On the hidden or out of the way yet sometimes thriving web forums

This is something I have noticed recently in several sites I visit frequently: there is a little community of consistent posters who have been drawn together and slowly get to know each other. While one of these sites, the Ask Amy column posted on the site of the Chicago Tribune, is not exactly hidden, The Economist discusses some web groups that have formed in really hard to find or unlikely places:

The programming crew had accidentally created a community of the sort that crop up all over the internet. Most online discussions take place in discussion forums designed to allow people to create an identity and interact in threaded, chronological conversations. But the hidden recesses of the web provide enough soil to root entire worlds, too. Wherever one person may post words which more than one other may read and respond to, a world is born.

Read the article to hear how devoted fans of Douglas Adams founded a group in a forum that was an afterthought and how some people unhappy with Sonic Drive-In’s service found each other.

Sounds like a start to a very interesting research study: what exactly motivates people to (1) seek out these spaces and (2) then continue with discussions and getting to know each other. The description of what happens in these settings in out of way parts of the Internet is hilarious:

It’s been thirteen years of hosting an accidental community. It’s somewhat like ignoring the vegetable drawer of your fridge for a year, then opening it to find a bunch of very grateful sentient tomatoes busily working on their third opera.

I would guess that the people who participate in groups like this are a limited number of total web users. I wouldn’t tend to be drawn to such forums: read a comment section of any blog or news story and you would likely find the conversation to be quite tedious or inflammatory. But I can remember the heady early days of AOL when chat rooms were the exciting feature of the Internet (and content took forever to load).

And these groups can be like real-life groups, meaning that they become territorial and protective:

Another surprise is that they will treat growth as a perturbation as well, and they will spontaneously erect barriers to that growth if they feel threatened by it. They will flame and troll and otherwise make it difficult for potential new members to join, and they will invent in-jokes and jargon that makes the conversation unintelligible to outsiders, as a way of raising the bar for membership.

It sounds like there is a starting period when the group might be somewhat fluid as people stumble unto such forums. But once the group coalesces and becomes a collective entity, others are not welcome and sharp boundaries are drawn to limit the influence of outsiders. So if one wants to become part of such a group, does one simply have to be lucky or have good timing?

Another question: what do the users get out of participating in such long digressions?

Found hypocrisy; still searching for clarity

In case you haven’t heard, a few days ago Google started publicly accusing Microsoft’s Bing of stealing its search results.  Juan Carlos Perez over at PCWorld has published an interesting roundup of reactions to Google’s new “strategy” of public accusations:

While the merits of Google’s accusation are up for debate — Microsoft denies the charge — the fact that Google chose to complain in such a loud and agitated manner has become fertile ground for analysis and comment by industry observers.

Opinions range from those who view Google’s actions as hypocritical to others who say the company did the right thing by airing its grievance.

PCWorld’s link to Daniel Eran Dilger reaction over at Roughly Drafted is especially worth checking out.  Personally, I come down on the “Google is being hypocritical” side of things.  It’s hard to have the expansive view of copyright law and fair use that Google embraces for its own activities and then to complain with any legitimacy about Microsoft’s alleged behavior.

Unfortunately, copyright law in general (and fair use in particular) is notoriously unclear, malleable, and subject to judicial whims.  It’s doubtful that Google will actually sue Microsoft over this, so we may never know what the “answer” is.

However, even if a U.S. court upheld Microsoft’s right to copy Google’s search results (assuming that’s what happened here), that would only give us an answer (1) on these specific facts (2) as between parties willing to litigate (and maybe even (3) before that particular judge).  Given the high costs of litigation, most non-Fortune-500 copyright users claiming fair use rights usually find it is in their best interest to settle for a few thousand dollars when saddled with a copyright infringement lawsuit.  Indeed, there are companies based on this very business model that are out there suing people; the number of copyright infringement suits is rising.

This latest spat between Google and Microsoft is, to some extent, a sideshow, but it does highlight some of the problems that uncertainty breeds within copyright law.  I’m not worried about Microsoft’s ability to defend itself:  it’s a multi-billion dollar company with lawyers and PR specialists both in-house and on speed dial.  I am worried about the start ups that are seeking to be the next Google or Microsoft:  they generally can’t afford to get anywhere close to the line because they know that an infringement lawsuit may mean millions in legal fees and damages, so they back off and play it safe.

That’s the real cost of un-clarity in copyright law.

How the John Edwards affair became news

How exactly certain scandals come to light when they do is often an interesting tale. The former editor of the National Enquirer explains how his investigative team put together the story of John Edwards’ affair. The tale involves the use of technology and a profiler who provided insights into how to trap Edwards in his lies:

I knew there was no viable scenario for Edwards to confess to the Enquirer. I faced the bitter realization that another news organization would reap the benefits of our team’s hard work and get the confession, but I also knew that ultimately that confession would validate the Enquirer‘s earlier story as well as the new one.

Behind the scenes we exerted pressure on Edwards, sending word though mutual contacts that we had photographed him throughout the night. We provided a few details about his movements to prove this was no bluff.

