George Lakoff on Obama’s mistake

George Lakoff is one of the most insightful writers on public discourse that I’ve read. Here’s an interesting post by him on why the Obama campaign has been wrong-footed recently by McCain.

I’ve been getting loads of email asking me to say something to the campaign. So with some hesitation and a great deal of respect, I will simply point out what I see.

Four years ago I wrote a book called, Don’t Think of an Elephant! The title made a basic point: Negating a frame activates that frame. If you activate the other side’s frame, you just help the other side, as Nixon found out when he said, “I am not a crook,” which made people think of him as a crook.

The Obama campaign just put out an ad called “No Maverick”. The basic idea was right. The Maverick Frame is central to the McCain campaign, and as the ad points out, it’s a lie. But negating the Maverick Frame just activates that frame and helps McCain. You have to substitute a different frame that characterizes McCain as he really is. There are various possibilities. Let’s consider one of them. Ninety percent of the time, McCain has been a Yes-Man for Bush. Think in terms of questions at a debate. If the question is, is McCain a maverick?, you are thinking about him as a maverick, even when you are trying to find ways in which he isn’t. McCain wins. If the question is whether McCain is a Yes-Man for Bush, you put McCain on the defensive. People think of him as a Yes-man 90 percent of the time, and try to think cases when he might not have been. This is not rocket science. It’s the first principle of framing.

The “No Maverick” ad also misses an opportunity. It correctly observes that McCain’s campaign is loaded with “lobbyists.” But most of the people the ad is trying to reach don’t know just what a “lobbyist” is. McCain is saying he is fighting against the Washington power structure. A lobbyist is a “member of the Washington power structure.” If you use such a phrase, you can point out that McCain campaign itself is part of the Washington power structure, the old-boy network…

A billion iPhone App Downloads?

From TechCrunch

There may only be over 12 million iPhones in the wild, but that hasn’t stopped iTunes users from downloading more than twice as many apps as songs during the store’s first two months of availability, according to a report.

Steve Jobs said at Apple’s press event last week that users have now downloaded over 100 million apps. Assuming it maintains the same rate of 70 million app downloads it witnessed in August alone, it could hit 1 billion apps by the end of the store’s first year of availability, sometime in 2009. iTunes song downloads didn’t hit the 1 billion mark until its second year of availability.

But in reality, 1 billion downloaded apps could happen much sooner than the middle of next year. As apps become a key selling point for Apple going forward and more iPhones and iPods get out into the wild, more users will find reason to download apps and in turn, increase the download rate…

Another confirmation of John Doerr’s investment acumen.

The benefits of assuming the worst

From Technology Review. What should banks and other ‘secure’ services do when dealing with customers who are incapable of keeping their machines free of malware?

“Our premise,” Ledingham says, “is that, rather than trying to clean up the machines, assume the machine is already infected and focus on protecting the transaction that goes on between the consumer and the enterprise website.”

The problem of malware on users’ computers is “the number-one problem that the financial institutions are wrestling with today,” says Forrester Research senior analyst Geoffrey Turner, an expert on online fraud. Financial institutions can take steps to secure the connections between their servers and their customers’ PCs, Turner says; they can even ensure the security of the customer’s Web browser. But they’re stumped, he says, when it comes to the customer’s operating system. Most successful attempts to steal computer users’ identities, Turner says, involve using malware to capture their credentials or conduct transactions behind the scenes without their knowledge. “The challenge is, how do you secure the end-user computer?” he says. “Should you even, as a bank, be trying to do that?”

Needless to say, his answer is “yes”. But then he runs SiteTrust, a tool recently released by a data-security company, Verdasys, which aims to protect users from fraud, even when their computers have been compromised.

Social malware

From Technology Review

Ever since Facebook opened its doors to third-party applications a year and a half ago, millions of users have employed miniature applications to play games, share movie and song recommendations, and even “zombie-bite” their friends. But as the popularity of third-party applications has grown, computer-security researchers have also begun worrying about ways that social-networking applications could be misused. The same thing that makes social networking such an effective way to distribute applications–deep access to a user’s networks of friends and acquaintances–could perhaps make it an ideal way to distribute malicious code…

Interesting article. I’ve been wondering about this ever since Facebook apps arrived.