tag:blogger.com,1999:blog-109395122024-03-07T15:00:04.530-08:00augmentationTracking the politics of infotech, promoting its use in political scholarship and civic engagement.Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.comBlogger845125tag:blogger.com,1999:blog-10939512.post-80052285466642854282011-02-11T10:01:00.000-08:002011-02-11T10:06:07.480-08:00Dirty Tricks, Cyber-style<a href="http://thinkprogress.org/2011/02/10/lobbyists-chamberleaks/">ThinkProgress</a> is reporting that the law firm of the US Chamber of Commerce (an NGO) hired several cyber-security firms to help them sabotage their political opponents:<br />
<blockquote>"[A] law firm representing the US Chamber of Commerce ... is working with set of “private security” companies and lobbying firms to undermine their political opponents ... with a surreptitious sabotage campaign." <br />
"According to e-mails ... the Chamber hired the lobbying firm Hunton and Williams [whose] attorney Richard Wyatt ... was <a href="http://www.huffingtonpost.com/2010/10/19/chamber-of-commerce-still_n_768076.html">hired</a> by the Chamber in October of last year. To assist the Chamber, Wyatt and his <a href="http://images2.americanprogress.org/ThinkProgress/johnwoodsagreeingthemis.PNG">associates</a>, John Woods and Bob Quackenboss, solicited a set of private security firms — <a href="http://blogs.forbes.com/parmyolson/2011/02/11/anonymous-ready-to-dump-more-hbgary-e-mails-launch-anonleaks/">HB Gary Federal</a>, Palantir, and Berico Technologies (collectively called <a href="http://images2.americanprogress.org/ThinkProgress/ProposalForTheChamber.pdf">Team Themis</a>) — to develop tactics for damaging progressive groups and labor unions, in particular ThinkProgress, the labor coalition called Change to Win, the SEIU, US Chamber Watch, and StopTheChamber.com." </blockquote>This sabotage campaign included feeding false information to discredit opponents, but also spying on the personal lives of opponents and their families:<br />
<blockquote>"New emails reveal that the private spy company investigated the families and children of the Chamber’s political opponents. The apparent spearhead of this project was Aaron Barr, an executive at HB Gary. Barr circulated numerous emails and documents detailing information about political opponents’ children, spouses, and personal lives. One of the targets was Mike Gehrke, a former staffer with Change to Win. Among the information circulated about Gehrke was the specific “Jewish church” he attended and a link to pictures of his wife and two children ..."</blockquote>Given how <a href="http://augmentation.blogspot.com/2009/12/palantir-relational-profiling.html">amazing their software is</a>, I'm a bit bummed that <a href="http://blogs.forbes.com/andygreenberg/2011/02/11/palantir-apologizes-for-wikileaks-attack-proposal-cuts-ties-with-hbgary/">Palantir was involved in this</a>.Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com3tag:blogger.com,1999:blog-10939512.post-4951670610967025682011-02-10T11:35:00.000-08:002011-02-10T11:54:36.557-08:00"Night Dragon" stalks big oilAccording to a <a href="http://www.mcafee.com/us/resources/white-papers/wp-global-energy-cyberattacks-night-dragon.pdf">new report by McAfee</a> (pdf):<br />
<blockquote>"Attackers using several locations in China have [waged] attacks against global oil, gas, and petrochemical companies, as well as individuals and executives in Kazakhstan, Taiwan, Greece, and the US to acquire proprietary and highly confidential information."</blockquote>These attacks (nicknamed "<a href="http://www.wirelessweek.com/News/Feeds/2011/02/wireless-focused-attacks-are-here-to-stay-night-dragon-b/">Night Dragon</a>" by McAfee analysts) include social engineering, shrink-wrapped toolkits, and a handful of IE exploits. Hackers have been able to access sensitive data, both business-related and personal.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqdlB3PKmuHcPv4x6VNWo2VyQ5ij32tGaX8NeYW_YTxHBOikptXo_cZvSZEGWp37ssvlos2V4OzbIDYLQJjjpn-XG7mD_PWaUUTxFZ78YpoMS7YsjOrBc1o23mWJZFze7cv8dp/s1600/McAfee.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="248" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEiqdlB3PKmuHcPv4x6VNWo2VyQ5ij32tGaX8NeYW_YTxHBOikptXo_cZvSZEGWp37ssvlos2V4OzbIDYLQJjjpn-XG7mD_PWaUUTxFZ78YpoMS7YsjOrBc1o23mWJZFze7cv8dp/s400/McAfee.png" width="400" /></a></div><br />