For 18 days we played this game, and as the standoff continued the Enquirer published a photograph of Edwards with the baby inside a room at the Beverly Hilton hotel.

Journalists asked if we had a hidden camera in the room. We never said yes or no. (We still haven’t). We sent word to Edwards privately that there were more photos.

He cracked. Not knowing what else the Enquirer possessed and faced with his world crumbling, Edwards, as the profiler predicted, came forward to partially confess. He knew no one could prove paternity so he admitted the affair but denied being the father of Hunter’s baby, once again taking control of the situation.

Perhaps this story isn’t anything unusual – technology makes information gathering a lot easier. Yet it is somewhat shocking to me that plenty of powerful people, like John Edwards or Tiger Woods, think that they can get away with things in the long run. Sure, the National Enquirer had to spend months tracking down this story but in the end, it was doable and effectively changed the public perception of John Edwards forever. Is there something that happens when people are put in powerful positions that changes their perceptions of what they can and can’t get away with?

Is it even possible for the powerful to get away with things like this any more? How many “scandals” are lurking out there somewhere? It is certainly a far cry from the days of the 1950s and before when sportwriters routinely shied away from reporting on what athletes did away from home and political reporters didn’t talk about everything.

The land of 100,000 lawsuits

Some enterprising anonymous researcher has determined that almost 100,000 copyright infringement lawsuits have been filed in the U.S. in the past year:

In the United States the judicial system is currently being overloaded with new cases, but the scope of the issue was never really clear until now. An anonymous TorrentFreak reader has spent months compiling a complete overview of all the mass P2P lawsuits that have been filed in the US since the beginning of 2010, listing all the relevant case documents and people involved in a giant spreadsheet.

The research shows that between 8th January 2010 and 21st January 2011, a total of 99,924 individuals have been sued. The vast majority of the defendants have allegedly used BitTorrent to share copyrighted works but a few hundred ed2k users are also included.

Of the 80 cases that were filed originally, 68 are still active, with 70,914 defendants still in jeopardy.

The raw data is available is spreadsheet form over on Google Docs.

As the disparity between 80 and 70,914 indicates, these types of lawsuits completely overwhelm the courts.  The U.S. justice system is simply not set up to handle this kind of volume, especially for suits as notoriously tricky to argue as copyright infringement.

Find (if ye know how to seek)

It’s a few days old now, but I just ran across a post over on TorrentFreak describing how Google has started removing “torrent”-related results from its auto-complete search results:

Without a public notice Google has compiled a seemingly arbitrary list of keywords for which auto-complete is no longer available. Although the impact of this decision does not currently affect full search results, it does send out a strong signal that Google is willing to censor its services proactively, and to an extent that is far greater than many expected.

Among the list of forbidden keywords are “uTorrent”, a hugely popular piece of entirely legal software and “BitTorrent”, a file transfer protocol and the name of San Fransisco based company BitTorrent Inc. As of today [1/26/2011], these keywords will no longer be suggested by Google when you type in the first letter, nor will they show up in Google Instant.

All combinations of the word “torrent” are also completely banned. This means that “Ubuntu torrent” will not be suggested as a user types in Ubuntu, and the same happens to every other combination ending in the word torrent. This of course includes the titles of popular films and music albums, which is the purpose of Google’s banlist.

This is quite an interesting development.  Personally, I have found Google’s auto-complete functionality very helpful in finding the names of half-remembered items.  It is a disturbing reminder of just how much control Google exerts–not only over what we find, but over what we search for.

Vast worlds of discovery

In case you thought the age of discovery was over, Wired’s Threat Level blog is reporting that a 21-year-old hacker George Hotz who released the PlayStation 3 jailbreak has been ordered to surrender

any and all computer hardware and peripherals containing circumvention devices, technologies, programs, parts thereof, or other unlawful material, including but not limited to code and software, hard disc drives, computer software, inventory of CD-ROMS, computer diskettes, or other material containing circumvention devices, technologies, programs, parts thereof, or other unlawful material.

As Hotz lawyer put it,

The information sought at issue [the jailbreak code] is less than 100 kilobytes of data. Mr. Hotz has terabytes of storage devices….Impounding his computers, it’s like starting a forest fire to cut down a single tree.

Though the court’s order does seem like overkill, it is unfortunately a typically broad discovery request.  Sony may simply be trying to harass Hotz and/or hamper any future work, a theory especially plausible insofar as the court also ordered that Hotz “shall retrieve” the jailbreak he posted.  Given the number of websites that have re-posted Hotz’s original code, this would seem to be impossible.  As Hotz’s lawyer rather cogently quipped, ““Mr. Hotz can’t retrieve the internet.”

Wired has posted the judge’s order here (PDF).

More info on how Internet helped movement in Tunisia

There have been a number of news stories that have suggested that the Internet played a role in the recent political movement in Tunisia that ousted the government. In an interview with Wired, the director of the Tunisian Internet Agency (ATI) gives more information about what happened:

During its 15-year existence, the ATI had a reputation for censoring the internet and hacking into people’s personal e-mail accounts. All Tunisian ISPs and e-mail flowed through its offices before being released on the internet, and anything that the Ben Ali dictatorship didn’t like didn’t see the light of day…

The revolution began Dec. 17 in the central Tunisian town of Sidi Bouzid, when 26-year-old fruit vendor Mohammed Bouazizi set himself on fire to protest the humiliating tactics of local officials. The suicide jolted Tunisians. They began to protest in the streets — and clash with police.

