You may have missed this…the day China pulled the plug.

You might have missed this.  I certainly did – but then again for the last week or two I’ve been running around like the proverbial ‘blue arsed fly’ trying to juggle a variety of personal, professional and voluntary responsibilities whilst avoiding cat-induced sleep deprivation.  Anyway…where were you when China appeared to ‘turn off’ access to Twitter, Facebook and YouTube all over the world?

Because yes, it actually happened – from sometime on Wednesday traffic destined for the servers of these three social media giants was noticed to be going to servers based in the People’s Republic of China.   Technicians overseeing the world’s DNS systems (the ‘phone books’ of the Internet that tell servers and routers around the Internet where to send traffic to) noticed this, and eventually traced it back to a node on the DNS system in Sweden, that may have either been accidentally reconfigured or deliberately reconfigured by hackers.  Whatever the reason, it’s been an eye opener in principle, it means that any reasonably equipped government or terrorist organisation can subvert the whole routing system of the Internet – at least until the holes that allowed this to happen are secured.

The nature of the Internet is such that it has always been possible to do this sort of subversion; it’s just that the Net has never been important enough to be worth worrying about until recently.    The recent kerfuffle between Google, the Government of the PRC and the US Government has put the Internet firmly on the political stage – much more prominently than took place during the Iranian disturbances last summer.  (I’ll be commenting again on Google / PRC in the next few days, but here are my previous comments on that particular story)

It’s almost certain that this was an act either ordered or condoned by the government of the People’s Republic.  Their much vaunted ‘Green Dam’ is clearly capable of acting way beyond the borders of the PRC, especially if the remote control ‘exploits’ are used to take control of PCs running the program.  This would effectively give the PRC a massive cyberwarfare potential, with every PC legally installed in the PRC being capable of taking part in a botnet.

This action very much appears to be a shot across the international community’s bows; the PRC demonstrated their ability to break the Internet.  There are ways around this intrusion, of course, and steps will be taken to deal with it, but it does show that the gloves are off in what is increasingly a battle of wills between governments wishing to restrict what their citizens can read online and those that aren’t interested.  And I’m afraid that I have to include some democratic governments – like Australia – in that list.

The Internet is a political weapon; last Dceember I commented on how the rules of online civil unrest might be changing, as people on the receiving end of protest decided to do something about it – in that item it was Iran and Twitter.  It may well be that that was simply the beginning of ongoing efforts from repressive regimes to control the streets of cyberspace as well as the streets of their own cities.  What is important to realise is that the nature of the Internet – it’s flexibility, expandability, it’s ability to be used for things that the original creators had never even thought of – is at the root of the relative ease with which people can break it.

Unfortunately I expect the ‘powers that be’ to react to this sort of threat by using it as an excuse to tighten up various aspects of security and surveillance on the Net.  Expect legislation such as ACTA and The Digital Economy Bill to be tightened up in a ‘9/11’ style response to this act of online retaliation.

All your personal info belongs to…some web site or other?

This is an interesting little article about a new product from Mozilla Labs for Firefox – it allows you to grab tour personal contact data from various web services and sources, and then keep it in a repository from where you can decide exactly what to make available to OTHER web services and sites.   The data is stored and indexed locally – as @timoreilly tweeted – “I like the idea of a smarter client-side address book, so my social data doesn’t end up belonging to someone else. ”

And so do I.

I have a large contact list in Outlook on my PC which definitely goes nowhere near any online web service.  In a similar way, 95% of people I deal with on Facebook I deal with purely on Facebook; same with twitter and any Internet Forums I belong to.  If  Twitter and Facebook disappeared overnight, I’d lose access to quite a few contacts I have in those two ‘depositories’ of data, but some folks on there that I would DEFINITELY miss in the event of Social Networking meltdown I’ve got alternative means of contact for – usually e-mail addresses, occasionally phone numbers.  As for e-mail, I tend to use good old fashioned ‘Mail Client’ software – Outlook again, I’m afraid! – and rarely use web mail.

