Home » Posts tagged 'less_access'
Tag Archives: less_access
The staff of the House Select Subcommittee On The Coronavirus Crisis has issued a 15 page report that documents 47 separate instances of political interference with the federal response to the coronavirus crisis.
- Select Subcommittee Analysis Shows Pattern of Political Interference by the Trump Administration in Coronavirus Response Press Release (Oct 2, 2020).
Today’s staff analysis found at least 47 separate incidents of political interference in the Administration’s coronavirus response spanning from February through September 2020. These incidents have impacted every major facet of the Administration’s public health response and appear to be increasing in number and severity as the election draws near.
report [PDF, 15pp]:
- The Trump Administration’s Pattern Of Political Interference In The Nation’s Coronavirus Response, Select Subcommittee On The Coronavirus Crisis, Staff Analysis (Oct 1, 2020).
The analysis demonstrates that over the last eight months, the Administration engaged in a persistent pattern of political interference—repeatedly overruling and sidelining top scientists and undermining Americans’ health to advance the President’s partisan agenda.
The Administration’s interference has occurred both in public view and in private, led by President Trump, Vice President Pence, White House officials, and political appointees at the Department of Health and Human Services (HHS) and other agencies. The apparent goal of this unprecedented, coordinated attack on our nation’s public health agencies during the pandemic was, in the President’s words, to “play it down.”
File this under the law of unintended consequences. A California law passed in 2017 designed to make sure CA government agency websites were accessible under the Americans with Disabilities Act (ADA) has had an unintended negative effect on CA agency Websites. The law simply states:
11546.7. (a) Before July 1, 2019, and before July 1 biennially thereafter, the director of each state agency or state entity, as defined in subdivision (e) of Section 11546.1, and each chief information officer appointed under Section 11546.1, shall post on the home page of the state agency’s or state entity’s Internet Web site a signed certification from the state agency’s or state entity’s director and chief information officer that they have determined that the Internet Web site is in compliance with Sections 7405 and 11135, and the Web Content Accessibility Guidelines 2.0, or a subsequent version, published by the Web Accessibility Initiative of the World Wide Web Consortium at a minimum Level AA success criteria.
Sounds good right? But according to this Sacramento Bee article “Documents vanish from CA websites as state applies ADA law” this has happened:
Dozens of wildfire reports disappeared from Cal Fire’s website as this year’s fire season began.
Thousands of water science reports vanished from the Department of Water Resources website.
More than 2 million documents, ranging from environmental impact reports to internal human resources guides, went missing from remote corners of Caltrans’ website.
The documents are disappearing from public view as California state departments work to comply with a 2017 law aimed at improving compliance with the Americans with Disabilities Act.
It seems that some CA departments are choosing to take down thousands of documents rather than make them machine-readable or otherwise accessible. I’m sure this negative press will spur the CA government to provide more funding to state agencies to update their Websites. But in the meantime, if you’re looking for something published by the CA government, check out the Archive of the California Government Domain, CA.gov.
This is yet another disturbing example of data loss documented by our friends at MuckRock. Evidently, a large amount of data from the Federal Energy Regulatory Commission (FERC) having to do with the infamous Enron Corporation has gone missing and even FERC staff do not know where it went.
How many examples will we need to post before libraries and archives get with the program and try and figure out ways to collect, archive, preserve and give access to born-digital information posted on .gov sites? And how does this particular example of data loss NOT happen again in the brave new world of open government data (aka H.R. 4174 the Foundations for Evidence-Based Policymaking Act of 2018 which was recently signed into law and described by Alex Howard)? If you’re as concerned as I am, you’ll contact FERC and request a copy of their data for your library.
Government investigations into California’s electricity shortage, ultimately determined to be caused by intentional market manipulations and capped retail electricity prices by the now infamous Enron Corporation, resulted in terabytes of information being collected by the Federal Energy Regulatory Commission. This included several extremely large databases, some of which had nearly 200 million rows of data, including Enron’s bidding and price processes, their trading and risk management systems, emails, audio recordings, and nearly 100,000 additional documents. That information has quietly disappeared, and not even its custodians seem to know why…
…While terabytes of information has disappeared, up to 4,516 documents remain available through a pair of predefined searches of FERC’s eLibrary. While FERC claims that they, not Lockheed Martin or CACI, do offer a trio of Enron datasets on CD, FERC has not responded to repeated requests for these datasets sent over the past two months.
Twitter and newspapers are buzzing with complaints about widespread problems with access to government information and data (see for example, Wall Street Journal (paywall 😐 ), ZDNet News, Pew Center, Washington Post, Scientific American, TheVerge, and FedScoop to name but a few).
Maybe when/if the government opens again, we should scrape the NIST and CSRC websites, put all those publications somewhere public. It’s worrying that *every single US cryptography standard* is now unavailable to practitioners.
— Matthew Green (@matthew_d_green) January 12, 2019
Matthew Green, a professor at Johns Hopkins, said “It’s worrying that every single US cryptography standard is now unavailable to practitioners.” He was responding to the fact that he could not get the documents he needed from the National Institute of Standards and Technology (NIST) or its branch, the Computer Security Resource Center (CSRC). The government shutdown is the direct cause of these problems.
