparency — Patrick Durusau @ 4:44 pm

Cutbacks on editors/fact-checking at the New York Times came at an unfortunate time for Marc Dacosta‘s first OpEd, The President Wants to Keep Us in the Dark (New York Times, 28 June 2017).

DaCosta decries the lack of TV cameras at several recent White House press briefings. Any proof the lack of TV cameras altered the information available to reporters covering the briefings? Here’s DaCosta on that point:


But the truth is that the decision to prevent the press secretary’s comments on the day’s most pressing matters from being televised is an affront to the spirit of an open and participatory government. It’s especially chilling in a country governed by a Constitution whose very First Amendment protects the freedom of the press.

Unfortunately, the slow death of the daily press briefing is only part of a larger assault by the Trump administration on a precious public resource: information.

DaCosta’s implied answer is no, a lack of TV cameras resulted in no diminishing of information from the press conference. But, his hyperbole gland kicks in, then he cites disjointed events claimed to diminish public access to information.

For example, Trump’s non-publication of visitor records:


Immediately after Mr. Trump took office, the administration stopped publishing daily White House visitor records, reversing a practice established by President Obama detailing the six million appointments he and administration officials took at the White House during his eight years in office. Who is Mr. Trump meeting with today? What about Mr. Bannon? Good luck finding out.

Really? Mark J. Rozell summarizes the “detailing the six million appointments he and administration officials took…” this way:


Obama’s action clearly violated his own pledge of transparency and an outpouring of criticism of his action somewhat made a difference. He later reversed his position when he announced that indeed the White House visitor logs would be made public after all.

Unfortunately, the president decided only to release lengthy lists of names, with no mention of the purpose of White House visits or even differentiation between tourists and people consulted on policy development.

This action enabled the Obama White House to appear to be promoting openness while providing no substantively useful information. If the visitor log listed “Michael Jordan,” there was no way to tell if the basketball great or a same-named industry lobbyist was the person at the White House that day and the layers of inquiry required to get that information were onerous. But largely because the president had appeared to have reversed himself in reaction to criticism for lack of transparency, the controversy died down, though it should not have.

Much of the current reaction to President Trump’s decision has contrasted that with the action of his predecessor, and claimed that Obama had set the proper standard by opening the books. The reality is different though, as Obama’s action set no standard at all for transparency.
…(Trump should open White House visitor logs, but don’t flatter Obama, The Hill, 18 April 2017)

That last line on White House visitor records under Obama is worth repeating:

The reality is different though, as Obama’s action set no standard at all for transparency.

Obama-style opaqueness would not answer the questions:

Who is Mr. Trump meeting with today? What about Mr. Bannon? [Questions by DaCosta.]

A fact-checker and/or editor at the New York Times knew that answer (hint to NYT management).

Even more disappointing is the failure of DaCosta, as the co-founder of Engima, to bring any data to a claim that White House press briefings are of value.

One way to test the value of White House press briefings is to extract the “facts” announced during the briefing and compare those to media reports in the prior twenty-four hours.

If DaCosta thought of such a test, the reason it went unperformed isn’t hard to guess:


The Senate had just released details of a health care plan that would deprive 22 million Americans of health insurance, and President Trump announced that he did not, as he had previously hinted, surreptitiously record his conversations with James Comey, the former F.B.I. director.
… (DaCosta)

First, a presidential press briefing isn’t an organ for the US Senate and second, Trump had already tweeted the news about not recording his conversations with James Comey. None of those “facts” broke at the presidential press briefing.

DaCosta is 0 for 2 for new facts at that press conference.

I offer no defense for the current administration’s lack of transparency, but fact-free and factually wrong claims against it don’t advance DaCosta’s cause:


Differences of belief and opinion are inseparable from the democratic process, but when the facts are in dispute or, worse, erased altogether, public debate risks breaking down. To have a free and democratic society we all need a common and shared context of facts to draw from. Facts or data will themselves never solve any problem. But without them, finding solutions to our common problems is impossible.

We should all expect better of President Trump, the New York Times and Marc DaCosta (@marc_dacosta).

July 6, 2017

Full Fact is developing two new tools for automated fact-checking

Filed under: Journalism,News,Reporting — Patrick Durusau @ 10:13 am

Full Fact is developing two new tools for automated fact-checking by Mădălina Ciobanu.

From the post:

The first tool, Live, is based on the assumption that people, especially politicians, repeat themselves, Babakar explained, so a claim that is knowingly or unknowingly false or inaccurate is likely to be said more than once by different people.

Once Full Fact has fact-checked a claim, it becomes part of their database, and the next step is making sure that data is available every time the same assertion is being made, whether on TV or at a press conference. “That’s when it gets interesting – how can you scale the fact check so that it can be distributed in a much grander way?”

Live will be able to monitor live TV subtitles and eventually perform speech-to-text analysis, taking a live transcript from a radio programme or a press conference and matching it against Full Fact’s database.

The second tool Full Fact is building is called Trends, and it aims to record every time a wrong or false claim is repeated, and by whom, to enable fact-checkers to track who or what is “putting misleading claims out into the world”.

Because part of Full Fact’s remit is also to get corrections on claims they verify, the team wants to be able to measure the work of their impact, by looking at whether a claim has been said again once they have fact-checked it and requested a correction for it.