I guess the bottom line is that I don’t really trust any server outside of my direct control when it comes to storing my personal data.  I wouldn’t feel 100% safe with having all of my contacts lists on the servers of someone like Microsoft or Google for a couple of reasons:

  • Your access to your contacts is gone if they have connectivity issues or a server goes.
  • Your contacts are open to exploitation from hackers / spammers.
  • Your contacts contribute to the ‘database of intentions’ – if your contacts have accounts with people like Google or Amazon using the email address in your list, it’s potentially possible for their interests to be used to target ‘social advertising’ at you when you use your email address to access a site.

This is without starting to worry about the issues surrounding storing my content on other people’s servers.  No, I’m much happier to keep my central list of contacts on my PC.  I can back it up, it’s always there when I have access to my PC, if I want to put it on another machine it’s just a case of copying it over.

The Mozilla application looks useful in terms of getting backups of such data – which is great – but I’m still going to be terribly inefficient and keep my contacts where I know what’s happening to ’em!

New Media, Old Manners

This post is based on some comments I made on another blog recently – dealing with the question of whether using Social media turns us in to rude bumpkins.  Whilst it’s true that the decision to participate or not in all this Tweeting and Facebooking is in our own hands, the amount of general rudeness that this sort of all pervasive social media generates is astonishing.  I appreciate that I come from an older generation who had very different ideas of what behaviours are acceptable, so I hope you’ll pardon me if I appear to be something of a dinosaur!

Here are a  couple of ‘old style’ rules of thumb that I was taught years ago about the etiquette of using technology that I still use today.

  • If you have a visitor, hold the phone calls.  If a call gets through, ask briefly if it’s important, as you have a guest.  Then if it proves not to be important, arrange to call the caller back later.  If you’re responsible for your own calls, let an answering machine take it. 
  • If you are in a conversation on the phone, don’t multi-task and email at the same time.  No matter how good you think you are at multi-tasking, the person on the other end of the phone will know you’re doing something else.
  • If someone asks you for the contact details of a third party, then contact the third party first and ask, or mail that person on behalf of the person asking with THEIR details.  Don’t give the personal details of someone else away without asking.

Social Media users often breach the equivalents of these old style social guidelines.  We Tweet when talking to people, share personal information like locations and photographs of third parties with people who may be total strangers.  We forget that the people we’re WITH are more important than the often relatively anonymous folks in our extended electronic network.  I have to say that I find it strange to be sitting in the pub with people and have half the group tweeting or Facebooking – it’s a habit that I’ve started acquiring a little as well.  I find it equally weird to be in courses or seminars – or presentations – and find people Tweeting – even if they’re encouraged to do so!  I just find it hard to believe that people can be paying attention to what’s being said whilst using social media.

I have to wonder how much of the use of Social Media by some people is akin to the mobile phone using buffoon portrayed by comedia Dom Jolly in which a guy is bustling along holding a gigantic mobile phone and is yelling in to it – it’s an ego-prop rather than a communications tool. 

Do you REALLY need the world and their dog to know you’re arriving at your hotel?  Or is it all about ego?

Facebook and the panic button….

Since the recent case in which a teenage girl was groomed and murdered by a paedophile via the Facebook site, there has been a lot of pressure from the UK Government for Facebook to put a ‘Panic Button’ style link on the site – a move supported by the CEOP organisationFacebook have commented that they have no objection in principle to making it easier to report abuse on the site, but that they feel that the CEOP supported option is not necessarily the best way.

Facebook are far from perfect in the way that they treat their users; I think all of us who use the site would have our own grumbles about privacy and the attitude of Facebook as a whole towards individual users now that they’ve got big.  But to be honest I think I would rather central Government stayed out of issues like this – especially New Labour, who seem to have spent the last decade dismantling our civil liberties bit by bit.  For a previous broader comment on this issue, I direct you to this item from a year ago, in which author Phillip Pullman commented on the behaviour of New Labour.

