Bill Keller Doesn't Get Along Very Well with Reality

The following paragraph is one of the biggest howlers in the history of Ever:

Unless you’ve been bamboozled by the frantic fictions of the right wing, you know that the Affordable Care Act, familiarly known as Obamacare, has begun to accomplish its first goal: enrolling millions of uninsured Americans, many of whom have been living one medical emergency away from the poorhouse. You realize those computer failures that have hampered sign-ups in the early days — to the smug delight of the critics — confirm that there is enormous popular demand. You have probably figured out that the real mission of the Republican extortionists and their big-money backers was to scuttle the law before most Americans recognized it as a godsend and rendered it politically untouchable.

So presumably, this is one of the "frantic fictions of the right wing":

The federal health-care exchange that opened a dozen days ago is marred by snags beyond the widely publicized computer gridlock that has thwarted Americans trying to buy a health plan. Even when consumers have been able to sign up, insurers sometimes can’t tell who their new customers are because of a separate set of computer defects.

The problems stem from a feature of the online marketplace’s computer system that is designed to send each insurer a daily report listing people who have just enrolled. According to several insurance industry officials, the reports are sometimes confusing and duplicative. In some cases, they show — correctly or not — that the same person enrolled and canceled several times on a single day.

As, presumably, is this:

It's a batting average that won't land the federal marketplace for Obamacare into the Healthcare Hall of Fame.

As few as 1 in 100 applications on the federal exchange contains enough information to enroll the applicant in a plan, several insurance industry sources told CNBC on Friday. Some of the problems involve how the exchange's software collects and verifies an applicant's data.

"It is extraordinary that these systems weren't ready," said Sumit Nijhawan, CEO of Infogix, which handles data integrity issues for major insurers including WellPoint and Cigna, as well as multiple Blue Cross Blue Shield affiliates.

Experts said that if Healthcare.gov's success rate doesn't improve within the next month or so, federal officials could face a situation in January in which relatively large numbers of people believe they have coverage starting that month, but whose enrollment applications are have not been processed.

"It could be public relations nightmare," said Nijhawan. Insurers have told his company that just "1 in 100" enrollment applicants being sent from the federal marketplace have provided sufficient, verified information.

[. . .]

"It doesn't surprise me—I've heard similar numbers," said Dan Mendelson, CEO of consulting firm Avalere Health, when asked about the 1-in-100 rate that Infogix cited.

"This is not a traffic issue," Mendelson said. "Right now, the systems aren't working."

And this:

No one knows how many people have managed to enroll because the administration refuses to release those numbers, but the website's launch has been rocky.

Media outlets have struggled to find anyone who's actually been successful. The Washington Post even illustrated that sought-after person as a unicorn, and USA Today called the launch an "inexcusable mess" and a "nightmare."

White House officials initially blamed the problem on an unexpectedly high volume as they had more than 8 million hits in the first week, but after it went offline over the weekend for repairs, officials now acknowledge other problems.

"We've identified the glitches, we've added hardware, we're recoding software, and I can tell you today is better than yesterday, and we are hoping in the very near future to have a seamless process that's what we are aiming for," Health and Human Services Secretary Kathleen Sebelius said.

However, computer experts say the website has major flaws.

"It wasn't designed well, it wasn't implemented well, and it looks like nobody tested it," said Luke Chung, an online database programmer.

Chung supports the new health care law but said it was not the demand that is crashing the site. He thinks the entire website needs a complete overhaul.

"It's not even close. It's not even ready for beta testing for my book. I would be ashamed and embarrassed if my organization delivered something like that," he said.

Oh, and as for those "millions of uninsured Americans" that Keller tells us have been enrolled . . .

The glitch-plagued rollout of President Barack Obama's signature health care law has been dogged by one big question: How many people have enrolled in an insurance plan?

The White House refuses to release the numbers, leading many to assume they are embarrassingly low. But insurance industry insiders point to another reason: Nobody knows if the numbers they do have are even accurate.

Turns out, some insurance companies say they are receiving data from the administration that is incomplete, duplicative or contradictory, making it difficult to get an accurate count of new enrollment.

[. . .]

So far, the buzz in the insurance industry is that enrollment numbers are falling short of projections. One insurance company executive put it this way, "The numbers aren't as bad as the doomsday people would say. But so far, they're low and they have people worried."

Avik Roy has a theory for why the Obamacare website is crashing: He believes that it is because Team Obama doesn't want you to suffer sticker shock. I am sure that people like Bill Keller will try desperately to dismiss this as yet another "frantic fiction of the right wing," but given just how divorced Keller is from the facts, why should we take anything he has to say regarding this issue seriously? Either Bill Keller is one of the laziest and most inept intellects ever to try to find out and explain facts on Obamacare, or he is congenitally dishonest. He--and other Obamacare defenders--can feel free to take their pick as to which is the case.

Utterly Outrageous

Now, this is whistleblowing:

Security researchers tonight are poring over a piece of malicious software that takes advantage of a Firefox security vulnerability to identify some users of the privacy-protecting Tor anonymity network.

The malware showed up Sunday morning on multiple websites hosted by the anonymous hosting company Freedom Hosting. That would normally be considered a blatantly criminal “drive-by” hack attack, but nobody’s calling in the FBI this time. The FBI is the prime suspect.

“It just sends identifying information to some IP in Reston, Virginia,” says reverse-engineer Vlad Tsyrklevich. “It’s pretty clear that it’s FBI or it’s some other law enforcement agency that’s U.S.-based.”

If Tsrklevich and other researchers are right, the code is likely the first sample captured in the wild of the FBI’s “computer and internet protocol address verifier,” or CIPAV, the law enforcement spyware first reported by WIRED in 2007.

Court documents and FBI files released under the FOIA have described the CIPAV as software the FBI can deliver through a browser exploit to gather information from the target’s machine and send it to an FBI server in Virginia. The FBI has been using the CIPAV since 2002 against hackers, online sexual predators, extortionists, and others, primarily to identify suspects who are disguising their location using proxy servers or anonymity services, like Tor.

The code has been used sparingly in the past, which kept it from leaking out and being analyzed or added to anti-virus databases.

If the FBI is actually sending us malware, then someone has some 'splainin' to do, to say the least. Congressional hearings are in order, and the hearings ought to be public.

I Am Officially Smacked by Gob (Economic Development Administration Edition)

Your government at work:

The Economic Development Administration (EDA) is an agency in the Department of Commerce that promotes economic development in regions of the US suffering low growth, low employment, and other economic problems. In December 2011, the Department of Homeland Security notified both the EDA and the National Oceanic and Atmospheric Administration (NOAA) that there was a potential malware infection within the two agencies' systems.

The NOAA isolated and cleaned up the problem within a few weeks.

The EDA, however, responded by cutting its systems off from the rest of the world—disabling its enterprise e-mail system and leaving its regional offices no way of accessing centrally-held databases.

It then recruited in an outside security contractor to look for malware and provide assurances that not only were EDA's systems clean, but also that they were impregnable against malware. The contractor, after some initial false positives, declared the systems largely clean but was unable to provide this guarantee. Malware was found on six systems, but it was easily repaired by reimaging the affected machines.

EDA's CIO, fearing that the agency was under attack from a nation-state, insisted instead on a policy of physical destruction. The EDA destroyed not only (uninfected) desktop computers but also printers, cameras, keyboards, and even mice. The destruction only stopped—sparing $3 million of equipment—because the agency had run out of money to pay for destroying the hardware.

Oy. And also, vey.