The work on Live and Trends has just been funded and the tools are scheduled to appear in 2018.

They are hiring, by the way: Automated Factchecking at Full Fact. Full Fact is also a charity, in case you want to donate to support this work.

I wonder how Full Fact rate stories such as Crowdstrike‘s, a security firm that lives in the back pocket of the Democratic Party (US), report claiming Russian hacks of the DNC? A report it later revised.

Personally since the claims were “confirmed” by a known liar, James Capper, former Director of National Intelligence, I would downgrade such reports and repetitions by others to latrine gossip.

In case you haven’t read in detail the various reports, there have been no records produced, but much looks like, “in our experience,” etc., but a positive dearth of facts. That interested “experts” say it is so, in the absence of evidence, doesn’t make their claims facts.

Looking forward to news on these projects as they develop!

July 5, 2017

The State of Automated Factchecking

Filed under: Journalism,News,Reporting — Patrick Durusau @ 12:57 pm

The State of Automated Factchecking by Mevan Babakar and Will Moy.

From the webpage:

The State of Automated Factchecking is an in-depth report looking at where we are with automated factchecking globally, and where we could get to with the necessary funding.

It sets out Full Fact’s roadmap for our own work on automated factchecking, and our design principles for the tools we are building.

We propose principles of collaboration for factchecking organisations, researchers and computer scientists around the world.

We hope that it will be the beginning of many fruitful conversations.

It’s split into two parts:

Part One: A roadmap for automated factchecking
Part Two: What we can do now and what remains to be done

Summary

  • We can scale up and speed up factchecking dramatically using technology that exists now.
  • We are months—and relatively small amounts of money—away from handing practical automated tools to factcheckers and journalists. This is not the horizon of artificial intelligence; it is simply the application of existing technology to factchecking.
  • Automated factchecking projects are taking place across the world, but they are fragmented. This means factcheckers and researchers are wasting time and money reinventing the wheel.
  • We propose open standards. Automated factchecking will come to fruition in a more coherent and efficient way if key players think in terms of similar questions and design principles, learn from existing language processing tasks, and build shared infrastructure.
  • International collaboration is vital so that the system works in several languages and countries.
  • Research into machine learning must continue, but we can make serious progress harnessing other technologies in the meantime.

Read the full report

Read The State of Automated Factchecking (pdf, 6Mb) and sign up below to keep up with the latest.

Stay up to date

To stay updated on our progress subscribe to our automated factchecking mailing list, or for any specific questions email Mevan Babakar at mevan@fullfact.org

I mention this report as background reading for the latest efforts by Full Fact to develop automated fact-checking tools.

Enjoy!

July 2, 2017

Media outrage on threatened violence against Assange?

Filed under: Censorship,Journalism,News,Reporting — Patrick Durusau @ 4:27 pm

Assange Compiles Media Figures, Establishment Democrats Calling For His Death by Elizabeth Vos.

From the post:

Wikileaks Editor-in-Chief Julian Assange tweeted extensively overnight regarding what he labeled tolerant liberals who have called for his assassination and torture. Assange called such media figures “blue-ticks.” It is not clear at this time what may have prompted the series of tweets. Assange also referenced the torture and murder of what he called “alleged sources” during the series of tweets. He also implicated Hillary Clinton in some of the references. Some understood this to be a reference to the upcoming anniversary of Seth Rich’s murder, but it is not clear at this time who Assange may have been specifically referring to.

I won’t repeat the latest dust-up between the US media and the village idiot they helped elect with their fascination for “man bites dog” type news. Candidate X said Y or did outrageous act Z, so, why is that news? The “media” that reports meetings between US presidents and aliens in the Rose Garden needs something to print. Could have left such stories to them.

Now, however, the candidate they favored with $millions if not $billions in free coverage, is rough-housing with the media. Oh, my!

When you think about reporters in other countries who die on a regular basis, year in and year out, a little harsh talk pales by comparison.

Not to mention the hypocrisy of the US media that reacts to every unkind twitch of the current Whitehouse, but blandly reports calls for the murder of Julian Assange.

I disagree with Assange’s partial leaks*, but even with partial leaks, Assange has empowered public discussion of vital issues for years. You need to ask yourself why in the face of that history, he is not attracting support from mainstream media. Or outrage at calls for violence, explicit calls, against him. (Care to comment New York Times, Washington Post?)

* I disagree on partial leaks because full leaks are likely to be more damaging to those responsible for immoral and/or illegal activity. To that end, those harmed by leaks should have made better choices.

June 21, 2017

.Rddj (data journalism with R)

Filed under: Journalism,News,R,Reporting — Patrick Durusau @ 8:02 pm

.Rddj Hand-curated, high quality resources for doing data journalism with R by Timo Grossenbacher.

From the webpage:

The R Project is a great software environment for doing all sorts of data-driven journalism. It can be used for any of the stages of a typical data project: data collection, cleaning, analysis and even (interactive) visualization. And it’s all reproducible and transparent! Sure, it requires a fair amount of scripting, yet…

Do not fear! With this hand-curated (and opinionated) list of resources, you will be guided through the thick jungle of countless R packages, from learning the basics of R’s syntax, to scraping HTML tables, to a guide on how to make your work comprehensible and reproducible.