Since then we’ve had the Digital Economy Bill – even without the Lib Dem Peers’ Amendments it was a pretty poor piece of legislation.  With the amendments it offers a wonderful means of stifling debate by simply shutting down access to any site that breaches copyright.  Under the Bill, as it stands, and if it were strictly applied, YouTube could be blocked to UK ISPs because of material that breaches copyright. 

Part of the problem with New Labour is their amazing ability to put together piss-poor legislation on a ‘knee jerk’ basis.  A lone gun nut leads to a total handgun ban – which doesn’t affect criminals as they tend to disobey the law anyway.   Despite massive increases in the legislation aimed at child protection, the very basic laws that were there all along fail to be implemented and children keep getting killed.  And there are many more examples.  One interpretation of this repeated series of cock-ups is that they’re just incompetent; my own interpretation is that New Labour are just incredibly keen on reducing our civil liberties as much as they can to have a nicely compliant and obedient citizenry.

The issue for me here is not just the Facebook reporting mechanism; I’m afraid I regard that as something of a ‘thin end of the wedge’, by which Government could influence and impact the policies of web sites not even based in Britain.  It’s not far from that sort of thing to the  censorship policies adopted by China and, more recently, but to a lesser degree, Australia.  Protesting about this sort of Government activity, which initially starts with child protection, is a little bit like trying to answer the question ‘Have you stopped beating your wife?’ in a way that doesn’t make you guilty.  But given this Governments record on civil liberties I’m afraid I do not and cannot trust them. 

As  Rousseau said “Free people, remember this maxim: we may acquire liberty, but it is never recovered if it is once lost.

And we’re losing it bit by bit.

Your email address CAN be harvested from Facebook…a heads up!

Or…yet another reason to watch who you befriend….

Facebook attempts to be what’s known in the online world as a ‘Closed Garden’ – interactions with the rest of the Internet are restricted somewhat to make the user experience better…or to keep you in the loving arms of Facebook, depending on how cynical you are.  One of the tools in this process is the Facebook API – a set of programming tools that Facebook produce to make it possible for programmers to write software that works within the Facebook framework.  Indeed, Facebook get very peeved if you try automating any aspect of the site’s behaviour without using the API.

One thing that the API enforces is the privacy controls; and one thing that you cannot get through the API is an email address.  Which is cool – it prevents less scrupulous people who’ve written games and such from harvesting email addresses from their users to use for other purposes.  It also ensures that all mass communications are done through Facebook.

Of course, if you’re determined enough you could go to every Friend’s profile page and copy the email address from there…or there are scripts that people have written to do the task by simply automating a browser.  The former is tedious, the latter is likely to get you thrown off of Facebook.

However, a method documented hereshows how this can be done through the auspices of a Yahoo mail account.   It is apparently a legitimate application available within Yahoo Mail for the benefit of subscribers.  How long Facebook will allow this loophole to be exploited is anyone’s idea, but given that I have a number of Facebook friends I felt it worthwhile warning folks.

The problem is not you, my trusted and good and wonderful reader, who would only use the tool for what it’s intended for – added convenience in contact management.  The problem lies with people who are a bit free and easy about who they make friends with.  If you do end up befriending a less than trustworthy individual, they could quite happily get your email address through this method, and soon enough you’ll be receiving all those wonderful offers for life enhancing medication and get rich quick schemes.

So…watch who you befriend.  Today might be a good day to prune out those folks that you’re not one hundred percent sure about!

The further perils of real time search…

A short while ago I wrote a couple of posts about the issues around Real time Search (How important is Real Time Search and Google and the Dead Past) – that is, Internet based searches that include Internet content that has been generated in the few minutes (or even less!) prior to the search.  Those of us who’ve been around the Internet for long enough will remember the days when you could wait days or weeks for stuff to show up in a Google search; nowadays Tweets can turn up in search results almost immediately.