McAfee is calling 2010 a watershed year for computer security, at which hacking evolved from dangerous nuisance (e.g., <a href="http://en.wikipedia.org/wiki/Code_Red_%28computer_worm%29">Code Red</a>, <a href="http://en.wikipedia.org/wiki/Sasser_%28computer_worm%29">Sasser</a>, <a href="http://en.wikipedia.org/wiki/Conficker">Conficker</a>) to genuine threat (e.g., <a href="http://en.wikipedia.org/wiki/Stuxnet">Stuxnet</a>). For a long time, hacking was brushed off as vandalism and petty crime. As critical systems discover the magnitude of their vulnerability, computing security is rapidly becoming <a href="http://www.us-cert.gov/">part of national security</a>.Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-48390228970814370402011-02-01T12:31:00.000-08:002011-02-01T12:33:38.805-08:00Internet 'kill switches'Shutting off the Egyptian Internet has (finally) drawn attention to a US Senate bill that seeks to permit the same sort of thing here. <a href="http://news.cnet.com/8301-31921_3-20030173-281.html?tag=nl.e703">CNET</a> has a nice summary:<br />
<blockquote>In December, a Senate committee approved a bill <a href="http://news.cnet.com/8301-13578_3-20007418-38.html">introduced last summer</a> and scheduled to be re-introduced soon, by senators Lieberman (I-CT) and Collins (R-ME) [with the support of at least some Democrats], which would [give American presidents] power over privately-owned computer systems during a "<a href="http://www.opencongress.org/articles/view/1917-Lieberman-Cybersecurity-Bill-Would-Give-DHS-Broad-Emergency-Powers-Over-the-Internet">national cyber emergency</a>." The latest public version includes controversial new language saying that the federal government's designation of vital Internet or other computer systems "shall not be subject to judicial review."</blockquote>Say it ain't so, Joe.Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-55784209427292158082011-01-30T23:55:00.000-08:002011-01-30T23:55:30.829-08:00Science enters the network ageWriting at <a href="http://seedmagazine.com/content/article/on_science_publishing/">SEED</a> magazine, John Wilbanks has drawn attention to the transformation currently taking place in academic publishing, namely the slow shift from paper to digital that is also gradually opening models of knowledge sharing in bold new ways.<br />
<blockquote>"Publishers like Hindawi and BioMed Central and the Public Library of Science use <a href="http://creativecommons.org/licenses/">Creative Commons copyright licenses</a> to grant all rights to their users to make and distribute copies, to remake and remix the knowledge, reserving only the mandate for attribution. ... This is how we maximize our societal investment in science: by making sure it can be read, understood, and used by the network culture."</blockquote>Imagine a world where scientific knowledge were not trapped <a href="http://books.google.com/googlebooks/agreement">behind proprietary walls</a>, where anyone could <a href="http://en.wikipedia.org/wiki/Open_research">access cutting-edge research</a>, participating according to their ability. Imagine how this might accelerate the pace of innovation and change, speed discovery of errors, and <a href="http://augmentation.blogspot.com/2007/06/peer-review-20.html">expand the community of scholars</a>.<br />
<a href="http://flowingdata.com/wp-content/uploads/2011/01/collabo_links-medium-900x450.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="200" src="http://flowingdata.com/wp-content/uploads/2011/01/collabo_links-medium-900x450.jpg" width="400" /></a><br />
<a href="http://collabo.olihb.com/">Imagine</a>.Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-26205434919674481532011-01-30T23:29:00.000-08:002011-01-30T23:30:42.614-08:00The Tweet of DamoclesClearly, social media are expanding dialogue throughout the world, and have the potential to radically reduce the costs of grassroots organizing. But they can also make it easy to track the words (if not deeds) of users, especially those naive enough to believe new media can somehow transcend traditional power politics. Writing for the <a href="http://www.nytimes.com/2011/01/30/weekinreview/30shane.html?_r=1">New York Times</a>, Scott Shane writes of how repressive governments are using social platforms like Facebook and Twitter to build profiles of dissidents, map the networks of their friends and allies, and to sow misinformation.<br />
<blockquote>"The Iranian police eagerly followed the electronic trails left by activists, which assisted them in making thousands of arrests in the crackdown that followed. The government even crowd-sourced its hunt for enemies, posting on the Web the photos of unidentified demonstrators and inviting Iranians to identify them."</blockquote>Of course, the ability to track the movement of memes through networks <a href="http://truthy.indiana.edu/">can also be used for good</a>. It's also likely that savvy users may always find <a href="https://blog.torproject.org/blog/recent-events-egypt">lower-risk ways to connect</a>. But there's a serious problem with assuming that any technology is an unqualified social good, or rather, that any technology is <a href="http://www.cyberdissidents.org/ourissues.html">beyond corruption</a>. While they may not have anticipated that the Mubarak government would completely quash the Egyptian Internet, organizers were well aware that both Facebook and Twitter could be used against them, and <a href="http://www.theatlantic.com/international/archive/2011/01/egyptian-activists-action-plan-translated/70388/">urged protesters to communicate by more direct means</a> (photocopies and faxes).<br />
