There is still more interesting grist from the national telephone survey by the Annenberg Public Policy Center at the University of Pennsylvania. The report has an extensive discussion of price discrimination – offering different prices for the same product or service to different customers based on behavioral profiling.
This practice is already happening. Supermarket discount cards are an example of price discrimination. The report notes: “[B]eing a loyal customer doesn’t automatically mean getting the lowest prices. Computer analyses of shopping histories might determine that a person’s allegiance to some products means he or she would buy them even without the discounts, or with smaller discounts than others might get for the same items at the same time.”
More interesting results from a recent national telephone survey by the Annenberg Public Policy Center at the University of Pennsylvania. The report states:
The survey further reveals that the majority of adults who use the internet do not know where to turn for help if their personal information is used illegally online or offline. The study’s findings suggest a complex mix of ignorance and knowledge, fear and bravado, realism and idealism that leaves most internet-using adult American shoppers open to financial exploitation by retailers.
Why do we keep getting that Nigerian money scam email? Who could possibly fall for it? One would think that by now, the gig wouldn’t work – people would be on to it – and those pesky spammers would move on to another scam. But alas, somebody out there must be falling for it. A recent national telephone survey by the Annenberg Public Policy Center at the University of Pennsylvania reveals some startling statistics about gullibility in all its splendor:
49% could not detect illegal “phishing”—the activity where crooks posing as banks send emails to consumers that ask them to click on a link wanting them to verify their account.
Déjà vu. All over again. And again. Yet another data security break, as if the scores of breaches announced earlier weren’t already enough. A short while ago, I posted about a tally of the security breaches indicating that the personal data of over 5 million people had been leaked or improperly accessed. Now this, from the AP [link no longer available]:
If you’re a professor, want to make a quick buck? Apparently, some professors have joined the ranks of identity thieves. A community college professor stole the identities of three of his students and used them to fill out credit card applications in the students’ names. According to a CNN story [link no longer available]:
Brian Tamanaha (law, St. John’s), has written a provocative article called The Perils of Pervasive Legal Instrumenalism. He observes that “[a]n instrumental view of law–the idea that law is an instrument to achieve ends–is taken for granted in the United States, almost a part of the air we breathe.” Such a view, however, creates a serious problem:
[I]n situations of sharp disagreement over the social good, if law is perceived as an instrument, individuals and groups within society will endeavor to seize the law, and fill in, interpret, and apply the law, to serve their own ends. What results is a contest over law itself, a contest in which all sides seek to enlist the power of law on their behalf, spawning a Hobbsean conflict of all against all carried on within and through the legal order.
Despite my enjoyment of the Bar Exam as a work of jurisprudence, I believe that the Bar Exam should be abolished. It prevents mobility among lawyers, making it cumbersome and time consuming to move to different states. It does not test on actual law used in legal practice, but on esoteric legal rules, many of which are obsolete, and most of which are of absolutely no value to a practicing attorney or to anyone for that matter. In short, the Bar Exam is an unproductive waste of time.
My guess is most all lawyers would agree. So why does the Bar Exam persist?
This year, pursuant to the Fair and Accurate Credit Transactions Act (FACTA) of 2003, credit reporting agencies must provide people with one free credit report per year. This is gradually being phased in this year. People can obtain their reports from this website: https://www.annualcreditreport.com/cra/index.jsp.
Back in the summer of 2004, a clerk on Capitol Hill blogged about her sexual exploits on a blog called Washingtonienne. A very interesting article in the Washington Post Magazine describes what happened:
The instant message blinked on the computer at Jessica Cutler’s desk in the Russell Senate Office Building. “Oh my God, you’re famous.” Before she could form the thought — “famous, cool” — or puzzle how she, a lowly mail clerk, had escaped obscurity, a second instant message popped up on her screen. Startled, Jessica recalls, she began to curse.
“Your blog is on Wonkette,” the message said.
Jessica’s blog (short for “Web log”) was the online diary she had been posting anonymously to amuse herself and her closest girlfriends. In it, she detailed the peccadilloes of the men she said were her six current sexual partners, including a married Bush administration official who met her in hotel rooms and gave her envelopes of cash; a senator’s staff member who helped hire her, then later bedded her; and another man who liked to spank and be spanked.
Wonkette is a popular online gossip column that was read by lots of Jessica’s friends and Capitol Hill co-workers, including some of the men in her blog.
The messages warning Jessica that her private little joke had just gone very public came from a girlfriend over on the House side. . . .
Typing and clicking her mouse at a desperate pace, Jessica logged on to blogger.com, the electronic bulletin board where she’d posted her sexploits under the pseudonym Washingtonienne, and deleted her blog, hoping she’d blown her diary into oblivion.
Recent discussions regarding the Real ID Act follow the same general path as many discussions about the trade-offs between security and privacy. These discussions typically begin with taking a security proposal and then weighing it against its costs to privacy and civil liberties. What is often not done, however, is to put the security proposal through meaningful scrutiny as an effective security measure. Instead, it is often assumed that the security measure is worthwhile, and the only question is whether it is worth the trade-off in privacy and civil liberties.
But what if security measures against terrorism were examined with a more critical eye? I believe that the risk of terrorism is not being assessed in a rational way and is receiving a disproportionate amount of resources. This can have grave consequences, probably resulting in significantly more loss of life than a major terrorist attack.