Drupal Developer and Business Meetup January 5th in SF

So we finally found a wiki to announce and organize this.
Please go there and RSVP – contribute to the Agenda.

Join us for a good community building meeting, address your technical challenges building in Drupal and connect to others building businesses based on the platform.

Doc just gave me this to read about Drupal (and every open source project including Linux the subject of the article).

Participatory Panopticon tracking the CIA’s Torture Taxi

I was thinking about the participatory panopticon concept the other day when reading this article in the local weekly paper about amateur plane spotters tracking the movements of the CIA planes around the world that are moving torture victims to of shore destinations. The cover story was ‘Torture Air’.

Jamais (the originator of the term participatory panopticon) has this article today about how Yahoo Research Labs have come closer to making it more real with face recognition.

Interent 2.0 – deep cultural consequences

I have been reading Sherry Turkles book Life on the Screen: Identity in the Age of the Internet. The ironic thing is that it was written in 1995 before the Web really took off and became mainstream. I am going to finish it over my retreat. So far she has gotten me to reflect on the nature of our relationship to machines and how children growing up relate to machines. She has been studying their interaction with them over several decades and in different cultural contexts. I am reminded her work when reading Internet 2.0: the economic, social and cultural consequences of the new Internet

There are 4 levels to this model.

Disintermediation, Long Tail – which are concepts in wide circulation already. When it gets interesting is around Reformation and Continuous Presence.

The Internet is a reformation machine. It will create new fundamentals of and for our world. It change the units of analysis and the relationships between them

I think it does a good job of articulating the challenge to the ‘shape’ of our cultural dynamic.

The reformation model says fundamental categories of our culture (particularly the self and the group and the terms with which we think about them) are changing…. This is a change in the basic terms of reference, the very internal blue print with which we understand and construct the world.

Continuous Presence
One way to assess innovations is to make a guess about where we are headed. I think our economic, social and cultural destination might be this: we will be continuously connected to all knowledge and all people with a minimum of friction, and priviledge will be measured, in part, by how good are the filters with which we make contact with all but only the people and knowledge we care about.

Rove Implicated in Santa Identity Leak

This headline gave me a big chuckle today on the news stand. I thought given the seriousness of what is going on in DC you also might enjoy reading this news just out from the The Onion (which is even cooler cause it is built on Drupal).

The recent leak revealing Santa Claus to be “your mommy and daddy” has been linked to President Bush’s senior political adviser and deputy chief of staff Karl Rove.

“If this devastating leak, which severely undermines the security of children everywhere and has compromised parent-child relations, came from the highest levels of the White House, that is an outrage,” said former Bush counterterrorism adviser and outspoken Bush Administration critic Richard Clarke.

The identity of the mythical holiday gift-giver, previously known only in grown-up circles, was published in the popular Timbertoes cartoon in the December issue of Highlights For Children. Jean Abrams, a conservative firebrand known to have close ties to Bush appointees in the Department of Education, revealed “Santa” to be a code name for anonymous parental gift-giving.

The Identity Film ClubIdentity Film Club: First installment

I saw Syriana for the third time in three days yesturday.

Remember back at the internet identity workshop in October? In the closing circle when everyone was talking about books they recommend, I floated the idea that we might have an identity movies/films to broaden the public dialogue about identity issues and raise social literacy on the issues. So, I think we have found our first film. Syriana. This movie is going to get a lot of play this spring – and will be a strong candidate for several academy awards. There are many differentidentity issues covered in nuanced ways ripe for discussion.

Does anyone want to help me work on a discussion guide? I wonder if anyone has configured a site do this sort of thing? Sort of seems like a good thing for to host on a Drupal site. I am open to volunteers to help. I will put up a page on the iiw wiki.
I am open to suggestions about what the next movie could be – perhaps one in video stores.

Corporate Brand Identity GAP

Ed Batista posted this link to a GAP ad that was not widely distributed. The staff and customers destroy the store. It is quite entertaining.