<br />
The same tools that move us towards a <a href="http://www.worldofends.com/">world of ends</a> can also be used by those who desperately want to hold the center of that world. Mind the gap.Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-26005403923822273432011-01-28T12:54:00.000-08:002011-01-28T13:02:23.235-08:00How Egypt pulled the plugGigaOM has an interesting piece on <a href="http://gigaom.com/2011/01/28/how-egypt-switched-off-the-internet/">how Egypt Switched Off the Internet</a>.<br />
<blockquote>"Plenty of nations place limitations on communications, sometimes very severe ones. But there are only a few examples of regimes shutting down communications entirely — Burma’s military leaders notably <a href="http://www.technologyreview.com/web/19474/?a=f">cut connectivity during the protests of 2007</a>, and Nepal did a <a href="http://www.globalsecurity.org/military/world/war/nepal_insurgency-2005.htm">similar thing</a> after the king took control of the government in 2005 as part of his battle against insurgents. Local Chinese authorities have also conducted similar, short-lived blockades."</blockquote>That Egypt's Internet could be smothered so easily should be sobering for the "<a href="http://www.ted.com/talks/clay_shirky_how_cellphones_twitter_facebook_can_make_history.html">Internet will set us free</a>" crowd, but that news is still emerging shows that it's still not so easy to control the external message.<br />
<br />
Perhaps we'll ultimately see support for Keck and Sikkink's "<a href="http://www.amazon.com/dp/0801484561">boomerang effect</a>," but events in Egypt (and <a href="http://webography.wordpress.com/2010/03/07/authoritarian-regimes-coopting-the-internet/">Iran</a>) show how the power of social and mobile media to coordinate collective action at local levels can be blunted. Moreover, it shows why protest organizers should be prepared for the sudden loss of such tools.Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com1tag:blogger.com,1999:blog-10939512.post-60717952801229656722011-01-27T23:55:00.000-08:002011-01-28T00:38:54.305-08:00Egypt: 404<a href="http://news.cnet.com/8301-31921_3-20029862-281.html">CNET</a> and <a href="http://www.google.com/search?q=internet+egypt&hl=en&safe=off&client=firefox-a&hs=hT4&rlz=1R1GGLL_en___US364&prmd=ivnsu&source=univ&tbs=mbl:1&tbo=u&sa=X&ei=uHNCTYnzHoT4sAPu9pzqCg&ved=0CCEQ8QkoAzAA">many others</a> are reporting that all Internet traffic in Egypt has gone offline.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://i.i.com.com/cnwk.1d/i/tim/2011/01/27/5395027368_7d97b74c0b_b.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="197" src="http://i.i.com.com/cnwk.1d/i/tim/2011/01/27/5395027368_7d97b74c0b_b.jpg" width="400" /></a></div>I hadn't realized we would be importing the <a href="http://www.zdnet.co.uk/news/security/2011/01/25/us-internet-kill-switch-bill-to-return-40091536/">Internet kill switch</a>. Perhaps <a href="http://www.newyorker.com/reporting/2010/10/04/101004fa_fact_gladwell">Malcolm Gladwell</a> and <a href="http://www.amazon.com/o/ASIN/1586488740">Evgeny Morozov</a> are onto something?<br />
<br />
<span style="font-size: small;"><b>Addendum:</b> It appears that <a href="http://www.renesys.com/blog/2011/01/egypt-leaves-the-internet.shtml">the darkness is not (yet) total</a>.</span>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-70426169818064022752011-01-22T21:00:00.000-08:002011-01-22T21:00:59.700-08:00Sedition in a boxSymantec just released its <a href="http://www.symantec.com/business/theme.jsp?themeid=threatreport&om_ext_cid=biz_socmed_twitter_facebook_marketwire_linkedin_2011Jan_worldwide_attacktoolkits">Mid-Term Internet Security Threat Report</a>, and surprise, surprise - the Wild West is getting wilder. It used to be that knocking a server offline, or stealing confidential data took programming savvy. Not anymore.<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://www.symantec.com/en/us/enterprise/images/theme/b-thm-istr-timeline-1388x842.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="242" src="http://www.symantec.com/en/us/enterprise/images/theme/b-thm-istr-timeline-1388x842.jpg" width="400" /></a></div><br />
