news
NBC stupidly shutting down Breaking News app, service
NBC stupidly shutting down Breaking News app, service
The decision, as it often does in the media business, came down to revenue. "Unfortunately, despite its consumer appeal, Breaking News has not been able to generate enough revenue to sustain itself," Ascheim said in the letter supplied by NBC News. "We have therefore made the hard decision to close its operations so that we can re-invest that funding into NBC News’ core digital products to help us achieve our ambitious goals for those businesses."
This is short-sighted. Web-based news isn’t generating revenue? No shit. Breaking News has been a standard-bearer of confirm-before-publishing and still manages to be ahead of every other news outlet’s attempt at a breaking news product.
I’d spend $2.99/month on this thing to keep it alive. Let’s say 1/4 of its Twitter followers would do the same. That’s $84.6 million in revenue right there.
Would that be sustainable?

NSA tracking cellphone locations worldwide
NSA tracking cellphone locations worldwide
Barton Gellman and Ashkan Soltani, reporting at The Washington Post:
The NSA does not target Americans’ location data by design, but the agency acquires a substantial amount of information on the whereabouts of domestic cellphones “incidentally,” a legal term that connotes a foreseeable but not deliberate result.
Incidental indeed.
Judge calls Google book-scanning fair use
Judge calls Google book-scanning fair use
Great news for fair use doctrine, and a big win for word geeks.
Judge Denny Chin said much in his ruling granting Google’s motion for summary judgment, but this part stuck out to me:
Google Books permits humanities scholars to analyze massive amounts of data — the literary record created by a collection of tens of millions of books. Researchers can examine word frequencies, syntactic patterns, and thematic markers to consider how literary style has changed over time.
The decision is up on Scribd. I shall geek out further about it after I have a chance to read it through.
A new kind of freelance journalism
A new kind of freelance journalism
This is essentially journalism à la carte: Peter Jukes offered to continue live-tweeting the News of the World phone-hacking trial if the crowd would fund it. Interest was strong enough to do just that, and his Indiegogo funders ordered up some trial coverage, funded through Christmas.
He’s probably not the first and certainly not the last, but I predict this is just the beginning of a trend and this sort of thing will be far more common in the years to come.
Correction: This blog correctly uses the same title I gave this post to describe this long-form article. So, it’s not so new, after all.
NSA responds to “erroneous” data collection reports (full text)
The National Security Agency, in a mass email to press Oct. 31, presumably responding to a recent Washington Post report on the agency’s direct data monitoring of company’s like Google and Yahoo, goes all third-person self-referential on us:
What NSA does is collect the communications of targets of foreign intelligence value, irrespective of the provider that carries them. U.S. service provider communications make use of the same information super highways as a variety of other commercial service providers. NSA must understand and take that into account in order to eliminate information that is not related to foreign intelligence.
Read the rest of the statement:
STATEMENTOct. 31, 2013
Recent press articles on NSA’s collection operations conducted under Executive Order 12333 have misstated facts, mischaracterized NSA’s activities, and drawn erroneous inferences about those operations. NSA conducts all of its activities in accordance with applicable laws, regulations, and policies – and assertions to the contrary do a grave disservice to the nation, its allies and partners, and the men and women who make up the National Security Agency.
All NSA intelligence activities start with a validated foreign intelligence requirement, initiated by one or more Executive Branch intelligence consumers, and are run through a process managed by the Office of the Director of National Intelligence. When those requirements are received by NSA, analysts look at the Information Need and determine the best way to satisfy it. That process involves identifying the foreign entities that have the information, researching how they communicate, and determining how best to access those communications in order to get the foreign intelligence information. The analysts identify selectors – e-mail addresses and phone numbers are examples – that help isolate the communications of the foreign entity and task those to collection systems. In those cases where there are not specific selectors available, the analysts will use metadata, similar to the address on the outside of an envelope, to attempt to develop selectors for their targets. Once they have them, they task the selectors to the collection systems in order to get access to the content, similar to the letter inside the envelope.
The collection systems target communications links that contain the selectors, or are to and from areas likely to contain the selectors, of foreign intelligence interest. Seventy years ago, the communications links were shortwave radio transmissions between two points on the globe. Today’s communications flow over technologies like satellite links, microwave towers, and fiber optic cables. Terrorists, weapons proliferators, and other valid foreign intelligence targets make use of commercial infrastructure and services. When a validated foreign intelligence target uses one of those means to send or receive their communications, we work to find, collect, and report on the communication. Our focus is on targeting the communications of those targets, not on collecting and exploiting a class of communications or services that would sweep up communications that are not of bona fide foreign intelligence interest to us.
What NSA does is collect the communications of targets of foreign intelligence value, irrespective of the provider that carries them. U.S. service provider communications make use of the same information super highways as a variety of other commercial service providers. NSA must understand and take that into account in order to eliminate information that is not related to foreign intelligence.
NSA works with a number of partners and allies in meeting its foreign-intelligence mission goals, and in every case those operations comply with U.S. law and with the applicable laws under which those partners and allies operate. A key part of the protections that are provided to both U.S. persons and citizens of other countries is the requirement that information be in support of a valid foreign intelligence requirement, and the Attorney General-approved minimization procedures. These limitations protect the privacy of all people and, in particular, to any incidentally acquired communications of U.S. persons. The protections are applied when selectors are tasked to the collection system; when the collection itself occurs; when the collected data are being processed, evaluated, analyzed, and put into a database; and when any reporting of the foreign intelligence is being done. In addition, NSA is very motivated and actively works to remove as much extraneous data as early in the process as possible – to include data of innocent foreign citizens.
—NSA Public Affairs Office
FBI asks DOJ to investigate source of Calderon leak to Al Jazeera
FBI asks DOJ to investigate source of Calderon leak to Al Jazeera
It could be that I’m new to the journalism industry and only recently interested in its developments. But it seems to me as if journalism and law are converging like never before, and on an international stage.
While Al Jazeera America is unlikely to face direct legal action, the American arm of the Qatari news network only launched in August 2013. It’s new, and if its current sources face investigation and potential federal charges, prospective sources may decide not to become sources at all.
States cite lack of federal progress in pursuit of privacy reform
States cite lack of federal progress in pursuit of privacy reform
Special interest groups oppose federal privacy reform to prevent onerous new regulations.
But this effort must, at some point, become counterproductive.
A multitude of state-specific privacy frameworks that, by (federal) law, can’t operate between states, must, at some point, become at least as onerous as new federal regulations.
Liberals, Tea Partiers unite to protest NSA in DC
Liberals, Tea Partiers unite to protest NSA in DC
The march attracted protesters from both ends of the political spectrum as liberal privacy advocates walked alongside members of the conservative Tea Party movement in opposition to what they say is unlawful government spying on Americans.
What a weird image.
Reuters nixes Next: Failed redesigns and the challenge of expanding a digital audience
Reuters nixes Next: Failed redesigns and the challenge of expanding a digital audience
That’s a shame. This image alone illustrates the design strides made by the Next team (the cancelled redesign is on the right).
The Reuters iOS app is better than that of Associated Press, for what it’s worth.