Now, enjoy your journey.

Some more efforts at persuasion: As I work in the media, I know how a lot of journalists are turned off by everything that doesn’t have a graphical interface with buttons to click on. However, you don’t need to spend days studying programming concepts in order to get started with R, as most operations can be carried out without applying scary things such as loops or conditionals – and, nowadays, high-level abstrations like dplyr make working with data a breeze. My advice if you’re new to data journalism or data processing in general: Better learn R than Excel, ’cause getting to know Excel (and the countless other tools that each do a single thing) doesn’t come for free, either.

This list is (partially) inspired by R for Journalists by Ed Borasky, which is another great resource for getting to know R.

… (emphasis in original)

The topics are familiar:

  • RStudio
  • Syntax and basic R programming
  • Collecting Data (from the Web)
  • Data cleaning and manipulation
  • Text mining / natural language processing
  • Exploratory data analysis and plotting
  • Interactive data visualization
  • Publication-quality graphics
  • Reproducibility
  • Examples of using R in (data) journalism
  • What makes this list of resources different from search results?

    Hand curation.

    How much of a difference?

    Compare the search results of “R” + any of these categories to the resources here.

    Bookmark .Rddj for data journalism and R, then ping me with the hand curated list of resources you are creating.

    Save yourself and the rest of us from search. Thanks!

    Storyzy A.I. Fights Fake Quotes (Ineffective Against Trump White House)

    Filed under: Journalism,News,Reporting,Verification — Patrick Durusau @ 9:53 am

    In the battle against fake news, Storyzy A.I. fights fake quotes

    From the post:

    The Quote Verifier launched today by Storyzy takes the battle against fake news to a whole new automated level by conveniently flagging fake quotes on social networks and search engines with +50,000 new authentic quotes added daily.

    Storyzy aims to help social networks and search engines by spotting fake quotes. To fulfill this ambition Storyzy developed a tool (currently available in Beta version) that verifies whether a quote is authentic or not by checking if a person truly said that or not.
    … (emphasis in original)

    A tool for your short-list of verification tools to use on a daily basis.

    It’s ineffective against the Trump White House because accurate quotes can still be “false.”

    “Truthful quotes,” as per Trump White House policy, issue only from the President and must reflect what he meant to say. Subject to correction by the President.

    A “truthful quote,” consists of three parts:

    1. Said by the President
    2. Reflects what he meant to say
    3. Includes any subsequent correction by the President (one or more)

    There is a simply solution to avoiding “false” quotes from President Trump:

    Never quote him or his tweets at all.

    Quote his lackeys, familiars and sycophants, but not him.

    June 17, 2017

    The Quartz Directory of Essential Data (Directory of Directories Is More Accurate)

    Filed under: Data,Journalism,News,Reporting — Patrick Durusau @ 1:51 pm

    The Quartz Directory of Essential Data

    From the webpage:

    A curated list of useful datasets published by important sources. Please remember that “important” does not mean “correct.” You should vet these data as you would with any human source.

    Switch to the “Data” tab at the bottom of this spreadsheet and use Find (⌘ + F) to search for datasets on a particular topic.

    Note: Just because data is useful, doesn’t mean it’s easy to use. The point of this directory is to help you find data. If you need help accessing or interpreting one of these datasets, please reach out to your friendly Quartz data editor, Chris.

    Slack: @chris
    Email: c@qz.com

    A directory of 77 data directories. The breath of organizing topics, health, trade, government, for example, creates a need for repeated data mining by every new user.

    A low/no-friction method for creating more specific and re-usable directories has remained elusive.

    Are You A Serious Reader?

    Filed under: Books,Journalism,Literature,News,Reporting — Patrick Durusau @ 10:32 am

    What does it mean for a journalist today to be a Serious Reader? by Danny Funt.

    From the post:

    BEFORE THE BOOKS ARRIVED, Adam Gopnik, in an effort to be polite, almost contradicted the essential insight of his life. An essayist, critic, and reporter at The New Yorker for the last 31 years, he was asked whether there is an imperative for busy, ambitious journalists to read books seriously—especially with journalism, and not just White House reporting, feeling unusually high-stakes these days—when the doorbell rang in his apartment, a block east of Central Park. He came back with a shipment and said, “It would be,” pausing to think of and lean into the proper word, “brutally unkind and unrealistic to say, Oh, all of you should be reading Stendhal. You’ll be better BuzzFeeders for it.” For the part about the 19th-century French novelist, he switched from his naturally delicate voice to a buffoonish, apparently bookish, baritone.

    Then, as he tore open the packaging of two nonfiction paperbacks (one, obscure research for an assignment on Ernest Hemingway; the other, a new book on Adam Smith, a past essay subject) and sat facing a wall-length bookcase and sliding ladder in his heavenly, all-white living room, Gopnik took that back. His instinct was to avoid sermonizing about books, particularly to colleagues with grueling workloads, because time for books is a privilege of his job. And yet, to achieve such an amazingly prolific life, the truth is he simply read his way here.

    I spoke with a dozen accomplished journalists of various specialties who manage to do their work while reading a phenomenal number of books, about and beyond their latest project. With journalists so fiercely resented after last year’s election for their perceived elitist detachment, it might seem like a bizarre response to double down on something as hermetic as reading—unless you see books as the only way to fully see the world.