According to Symantec, the greatest threat to the Internet today are plug-and-play "<a href="http://www.symantec.com/tv/shows/details.jsp?vid=753424765001&subcategory=guide_to_scary_internet_stuff">Web Attack Toolkits</a>," which enable <a href="http://en.wikipedia.org/wiki/Script_kiddie">script kiddies</a> to roll with the big boys.Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-29046760374246282552011-01-11T20:49:00.000-08:002011-01-11T20:51:05.181-08:00Nerdcore could rise up<span style="font-size: small;">Estonia <a href="http://www.youtube.com/watch?v=j0JxrDTJHIc">could get elevated</a> - <a href="http://nationalcybersecurity.com/?p=46242">NCS is reporting</a> that the country has formed the Computer Emergency Response Team of Estonia (<a href="http://www.cert.ee/">CERT-E</a>, also known as the Cyber Defense League), a militia intended to protect the country should someone try to out-do the <a href="http://en.wikipedia.org/wiki/Cyberattacks_on_Estonia_2007">2007 attacks</a> on the country:</span><br />
<blockquote><span style="font-size: small;">"The league, made up of a group of Estonian programmers, computer scientists and software engineers would be the country’s main leg of defense in the event of a second cyberwar, but an all-volunteer unit may not pack enough nerdpower for confident security. Instead, Estonian officials are considering a draft among the country’s IT work force, Defense Minister Jaak Aaviksoo <a href="http://www.npr.org/2011/01/04/132634099/in-estonia-volunteer-cyber-army-defends-nation">told NPR this week</a>."</span></blockquote><blockquote><span style="font-size: small;">"We are thinking of introducing this conscript service, a cyber service,” Aaviksoo said. “This is an idea that we’ve been playing around [with]."</span></blockquote><span style="font-size: small;">Sort of like the <a href="http://www.youtube.com/watch?v=Upik6Va0xtk">Global Frequency</a>, but with uniforms.</span>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-67322675729991610912011-01-09T21:41:00.000-08:002011-01-09T21:46:01.496-08:00US strategy to prevent leaks, leaked<a href="http://www.techspot.com/news/41889-leaked-us-government-strategy-to-prevent-leaks.html">TechSpot News</a> is reporting that MSNBC has received a <a href="http://msnbcmedia.msn.com/i/msnbc/sections/news/OMB_Wiki_memo.pdf">memo detailing the US' government strategy to prevent leaks</a> in a "post-Wikileaks environment."<br />
<blockquote>Each initial assessment should be completed by January 28, 2011, and should include the following ... <br />
<ol><li>Assess what your agency has done or plans to do to address any perceived vulnerabilities, weaknesses, or gaps on automated systems ...</li>
<li>Assess weakness or gaps ... and formulate plans to resolve the issues or to shift or acquire resources to address those weaknesses or gaps.</li>
<li>Assess your agency's plans for changes and upgrades to current classified networks, systems, applications, databases, websites, and online collaboration environments as well as for all new classified networks, systems, applications, databases, websites or online collaboration environments that are in the planning, implementation, or testing phases ...</li>
<li>Assess all security, counterintelligence, and information assurance policy and regulatory documents that have been established by and for your department or agency.</li>
</ol></blockquote>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-52382400137639445932010-08-05T13:56:00.000-07:002010-08-05T13:56:46.297-07:00Censorship, Digg?Alternet has posted an article about an effort by self-identified conservatives to <a href="http://blogs.alternet.org/oleoleolson/2010/08/05/massive-censorship-of-digg-uncovered/">censor Digg rankings</a>. For those unfamiliar with <a href="http://digg.com/">Digg</a>, it's essentially a platform for crowd-sourced submission and ranking of websites and postings.<br />
<br />
A year-long investigation has uncovered a rather effective campaign to "bury" new submissions contrary to the agenda of these conservative activists. These "Digg Patriots" (there are several similar groups) gave such Diggs an avalanche of negative votes (thus elevating "conservative-supporting" posts), coordinating their attacks and using multiple account profiles.<br />
<br />
So much for the <a href="http://www.cnn.com/2008/TECH/08/26/newmark.democracy/index.html">inherent democracy</a> of the Interwebs.Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-72720140218436393972010-07-30T17:51:00.000-07:002010-07-30T17:51:41.529-07:00Secrets from the FutureWired is reporting on <a href="http://www.wired.com/dangerroom/2010/07/exclusive-google-cia/">public-private intelligence projects</a> which mine relational and other data from broad swaths of the Interwebs. Nothing terribly new here, but it's interesting seeing more approaches like this emerge. Here's an overview promo from one such company, <a href="http://blog.recordedfuture.com/2010/03/13/recorded-future-%E2%80%93-a-white-paper-on-temporal-analytics/">Recorded Future</a>: <br />