The GAP Identity today:

The Gap has become the transparent background music of fashion–the aesthetic you never see because it’s everywhere (and thus effortless to imitate, undercut or adapt.) I like expansive, dramatic gestures–even when they fail, you have a lot more fun making the attempt–and I’d love to see The Gap destroy its increasingly-meaningless brand in order to save it–but I’m hard-pressed trying to think of a big retailer that’s pulled off a similar trick.

Ed reflects on the evolution of GAP’s identity:

At 38, I’m old enough to remember The Gap’s two-stage transformation, first from off-brand denim outlet to cooler-than-Levi’s, and then on to world domination via sort-of-preppy, sort-of-hip GeneriClothes. But a fundamental problem they face now is that the market’s fragmented out from under them, and fewer people want to wear GeneriClothes these days–we’re all pursuing our individual style muses.

Syriana: Everything is Connected – layers of identity

Who are you, what do you do, who are you loyal to and why? These deeper questions of identity weave throughout the narrative of Syriana. Yesturday I saw the movie for the second time (the first time was Saturday). As I do everything these days – I kept ‘identity’ in mind and it made it even more depth and intesnsity. I would recommend it to you all.

It is a political economy thriller (my favorite kind). It touches on a range of the complex issues of today’s world.

  • A web of entrenched oil interests
  • US interest in energy reserves and the rise of China
  • Secret operations ‘in American interesAmerican interest’
  • The lack of economic opportunity for the “youth buldge” coming of age in the Arab/Muslim world with no hope of a good job there for no hope of getting married and having “a life.”
  • The intense living conditions of migrant workers throughout the middle east.
  • How corporate acquisitions and flexibility affects peoples lives – ‘letting them go.’
  • When work disappears and religious “institutions” become appealing life options leading to young men willing to kill themselves for ‘the true faith.’
  • When emir’s pick their successor based on the preference of Texas oil firms, their law firms and American ‘government interest.’
  • When flights flying far above and missiles can take out the one car with the one guy they don’t want around any more.

Identity arises again and again. I am going to write more about this after I see it a third time today.

The Trial is real for those on the No-Fly List

To follow up on the Orwell post…

Daniel Solove has a great book out about digital identity and the challenges that we face today with it. He likens the situation we face with our digital dossiers to that of The Trial as opposed to they typical Orwellian metaphor – often apt but not the only applicable one. This reality is all to familiar for those trapped in the hall of mirrors called the ‘No Fly List.’ …..

Sarah Zapolsky was checking in for a flight to Italy when she discovered that her 9-month-old son’s name was on the United States’ “no fly” list of suspected terrorists.

“We pointed down to the stroller, and he sat there and gurgled,” Zapolsky said, recalling the July incident at Dulles International Airport outside Washington, D.C. “The desk agent started laughing…She couldn’t print us out a boarding pass because he’s on the no-fly list.”

Zapolsky, who did not want her son’s name made public, said she was initially amused by the mix-up. “But when I found out you can’t actually get off the list, I started to get a bit annoyed.”

She isn’t alone.

According to the Transportation Security Administration, more than 28,000 people have applied to the TSA redress office to get on the “cleared list,” which takes note of individuals whose names are similar to those on the terrorism watch list, but even getting on that list does not guarantee an end to hassles related to the no-fly list.

The TSA does not reveal how many or which names are actually on the list, and complaints do not get names removed, since those names are also those of suspected terrorists. The best that innocent travelers can hope for is a letter from the TSA that it says should facilitate travel but is no panacea.

In addition to babies, the victims of mistaken identity on the no-fly list have included aging retirees and public figures such as Democratic Sen. Edward Kennedy of Massachusetts, Republican Rep. Don Young of Alaska and Democratic Rep. John Lewis of Georgia.

“It’s a significant problem,” said Brenda Jones, the spokeswoman for Rep. Lewis, who travels by plane at least twice a week. She said the congressman had written to the TSA, but “he is still on the no-fly list, and the problems persist.”

Secretive list
While the number of suspected terrorists on the list is unknown, aviation sources estimate that it includes tens of thousands of names, if not more.