Others who noticed the same problem started chiming in to the discussion Green started, noting that they couldn’t find the standards they needed in Google’s cache or the Wayback machine, either. Someone else suggested that “Such documents should be distributed to multiple free and public repositories” and said that “These documents are “Too important to have subject to a single point of failure.” Someone else said that he downloads personal copies of the documents he needs every month, but had missed one that he uses “somewhat often.” One lone voice wondered about “Federal Depository Libraries, of which I believe there is at least one in every state.” (James responded to that one, letting people know about the FDLP and End of Term crawl!)
There are at least two reasons why users cannot get the documents they need from government servers during the shutdown. In some cases, agencies have apparently shut off access to their documents. (This is the case for both NIST and CSRC.) In other cases, the security certificates of websites have expired — with no agency employees to renew them! — leaving whole websites either insecure or unavailable or both.
Regardless of who you (or your user communities) blame for the shutdown itself, this loss of access was entirely foreseeable and avoidable. It was foreseeable because it has happened before. It was avoidable because libraries can select, acquire, organize, and preserve these documents and provide access to them and services for them whether the government is open or shut-down.
Some libraries probably do have some of these documents. But too many libraries have chosen to adopt a new model of “services without collections.” GPO proudly promotes this model as “All or Mostly Online Federal Depository Libraries.” GPO itself is affected by this model. Almost 20% of the PURLs in CGP point to content on non-GPO government servers. So, even though GPO’s govinfo database and catalog of government publications (CGP) may still be up and running, during the shut-down GPO cannot ensure that all its “Permanent URLs” (PURLs) will work.
This no-collections-model means that libraries are too often choosing simply to point to collections over which they have no control — and we’ve known what happens “When we depend on pointing instead of collecting” for quite some time. When those collections go offline and users lose access, users begin to wonder why someone hasn’t foreseen this problem and put “all those publications somewhere public.”
The gap between what libraries could do to prevent the kind of loss of access the shutdown is causing and what they are doing is particularly notorious in the area of government information. Most federal government information is in the public domain and is available without technical or copyright restrictions or fees. There is nothing preventing libraries from building collections to support users except the will to do so.
Many library administrators are eager to proclaim that pointing to collections they do not control is the new role of libraries in the digital age. Those who promote this new model of services without collections then struggle to demonstrate the value of libraries to their user communities. This is difficult when those communities go directly to collections of information, bypassing libraries and, perhaps, wondering why libraries still exist at all.
This represents a failure by libraries to fulfill their role in society and in the digital information ecosystem.
When the shutdown ends, access will, presumably, be restored. In the wake of the many other problems caused by the shutdown (many of them immediate and even dangerous), this temporary loss of access to some government information may not seem pressing. But librarians should see this as another wake-up call. Hopefully, Depository Library Council’s recent recommendation regarding digital deposit will answer that call. Libraries should not focus on bemoaning the short-term problem. We should, instead, focus on making the next crisis impossible. We can do this by focusing on the long-term problems of digital collection development, preservation and access. The current crisis may be temporary, but when we rely only on the government to provide access to these important resources, access will remain vulnerable to the next crisis or misstep or conscious decision to cut off access. We need to recognize that government agencies do not always have the same priorities as our users.
Today, libraries cannot ensure long-term access to government information because they do not control it. But, if libraries select, acquire, organize, and preserve the government information that is vital to their user communities, then they can ensure long-term access to it. You will not have to persuade your users of the value of your library when you do what they value.
James A. Jacobs, University of California San Diego
James R. Jacobs, Stanford University
Steven Aftergood over at Federation of American Scientists’ Secrecy News project writes today that President Trump recently commented off-handedly that reports from the Department of Defense’ Inspector General should be private and not publicly accessible. It’s unclear if this off-the-cuff comment will lead to less public access to these important reports, but Aftergood notes that “secrecy in the Department of Defense has increased noticeably in the Trump Administration” but that the Pentagon still publishes a massive amount of information. What is clear is that this one small comment could have huge implications going forward from “For Official Use Only” markings to restrict access to information to perhaps an erosion of the FOIA process. This is certainly something to keep an eye on.
The recurring dispute over the appropriate degree of secrecy in the Department of Defense arose in a new form last week when President Trump said that certain audits and investigations that are performed by the DoD Inspector General should no longer be made public.
“We’re fighting wars, and they’re doing reports and releasing it to the public? Now, the public means the enemy,” the President said at a January 2 cabinet meeting. “The enemy reads those reports; they study every line of it. Those reports should be private reports. Let him do a report, but they should be private reports and be locked up.”
It is not clear what the President had in mind. Did he have reason to think that US military operations had been damaged by publication of Inspector General reports? Was he now directing the Secretary of Defense to classify such reports, regardless of their specific contents? Was he suggesting the need for a new exemption from the Freedom of Information Act to prevent their disclosure?
Or was this simply an expression of presidential pique with no practical consequence? Thus far, there has been no sign of any change to DoD publication policy in response to the President’s remarks.