<br />
<div style="text-align: center;"><object height="280" width="450"><param name="movie" value="http://www.youtube.com/v/ImhVpC-G_jg&hl=en_US&fs=1"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/ImhVpC-G_jg&hl=en_US&fs=1" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="450" height="280"></embed></object></div><div style="text-align: center;"><br />
</div><div style="text-align: center;"><a href="http://www.youtube.com/watch?v=BA6kG-tOkBs">You can't hide from the future</a>.</div>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-67751882043778624332010-06-17T23:24:00.000-07:002010-06-17T23:24:08.440-07:00Senate partisan networks<object height="300" width="460"><param name="movie" value="http://www.youtube.com/v/c8I5iMa_VV0&hl=en_US&fs=1&rel=0&color1=0x402061&color2=0x9461ca"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/c8I5iMa_VV0&hl=en_US&fs=1&rel=0&color1=0x402061&color2=0x9461ca" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="460" height="300"></embed></object>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-29698194424384559932010-06-13T11:47:00.000-07:002010-06-13T11:47:36.393-07:00SNA in RLast summer, Drew Conway (NYU) gave an excellent introduction to using the igraph package for basic <a href="http://www.vcasmo.com/video/drewconway/7038">Social Network Analysis in R</a>:<br />
<object height="360" width="440"><param name="movie" value="http://www.vcasmo.com/swf/vcasmo.swf"></param><param name="flashvars" value="pid=7038"></param><param name="allowFullScreen" value="true"></param><param name="allowScriptAccess" value="always"></param><embed src="http://www.vcasmo.com/swf/vcasmo.swf" flashvars="pid=7038" allowfullscreen="true" allowscriptaccess="always" type="application/x-shockwave-flash" width="440" height="360"></embed></object>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-80261411519158730172010-06-13T11:44:00.000-07:002010-06-13T11:44:07.717-07:00Gephi GEXF<div class="separator" style="clear: both; text-align: left;">GEXF (<a href="http://gexf.net/">Graph Exchange XML Format</a>) is a network language that supports common formats such as <a href="http://gephi.org/users/supported-graph-formats/csv-format">CSV</a> | <a href="http://gephi.org/users/supported-graph-formats/ucinet-dl-format">UCINET</a> | <a href="http://gephi.org/users/supported-graph-formats/pajek-net-format">Pajek</a>, as well as a host of XML variants for network data<span style="font-size: small;">, including <a href="http://gexf.net/format/">GEXF</a> | <a href="http://gephi.org/users/supported-graph-formats/gml-format">GML</a> | <a href="http://gephi.org/users/supported-graph-formats/graphml-format">GraphML</a> | </span><a href="http://gephi.org/users/supported-graph-formats/xgmml-format/">XGMML</a>.</div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0OS68Ja4R7-cHUK3XlQ7XcZVPgmBQ2aRm6POwsmz2MfRvPUkEdENvtuSIQr8vfK-kaa1LEapxsqIXMjFs_2c5hi4hQwvOkKGo3oQ0sZc-ezdX38wnIzEhlULcbppmK9qbqAwR/s1600/GEPHI.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="222" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0OS68Ja4R7-cHUK3XlQ7XcZVPgmBQ2aRm6POwsmz2MfRvPUkEdENvtuSIQr8vfK-kaa1LEapxsqIXMjFs_2c5hi4hQwvOkKGo3oQ0sZc-ezdX38wnIzEhlULcbppmK9qbqAwR/s400/GEPHI.png" width="400" /></a></div><div style="font-family: inherit;"></div><div style="font-family: inherit; margin-bottom: 0.03in;"><div style="text-align: center;">It appears to offer the best of all worlds (h/t to Dr. Pangloss). </div><div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEg0OS68Ja4R7-cHUK3XlQ7XcZVPgmBQ2aRm6POwsmz2MfRvPUkEdENvtuSIQr8vfK-kaa1LEapxsqIXMjFs_2c5hi4hQwvOkKGo3oQ0sZc-ezdX38wnIzEhlULcbppmK9qbqAwR/s1600/GEPHI.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"></a></div></div>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-57495079773919738542010-06-03T09:35:00.000-07:002010-06-03T09:38:27.252-07:00PdF 2010 is NOW!<div style="font-family: inherit;"><span style="font-size: small;">If you are in NYC over the next two days (</span><span style="font-size: small;">June 3-4</span><span style="font-size: small;">) and have both time and interest (as well as the $500-600 registration fee), consider attending the sixth annual <a href="http://personaldemocracy.com/technology-politics-social-media-conference-personal-democracy-forum-new-york-0">Personal Democracy Forum</a> at CUNY.</span><br />
<span style="font-size: small;"><span style="font-size: xx-small;"> </span> </span></div><div style="font-family: inherit;"><span style="font-size: small;"><object height="275" width="460"><param name="movie" value="http://www.youtube.com/v/iVi0s9IlnAU&hl=en_US&fs=1&rel=0&color1=0x2b405b&color2=0x6b8ab6"></param><param name="allowFullScreen" value="true"></param><param name="allowscriptaccess" value="always"></param><embed src="http://www.youtube.com/v/iVi0s9IlnAU&hl=en_US&fs=1&rel=0&color1=0x2b405b&color2=0x6b8ab6" type="application/x-shockwave-flash" allowscriptaccess="always" allowfullscreen="true" width="460" height="275"></embed></object></span></div><div style="font-family: inherit;"><span style="font-size: small;"><span style="font-size: xx-small;"> </span> </span><br />
