Thursday, June 19, 2014

Social Media for Investigative Professionals

Notes from presentation at SLA-2014, Vancouver, BC, Canada June 9, 2014

Social Media for Investigative Professionals
or
How to find people who don’t want to be found!
Presenter:  Julie Clegg, President, Toddington International Inc.

Prior to working at Toddington, Ms. Clegg worked for 10 years as a detective with the West Yorkshire Police in the UK.
Images are from her slides.

We are living in a digital world!

In order to be a competent, successful citizen, you need a new set of tools
                                                         -          Lee Rainie, Pew Research Center

The largest group of digital users is in Asia, but they constitute less than 30% of the Asian population.
North America and Europe are pretty saturated with 78% and 63% of the population already digital users.  Greatest growth potential is in Africa, Asia and Latin America.

Digital use will take off as we move into the Internet of Things – when we are connected with our refrigerators and cars and we get reminders of what we products we need at home while we are shopping.
Technological change is happening twice as fast social change in incorporating the new technologies.  Business is moving even more slowly.  It is hard to keep up and we can’t always afford to keep up.  New phone technologies are rolled out annually.

Among new technologies – geo-tagging (in social media posts and photos) has led to geo-fencing.  Building an electronic fence around a spot and harvesting the Twitter, Insta-gram and other posts within the fence.
Metcalfe’s Law:

N(N-1)/2

The value of a network grows as the square of the number of its users increase.
                                                     -          Robert M. Metcalfe, co-creator of Ethernet

Social Media:

There are a variety of Social Media categories:
  • Collaboration and Crowdsourcing – vBulletin Dicussion Boards, Google Groups
  • Blogs – Blogger, WordPress, TypePad, LiveJournal
  • Microblogs – Twitter, Tumblr, Weibo
  • Content Communities (Wikis) – Wikipedia, Wikispaces, Gamepedia
  • Social Networks – Facebook, Linked-In, Google Plus, QZone
  • Image Repositories – Flickr, Picassa, Imgur, DeviantArt
  • Virtual Games
  • Virtual Worlds
YouTube is social network platform but it is also a search tool.  It is a good resource to find training and product information.

Gaming platforms – World of Warcraft and virtual worlds like 2nd Life are great places for social interaction and research and investigation.  There can be product reviews.  Some universities have set up campuses in 2nd Life and you can take classes by placing your avatar into a classroom.
Both are good ways to access person-to-person interaction.  From a law enforcement perspective it is important.  As technology develops there are complaints of online offenses requiring new definitions and reporting of crimes.

Blogs tend to have low readership currently, but when they first took off in 2007 people were sharing a lot of personal information.  Some blogs are online diaries and still good sources for personal information on individuals.
Foursquare is an example of a space timer.  Sites like this tell you that a person was at specific place at a particular time.

Space locators are location-sensitive only.  TripAdvisor and Yelp tell you where people have been.
Quick timers are time-sensitive only – Twitter and Facebook are examples.

Slow time – neither time, nor location specific.  Sites like Wikipedia and YouTube.  Items here will be around for a long time, generally.
Social Media Building Blocks:

Ms. Clegg talked about the elements of social media – Presence, Relationship, Reputation, Identity, Groups, Conversation and Sharing.

Linked-In is focused on Identity and pulls in elements of Reputation, Relationship and Groups.


Foursquare focuses on Presence with elements of Identity and Relationship.


YouTube is about Sharing – and secondarily about Conversation, Groups and Reputation.


Facebook is a big winner – it is really about Relationships with elements of Presence, Reputation, Identity, Conversation and Sharing.

Twitter is another big winner – but its primary focus is on Sharing and secondarily about Presence, Relationship, Reputation, Identity, and Conversation.


How connected are we?

Ms. Clegg showed examples of people putting social media ahead of personal safety.
  • Posing for photos at fire scenes
  • Updating Facebook status while driving (her example was related to an actual fatal accident)
  • An incident with a man taking a hostage and posting to Facebook – and others updating with police movement and activity.
Tracking people using Social Media:

Now there are tools (some free, some for purchase) that allow you to draw a digital fence around a location and pick up the Twitter, Instagram and other posts at that location.
You can draw a fence around someone’s house and follow their posts and tweets.  Use this to find a Twitter user name and perhaps a Facebook profile.  Search in Facebook on photos – or photos that someone has liked – find their friends.