Around 100 people died throughout the country. The media, controlled by Ben Ali’s advisers, reported only that criminals were looting.

But videos of the protests, riot police and their victims appeared on Facebook, and bloggers began reporting the daily events with first-hand accounts, photographs and videos. This information helped drive the uprising, and the government responded by allegedly hijacking Tunisian Facebook passwords.

At the same time, hackers began to attack the Tunisian government’s control over the internet. They bombed the ATI’s DNS and website, and tried to bomb the e-mail centipede gateway. The National Computer Security Agency — which fights hacking, phishing, viruses and fraud — took on the activists who tried to overload government websites with distributed denial-of-service attacks.

“When the hackers did DDOS they did a good job, and Anonymous did a good job,” Saadaoui says, smiling. “But not on everything. They weren’t able to take down the DNS, they weren’t able to take down the main servers or the network, but they were able to DDOS websites. They were able to bomb Ben Ali’s website.”

And there is some interesting talk about the future of the Internet in Tunisia: completely open or will the government still have some control in order to block sites that go against conservative Islamic teachings?

So it sounds like the Internet was used in two ways by those in the revolutionary movement:

1. The spreading of information through sites like Facebook. This would help keep people coordinated as well as alert the outside world to what was happening.

2. A number of hackers took the opportunity to attack the government’s Internet infrastructure. They had some success though they couldn’t bring the whole system down.

Is this the way future social movements will happen: through quick information spreading (Facebook, Twitter, whatever comes next) plus hackers trying to disrupt government activity? It would be interesting to know more about these hackers: have they attacked the government before, were they just waiting for an opportunity like this, were they coordinating their actions with those of protesters on the street?

Tactics of Egyptian protesters in a pamphlet

News from Egypt is trickling out. The Atlantic has translated part of a pamphlet that supposedly was distributed to protesters in recent days. While it is unclear how many protesters might have these, it is an interesting look into the tactics of protests and social movements.

Some thoughts:

1. There is information here on the broader goals of the movement plus more specific information about how to combat riot police. The end goal of the protests is to take over government buildings.

2. The final translated portion has some warnings about not letting the pamphlet fall into the wrong hands, particularly not posting it on the Internet or sharing it through Twitter. (Since the Internet has been shut down in Egypt, this may not be an issue now.)

2a. Could we get to a point where Internet usage is considered a human right? Should governments be able to ever shut it down or restrict access?

2b. If The Atlantic can get its hands on this, surely the Egyptian government already has.

3. This pamphlet must have taken some time to put together. Where did it come from and who put the time into it? This suggests people were preparing for this moment.

4. It must have been an interesting editorial discussion regarding which portions of this to translate in order “to balance the historic nature of the document and protest with the safety of protesters. Publishing this excerpt was the compromise at which we arrived.”

Considering what the “green Loop” might look like

Amidst talk of eco-cities, a Chicago architectural firm has put together a plan to reduce carbon emissions by 80 percent within Chicago’s Loop. How to accomplish this: retrofit older buildings rather than building a lot of new, green buildings.

The architects break what they call the Central Loop into four types of buildings: heritage buildings (1880-1945), which are clad in heat-absorbing masonry and have operable windows; midcentury modern buildings (1945-75), which hog energy due to their vast expanses of glass and heavy reliance on air conditioning; post-energy-crisis buildings (1975-2000), which show greater energy-efficiency but are burdened by an unanticipated rise in computer use; and energy-conscious buildings (2000-present), which continue to improve efficiency but are in relatively short supply.

That brings us to the heart of the matter: The key to cutting pollution isn’t building new green buildings. There simply aren’t enough of them to make a difference. The only way to lower our carbon footprint is to make the buildings we already have more energy-efficient.

That’s possible, as evidenced by the recent transformation of the Merchandise Mart, the massive yet graceful Art Deco commercial and trade show building along the Chicago River. At 4.2 million gross square feet, it’s one of the world’s largest buildings. By taking a variety of steps — from installing energy-saving water pumps to promoting eco-friendly products to the building’s tenants — the Mart cut its overall energy consumption by 21 percent from 2006 to 2010, executives there say.

I wonder how this plan would be received by businesses and building owners. While they suggest energy costs will decrease in the long run and rents may increase, such retrofitting could be costly in the short-term and there could be some anxiety about doing these things in the middle of a tough real estate and business market.

And how much would the City of Chicago really get behind this? Mayor Daley has drawn plaudits in the past for promoting ideas like rooftop gardens but these are limited in number. The City itself faces significant financial troubles in the coming years and I imagine issues like jobs, pensions, crime and the number of police in the streets, will dominate conversations for a while.

I would enjoy seeing their charts or models to see which particular buildings in the Loop use more or less energy. The picture that leads this report on the plan probably shows carbon emissions or energy use by building.