    Being well-read is a transcendent achievement similar to training to run 26.2 miles, then showing up for a marathon in New York City and finding 50,000 people there. It is at once superhuman and pedestrian.

    … (emphasis in original)

    A deeply inspirational and instructive essay on serious readers and the benefits that accrue to them. Very much worth two or more slow reads, plus looking up the authors, writers and reporters who are mentioned.

    Earlier this year I began the 2017 Women of Color Reading Challenge. I have not discovered any technical insights into data science or topic maps, but I am gaining, incrementally for sure, a deeper appreciation for how race and gender shapes a point of view.

    Or perhaps more accurately, I am encountering points of view different enough from my own that I recognize them as being different. That in and of itself, the encountering of different views, is one reason I aspire to become a “serious reader.”

    You?

    June 15, 2017

    Man Bites Dog Or Shoots Member of Congress – Novelty Rules the News

    Filed under: Journalism,News,Reporting — Patrick Durusau @ 4:35 pm

    The need for “novelty” in a 24 x 7 news cycle, identified by Lewis and Marwick in Megyn Kelly fiasco is one more instance of far right outmaneuvering media comes to the fore in coverage of the recent shooting reported in Capitol Hill shaken by baseball shooting.

    Boiled down to the essentials, James Hodgkinson, 66, of Illinois, who is now dead, wounded “House Majority Whip Steve Scalise (R-La.) and four others in the Washington suburb of Alexandria, Va.,” on June 14, 2017. The medical status of the wounded vary from critical to released.

    That’s all the useful information, aside from identification of the victims, that can be wrung from that story.

    Not terribly useful information, considering Hodgkinson is dead and so not a candidate for a no-fly/sell list.

    But you will read column inch after column inch of non-informative comments by and between special interest groups, “experts,” and even experienced political reporters, on a one-off event.

    A per capita murder rate of 5 per 100,000, works out to 50 murderers per million people. Approximately 136 million people voted in the 2016 election so 50 x 136 means 6800 people who will commit murder this year voted in the 2016 election. (I’m assuming 1 murderer per murder, which isn’t true but it does simplify the calculation.)

    One of those 6800 people (I could have used shootings per capita for an even larger number) shot a member of Congress.

    Will this story, plus or minus hand wringing, accusations, counter-accusations, etc., change your routine tomorrow? Next week? Your plans for this year?

    All I see is novelty and no news.

    You?

    PS: Identifying the “novelty” of this story did not require a large research/fact-checking budget. What it did require is a realization that everyone is talking about the shooting of a member of congress means only “everyone is talking about….” Whether that is just a freakish event or genuine news, requires deeper inquiry.

    One nutter shoots a member of Congress, man bites dog, novelty, not news. Organization succeeds in killing 3rd member of Congress, that looks like news. Pattern, behavior, facts, goals, etc.

    The Media and Far Right Trolls – Mutual Reinforcing Exploitation (MRE)

    Filed under: Journalism,News,Reporting — Patrick Durusau @ 2:39 pm

    The Columbia Journalism Review (CJR) normally has great headlines but the editors missed a serious opportunity with: Megyn Kelly fiasco is one more instance of far right outmaneuvering media by Becca Lewis and Alice Marwick.

    Lewis and Marwick capture the essential facts and then lose their key insights in order to portray “the media” (whoever that is) as a victim of far right trolls.

    Indeed, research suggests that even debunking falsehoods can reinforce and amplify them. In addition, if a media outlet declines to cover a story that has widely circulated in the far-right and mainstream conservative press, it is accused of lying and promoting a liberal agenda. Far-right subcultures are able to exploit this, using the media to spread ideas and target potential new recruits.

    A number of factors make the mainstream media susceptible to manipulation from the far-right. The cost-cutting measures instituted by traditional newspapers since the 1990s have resulted in less fact-checking and investigative reporting. At the same time, there is a constant need for novelty to fill a 24/7 news cycle driven by cable networks and social media. Many of those outlets have benefited from the new and increased partisanship in the country, meaning there is now more incentive to address memes and half-truths, even if it’s only to shoot them down.

    Did you catch them? The key insights/phrases?

    1. “…declines to cover a story that has widely circulated…it is accused of lying and promoting a liberal agenda…”
    2. “…less fact-checking and investigative reporting…”
    3. “…constant need for novelty to fill a 24/7 news cycle driven by cable networks and social media…”

    Declining to Cover a Story

    “Far-right subcultures” don’t exploit “the media” with just any stories, they are “…widely circulated…” stories. That is “the media” is being exploited over stories it carries out of fear of losing click-through advertising revenue. If a story is “widely circulated,” it attracts reader interest, page-views, click-throughs and hence, is news.

    Less Fact-Checking and Investigative Reporting

    Lewis and Marwick report the decline in fact-checking and investigative reporting as fact but don’t connect it to “the media” carrying stories promoted by “far-right subcultures.” Even if fact-checking and investigative reporting were available in abundance, for every story, given enough public interest (read “…widely circulated…”), is any editor going to decline a story of wide spread interest? (BTW, who chose to reduce fact-checking and investigative reporting? It wasn’t “far-right subcultures” choosing for “the media.”