<span style="font-size: small;"><a href="http://personaldemocracy.com/">PDF</a> is the place to be if you're interested interrelations of informational technology and governance. Full schedule can be found <a href="http://personaldemocracy.com/pdf-2010-day-one-schedule-june-3rd">here</a>.</span></div>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-4324600258346544792010-06-02T19:16:00.000-07:002010-06-02T19:18:01.613-07:00Interwebs and regime change<div style="font-family: inherit;"><span style="font-size: small;"><a href="http://www.i-policy.org/2010/05/internet-isnt-the-agent-of-regime-change-some-hoped-for.html">Information Policy</a> has an interesting report on a presentation that <a href="http://evgenymorozov.com/blog">Evgeny Morozov</a> (Georgetown Institute for the Study of Diplomacy) gave at <a href="http://www.foreignpolicy.com/">Foreign Policy</a>'s Washington office:</span></div><blockquote style="color: #741b47; font-family: inherit;"><div style="line-height: 140%;"><span style="font-size: small;">"Authoritarian regimes have learned how to block certain computers from accessing the Web... The Internet is not the first free speech facilitator to fall short of expectations. ... Since the Cold War, Radio Free Europe/Radio Liberty, the US-funded broadcaster, has used shortwave frequencies to report news to countries that ban free press. But throughout history, oppressive regimes have countered with espionage and misinformation campaigns to discredit the broadcasts"</span></div></blockquote>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-61359529538033073062010-06-02T19:09:00.000-07:002010-06-02T19:09:52.725-07:00e-scholarship<a href="http://feedproxy.google.com/%7Er/Delicious/pescabicicleta/%7E3/Dj1IHMFyzHk/?utm_source=feedburner&utm_medium=email" name="2">The Rise of Crowd Science</a><br />
<div style="font-family: inherit; line-height: 140%;"><span style="color: black; font-size: small;">The Chronicle just posted an article on Big Data:</span></div><blockquote style="color: #741b47; font-family: inherit;"><div style="line-height: 140%;"><span style="font-size: small;">"Crowdsourcing is a natural solution to many of the problems that scientists are dealing with that involve massive amounts of data," says Haym Hirsh, director of the Division of Information and Intelligent Systems at the NSF. Findings have just grown too voluminous and complex for traditional methods, which consisted of storing numbers in spreadsheets to be read by one person, says Edward Lazowska, a computer scientist and director of the UW eScience Institute. So vast data-storage warehouses, accessible to many researchers, are going up in several scholarly fields to try to keep track of the wealth of information. Persuading scientists to fully embrace the age of big data, though, will require a change in academic reward structures to give new currency to papers with more authors than ever and to scientists who spend their careers crunching other peoples' numbers."</span></div></blockquote><div style="font-family: inherit; line-height: 140%;"></div><div style="font-family: inherit; margin-bottom: 0.03in;"><span style="font-size: small;"><a href="http://feedproxy.google.com/%7Er/Delicious/pescabicicleta/%7E3/vjUcl_sVvyI/?utm_source=feedburner&utm_medium=email" name="1">Computational humanities</a></span> </div><div style="font-family: inherit; line-height: 140%;"><span style="color: black; font-size: small;">... and yet another:</span></div><blockquote style="color: #741b47; font-family: inherit;"><div style="line-height: 140%;"><span style="font-size: small;">"Data-diggers are gunning to debunk old claims based on 'anecdotal' evidence and answer once-impossible questions about the evolution of ideas, language, and culture. ... Google has changed the landscape. Pouring hundreds of millions into digitization, the company did in a few years what Mr. Unsworth believes would have taken libraries decades: It has digitized over 12M books in over 300 languages, more than 10% of all books ever printed."</span></div><div style="line-height: 140%;"><span style="font-size: small;">"[Yet] some worry that the lure of money and technology will increasingly push computation front and center. ... whether transferring the lab model to a discipline like literary studies really works. Trumpener is dubious. Twenty postdocs carrying out one person's vision? She fears an "academia on autopilot," generating lots of research "without necessarily sharp critical intelligences guiding every phase of it."