Social Networking in Egypt Takes a Political Turn

FACT: In the past two days, reporters for the Los Angeles Times and the Washington Post have each written accounts of the ongoing confrontation in Egypt between the government and online activists – the “Facebook Revolution” as the Post reporter terms it, hyperbolically. One interesting aspect: the two accounts are not carried as actual news stories in the “newspaper” (real or virtual), but as blog posts by the reporters on dedicated foreign-correspondent blogs. The Washington Post account is on the “PostGlobal” uber-blogsite, under Jack Fairweather’s “Islam’s Advance” blog, while the L.A. Times account is on the “Babylon & Beyond” blog, which carries a sub-head of “Observations from Iraq, Iran, Israel, the Arab World and Beyond.”

ANALYSIS: Up to now there’s been little coverage in traditional American media outlets of the emerging political tenor of some social networks in Egypt over the past several months. Major newspapers and the cable-news channels have not explored the topic, but I just returned from some time in Egypt and I learned that of course it is a widely covered and discussed topic there.  One young woman in her 30s, an urban professional, told me “I’m on Facebook all day long!”

Every morning outside my hotel room I would find an English-language newspaper, and for many days in a row it was a different paper – often because they were weekly editions.  That gave me the opportunity to read a variety of opinions from a somewhat broad band, as measured in “distance to/from the government position.”  

Helpfully, on May 6 2008 the Egyptian Mail included a summary of the raging controversy over Facebook, noting that “In Egypt, Facebook is the stage for the latest twist in the generation gap, playing host to politically hungry young Egyptians eager to take on their ageing leader.”  Only at the end of the article did I notice that it was reprinted from a New-York-based Egyptian blogger, the respected Mona Eltahawwy.

Continue reading

IARPA and the Virtual Long Tail

FACT: This week, the Intelligence Advanced Research Projects Activity, an arm of the Director of National Intelligence (DNI), launched its new unclassified website.  What’s there is initially fairly minimal, but they’ll be adding to the public information posted there regularly.

ANALYSIS:  I spent the week in Orlando, as a Keynote speaker at the IARPA “Incisive Analysis Conference.”  I’ll be writing a little more about the conference in the near future, as I saw some great demo’s and spoke to the principal investigators on many excellent and far-sighted advanced research projects sponsored by IARPA.  It was great to be there and to see so many old friends from the intelligence community, the national labs (PNNL, Sandia, Oak Ridge, Livermore), DoD, and innovative commercial R&D outfits.  Also, as the first IARPA conference since the organization’s launch, it was an opportunity to hear new director Lisa Porter communicate her vision and principles, which she did well and I’ll discuss those soon as well.  (She also kidded me about my efforts to make her a cultural phenomenon, but I blamed it on WIRED magazine.)

Continue reading

“Legally Blonde 2.0” – SoCal Spook at Harvard

Shout out to Chris Rasmussen, a former colleague in the intell biz who emails that he’ll be speaking on uses of Web 2.0 approaches in the Intelligence Community at Harvard’s Kennedy School of Government in June…. as he put it in his email, “I’m pretty sure Danish dudes from southern California have been legallyblonde2.jpgblacklisted from Harvard for hundreds of years. Well the times are changing.”

Chris has been involved in social-networking and other 2.0 efforts in the IC, both at the enterprise level and in grass-roots form — accomplishing the latter and encouraging the former (strongly).  The Kennedy School program, “Web 2.0: Taking Action in Government”  is advertised as “examining the lessons learned from first movers in both business and government and distilling what actions government leaders must now take to harness the power of these new tools and business models.”  (more info here

I especially like that the conference is being organized with the help of Don Tapscott, co-author of  an excellent book: Wikinomics: How Mass Collaboration Changes Everything.

Continue reading

Tempted to “Skimp” on IT Security?