TSA spokesman Christopher White said the agency has seven people working full-time on processing applications to get on the cleared list. Considering the number of applications, that works out to less than 4,000 complaints per redress officer.

“We do take the cleared list very seriously, and it’s also important for us to focus on the right people. It does us no good to focus on the wrong John Doe,” White said.

Cleared individuals receive a letter from the TSA saying, “we have provided sufficient personal information to the airlines to distinguish you from other individuals” but cautions that “TSA cannot ensure that your travel will be delay-free.”

John Graham, a 63-year-old former Department of State official, said his TSA letter had not helped at all.

“I’m at a point now where I don’t really care whether my name is on the list as a mistake, as mistaken identity or whether someone at TSA does intend to hassle me. The fact is, there’s a total absence of due process,” he said.

The American Civil Liberties Union calls the no-fly list system unconstitutional, saying it treats people as guilty without a trial and unfairly deprives them of freedoms. It also says the system is an inaccurate and ineffective security method.

Despite efforts by the TSA to address complaints and concerns about the no-fly list, ACLU attorney Reggie Shuford said very little had changed to improve the process.

“We continually hear from people being caught up on the no-fly list with the same frustrating experiences and inability to get off the list,” he said.

Peter Johnson, a retired bibliographer at Princeton University, said travel became “hellish” after he discovered his name was on the no-fly list in August 2004.

“I’m not sure if what’s behind this is an effort to simply control people or if it’s largely mismanagement and poorly conceptualized programming,” Johnson said, adding that a TSA official had told him that there were more than 2,000 other Peter Johnsons in the United States who reported similar problems.

Bumper Sticker: Bush Cheney 1984

My good friend had a Bush Cheney sticker on his car bumper…I did a double take…he didn’t vote for Bush, they are not running again…ahh the year 1984. Subtle but to the point. The latest wire tapping scandal is not cool. Mitch Radcliff sums it up well.

Bush says he signed NSA wiretap order
Adds he OK’d program more than 30 times, will continue to do so
In acknowledging the message was true, President Bush took aim at the messenger Saturday, saying that a newspaper jeopardized national security by revealing that he authorized wiretaps on U.S. citizens after September 11.

“Yesterday the existence of this secret program was revealed in media reports, after being improperly provided to news organizations. As a result, our enemies have learned information they should not have, and the unauthorized disclosure of this effort damages our national security and puts our citizens at risk.”

Look at that. It’s disgusting.
The President broke the law, based on repeated rulings of the courts for decades that prohibit surveillance of U.S. citizens within the United States without court orders. Now, he’s trying to blame the messenger who revealed his continued flaunting of civil rights. Just more of the same hypocrisy, the same fear-mongering, the same wiping of his nose on the Constitution.

namespace clash – even for kaliya

Today I got this note…

I was surprised to find you I was searching out my 5 year old granddaughter’s name thinking I would purchase her name as a domain for her.

A five year old with my name will not get to be =kaliya :( oh well.
I am buying up some other =’s names today for me and some gifts for the family for christmas. They won’t get it but maybe in the next year they might understand what I do in california. I just changed my contact link here to =iwoman.

Structured Blogging and ‘structured’ tags (I-tags)

Yesterday we had the Kum-by-ya sing along lead by Marc Canter for 40 companies on board with Structured Blogging/Content ad hoc open standards.

Salim was a big leader behind the effort and started blogging yesterday too at – You’ve Got Ismail.

Mary mentioned I-Tags open standard Drummond had just got the spec up… there for you all to see.

Today Marc plugged i-tags from the stage today at the morning panel on syndication and RSS.

Identity Workshop Informational Morning – Success!

So we have a great time at the workshop yesterday. Eugene gave a great over view of “the problem” and why pinging a third party identity broker/provider would be a good evolution.
Johannes gave a great overview of the space URL based identifiers (YADIS – currently looking for a new name), WS* (Microsoft) and Liberty Alliance.
Dave presented about OpenID,
John presented about SXIP 2.0,
Drummond on XRI and
Eugene again about Yoke – the I-broker for the masses.