<img align="BOTTOM" border="0" height="2" name="graphics2" src="http://feeds.feedburner.com/%7Er/Delicious/pescabicicleta/%7E4/vjUcl_sVvyI?utm_source=feedburner&utm_medium=email" width="2" /></span></div></blockquote>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-78547199230768151182010-06-01T22:44:00.000-07:002010-06-01T22:44:12.932-07:00Citizen media and oil spills<div style="font-family: inherit;"><span style="font-size: small;"><a href="http://feedproxy.google.com/%7Er/Delicious/pescabicicleta/%7E3/8nZQQVBvRpU/?utm_source=feedburner&utm_medium=email">Oil Reporter</a> is an iPod app that lets locals help with the spill recovery effort by reporting what they see on the ground. </span></div><blockquote style="color: #741b47; font-family: inherit;"><span style="font-size: small;">"Users can upload photos and videos, reporting oil sighting, harmed wildlife sightings and much more.”</span></blockquote>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-10265468614264854962010-05-31T13:50:00.000-07:002010-05-31T13:50:10.556-07:00Biometrics in crowds<span style="font-size: small;"></span><div style="font-family: inherit;"><span style="font-size: small;"><a href="http://www.wired.com/dangerroom/2010/05/darpas-beady-eyed-camera-spots-the-non-cooperative">Wired is reporting</a> on Smart-Iris, a <a href="http://en.wikipedia.org/wiki/DARPA">DARPA</a>-funded device that (inventor Marc Christensen et al. claim) can zero in on individual irises in a moving crowd, regardless of angle:</span></div><blockquote style="color: #741b47; font-family: inherit;"><span style="font-size: small;">"A long line of people, moving through a line, could be scanned by wall-mounted cameras and they wouldn’t even notice it was happening ... new algorithms are being developed ... to identify individuals based on segments of their iris, rather than a full frontal scan."</span></blockquote>Seems <a href="http://www.youtube.com/watch?v=oBaiKsYUdvg">Tom Cruise</a> might not be quite <a href="http://www.youtube.com/watch?v=pRvm0PfayR8">so crazy</a>, after all.Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-16771437762581821592010-05-31T10:28:00.000-07:002010-05-31T14:47:16.025-07:00The Physics of DataIf you have time, I recommend watching Marissa Mayer's <a href="http://www.parc.com/event/936/innovation-at-google.html">presentation at the </a><a href="http://www.parc.com/event/936/innovation-at-google.html">Palo Alto Research Center</a> (PARC) last Fall. She shows how Google is connecting social data (e.g., search queries) with more tangible ("meatspace") data to create <a href="http://www.cidrap.umn.edu/cidrap/content/influenza/panflu/news/nov1308google-jw.html">predictive models</a> that are ... well, predictive. Also significant (especially in the light of ...) are Google's efforts to expose data in ways that are more dynamic, such as <a href="http://tables.googlelabs.com/public/tour/tour1.html">Fusion Tables</a> and <a href="http://www.google.com/publicdata/home">Public Data Explorer</a> (or even within basic <a href="http://www.google.com/search?hl=&q=us+unemployment+rate&sourceid=navclient-ff&rlz=1B3GGLL_enUS364US364&ie=UTF-8&aq=0&oq=us+unempl">search results</a> - click through for more features).<br />
<br />
Imagine where we'll be once scholars (of all persuasions) start making their data public and using tools designed for <a href="http://www.springerlink.com/content/8r45162q35401816/">collaborative, cumulative research</a>. Personally, I'm imagining something like a mash-up between an online <a href="http://www.provalisresearch.com/">Provalis suite</a>, <a href="http://www.google.com/publicdata/home">Public Data Explorer</a>, and the steadily expanding universe of online data and commentary.Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-88971640014196634572010-05-31T01:40:00.000-07:002010-05-31T01:46:52.570-07:00Mobile phones, citizen media<div style="font-family: inherit;"><span style="font-size: small;">The <a href="http://summit2010.globalvoicesonline.org/">Global Voices Citizen Media Summit 2010</a> was held this May 6-7 in Santiago, Chile. <a href="http://mobileactive.org/">MobileActive.org</a> was there, and has an interesting write-up:</span></div><blockquote style="color: #741b47; font-family: inherit;"><span style="font-size: small;">"Mobile phones have already played a significant role in advancing citizen media around the world. They were instrumental in helping capture photos and videos on the streets of Tehran during 2009 protests that followed the elections there. A video captured during that time even won a prestigious journalism award. ... at least three distinctive advantages mobile phones have over traditional multimedia capturing devices: (1) they are always in our pockets and therefore always accessible (2) when there is a data connection, they allow instant uploading and live coverage and (3) they allow reporters to capture multimedia in more situations, by being lighter to transport, and appearing more innocuous in situations like protests."