FACT: According to a study presented at last week’s annual RSA Conference on cyber security, by Palo Alto Networks CTO Nir Zuk, “Users are routinely, and fairly easily, circumventing corporate security controls. And that is because traditional firewall technology was not meant to grapple with the diversity of Internet applications of recent years.”

ANALYSIS: Security has been an even hotter topic than usual for the past month, what with new national-level attention to cyber security and, for Microsoft, a culmination of sorts of various strands of effort into our new “End to End Trust” initiative.  My boss, Jim Simon, attended the RSA Conference in San Francisco, with his boss, Craig Mundie, Microsoft’s Chief Research and Strategy Officer.  Craig laid out Microsoft’s “End-to-End Trust” vision, designed to provide users more control over online and enterprise systems.  His keynote was widely covered (even by offbeat security blogs, like RiskBloggers.com) so I don’t need to rehash it.

Nir Zuk’s presentation was interesting – and not just because he’s one of the true pioneers of firewall technology.  He really understands secure enterprise environments, something I’m talking about increasingly with government organizations, who are learning the hard way the need to protect their data, apps, and computing platforms.  

Continue reading

Friendships and Professional Relationships

FACT: The General Accounting Office has lifted a week-old ban imposed on IBM’s ability to win any new federal contracts (or work on new task orders for existing contracts).  But, according to ComputerWorld, “IBM still faces an investigation by the EPA as well as a federal grand jury probe over a bid for a contract at the agency in 2006.” The ban had been imposed because of significant problems in the process surrounding the $84 million Environmental Protection Agency contract, which the company lost last year. 

ANALYSIS: Now that the ban has been lifted, I am glad to relay the news — not only because I blogged about it when imposed but also because I admire IBM and its work for government. But the circumstances made me think about my own current set of relationships with former colleagues in the federal government.

According to the AP’s account of the agreement struck with IBM leading to the ban’s lifting, which I read in Enterprise Security Today, “Several IBM employees allegedly obtained protected information from an EPA employee, ‘which IBM officials knew was improperly acquired, and used the information during its negotiations to improve its chance of winning a contract,’ according to the agreement. Such an act violated federal procedures… IBM has placed five individuals on administrative leave pending its own internal investigation and any federal probe.”

I don’t have more to say about the issue per se, other than riffing on that human aspect of the affair to make a personal comment about my own experience since leaving the federal government’s payroll last December….

Continue reading

Intriguing Politics – Social Media Discussion

FACT:  The second International Conference on Weblogs and Social Media (ICWSM) wrapped up yesterday in Seattle. It was organized again by the Association for the Advancement of Artificial Intelligence (or AAAI), with co-sponsorship by Microsoft, Google, and several universities and Web 2.0 companies. The papers are already being posted online here, which is great as there were some very interesting topics explored. 

ANALYSIS:   One really thought-provoking theme was proposed by Matthew Hurst, a scientist at Microsoft’s Live Labs (and co-creator of BlogPulse), who was a participant on the “Politics and Social Media” panel.  He’s summarized his points on his own blog, but it’s definitely worth pointing out the key distinction he posed:

Firstly, politics is about scaling social organization. A premier can’t talk to every citizen, so s/he has lieutenant’s. They have their own underlings, and so on in a typical hierarchical/departmental structure. Social media, however, is all about individuals – we read entries in weblogs, etc. So, if a politician wants to connect via social media, isn’t there some sort of fundamental mismatch? Obama may have 20, 000 followers on Twitter, but how many comments has he left on blog posts?

Secondly, there is the issue of social media amplifying the polarization (or homophily) found in any topical community. Thus, individuals look around at their neighbours in the social graph and see much of what they themselves are made of.

This bottom-down, top-up dichotomy has been discussed more generally about social media and social networks (often drawing a sharp distinction between “old-media” and “new-media,” or more colloquially if imprecisely as between “the media” and “the web.”)