Mary Hodder shared here use of identity for her video community.
Tom from Opinity shared how they are using identity for their reputation network.
Marc Canter shared his use of identity (specifically SXIP) in GoingOn across networks and communities.
Chirs Allen shared some use cases for networks where he needs identity.
I closed out by talking about the new identity commons ‘clear focus.

the developers who attended expressed their interest in being there and we broke for lunch.

All had a good time and much networking happened.

Vocab Watch:Sperfs

From Otis:

Here is an example of what I’m caling a “spref”:

218.22.246.34 – – [13/Dec/2005:03:11:21 -0500] “GET / HTTP/1.1″ 200 44403 “http://bontril.threethreethree.us/” “Mozilla/4.0 (compatible; MSIE 5.0; Mac_PowerPC; AtHome021)

The geekier portion of the readership will recognize this is a line from the web server log file. See that bolded URL? That’s “spref”, a fake referer [sic] that is supposed to make you think that somebody from that page came to your site, and intrigue you enough that you go and visit that page. Of course, this referral is completely artificial, there is really no link to your site on that page, and you end up at some v1@gr@ site. So now we have: spam + refer(r)er = spref.

Yes there is Post-Post Modernism

I posted this on the Identity Gang list back in October. Dick Hart made the assertion that there was no such thing as post post-modernism. I had to chime in.. because it does indeed exist and it relates to identity.
Modernism has its origins in the enlightment ‘rationalism’, absolute
structure and finding ‘the truth’.

Post-Modernism is a critique to modernism. In this structure, there
are no laws maintained to define hierarchical culture. Post-modernism
that asserts that there no hierarchies and that all points of view are
equally valid (except that this is a hierarchy itself putting
non-hierarchy above hierarchy)

Today you have the emergence of Post-post-modernism. It rejects the
“flat” – everything is equal point of view of of post-moderninsm but
not super structured rationalism like Modernism. You might call it a
Polyarchy. Polyarchy was a term that I first heard when Drummond and
Kim were talking. Keep reading through the links…

As if Post-Modernism is not bad enough, reporter Alexandra Jacobs of
the New York Observer claimed her experience aboard the Jet Blue
flight that made an emergency landing at LAX on Wednesday night was
Post-Post-Modern. She said tvs on the plane were showing Fox News and MSNBC coverage of their own demise.

You can hear her talk about it on last week’s This American LIfe
Back From The Dead” 10/7 – Episode 299

However, some differences are emerging that mark a new phase of
counter culture. One of the most obvious sign of this is the
reemergence of massive protests making flesh the networking of
cultural players who formally would have nothing to do with one
another. Examples of this abound: “teamsters and turtles,” garment
workers of the developing world with college students, anti-war
Republicans. Some may refer to what is going on today as post-post
modernism or hyper-post modernism, others might refer to it as the era
of Globalization.

In the polyarchic system, world politics is no longer essentially
“international” politics, where who gets what, when and how is
determined on the basis of bargaining and fighting among the
nation-states; rather, the international system is now seen as one of
subsystems of a larger and more complex field of relationships.

Panarchy, Polyarchy and Personarchy indicate that what is aimed at is:
– a worldwide open framework free from territorial sovereignties.
– a variety of voluntary systems of personal and social organization,
like parallel autonomous societies, even within the same territory.
– full freedom of association, circulation and action for each and
every human being.

mmm… sounds like people empowerd with their own identities and the
ability to use them to organize and empower themselves in civil
society and the marketplace.

I first heard the term Polyarchy when Drummond, myself and Paul
Trevithic were in Kim’s Cameron’s enjoying a glass of wine. Kim and
Drummond began bantering back and forth about this critical consept
that perhaps defines the what is ‘new’ and a critical underlying
principle in the coming identity layer of the interent.

There is no standard way in generic URI syntax to express “cross
hierarchy” relationships, a directory concept known as polyarchy. Yet
those of us working on the OASIS XRI TC have found polyarchy (which we call cross-references) as essential to the “internetworking of
multiple identifier schemes” as TCP/IP packet exchange is to the
internetworking of multiple LAN protocols.