    Constant Need for Novelty

    The “…constant need for novelty…” and its relationship to producing income for “the media” is best captured by the following dialogue from Santa Claus (1985)


    How can I tell all the people
    about my something special?
    Advertise. Advertise?
    How do I do that?
    In my line,
    television works best.
    Oh, I know! Those little picture
    box thingies? Can we get on those?
    With enough money, a horse in a
    hoop skirt can get on one of those.

    In the context of Lewis and Marwick, far-right subculture news is the “horse in a hoop skirt” of the dialogue. It’s a “horse in a hoop skirt” that is generating page-views and click-through rates.

    The Missed Headline

    I’m partial to my headline but the CJR aims at a more literary audience, I would suggest:

    The Media and Far Right Trolls – Imitating Alessandro and Napoleone

    Alessandro and Napoleone, currently residents of Hell, are described in Canto 32 of the Inferno (Dante, Ciardi translation) as follows:

    When I had stared about me, I looked down
    and at my feet I saw two clamped together
    so tightly that the hair of their heads had grown

    together, “Who are you,” I said, “who lie
    so tightly breast to breast?” They strained their necks
    and when they had raised their heads as if to reply,

    the tears their eyes had managed to contain
    up to that time gushed out, and the cold froze them
    between the lids, sealing them shut again

    tighter than any clamp grips wood to wood,
    and mad with pain, they fell to butting heads
    like billy-goats in a sudden savage mood.

    “The media” now reports its “butting heads” with “far-right subcultures,” generating more noise, in addition to reports of non-fact-checked but click-stream revenue producing right-wing fantasies.

    June 9, 2017

    Raw FBI Uniform Crime Report (UCR) Files for 2015 (NICAR Database Library)

    Filed under: FBI,Government Data,Journalism,News,Reporting — Patrick Durusau @ 7:31 pm

    IRE & NICAR to freely publish unprocessed data by Charles Minshew.

    From the post:

    Inspired by our members, IRE is pleased to announce the first release of raw, unprocessed data from the NICAR Database Library.

    The contents of the FBI’s Uniform Crime Report (UCR) master file for 2015 are now available for free download on our website. The package contains the original fixed-width files, data dictionaries for the tables as well as the FBI’s UCR user guide. We are planning subsequent releases of other raw data that is not readily available online.

    The yearly data from the FBI details arrest and offense numbers for police agencies across the United States. If you download this unprocessed data, expect to do some work to get it in a useable format. The data is fixed-width, across multiple tables, contains many records on a single row that need to be unpacked and in some cases decoded, before being cleaned and imported for use in programs like Excel or your favorite database manager. Not up to the task? We do all of this work in the version of the data that we will soon have for sale in the Database Library.

    I have peeked at the data and documentation files and “raw” is the correct term.

    Think of it as great exercise for when an already cleaned and formatted data set isn’t available.

    More to follow on processing this data set.

    June 8, 2017

    Protecting Sources, Leaks and Journalistic Credibility

    Filed under: Journalism,News,Reporting — Patrick Durusau @ 2:42 pm

    Protecting Your Sources When Releasing Sensitive Documents by Ted Han and Quinn Norton.

    From the post:

    Extraordinary documentation can make for an extraordinary story—and terrible trouble for sources and vulnerable populations if handled without enough care. Recently, the Intercept published a story about a leaked NSA report, posted to DocumentCloud, that alleged Russian hacker involvement in a campaign to phish American election officials. Simultaneously, the FBI arrested a government contractor, Reality Winner, for allegedly leaking documents to an online news outlet. The affidavit partially revealed how Winner was caught leaking by the FBI, including a postmark and physical characteristics of the document that the Intercept posted.

    The Intercept isn’t alone in leaving digital footprints in their article material. In a post called “We Are with John McAfee Right Now, Suckers,” Vice posted a picture of the at-the-time fugitive John McAfee, complete with GPS coordinates pinpointing their source’s location, who was shortly in official custody. In 2014, the New York Times improperly redacted an NSA document from the Snowden trove, revealing the name of an NSA agent.

    The first step with any sensitive material is to consider what will happen when the subjects or public sees that material. It can be hard to pause in the rush of getting a story out, but giving some thought to the nature of the information you’re releasing, what needs to be released, what could be used in unexpected ways, and what could harm people, can prevent real problems.

    Han and Norton cover document metadata, which I omitted in Are Printer Dots The Only Risk? along with some of the physical identifiers I mentioned.

    Plus they have good advice on other identifying aspects of documents, such as content and locations.

    Despite my waiting and calling for a full release of the Panama Papers, is there a credibility aspect to the publication of sensitive documents?

    Another era but had Walter Cronkite said that he read a leaked NSA document and reported the same facts as the Intercept, his report would have been taken as the “facts” contained in that report.

    To what extent is journalism losing credibility because it isn’t asking to be treated as credible? Merely as accurate repeaters of lies prepared and printed elsewhere?

    June 6, 2017

    Verifying Burn Of Source – Who You Gonna Call?

    Filed under: Journalism,News,Reporting — Patrick Durusau @ 4:30 pm

    WikiLeaks offers $10,000 to get Intercept reporter fired by Joe Uchill.

    From the post:

    WikiLeaks offered a $10,000 bounty Monday aimed at getting a reporter for The Intercept fired, following the arrest of a government contractor who allegedly leaked an NSA report to the site.