Often an individual is careful to monitor his/her Internet activity and profiles, but their friends and family members may not be as careful.
www.echosec.net

Using Geofeedia Ms. Clegg’s company found a posting by an employee at a secure location.  There was a clear photo showing the employee’s desk – his monitor that was displaying a classified document and his personal laptop that was in used.  Both are violations of security guidelines.

Another location they found a posting by a soldier who was scheduled for deployment.  She was posing with her rifle.  From that post they could pull up her Facebook profile and photos of herself and her friends. 
www.teachingprivacy.com

Knowing her Twitter profile name they could search on the Teaching Privacy website for other posts by her worldwide and see where she has been deployed.
Google tricks:

One trick that Ms. Clegg showed was an enhancement of the familiar wild card search in Google.  Put a name in quotes but add an * - “Lisa * Smith”  The * acts as a wild card and will cover up to 4 additional words between the names.
Ms. Clegg used this on one project and was able to find the name of a subject’s wife.  The subject had done a good job of keeping his own online profile low, but not his wife and family.  With the wife’s name she was able to find associations with the children’s school and then photos on Facebook and Twitter of the children.  Following Twitter posts and the time and location stamp she was able to trace the subject’s route to work – dropping the kids at school and on to his place of business.

For all this geo-tracking – Ms. Clegg concluded by showing us a site:
www.pleasedontstalkme.com

A person can log in with his/her Twitter ID and select any location.  Then post a tweet and it will appear in Twitter that one is Johannesburg when she is really in Detroit.
All that means is that we have to be careful when we use any of these geo-tracking tools. 

Friday, June 13, 2014

KM in the Trenches


Presentation by Ulla de Stricker, Cindy Shamel and Connie Crosby at SLA-2014, Vancouver, BC, Canada, June 8, 2014
Presenters are authors of Knowledge Management Practice in Organizations: The View from Inside.

Chapter 2 – KM Culture, by Ulla de Stricker is available for download –
If a city tears up the same street three times over a six month period to install three different cables, there’s a KM problem.

If KM is imposed by IT – no one will do it.
There are often multiple KM groups within the same organization.

You have to look at the cultural aspect of the organization in order to see how you can incorporate KM practices.
How do we proceed?  Short term – it may be easy to fix an immediate KM short-coming.  Provide someone with the information s/he needs.  But what about the long term?

Knowledge Audit:
How do you find out what you need to know about your organization?

Hire a consultant.  Conduct a survey.  Become an Undercover Boss!  Just like the TV show, go undercover to find out what problems exist in your organization so you can fix them.
New hires are another source of information on what is going on and what isn’t working.  They have their experience at another job and can communicate on any difficulties they are having in finding information at the new place.

KM by stealth – if management doesn’t like KM – do it anyway, just don’t call it KM.
Managers lose sight of the grass roots after about two years.  Many times good workers become managers because they know how a department works.  They know what it takes to run things well.  But as they focus more on administrative duties, they begin to lose sight of the work.

KM Culture – there is not always enough Time, Thought or Reflection to implement KM.
People cycle through the organization faster and faster.  It is harder to keep track of what KM efforts have been made before and what is in place and/or working and not working.

Often KM technology is rolled out – but we forget that human oversight and interaction is needed.  We often forget to train people on how to use the technology and think that the technology will just do the work of KM.
Human oversight and intervention is IMPORTANT!

Be Agile – add value to the KM process every day or every week.  Work toward accomplishing the KM solution for the organization incrementally.
How do we get buy-in?

Listen – eavesdrop!
Where are people suffering?  Where is the pain?  What is keeping the boss awake at night?

Build the KM strategy around what is worrying the boss.  If you can find a solution to her/his concerns, you will get buy-in at the top.
3 questions:

Ask the following questions to people in your organization and listen to their answers.  You will learn a lot.
  • Tell me about your day – what does your department do?
  • Tell me about your research?  What are you working on?
  • What’s the buzz in your field these days?

Facts and Findings:
When preparing a report on the Knowledge Audit there are three sections:

Facts and findings – the current state of things – just the facts.
Pointers – this prepares them to think about and get ready to hear solutions.  But don’t include the solutions in the report.  If you do, they will skip to the solutions and explain away why they cannot afford to implement the solutions.

Solutions – find out where the organization is in pain – and tailor the solutions to ease that.
Ownership of systems is essential.

Scale-up over time.
Start small and build out.