Kim Cameron is a co-author of this paper on polyarchy.
We describe a new information structure composed of multiple
intersecting hierarchies, which we call Polyarchies. Visualizing
polyarchies enables use of novel views for discovery of relationships
which are very difficult using existing hierarchy visualization tools.

So there is post-post modernism – it is polyarchical. Polyarchy is a
critcial if little talked about property of emerging identity
protocols.

Reflections on the Year

James had this reflection about the year and it got me thinking about mine.

I dido on the “One weird stressful year

I started out last year working as an Evangelist for Identity Commons 1.0. It was clear that the money was running out and I was not sure what I was going to do next. I ended up doing some consulting for a PR firm on blogosphere metrics for a certain web photo company. I learned a lot about how attention is reflected very differently in the Blogosphere and Deliciousphere. From that research. It is clear by affiliation and groups will be something worth creating trusted tools to aggregate information. It is all about niche communities. Early on in Delicious land the choices reflected the early adopter geek world. It reflected their choices and interests… how do you maintain those clusters and look at attention.

My next gig was setting up the first official blog ever on Broadway for the musical Little Women. The show closed just as we did our first official blogosphere showing.

In between all that I took on getting Planetwork going and stepping into leadership there as the Network Director. This fall has been fantastic getting monthly networking going in DC, Seattle, Portland (their first planning meeting is tonight) and Boston (we had our first planning meeting last month). We are producing the Green Digital Be-In on Earth Day, Apirl 22nd.

I guess most importantly I got an ‘identity’ this year as Identity Woman. The name just came to me as I was moving away from being officially with Identity Commons. I kept showing up and more often then not I would be the only woman there.
Things continue to evolve in the Identity conversation and it seems like there might be an Identity Commons 2.0 I am already playing a leadership role in making that happen. More details soon.
Combining both these “identities” I just finished the first draft of a white paper on the Civil Society Gateway – how all this identity stuff can really empower citizens to work together.
I have hopes that in the coming year the community that got me started involved with all of this the values based folks who meet in workshops and retreats might ‘get’ networking tools. Integrative Activism will certainly continue on in that vein this year.

A friend of mine with whom I periodically intense conversations talked about the essence of what I do it seems if you wanted to pin it down it would be “facilitation.

I guess that is what I enjoy most. Bringing folks together and supporting emergent connections forming. I feel good about the coming year. I hope it will be less crazy stressful though. To get a good start on that I will be leaving on ‘silent’ retreat on December 24th and return on January 2nd.

Technorati Tags: , ,

USAToday reports: possible regulation of data collection

Here it is…

“Google could easily become the poster child for a national public movement to regulate data collection,” says Jeff Chester, head of the Center for Digital Democracy, a privacy advocate.

Unbeknownst to many users, privacy advocates like Chester say, Google’s technology gives it enormous power to collect data on the interests and online habits of millions of Web surfers.

Google stores every user’s searches in its growing database and index of websites, maps, photographs and other documents. Its free e-mail program, Gmail, stores all user messages — including deleted ones — forever.

Type someone’s name or phone number into Google’s search box and you’ll likely turn up a home address, allowing you to see an aerial photo of their house from the Google Earth satellite photo service, started last year.

Daniel Brandt in San Antonio, creator of the Google-Watch.org website, worries that law enforcement authorities or repressive foreign governments could demand access to Google’s database to examine users’ surfing habits.

“Google will become bigger and bigger, and they will be a massive problem in terms of Internet privacy,” Brandt says.

The Senate Judiciary Committee last month passed a data privacy bill that goes to the full Senate. The bill, whose sponsors include Arlen Specter, R-Pa., and Dianne Feinstein, D-Calif., would regulate data brokers, force more security and increase penalties for identity theft.

A breach of Google’s database could be a catalyst for more lawmaker attention. “That would be the Tylenol scare to end all Tylenol scares at Google,” Battelle says.