    The Justice Department announced earlier Monday that it had arrested Reality Leigh Winner, a 25-year-old government contractor, for leaking classified documents to a news organization. It has been widely reported that Winner allegedly leaked documents from the NSA to The Intercept about Russian attempts to hack U.S. elections officials.

    Investigators were able to find Winner in part, according to a government court filings, because of clues gained when an Intercept reporter showed the leaked report to the government.

    The Intercept article lists four reporters:

    From the affidavit for Reality Leigh Winner’s arrest:


    12. On June I, 2017, the FBI was notified by the U.S. Government Agency that the U.S. Government Agency had been contacted by the News Outlet on May 30, 2017, regarding an upcoming story. The News Outlet informed the U.S. Government Agency that it was in possession of what it believed to be a classified document authored by the U.S. Government Agency. The News Outlet provided the U.S. Government Agency with a copy of this document. Subsequent analysis by the U.S. Government Agency confirmed that the document in the News Outlet’s possession is the intelligence reporting. The intelligence reporting is classified at the Top Secret level, indicating that its unauthorized disclosure could reasonably result in exceptionally grave damage to the national security, and is marked as such. The U.S. Government Agency has since confirmed that the reporting contains information that was classified at that level at the time that the reporting was published on or about May 5, 2017, and that such information currently remains classified at that level.

    13. The U.S. Government Agency examined the document shared by the News Outlet and determined the pages of the intelligence reporting appeared to be folded and/or creased, suggesting they had been printed and hand-carried out of a secured space.

    Why on earth?:

    The News Outlet provided the U.S. Government Agency with a copy of this document.

    How sloppy is that?

    Do you trust the “U.S. Government Agency” given a copy of the document to out the reporter in question?

    Or does this give them a free shot at a good reporter and blackmail evidence on the real culprit?

    Suggestions?

    How NOT To Leak! (Educational Materials on Leaking?)

    Filed under: Cybersecurity,Journalism,News,Reporting — Patrick Durusau @ 4:01 pm

    The Intercept’s Russian hacking report also seems to be a good example of how not to handle leaks by Laura Hazard Owen.

    From the post:

    On Monday afternoon, The Intercept published a bombshell story: “Top-secret NSA report details Russian hacking effort days before 2016 election.” The story — later confirmed by CBS — reveals that “Russian military intelligence executed a cyberattack on at least one U.S. voting software supplier and sent spear-phishing emails to more than 100 local election officials just days before last November’s presidential election, according to a highly classified intelligence report obtained by The Intercept,” and includes PDFs of the NSA’s report.

    The story is a potentially huge one, providing the most evidence we’ve seen thus far that the Russian government attempted to influence the outcome of the U.S. election in ways beyond just spreading misinformation (and Russian president Vladimir Putin had even denied his government’s role in that). But another story is emerging around The Intercept’s story as well: By Monday evening, a 25-year-old federal contractor, Reality Leigh Winner, was charged with leaking the documents (the first criminal leak case under Trump). If Winner was indeed The Intercept’s source, there are questions about whether The Intercept could have done more to protect her — starting with those PDFs it published as part of its story.

    FYI, the Intercept has a huffy denial at the end of Owen’s post. Huffy enough to confirm they screwed up.

    In the rush to publication, the Intercept failed to observe basic information hygiene with regard to the leaked PDFs. Leaked PDFs included printer steganography that enables tracing the printer.

    Numerous other failures, such as the alleged source using their work computer to leak the documents, etc., were also present.

    Enough errors, between the Intercept and its alleged source, to make you think dead pages advising on how to leak properly aren’t enough.

    Suggestions on how to effectively educate people on proper leaking techniques?

    June 1, 2017

    New York Times Mutes Public Editor (And Effective Criticism)

    Filed under: Journalism,News,Reporting — Patrick Durusau @ 10:21 am

    New York Times public editor Liz Spayd on decision to eliminate her position by Pete Vernon.

    From the post:

    THE DECISION THIS MORNING BY THE NEW YORK TIMES to eliminate the position of public editor touched off a debate over the value of a position established in the wake of the Jayson Blair fabrication scandal to hold the paper’s editors and reporters accountable to industry standards and reader concerns.

    Times Publisher Arthur Sulzberger, Jr. explained the move in a memo to staff: “The responsibility of the public editor—to serve as the reader’s representative—has outgrown that one office.”

    According to Sulzberger, “When our audience has questions or concerns, whether about current events or our coverage decisions, we must answer them ourselves.” To that end, the paper will rely on an expanded comment section and social media feedback, as well as a new “reader center,” which was announced yesterday.

    Relying on social media critiques and angry voices in the comment sections is a curious way of replacing an experienced journalist who could offer nuance and perspective while writing with the institutional backing of the nation’s most influential newspaper. The move comes at a moment when public confidence in the media is at an all-time low. In a time when the value of introspection and transparency is at a premium, cutting a position designed to provide both smacks of self-satisfaction and a misreading of the current media landscape.
    … (emphasis in original)

    Vernon’s post deserves your attention but the adage:

    Everyone’s Responsibility Is No One’s Responsibility

    answers Sulzberger the best.

