powerpoint slideshow

Download Report

Transcript powerpoint slideshow

No Boundaries
Jane Macoustra
Tai-Pan Research
Internet Librarian International
17th October 2006
Michael Moore on Librarians
“I really didn't realize the librarians were, you
know, such a dangerous group.
They are subversive. You think they're just sitting
there at the desk, all quiet and everything.
They're like plotting the revolution, man. I
wouldn't mess with them. You know, they've
had their budgets cut. They're paid nothing.
Books are falling apart. The libraries are just
like the ass end of everything, right?”
No Boundaries
We will take a brief look at:
• What we mean by no boundaries
• Different ways to communicate across the
time zones
• What has worked best for the SLA Asian
Chapter
• Conduct a live visual Skype to Australia
What do we mean by No
Boundaries?
• There’s no restriction to whom you can
contact: colleagues, suppliers, customers,
family & friends, distance learning
• Time zones no longer matter for a
geographically dispersed community
• Communicate anywhere in the world and
communicate cheaply
Types of communication
systems
Some of the pitfalls:
• Snail mail, E-mail, Telephone & mobile
– all have drawbacks
• Conference calls & video conferencing
• Virtual Reference, Podcasts, blogs &
RSS
• Discussion lists & forums, SMS, COP
Types of communication
systems
• VOIP At the time we looked, we found
Skype easy to use
• It’s free; a bonus for communities in
developing countries
Another dispersed community
Consider how terrorists communicate with
each other.
• They use all communication systems
available
• They use codes, pseudonyms and aliases
so they cannot easily be identified
Another dispersed community
• Their communications are multilingual - harder
for monitoring
• Their communications include using
propaganda via web sites and discussion forums
that frequently change locations to avoid being
identified
• Propaganda: who else uses it? The Royal
Family
Terrorism Monitoring
So what about the people who monitor terrorism?
• Those who work in counter-terrorism use the
same techniques to monitor the same systems to
try and pick up the signals from organiser to
terrorist
• Not a lot is known about the threats posed
through Internet use so far
Terrorism Monitoring
“There are eight different ways in which
contemporary terrorists use the Internet,
ranging from psychological warfare and
propaganda to highly instrumental uses
such as fundraising, recruitment, data
mining, and coordination of actions.”
Terrorism Monitoring
• They use different portals on the web for
tracking terrorism and disseminating that
information – it is a constantly evolving
medium for them
• BUT – there are language barrier
problems that cause delays
• Consider the info reporting challenges
when there is an alert – decisions are
based on what?
Terrorism Monitoring
• A US parody for NSA Wiretapping by Walt
Handelsman, Newsday:
http://www.newsday.com/media/flash/200606/23671673.swf
• A gripe about surveillance privacy monitoring
in the US by the Nat Security Agency.
However, NO government is innocent
regarding privacy invasion in any medium
Terrorism Monitoring
• International monitoring evolves from Enigma
coding used by the Germans in WWII. This
cryptographic coding system for
communication apparently - was eventually
used to develop the birth of the Internet
• When will - or should librarians start to take
bigger roles in this sort of research? They get
enough practice in classification, metadata,
taxonomy, data mining and co-ordination skills
Communication for research
• Anonymity can be achieved using
different communication systems
• BUT - your writing style can give away
your identity! Beware and alter your
writing abilities to an extent where you
cannot be recognised
Communication for research
• Add spelling mistakes on purpose – dumb
down a little, but not to the point of stupid
• Discussion forums and blogs – obtain
feedback
• Others don’t need to know who you are or
why you want specific information
Communication for research
• Anonymouse is a tool to avoid being
tracked when you are surfing the Web. Look
at allnettools.com
• Chinese often use these tools so no one can
monitor what they’ve been looking at on the
Web. Access these gateways to mask IP
addresses to stop official bodies monitoring
what you search
Communication for medical
research
Virtual Reference services
“Chasing the Sun” An international virtual
reference service between health libraries
• Gives 24 hour access to vital medical
information between health professionals
using global time differences to its
advantage
Communication
for the SLA Asian Chapter
The Asian Chapter has experimented in a
number of ways to maintain frequent
communication. We are currently making
the most use of:
• E-mail, Discussion Lists, RSS, COP and
VOIP, and we are going to attempt
virtual visits for Asian conferences
Communication for the SLA
Asian Chapter
• Discussion Lists are used for the Chapter
members to gain access to copies of
AGM & Board Minutes, conference
details, newsletter alerts, jobs and
discussions
Communication for the SLA
Asian Chapter
One Asian member is currently in a war
torn zone:
• They have a long walk to get to the
nearest Internet café; contact is sporadic
• Communication is basic; we maintain
flexibility when considering how we keep
in contact with our members
Communication for the SLA
Asian Chapter
• COP. The practice of using COP is used
to hold the meetings of the Board
• There is control over who can access
COP and they have to be a Board member
to access certain areas
• Easier dissemination of the “discussions”
at the Board meetings
Communication for the SLA
Asian Chapter
• Attempt of a virtual SLA Presidential
handover to incoming President will take
place at a conference in Asia this year
• Untested so far
• Back up is what?
Communication for the SLA
Asian Chapter
• VOIP – Skype, Jabber, Yahoo, MSN,
AIM, Sametime (Lotus), Plaxo
• So far we have only only tested Skype
and Plaxo. The majority of Board
members use these
• Basic requirement: access to a computer
& maybe headphones and/or webcam
How can VOIP be used?
• Board Meetings and HE, distance
learning, school kids – how do people
enjoy learning?
• Novelty factor for learning and visual
communication is as important as
attending in a classroom – learning
methodologies for individuals
How else can VOIP be used?
• Facsimile reduction? attach Word
documents and send via VOIP – not
ready
• Reduced telephony costs to the company;
consider the savings that a call centre
could make by changing over to new
technology
Drawbacks
• Employees may not be allowed to load VOIP
on their computers at the moment
• They cannot access VOIP through the company
firewall
• Installation via the company, not individual
employees accounts – monitoring of employee
activities? Difference between a phone call?
SKYPE
A Demonstration
Jeanette Regan, Canberra, Australia –
Treasurer of the SLA Asian Chapter.
Contact is via Skype with a webcam
Acknowledgements
• The Dark Web Portal: Collecting and Analysing
the Presence of Domestic and International
Terrorist Groups on the Web
http://ai.arizona.edu/research/terror/publications/IT
CS_Dark_Web_submission.pdf
• How Modern Terrorism Uses the Internet
http://www.usip.org/pubs/specialreports/sr116.pdf
Acknowledgements
• Chasing the Sun
http://www.salus.sa.gov.au/cts/ctsmain.htm and
http://www.salus.sa.gov.au/cts/ctsmembers.htm
• A rogue RSS feed:
http://meredith.wolfwater.com/wordpress/index.
php - but read with care
Acknowledgements
• Michael Moore on Librarians:
http://www.buzzflash.com/interviews/2002/
03/Michael_Moore_031302.html
• http://news.bbc.co.uk/1/hi/technology/480
8882.stm
Any Questions?
Jane Macoustra
Tai-Pan Research
1 Mitre Close, Sutton, Surrey, SM2 5HJ England
http://www.tai-panresearch.com
[email protected]
Tel:+44(0)208 395-6603 or mobile: 07786 432639
This material is based on a presentation given at Internet Librarian International 1617th October 2006, organised by Information Today, Inc., 143 Old Marlton Pike,
Medford, NJ 08055, USA. Phone 1 (609) 654-6266. http://www.infotoday.com