This is fascinating. Check out OpenSecrets new Anomaly Tracker tool. By collecting data on lawmakers, donations received by their committees or super PACs, and legislation sponsored, out of the ordinary occurrences can be exposed.
The Anomaly Tracker tool highlights “anomalies” in our money-and-politics data. An anomaly, as we define it here, is an occurrence that is out of the ordinary. It is not necessarily an indication that there is something amiss.
We are tracking six kinds of anomalies here:
- Lawmakers sponsoring legislation that was lobbied by only one company or other organization whose employees or PAC also donated to the sponsoring lawmakers.
- Lawmakers receiving twice as much in contributions from their top donors as their next highest donors.
- Lawmakers receiving twice as much in contributions from their top donor industries as their next highest donor industries.
- Lawmakers receiving more than 50 percent of their itemized contributions from out of state.
- More than 50 percent of a committee or candidate’s spending is paid to a single vendor.
- PACs giving at least $7,500 to a candidate’s Leadership PAC but nothing to the candidate’s committee.
Have a suggestion for a type of anomaly you would like to see or wish to speak to us about this tool? Email us!
ArsTechnica just posted these wild posters from the NSA’s security education program. They were released because of the diligence and FOIA request of our friends at the Government Attic where you can see all of the posters.
In February of 2016, the people behind the website Government Attic made an unusual Freedom of Information Act request to the National Security Agency: “A digital/electronic copy of the NSA’s old security posters from the 1950s and 1960s.” It took more than two years, but the NSA finally got around to honoring the request—providing digital images of more than 100 posters from NSA’s Security Education Program, spanning from the agency’s early days in the 1950s up to the 1970s (with some minor redactions, of course).
The posters are a time capsule of Cold War era government secrecy culture, and they use every possible approach in the propaganda and advertising book to hammer home the need for security awareness. Posters from the 1950s heavily played on the threat of the Soviets to life, liberty, and religion—with a heavy emphasis on the role of Christianity in the lives of good, God-fearing Americans of the time. Others focused on patriotism and on the need to protect the American way of life.
But with the cultural changes of the 1960s and 1970s, things got a little… looser, as pop culture references started to seep into the security propaganda materials—along with occasional warnings about the counter-culture (such as “Don’t Blow Your Clearance on Drugs”). A Saturday Night Fever-themed poster, with an illustration of John Travolta that looks a bit more like a young Mitt Romney, is perhaps the high-water mark of the trend. While perhaps not as iconic as the World War II operational security poster “Loose Lips Might Sink Ships,” the “Security Fever—Catch It” poster is a lost classic.
The Washington Post is reporting on the release of a new White House cybersecurity report titled “Federal Cybersecurity Risk Determination Report and Action Plan” (I just submitted it to GPO as a fugitive document!). The report has some very disturbing results showing that federal agencies across the government are struggling to get secure. Read on.
The White House and the Department of Homeland Security have finished a governmentwide review examining the security of federal agencies, and the results aren’t pretty.
Dozens of federal agencies have cybersecurity programs that aren’t properly equipped to deal with cyber intrusions in their networks, according to a new report released by the White House Office of Management and Budget. Of the 96 federal agencies examined, a whopping 71 were relying on cybersecurity programs deemed “at risk or high risk.”
…The report found that 12 agencies had “high risk” programs, meaning key cybersecurity tools weren’t in place or weren’t deployed sufficiently. Fifty-nine agencies had “at risk” programs, meaning some of the right policies were in place but there were “significant gaps” in terms of security. OMB also noted that federal agencies lacked the visibility into their own networks that would help them detect attempts to steal data and respond to other cyber incidents.
Although the report doesn’t identify which agencies had cybersecurity problems, the scope of the issues described in the report makes it clear that both small and large agencies alike have a ton of work to do, said Stewart Baker, former assistant secretary for policy at DHS.
Here’s a a thought-provoking tweet forwarded to me by Jonathan Petters. Random twitter user Kenny Jacoby found a giant 1,200 page document that he wanted to use — not read! So what did he do? He banged on it for 8 hours in order to extract all the data from the PDF and convert it to a structured dataset. Good on him for doing that, but how many people have the skills and time to be able to do that?
And this, kind readers, is a perfect example of what we’ve been writing about here at FGI for some time. In the age of near-ubiquitous online access, it’s not enough for governments to publish PDFs, they need to provide more and better access for both humans and machines.
Information must be:
not just preserved, but discoverable [2.2.2]
not just discoverable, but deliverable [2.3.3]
not just deliverable as bits, but readable [2.2.1]
not just readable, but understandable [2.2.1]
not just understandable, but usable [22.214.171.124]
(*numbers in brackets refer to sections of the OAIS standard.)
This is a nut that our friends at the Congressional Data Coalition are trying to crack. And some federal agencies are wading into this space as well — see for example Data.gov. But there are still far too many examples of this data/publication divide. It’s going to take a concerted effort by the public, watchdog groups like Sunlight Foundation and OpenTheGovernment along with librarians to push for this change in the way we think about government information.
Spent about 8 hours writing and debugging code to scrape a hideous 1,200-page PDF into a structured dataset because a public agency refused to give up its raw data.
Don’t mess with me. pic.twitter.com/Eiz1SZl3Xx
— Kenny Jacoby (@kennyjacoby) May 28, 2018
the Congressional Budget Office (CBO) recently released its scoring or cost estimate of H.R. 5305, FDLP Modernization Act of 2018. CBO is required by law to provide a formal cost estimate for nearly every bill approved by Congressional committees to show how the bill would affect the Federal budget over the next five to 10 years, compared with what future spending or revenues would be under the current law.
CBO estimates that implementing H.R. 5305 would cost $13 million over the 2019-2023 period, assuming appropriation of the necessary funds. Further, CBO estimates that enacting H.R. 5305 would not increase net direct spending or on-budget deficits in any of the four consecutive 10-year periods beginning in 2029. The complete scoring report is available on FDLP.gov.
H.R. 5305 would amend the Federal Depository Library Program (FDLP), the part of the U.S. Government Publishing Office (GPO) that provides government publications to the public at no cost. Specifically, H.R. 5305 would ensure the continued availability of no-cost public access to government information in various formats, reform and modernize the FDLP, and authorize the activities of the Superintendent of Documents.
CBO estimates that implementing H.R. 5305 would cost $13 million over the 2019-2023 period, assuming appropriation of the necessary funds.
Enacting H.R. 5305 could affect direct spending by agencies that use fees, receipts from the sale of goods, and other collections to cover operating costs. The bill also could affect direct spending by allowing GPO to accept and retain gifts. Therefore, pay-as-you-go procedures apply. Because most of the affected agencies can adjust the amounts collected as their operating costs change, CBO estimates that any net changes in direct spending by agencies would be insignificant. CBO expects that gifts to GPO would be nonmonetary and thus have no effect on the budget. Enacting the bill would not affect revenues.
CBO estimates that enacting H.R. 5305 would not increase net direct spending or on-budget deficits in any of the four consecutive 10-year periods beginning in 2029.
H.R. 5305 contains no intergovernmental or private-sector mandates as defined in the Unfunded Mandates Reform Act.