Posts

Showing posts with the label tracking web users

Uncovering a mysterious blogger

This article on Streetsblog , a progressive pro-bicycle and transit website, is fascinating. The lengthy piece, worth reading in its entirety, explains how Streetsblog staff uncovered the identity of a hyperactive negative commenter with his own website, Commuter Outrage. Evidently the man behind Commuter Outrage, a twenty-something conservative who works in a civilian job at the Pentagon, was digging up material for his screeds during work hours using his employer's (and the government's) resources, and Streetsblog's questions about these practices quickly led the secretive fellow to disappear the entire Commuter Outrage website. Instructive were the easy-to-understand steps taken by Streetsblog staff to uncover the man's identity, along with evidence that suggested he was blogging on his employer's time. Also interesting was the fact that the attacks by Commuter Outrage and its putative staff (really just this one fellow, apparently) were not some right-wing consp...

Datamining your Twitter feed

Just as I predicted in How They Scored: Twitter is in advanced talks with Microsoft and Google separately about striking data-mining deals, in which the companies would license a full feed from the microblogging service that could then be integrated into the results of their competing search engines. -- Kara Swisher, All Things D

Authentication

Here's a nice discussion of authentication , an information technology concept I mention in "How They Scored," and its implications for online identity.

Why do people report on themselves?

Image
Not long after I started using Twitter, I started to wonder: Why? Imagine the familiar movie scenario where a detective is desperate to track and find a suspect, or where a detective is hired by a suspicious spouse to trail their errant husband or wife. Or an alternate scenario from the Cold War, where the secret police manipulate ordinary citizens to inform on one another (cf. the film The Lives of Others , pictured at left). Or the horrible situation of a controlling husband who wants to know where his wife is at every minute of the day. In those situations, one person wants to track another; the person who is tracked would rather not be tracked and sometimes would do anything to avoid it. Now consider yourself, or any ordinary bourgeois, and how much you are tracked on a daily (and sometimes minute-to-minute) basis. Credit card companies and credit reporting firms register every purchase you make with something other than cash. Airlines, grocery stores and other businesses with rew...

Assuming another identity

This story on wired.com , about the difficulty of losing your identity and taking up another, is something I wrote about in How They Scored. The characters are looking at the business possibilities of a proposed business named Dreedle, which would compile vast databases of consumer behavior; the narrator reflects on how such databases would make it difficult to disappear, as you used to be able to in the old days. There were plenty of things about me I didn't want rolled up into some online repository. One or two of these things I might confide to a lover -- that I liked to watch a certain kind of porn, for example (though I wasn't sure Meeghan was ready to know that). Another, less embarrassing detail I might write about on a blog -- my appreciation of the Giants infielders, say, or my enthusiasm for Russian composers. Other things I wouldn't mind mentioning in a phone call to my mother. But put them all together, combined with the records of everything I buy, books I rea...

'Privacy meltdown' feared from Google-DoubleClick merger

From an interview with a privacy expert on the Google-DoubleClick merger : There are two key elements to a profile. Most people tend to focus on the Big Brother data collection side, and that's simply taking information about a person from different aspects of their private life: their medical records, their financial records, where they go online, what they put in e-mail, who they call -- all that kind of information that can be put together to create a detailed profile of an individual. But the second part -- which I don't think people think about very much but in many respects is becoming more important -- is the algorithm that is put on top of that data and the decisions that are made [based on an analysis of the information]. That's actually an area that EPIC is spending a lot more time on these days, because if you look at such questions as which banner ads an Internet user sees when they visit a Web site, or whether an airline passenger is pulled aside for secondary ...