Continue reading

Google’s Argument to Enterprise IT: “Trust Us”

FACT:  Yesterday, Google’s Dave Girouard, VP of enterprise sales, gave a keynote speech on “The Evolution of Cloud Computing” at FOSE, a Washington trade-show focusing on federal government and military IT customers.  According to a Washington Post reporter’s blog account afterwards:

[Girouard said] “Google will have to do things differently” to work with defense and intelligence agencies, where data security and privacy are held to the tightest standards. But he argued that having information spread across hundreds of different servers is actually more secure than housing data on a few servers at a specific location. “Security is now more virtual than physical,” he said.

ANALYSIS:  The Google salesman (Girouard is VP of enterprise sales) was speaking at FOSE on the same day I made an April Fools blogpost featuring a lame “Cloud Computing” joke (see it here, come back when you stop laughing).  

This year I’m at FOSE as neither buyer nor speaker; the past couple of years I spoke at FOSE, as a DIA official, and I always enjoy walking the exhibit floor, plus I was curious about Girouard’s take on Google’s current move into the federal space.

To be honest I’ve met him before when he was with Virage and he’s a fine fellow, a good salesman.

The rhetoric of his main pitch, though, seems to be battling uphill, and I’m not sure he gets a nuanced distinction.

Continue reading

Do Voters Love the Candidates… or their Fonts?

FACT:  John McCain, Hillary Clinton, and Barack Obama have chosen distinctively different typeface fonts for their campaign posters, bumper stickers, and TV-ad logos. 

font-gotham-obama.jpgObama uses sans serif Gotham.  McCain uses sans serif Optima. Only Clinton uses a serif, New Baskerville.  According to the Los Angeles Times yesterday, many typographers are following the usage choices closely, and now some political analysts are finding message in the medium; Obama’s choice is “the hot font of 2008,” Clinton’s font flourishes “conjure trustworthiness,” while McCain’s communicates an “old-fashioned yet quirky vibe.”

ANALYSIS:  Anyone who remembers their first experience with a personal computer’s word-processing program recalls that initial thrill when the realization hit: I can choose any font? I can choose any font!!!

Billions of funky emails, resumes, and yard-sale posters later, we’re all perhaps jaded by the profusion of font styles, and tend to have built up biases and defenses regarding certain looks.

Continue reading

A Roadmap for Innovation – from Center or the Edge?

Fact:   In marking its five-year anniversary earlier this month, the Department of Homeland Security released a fact sheet touting the department’s accomplishments in that time, including “establish[ing] the Computer Emergency Readiness Team (US-CERT) to provide a 24-hour watch, warning, and response operations center, which in 2007 issued over 200 actionable alerts on cyber security vulnerabilities or incidents. US-CERT developed the EINSTEIN intrusion detection program, which collects, analyzes, and shares computer security information across the federal civilian government. EINSTEIN is currently deployed at 15 federal agencies, including DHS, and plans are in place to expand the program to all federal departments and agencies.”

Analysis:  I’m not going to write, in this post at least, about US-CERT and EINSTEIN in particular. I will point out that some writers have been skeptical of “Big DHS” progress on cyber security up to now, and the anniversary was an occasion for much cynical commentary. 

cnet-news.jpgCharles Cooper in his popular Coop’s Corner blog on CNet wrote that “when it comes to network security, DHS appears to be more of a wet noodle than even its sharpest critics assumed… Talk with security consultants and former government officials involved with DHS and you come away wondering what these folks do all day.”

Continue reading

The Future of Enterprise Computing – and Social Computing

I wrote the other day about how highly ranked the University of Virginia’s undergrad business school is (a close second in BusinessWeek’s annual ranking), and mentioned that one reason is the creative research and programs they sponsor.

In fact, thanks to UVA’s McIntire School of Commerce, I enjoyed a great day recently exploring some of my favorite topics with leading experts.  I was an invited speaker at their one-day conference on The Future of Enterprise Computing on March 14th, presented by McIntire’s Center for the Management of Information Technology (CMIT).  It was a fascinating day….

Continue reading