 

The Googlization of Everything

Notes from a presentation by Siva Vaidhyanathan, Robertson Professor in Media Studies, University of Virginia at the 2014 FEDLINK Spring Exposition at the Library of Congress, Montpelier Room on
May 14, 2014.

 Mr. Vaidhyanathan is the author of TheGooglization of Everything - and Why We Should Worry,
Libraries have done so well that they are taken for granted.  They become invisible – like an offensive line in football.  You only notice when it doesn’t do its job.

Google is 17 years old.  In that time it has changed our expectation of how companies should operate and on the availability of information.  Google is pervasive and we have become dependent.
Right to be forgotten

What about the recent European Court decision that people can remove information about themselves from the public record.
The European case involved a Spanish man who at one time owed a large debt.  He repaid the debt – but anyone searching his name on Google finds a page about the debt – but not the information that the debt was repaid long ago.

In the days before the Internet anyone doing research on this man would have to go to a local library, courthouse or records office and search through records and likely learn that he had repaid a debt that he owed at one time.  This kind of searching takes time and costs money.  In the age of Google it is cheap and easy – but it fails to provide the context of the information.  Yes – there was a debt – THAT WAS REPAID!
Following the European Court decision, the New York Times opined that this was an attack on the free press.  But we had a free press before Google – why does this threaten the press?

Another reaction to the court decision is the sense that if we cannot find something on Google, then it doesn’t exist.
Social Circles

Facebook has changed the way we connect socially with others.  In the past one managed one’s circles of friends and would selectively share personal information.  Our co-workers would know some information; acquaintances we meet at conferences would know some, perhaps not the same information.  Our family would have other information – but our siblings might know things that our parents did not know.
Facebook scrambles those circles – so that everyone is suddenly on the same level of knowing the same information about us and our associations.  Unless we learn to control our Facebook privacy settings.

Google scrambles our ability to control our reputation.  The links that point to us are skewed by the weight given to some websites.  Some news sources are given more significance than other sites.  For example, Huffington Post articles seem to stay at the top of the search results.
NSA has had a partnership with Google and Facebook, but we only recently learned that NSA has gotten even more access to our personal information at these sites than even the administrators realized.

Google’s Mission:
The mission statement is not – “Don’t be evil.”

It is To organize the world’s information and make it universally accessible.
When Google started in 1988 – that was ambitious – so much material was being added to the Internet on a daily basis.  Yahoo approached the organization with people to do the sorting and categories to help.

Google folks were in university and applied for a National Science Foundation grant for library research – and they developed the algorithm to sort and organize the web sites.
Organizing is a job of discernment, judgment and training.  It needs training and guidelines.

This is the hubris of Google – to think that they can organize the world’s information.  Not all of the world’s information is on the Internet – and they still cannot make it universally accessible. 
Libraries have the skill and the ability to provide access to their collections – and they have better metadata!

But this was part of their purpose in launching GoogleBooks, GoogleScholar and even taking on YouTube.
GoogleBooks – was a deal with Harvard University, Stanford, New York Public Library, the Bodleian Library and a few others that gave Google, a six-year old start-up company, the access to hundreds of years of acquisitions and materials with the purpose of digitizing and putting on the Internet – without any plan for copyright and license agreements.

But these projects are losing money for Google.
More about Google Rankings

Google is a benevolent dictator.  In the early days of the Internet porn sites came up pretty regularly in Internet searches.  Now Google downgrades the ranking of porn sites – the sites are still there – just not on the first page.
Personalization and localization are great for shopping and for business, but they are not very good for learning – when we are trying to research some principle or standard and it isn’t tied to something within our immediate vicinity.

What is missing is the learning and the context of information that comes from doing real research.  Algorithms favor the interests of developers.
Popularity of sites plays a role in search retrieval on Google.  The more popular sites come up first.  This is disastrous when you are searching for health information.  Search on vaccination and you get a lot of sites by vaccine-bashers and Huffington Post articles.  That is a subject area where brand names should matter – Centers for Disease Control or WebMD etc.

What is the goal?
Google has already won the battle of the search engines.  So far they haven’t won the battle of the operating systems of the Web or of Mobile devices.  The goal is become the operating system for life – when our appliances and our cars and our clothes are all connected to the Web. 

What is the long game?  On the open Web, Google wins over Facebook.  If you spend your time on Facebook – then Facebook wins.
The big players are Apple, Microsoft, Google and Facebook.  Who will win when data is flowing through our lives?  Who will we trust to manage all of that?  Who will be the operating system of our lives?