There are many reasons – most expressed in the two posts above – that I have for feeling rather uneasy about the whole idea of real time search, particularly around personal privacy.  I think the main mistake I made when I wrote those two posts last year was to underestimate the speed with which things would move.  Recent developments in geolocation based systems – that record the location from which a post is made – such as FourSquare and the geocoding side of Twitter have made it easy for Tweets and similar online posts to locate people in the real world.  A particularly fine example of this phenomena is the suitably named ‘Please Rob Me’ – this site uses some clever coding to detect when people Tweet that they’re away from home. 

The publication of ‘exploits’ for web browsers and other software could also become a hot topic.  At the moment, a hacker may determine how to ‘poison’ a website with a specially manufactured piece of code that can infect an unprotected PC with a virus or Trojan Horse program.  The hacker can then publicise the fact via various means, hoping that others will get the chance to use it before the manufacturer of the browser relaeses a ‘patch’ for the bug that the code exploits.  Real time search could very much help hackers – by releasing details of an exploit, then linking to it from a few sites, then tweeting it, it’s quite possible that details of such exploits could be showing up in search results within minutes or hours of the exploit being identified.  Unless the search results are sanitised in some way to prevent this happening – highly unlikely – then this will surely lead to decreasing online safety.

A related problem might be in the creation of online Pop-up Shops’ for ‘warez’ or other illegal content.  For those who’ve never come across a ‘Pop-up Shop’ these are shops that take out a very short lease on a retail property – typically a month or so around Christmas or some other busy event that will guarantee good local footfall.  They then sell cheap goods, Christmas cards, etc. and then shut up shop and disappear – whilst these shops are totally legit business, the Internet equivalents are frequently not.  Given real time search, a suitably optimised ‘instant site’ with an arbitrary URL could be put on a server, show up in search engine indexes / Tweet indexes within the hour , make material available and be gone before the authorities even know it was there.

Real time search is here – faster and probably more effective than I feared.  And it’s not going to be pretty.

PCC, Stephen Gately and liberal backlash

The Press Complaints Commissionshas decided not to uphold complaints about an article by Jan Moir about the circumstances surrounding Stephen Gately’s death.  I’m not going to rehash the details of the case – a quick Google will allow you to find the original article, but my main interest is in some of the comments that I’ve heard floated up on Twitter and other web sites about the findings of the PCC.  The PCC did indeed receive a record number of complaints – 25,000 – about the column, and there was a fairly hefty campaign mounted over social networks such as Twitter to encourage people who felt strongly to complain.  The newspaper concerned, The Mail on Sunday, dodged censure:

PCC chairwoman Baroness Buscombe said the commission found the article “in many areas extremely distasteful” but that the Mail had escaped censure because it “just failed to cross the line”.

The PCC had considered context and “the extent to which newspaper columnists should be free to publish what many will see as unpalatable and unpleasant stories”.

and two complaints to the Metropolitan police that were passed to the Crown Prosecution Service were also rejected as grounds for prosecution because of insufficient evidence that the piece breached the law.

Jan Moir’s piece was ill-timed, and some of her comments were hurtful to some people.  I guess that there were those who found the piece upsetting who didn’t complain, and that there were probably quite a few people who wholeheartedly agreed with what she had to say; after all, complaints procedures rarely get support.  But, as they say, process has been carried out and judgement bought in by the PCC and the CPS, and in many ways that should be the end of it – whether you agree with the outcome or not. 

Having said that, I wasn’t surprised today when I saw a fair amount of blather on Twitter from the ‘chattering classes’ referring to the PCC judgement, starting off by saying that as the editor of the Mail on Sunday is on the PCC, the verdict is immediately biased.  I guess that’s to be expected.  We then went in to slightly disturbing territory, with a Tweet that I came across along the lines taht the Tweeter didn’t want to censor comment but felt that something to rein in columnists from claiming authority they didn’t have.  There’s also this debate on the BBC’s own web site.  Now, why do I find that tweet rather disturbing? 