    Can you name a single reader of the New York Times for who holding reporters and the editorial process of the New York Times (NYT) accountable is their day job??

    That’s the trick isn’t it?

    If it’s not your day job, with resources commensurate to the task and access, how will you “hold” the New York Times accountable?

    Will you post to Facebook or Twitter? Exactly how many people do you think will see/consider your “speaking truth to power?”

    The public editor, publishing in the NYT, had a voice at least as loud as the editors and reporters.

    That was Sulzberger’s real problem with the public editor. He wants the appearance of accountability but not its reality. Critics should be unfunded, isolated, powerless voices that can be easily ignored.

    Sulzberger needs to go down on your list of enemies of journalism and the public in general.

    Data journalists, start tracking NYT contents for your degradation of journalism stories two or three years hence. (I not presuming an outcome of silencing the public editor, that’s a forecast.)

    May 29, 2017

    Data Journalists! Data Gif Tool (Google)

    Filed under: Graphics,Journalism,News,Reporting,Visualization — Patrick Durusau @ 10:03 am

    While not hiding its prior salary discrimination against women, Google has created and released a tool for creating data gifs.

    Make your own data gifs with our new tool by Simon Rogers.

    From the post:

    Data visualizations are an essential storytelling tool in journalism, and though they are often intricate, they don’t have to be complex. In fact, with the growth of mobile devices as a primary method of consuming news, data visualizations can be simple images formatted for the device they appear on.

    Enter data gifs.

    (gif omitted)

    These animations can be used for a variety of sophisticated storytelling approaches among data journalists: one example is Lena Groeger, who has become *the* expert in working with data gifs.

    Today we are releasing Data Gif Maker, a tool to help journalists make these visuals, which show share of search interest for two competing topics.

    A good way to get your feet wet with simple data gifs.

    Don’t be surprised that Google does good things for the larger community while engaging in evil conduct.

    Racists sheriffs who used water cannon and dogs on Black children loved their own children and remembered their birthdays. WWII death camps guards attended church. Were kind to small animals.

    People and their organizations are complicated and the reading public is ill-served by shallow reporting of only one aspect or another as the “true” view.

    May 25, 2017

    How Not To Be Wrong

    Filed under: Journalism,News,Reporting — Patrick Durusau @ 9:03 am

    How Not To Be Wrong by Winny de Jong.

    From the post:

    At the intersection of data and journalism, lots can go wrong. Merely taking precautions might not be enough.

    “It’s very well possible that your story is true but wrong,” New York Times data journalist Robert Gebeloff explained at the European Investigative Journalism Conference & Dataharvest, which was recently held in Mechelen, a city 20 minutes outside of Brussels.

    “When I work on a big story, I want to know everything about the topic.” To make sure he doesn’t miss out, Gebeloff gets all the data sources he can, examines it in all relevant ways and publishes only what he believes to be true.

    The best part of this post is the distillation of Gebeloff’s presentation into a How Not To Be Wrong Checklist.

    De Jong’s checklist is remarkably similar to requirements for replication of experiments in science.

    It would make a great PDF file to share with data scientists in general.

    May 24, 2017

    Leaking Photos Of: “Sophisticated Bomb Parts”

    Filed under: Journalism,News,Reporting,Terrorism — Patrick Durusau @ 4:45 pm

    Theresa May to tackle Donald Trump over Manchester bombing evidence by Heather Stewart, Robert Booth and Vikram Dodd.

    From the post:


    British officials were infuriated on Wednesday when the New York Times published forensic photographs of sophisticated bomb parts that UK authorities fear could complicate the expanding investigation into the lethal blast in which five further arrests have been made in the UK and two more in Libya.

    See for yourself: Found at the Scene in Manchester: Shrapnel, a Backpack and a Battery by C. J. Chivers.

    Let’s see, remains of a backpack, detonator, metal scrap, battery.

    Do you see any sophisticated bomb parts?

    Sophistication, skill, encryption, etc., are emphasized after terrorist attacks, I assume to excuse the failure of authorities to prevent such attacks.

    That’s more generous than assuming UK authorities are so untrained they consider this a “sophisticated” bomb. Just guessing from the parts, hardly.

    “Click Bait” at The Kicker – Covering Manchester

    Filed under: Journalism,News,Reporting,Terrorism — Patrick Durusau @ 4:10 pm

    The Kicker: The media’s model for covering terrorist attacks is broken by Pete Vernon.

    From the webpage:

    ON THE LATEST EPISODE of The Kicker, we run through some of the week’s biggest media stories, including a ratings leaderboard shakeup for cable news, a spurious conspiracy that consumed the right-wing media universe, and a new study that says–surprise–journalists drink too much caffeine and alcohol. Then, we move on to the media coverage of the terrorist attack in Manchester, and tackle why we think the industry’s model for covering terror attacks is broken. Finally, CJR’s David Uberti interviews Clara Jeffery, editor in chief of Mother Jones. They discuss the magazine’s novel approach to funding its political coverage as well as the role Mother Jones played in breaking the Trump-Russia story.

    Subscribe via iTunes · Stitcher · RSS Feed · SoundCloud.

    The podcast.

    Leading with the promise of The media’s model for covering terrorist attacks is broken, I listened to The Kicker today.

    If you like podcasts, you will like The Kicker, but it illustrates for me the difficulties associated with podcasts.