This week: Identity powder keg in California

While we will be hanging out at Syndicate this week singing “Kum Bah Ya” about new “standards” for micro content and structured blogging and the announcement about i-tags. There is an impending “identity powder keg” that could go off this week in Califorina (and across the country) with the pending execution of Tookie Williams on Tuesday December 13th.

I googled – “Identity” and “Tookie” some interesting articles came up. They get to the heart of one element of ‘identity’ to have a meaningful place in a socio-cultural context. To be seen by others (afterall identity is what others say about us).

From Black News.com:

In a candid, and revealing moment, Stanley “Tookie” Williams told a visitor at San Quentin prison that he helped found the notorious Crips street gang because he wanted to smash everyone, make a rep, get respect and dignity, and that he wanted his name to be known everywhere. He got his wish in more ways than he ever dreamed of. The demons that drove Williams in his reckless push for identity and prominence also drove him to become the nation’s best known condemned prisoner. He faces execution December 13 for multiple murders.

William’s revelatory glimpse into his thug past tells much about the anger, alienation, and desperation that have turned legions of young black men into social pariahs, and that propel them to wreak murder and mayhem in mostly poor, black communities. But today’s Tookies didn’t crop up from nowhere. The transformation in the early 1970s of the old-line civil rights groups into business, and professional friendly organizations, and black middle-class flight from the inner city neighborhoods, left the black poor, especially young black males, socially fragmented, politically rudderless, and economically destitute. Lacking visible role models of success and achievement, and competitive technical skills and professional training to compete in a rapidly shifting economy, they were shoved even further to the outer margins of American society.

XRI’s Resolve Identity Mangament Dilema

This is the title of an article just out this weekend in Network World.
It is by David Mcaplin a senior architect at Epok. Here is an exerpt.

Metadata isn’t limited to alternative identifiers. Imagine that an XRI-identified resource is a technical manual, available as a PDF or Word document and retrievable from a variety of mirrored network locations via various protocols. In a broad sense, the manual is the same document irrespective of where it is located, how it is retrieved or in what format it is represented. XRIs are ideally suited for identifying resources at this level of abstraction because the resolution process lets the consuming application choose the best network location, retrieval method and file format for its needs from the available options.

Like URIs, XRIs are composed of an authority portion and a path portion. XRI resolution converts the authority portion and the path portion of an XRI to an XML document called an XRIDescriptor. The XRIDescriptor describes the identified resource and the means by which the digital representation of the resource can be retrieved. By providing an additional level of in direction away from concrete instances of a resource, XRIs provide a permanent, unbreakable reference on which stable business relationships can be based.

There is a great diagram on the next page.

Your musical Identity

I was reading this months issue of wired the one with the smilie Oil blobs on it. I came across this little article about Pandora. It is the GREAT Juke box program. You enter a song you like and it uses a mathematical algorithm to find other music by different artist that is similar. I have been listening this morning. I LOVE it. The user interface is very slick. It actually has articulate things to say about the music too – when you click on ‘why did you play this’. Perhaps I will actually define my musical identity after all.

Technorati Tags: , ,

Identity Zones?

Since working in this field I have begun to see all things through the lens of Identity. It is really deep philosophically – touching on the deepest aspects personal meaning – those things that we identify with. I found a book in used book store called Your Identity Zones: Who Am I? Who are you? Who do we get along?

I have just begun to skim over the contents. Identity for this author has two primary elements Affiliations and Values. “Identity Zones” are the ways you can measure the role affiliations and values play in your life. It seems like an interesting self reflection process.

Technorati Tags:

My Data, My Identity, My bookmarks, My pictures

This news just out.
Yahoo Bought Delicious.
Now I am not sure how I feel about this. Now they own two of the major tagging sites.

These are my tags on my photos and my bookmarks. How can we get out of pattern giant identity silos buying up other services? I want an integrated Identity on the web that I manage weaving together tools and services that are useful to me not just handy cause they are in one of the mega silos.

Hopefully they will avoid the major faux-pas that happened with Flickr where they asked users to to enter a yahoo ID instead of their existing Flickr account.