It’s all in the wording.  Where does ‘claiming authority’ start and end?  Do we apply it across the board?  Do you have to be a political scientist to talk about politics?  A GP to write medical articles?  A physicist to comment on the LHC?  And what about us bloggers?  Do we have to ‘in with the in crowd’ before we can comment on the activities of celebrities?  Do I have to have a degree in economics before I can comment on the parlous state of the UK economy?  Should we have license to comment?

I’m sorry – but a good columnist SHOULD occasionally say something that pisses people off; one shouldn’t b personally offesnive or abusive, but the sacred cows of modern society should be up for comment. Once you start down the road of ‘reining in’ columnists it’s the thin end of the wedge towards full blown censorship.  Would there have been so much fuss from the media and liberal intelligentsia were the column about the death of a young ‘smack rat’ in similar circumstances?  I very much doubt it; I fear that a lot of the reaction here has been about the death of  ‘one of their own’ in what must be described as unusual circumstances – unusual in my experience, any way.

 There’s an old saying that someone stays liberal on law and order until they get mugged or burgled; perhaps we might expand that to suggest that some people stay liberal on freedom of speech until someone dares to use it to say something they disagree with.

Google Buzz and Google’s incursion in to Social Networking

GoogleMany years ago there was a joke in techy circles that likened Microsoft to the Star Trek aliens ‘The Borg’.  It appeared at the time (mid 1990s) that Microosft were indeed determined to assimilate everything they encountered and absorb the technology of other companies in to their own.  Well, like the Borg in Trek, Microsoft finally found that they couldn’t assimilate everything.  But today there’s a new Borg Queen on the block, in teh form of Google.

Google Buzz was launched as an adjunct to Gmail, and Google got themselves in to hot water at the launch by having the system automatically follow everyone in your Gmail contacts list.  This was regarded as pretty heavy handed on Google’s part – and Google obviously concurred to some degree as they introduced changes to this part of the system.  The problem for Google is that they have a lousy history of handling privacy issues in both their Search tools and Gmail, and I guess starting a new product off with a similar disregard for the perceptions of their users was not a sound move.

So, how relevant is this move by Google?  I have to say that I’m not convinced that Google will actually represent major competition to Facebook or Twitter with Buzz (or, for that matter, with Wave).  The lock in to Google’s infrastructure of Buzz is something that Facebook doesn’t have, for instance.  I don’t have to have a Facebook email account, and I don’t do my searching through Facebook.  And therein lies the problem for me – and it all comes back to Google’s database of intentions that I’ve mentioned before in this blog.  The more Google can derive about the way in which people use Search, who they interact with, what ‘clusters’ of interests people have – even anonymously – the more value Google’s database of intention is.  You might want to take a look at some of my previous articles about Google – Google and The Dead Past, The importance of Real Time Search and Google seeks browser dominance – to get a feel for my views on Google.   Google’s strategic moves have been consistently to get Google’s search into everything we do.  Gmail was their first crack at this with personal communications, and now with Wave and Buzz they have the tools to map social networks, and the search behaviours of people on those social networks, especially if people remain logged in to Google accounts whilst the do their searching.

Let’s pretend…..you are logged in to your Buzz account and you search for something.  Google can link your search interests to those of the people in your social network, and vice versa.  They can thus add the collective behaviour of your searches to their database of intentions – remember what I said about the Borg? 🙂  And we’re not even thinking about the additional data provided by Google Apps…

 Google are also purchasing a ‘Social Search’ tool that allows people to ask questions of their social groups; I think we can safely assume that the responses will be squirreled away somewhere for future use.