</span></blockquote>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-31257136948339497252010-05-30T17:54:00.000-07:002010-05-30T17:55:30.152-07:00NodeXL: SNA for Excel<div style="font-family: inherit;"><span style="font-size: small;"><a href="http://nodexl.codeplex.com/">NodeXL</a> is an Excel template that supports network visualization. It's about time (why hasn't MS already made SNA a central feature?).</span></div><div class="separator" style="clear: both; font-family: inherit; text-align: center;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1mw-cEbVzp-UML5je_IBjVTrBbD9IxjVzf_2eUrqq5BsMrN6W_-Gx3s5fYr2qdDXZQBrySjbRWZgUBPxxzEO_6SzDxZL921K5irlaklH90WtIB-36XAlAdOAEXrj7G5YZsw8e/s1600/NoAttributes.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEh1mw-cEbVzp-UML5je_IBjVTrBbD9IxjVzf_2eUrqq5BsMrN6W_-Gx3s5fYr2qdDXZQBrySjbRWZgUBPxxzEO_6SzDxZL921K5irlaklH90WtIB-36XAlAdOAEXrj7G5YZsw8e/s400/NoAttributes.png" width="400" /></a></span></div><div style="font-family: inherit;"><span style="font-size: small;">Anyway, the template offers full network/graph customization, dynamic filtering, ability to calculate basic network metrics, as well as the ability to directly import networks from email and popular social network sites.</span></div>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-18244226988259590322010-05-29T18:25:00.000-07:002010-05-29T18:27:54.160-07:00Geodata clearing house<div style="font-family: inherit; margin-bottom: 0.03in;"><span style="color: black; font-size: small;">"[G]eospatial data are critically important for disaster response, protecting the environment, and many other challenges. But much of this information is in danger of being lost due to evolving technology and other threats."</span></div><div class="separator" style="clear: both; font-family: inherit; text-align: center;"><span style="font-size: small;"><a href="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0aeqeL9HBKSurvDms84DgJOysljmf8Q10B5HAltdIoraERmrj5CIfND3N5Lgq-M1i75DRHHlc4uCM39v24mpNANCdF9fax2McDbfhzz93kIlWeMCfItIVzYifXYs1HqHvaHW6/s1600/clipart-gis.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="400" src="https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEj0aeqeL9HBKSurvDms84DgJOysljmf8Q10B5HAltdIoraERmrj5CIfND3N5Lgq-M1i75DRHHlc4uCM39v24mpNANCdF9fax2McDbfhzz93kIlWeMCfItIVzYifXYs1HqHvaHW6/s400/clipart-gis.gif" width="358" /></a></span></div><div style="font-family: inherit; margin-bottom: 0.03in;"><span style="color: black; font-size: small;">"The <a href="http://www.loc.gov/today/pr/2010/10-133.html">National Digital Information Infrastructure and Preservation Program</a> will fund development of a CIESIN clearinghouse at Columbia's Earth Institute ... These electronic resources are essential to research, education, and sustainable development and only grow more valuable over time."</span></div>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0tag:blogger.com,1999:blog-10939512.post-37328789149483262642010-05-28T15:35:00.000-07:002010-05-28T15:35:59.180-07:00Interesting links: 05.28.10<b><span style="font-size: small;"><a href="http://feedproxy.google.com/%7Er/Delicious/pescabicicleta/%7E3/1-D9j-DVr50/?utm_source=feedburner&utm_medium=email" name="1">Current: A News Project</a></span></b><br />
<div style="font-family: inherit; line-height: 140%;"><span style="color: black; font-size: small;">"Current shows a snapshot of what the entire internet-using population in America has been thinking for the last 24 hours, in the form of their collective search history.</span></div><div style="font-family: inherit; line-height: 140%;"><span style="color: black; font-size: small;"><img align="BOTTOM" border="0" height="2" name="graphics1" src="http://feeds.feedburner.com/%7Er/Delicious/pescabicicleta/%7E4/c56eCvNj0Bs?utm_source=feedburner&utm_medium=email" width="2" /></span></div><div style="font-family: inherit; margin-bottom: 0.03in;"><b><span style="font-size: small;"><a href="http://feedproxy.google.com/%7Er/Delicious/pescabicicleta/%7E3/qkCcvR2nMAg/?utm_source=feedburner&utm_medium=email" name="3">Primer on searching C-SPAN's Video dbase</a></span></b> </div><div style="font-family: inherit; line-height: 140%;"><span style="color: black; font-size: small;">["The] C-SPAN Video Library has placed a "how to" brief "how to" search video tutorial online offering a basic introduction to searching this content rich database with a lot of material that's difficult if not impossible to find anywhere else."</span></div>Ballardhttp://www.blogger.com/profile/01319346878358165365noreply@blogger.com0