    First, the podcast covered five separate stories in a little over thirty minutes. Ranging from cable news ratings, Seth Rich and fake news, the drinking habits of journalists, the media model for terrorist coverage (the story of interest to me), and the role of Mother Jones in the continuing From Russia With Love connection to Donald Trump.

    As “click bait” for the podcast, the media reporting on terrorism segment starts at approximately 8:20 and ends at approximately 16:50, some 8 minutes and 30 seconds of coverage, much shorter than the account concerning Mother Jones (16:49 – 31:14).

    Second, what discussion occurred, included insights such as “…breaking news rooms, larger news rooms, don’t have the privilege of deciding whether to cover a story…?” To be fair, that was followed by discussions of “how to cover stories,” the use of raw/unexplained user video, and the appropriateness of experts discussing politics immediately following such events.

    The point that got dropped in the podcast was Christie Chisholm‘s remark:

    …breaking news rooms, larger news rooms, don’t have the privilege of deciding whether to cover a story…

    Why so?

    I may be reading entirely too much into Christie’s comment, but it implies that some news rooms must fill N minutes of coverage on breaking events, whether there is meaningful content to be delivered or not. Yes?

    If that is the case, that coverage of breaking events requires wall-to-wall coverage for N minutes, then raw, unexplained video, expert opinions with no facts, reporters asking for each others reactions, the spontaneous speculation and condemnations, become easily explainable.

    There is too little content and too much media time available to cover it.

    Building on Christie’s insight, The Kicker could have created a timeline of “facts” with regard to the explosion in Manchester as a way to illustrate when facts became known about the explosion and contrast that with the drone of factless coverage of the event.

    That would have made a rocking podcast and a pointed one at that.

    PS: The podcast did discuss other issues with media coverage of Manchester but the lack of depth and time prevented substantive analysis or proposals. Media coverage of terrorist events certainly merits extended treatment by podcast or otherwise.

    May 23, 2017

    The power of algorithms and how to investigate them (w/ resources)

    Filed under: Algorithms,Journalism,News,Reporting — Patrick Durusau @ 2:03 pm

    The power of algorithms and how to investigate them by Katrien Vanherck.

    From the post:

    Most Americans these days get their main news from Google or Facebook, two tools that rely heavily on algorithms. A study in 2015 showed that the way a search engine like Google selects and prioritises search results on political candidates can have an influence on voters’ preferences.

    Similarly, it has been shown that by tweaking the algorithms behind the Facebook newsfeed, the turnout of voters in American elections can be influenced. If Marc Zuckerberg were ever to run for president, he would theoretically have an enormously powerful tool at his disposal. (Note: as recent article in The Guardian investigated the misuse of big data and social media in the context of the Brexit referendum).

    Algorithms are everywhere in our everyday life and are exerting a lot of power in our society. They prioritise, classify, connect and filter information, automatically making decisions on our behalf all the time. But as long as the algorithms remain a ‘black box’, we don’t know exactly how these decisions are made.

    Are these algorithms always fair? Examples of possible racial bias in algorithms include the risk analysis score that is calculated for prisoners that are up for parole or release (white people appear to get more favourable scores more often) and the service quality of Uber in Washington DC (waiting times are shorter in predominantly white neighbourhoods). Maybe such unfair results are not only due to the algorithms, but the lack of transparency remains a concern.

    So what is going on in these algorithms, and how can we make them more accountable?
    … (emphasis in original)

    A great inspirational keynote but short on details for investigation of algorithms.

    Such as failing to mention the algorithms of both Google and Facebook are secret.

    Reverse engineering those from results would be a neat trick.

    Google would be the easier of the two, since you could script searches domain by domain with a list of search terms to build up a data set of its results. That would not result in the algorithm per se but you could detect some of its contours.

    Google has been accused of liberal bias, Who would Google vote for? An analysis of political bias in internet search engine results, bias in favor of Hillary Clinton, Google defends its search engine against charges it favors Clinton, and, bias in favor of the right wing, How Google’s search algorithm spreads false information with a rightwing bias.

    To the extent you identify Hillary Clinton with the rightwing, those results may be expressions of the same bias.

    In any event, you can discern from those studies some likely techniques to use in testing Google search/auto-completion results.

    Facebook is be harder because you don’t have access to or control over the content it is manipulating for delivery. Although by manipulating social media identities, you could test and compare the content that Facebook delivers.

    May 22, 2017

    Breaking News Consumer’s Handbook

    Filed under: Journalism,News,Reporting — Patrick Durusau @ 9:18 pm

    From a tweet by @onthemedia, see their website: onthemedia.org.

    If you follow #2:

    2. Don’t trust anonymous sources.

    Skip political reports in the New York Times and Washington Post.

    Is there a market for delayed news?

    I ask because I understand there was an explosion in Manchester Arena in England, 10:35 PM their local. Even as I type this, mis-information is flooding social media channels from any number of sources.

    What if there was a news service with a variable delay, say minimum 7 days but maximum of 14 days, that delivered a coherent and summarized version of breaking events?

    As opposed to the click-bait teasers that get shared/forwarded/re-tweeted without anyone reading the mis-information behind the click-bait.

    « Newer PostsOlder Posts »

    Powered by WordPress