Even when anonymised, this sort of information builds in to a very valuable commodity that Google can sell to future ‘partners’.  Google’s behaviour at the moment seems to be to develop or acquire a series of discrete elements of Social Networking technology that they’re bringing together under the existing account system of Gmail / Google Accounts, which makes perfect sense.  At one time Microsoft filled in some of the gaps in their various offerings in a similar way to allow them access to market segments that they were still trying to penetrate.  Perhaps Google have learnt from the software behemoth.

But they have a way to go – here are what I consider Google’s biggest challenges.

  1. The attitude of the public towards Google is not entirely positive, and whilst Facebook have had numerous privacy problems their defined market presence in Social Networking and not in Social Networking, Search, Email, Productivity tools, kitchen sink manufacture, etc.  
  2. Facebook may easily lose market share to a good competing service; their constant re-vamping of User Interface and buggy code upsets users but at the moment there is no viable competation for most people as Facebook is where their social network is.  Google would have to get people to migrate en-masse and over a short period of time to get the sort of success FB show.
  3. Wave is certainly buggy; Gmail and Buzz are designed to not run on IE6 and it’s debatable how long Google will support other Microsoft Browsers – I wonder how many people would want themselves tied in to Google at the level of software as well as applications?  Like I said earlier – Facebook doesn’t require me to have a Facebook email address.
  4. What’s Google’s target market; Wave seemed to be a solution looking for a problem; Buzz seems to be a similar ‘half way house’ affair that in some ways would have been best placed in Wave. Twitter and Facebook tend to provide specific groups of users with a defined user experience and functionality.  Quite what Buzz and Wave and Gmail together provide that isn’t available elsewhere is not clear to me.

So….my thoughts?  If this is Google’s attempt to park their tanks on Facebook’s lawn, then they’ve invoked the ‘Fail Whale’.

We know where you’ve been on the Net, and we don’t need no steenkin’ cookies!

searchglassI’m not overly paranoid about people knowing where I’ve been on the Internet; I’m aware that it’s pretty easy for a website to feed your browser ‘tracking cookies’ that can be used for marketing and advertising purposes, and these can then be picked up on other sites, thus providing a path of footsteps that you have followed online.

Which is why I clear my cookies regularly, and set my browsers to only accept cookies from sites that I want to accept cookies from.  But I can see that in some parts of the world, your browsing history might be of great interest to Government and Law Enforcement, and I’m sure that many of the larger online retailers would love to get their paws on a good, reliable and hard to circumvent method of looking at what common interests people have.  For example, even if you’re anonymous, it can be of great use to companies to know what sorts of sites you visit, because you can then use data mining techniques to derive information on what other sites or products you might be interested in.  For example, if you’re an Amazon user, you’ll be aware of the fact you get recommendations of the ‘We see you’re interested in x.  Other people interested in x also bought y and z’. 

Now…let’s take this a little further.  I was browsing around the other afternoon and came across this site.  Give it a try – it’s under the auspices of the Electronic Frontier Foundation.  I don’t know what it came back with for you, but my ‘fingerprint’ was pretty darn rare – I guess it’s inevitable because of the various things I have installed on this  computer for work.  The site looks at the information sent by your browser to the site, and uses it to derive a ‘uniqueness’ factor – a sort of tag.  For an out of the box installation of an Operating System then I’d expect that there would be quite a few people whose finger prints are essentially the same.  But the more you tweak and configure and install stuff on your PC, the more unique it gets….to a point at which it can identify your PC uniquely, with very few errors.

And all this without it ever putting a cookie anywhere near your PC.  Now, there are ways around this – there always are – but they’re not the sort of approaches that the average man or woman in the street would take.

So what sort of ‘advantage’ would such a technology offer online companies, Government and the Security Services?

Now, this is pure supposition – I have absolutely no evidence at all that this is happening or is likely to happen…but let’s pretend.  We’ll assume that a number of large online companies have collaborated on sharing this fingerprint data – basically you visit a site or even a page – or maybe even do searches for certain subjects – and your electronic fingerprint is tagged on to that fact.

Scenario 1.  You do a search for information on equipment to help you avoid speed cameras.  Later that day you go to buy car insurance.  The insurer does a quick check on your ‘fingerprint’ against topics of interest to it – including sites offering legal advice for people caught speeding and also sites that inform or advise on speed traps.  You show up – you’re declined.

Scenario 2.  You’re interested in computer hacking – maybe even researching a book.  You visit a number of sites of interest, look at books on Amazon and such.  A few weeks later a major ‘hack’ happens and the authorities look at the electronic fingerprints of everyone who may have researched the topic.  You will show up.  This fingerprint is then circulated around ISPs who note that it is one that is associated with your Internet account.

Scenario 3. You’re gay in a country run by a repressive regime.  You visit web sites where the fingerprinting is being done for commercial marketing reasons.  The security services of your country get hold of this data, either by buying it or stealing it, and run a check of those fingerprints against the ones that are on file with the ISPs of that country.  You will find yourself in major trouble.

There are ways around this technique – it’s easy to go through proxies, and possible to strip all this sort of identifying data off of the packets that go to web sites.  And people who’re genuinely worried (or have reason to avoid this sort of inspection) will no doubt be doing this.  But for the vast majority of people this simply would be yet another means of intrusion in to our private lives.

Social Search = global groupthink?

GoogleA few days ago I came acrossthis item in Google’s blog – looking at what they call ‘Social Search.  This is a set of applications being developed by Google to allow image content that you and your social circle (as set up through your Google account) have posted on image sharing sites such as Flickr in searches returned by Google Images.    So the idea is that you do a search on particular images using Google Images, and prominently featured in the results set would be images that your friends have posted up on these other sites.  I assume that eventually this sort of thing will spread out to encompass other sites of user generated content – Facebook, MySpace, personal blogs, etc.  Of course, this would require some cooperation between the companies running these sites and clearly there would be financial issues involved, but technically it’s not that difficult.

At first glance social search looks like a very cool concept.  After all, we tend to ask our friends and colleagues for advice and guidance on where to buy things or find them online.  We take their advice on what web sites are reliable, we are likely to at least look at films or books recommended by people who know our tastes, and so on.  If it did become possible to pull together information about searches carried out by groups of friends, and include information posted or recommended by our friends in search results in a prioritised manner, then the results would probably be more immediately relevant to us, and would also be at least partially validated – rather than the results being the equivalent of a cold call, they’d be closer to a personal introduction.

However, it struck me that there’s a potential downside to this approach, especially the more integrated in to the overall search results the ‘personally linked’ social search results become.  There is a phenomenon well known in management consultancy circles called ‘Groupthink’.  It’s what happens when you get a group of people who’re closely linked in some way – members of the same close knit team or department, for example.  What can happen during decision making and problem solving sessions is that the group may come to decisions based upon internal politics and ‘norms’, rather than objective facts that are presented to them.  This effect has been seen to be responsible for poor decision making in a wide range of situations.  It struck me that there is a good chance of this effect becoming evident in search results should the ‘Social Search’ really take off. 

For example, if someone in a social grouping is particularly ‘active’ online then their comments and recommendations might turn out to have a larger impact than other folks who’re less active online but possibly more informed about issues.  The overall effect would therefore to bias such social network search results towards the people with the largest online profile rather than those results that are possibly more accurate.  Such individuals would thus become opinion leaders and formers in particular social groups, and advertisers could easily seek out these higher profile individuals to sell directly to them, working on the principle that they will sell to their circle of contacts either directly by recommendation or indirectly through the results of social search.

Slightly disturbing.  Whilst influencing small groups of people it’s not the end of the world, but how long before we get a situation similar to that in the Phillip Dick short story ‘The Mold of Yancy’, where the behaviour of a whole civilisation was influenced by the tastes and preferences of one man?  Far fetched?  Perhaps not.