Another newspaper has been shuttered – the Rocky Mountain News.
While inevitable, it is sad to see newspapers disappear. The entire industry is in disarray and until someone somewhere finds a profitable economic model – the mood will be somber. I work in a similar industry. We have seen a decade of decline and have struggled to shift in to growing markets. It is hard, and I know that the day will come when my company closes or is bought out. The hard, cold reality is that no business can survive if it is not profitable. Reporters will not volunteer their time (for long). Printers will not donate paper and ink. The barriers to entry in to the news industry have dropped so low that anyone can enter and publish online. But while publishing costs have dropped precipitously, revenue has as well.
The staff of the paper did a great job publishing this video:
Final Edition from Matthew Roberts on Vimeo.
The Google Blog has the latest news regarding their legal dispute with the government. Google has successfully limited the scope of this specific request. The federal government is monolithic and moves at a ponderous pace. The legal decision appears to have hinged on the governments failure to describe the value of the information and why it is necessary. Well I’m guessing their next request won’t be as vague. This is the first round in a long battle and the best thing you can say about the dispute is that it is being conducted in broad daylight. I’m no legal pundit but it really feels like the court in this particular case did not extend themselves. So many politicians complain that the courts legislate but this is clearly not one of those cases. The judge ducked the decision indicating that the government can’t support their claims.
The posts closing paragraph is one we’ll be quoting from in the future:
We will always be subject to government subpoenas, but the fact that the judge sent a clear message about privacy is reassuring. What his ruling means is that neither the government nor anyone else has carte blanche when demanding data from Internet companies. When a party resists an overbroad subpoena, our legal process can be an effective check on such demands and be a protector of our users.
Sometimes it’s hard to tell the difference between just plain lucky and good. As the story unfolds, Google is now in the position of being the people’s search engine. The ugly corporate giants Time Warner (via AOL), Microsoft and Yahoo have all kowtowed to the government and ‘cooperated’. Google, young and brash, is the people’s guardian of privacy. Are they this good or is this an intuitive decision at the corporate level.
But then you read the filings between the two sides in the legal wrangle and you get a different perspective. Google receives the original subpoena on August 25th, 2005. They receive an extension on responding and do so on October 10th. Their attorney, Ashok Ramani of the Keker & Van Nest firm, indicates that the original subpoena is defective. The argument is made (repeatedly) that the requests exceed the scope of the authorizing Federal Rules of Civil Procedure. Basically, the response reads “You can’t compel us to do something beyond the legal framework you have used as a starting point. As we (for reasons described later) are not inclined to provide you everything, we will only provide what the framework authorizes you to request. Even more telling is Mr. Ramani’s last paragraph:
…Google objects because to comply with the Request could endanger its trade secrets. Dr. Stark’s involvement would require Google to disclose the approximate number of queries it receives on a given day, and some details about how it stores those queries…
Short of figuring out the system by which the airline industry calculates fares, I can’t conceive of anything more complex and convoluted then the confluence of attorneys, statistics and (the simplest leg of the tripod which is this story) the privacy advocates. It’s no wonder story after story is being published by technical press republishing each other’s stories. This stuff is denser then iron.
The fact is, you can spin this story a number of different ways:
- This is a titanic struggle between the forces of good and evil (you assign whomever you like to each party). Google is resisting the governments inclination to use the search engine data as an extension of it’s own power structure.
- This is a dispute originating from Google’s corporate culture. They are a very young company which has not had to deal with the Government in the past.
- This is a clever strategy by Google – waiting until after the other search engines comply to produce the impression that they care about privacy and other search engines do not.
- Google’s views it’s database as a corporate asset and interpretes the request in that light. You don’t simply give your assets to the government. Taxes yes, assets no.
- Google’s marketing staff saw the bear trap from a mile away and knew, given the topics on the public’s radar, that any disclosure of anything smelling of individually identifiable bits would trigger a nasty reaction.
- Google receives so much ad money from the online red light district that disclosing the actual statistics would open them up to attacks from the conservative community
The fact is, now that they have positioned themselves this way publically, they must see it through to it’s natural conclusion. They will eventually accede to the demands but only after they have stood on the shoulders of the other search engines and positioned Google as separate and apart from the pack.
Securing one’s identity has become a critical need. Although written for a commercial audience, the referenced resources and the author’s web site references have relevance for individuals.
A recent article on O’Reilly by Phil Windley entitled Identity Management Architectures and Digital Identity provides a good overview of identity management.
The metaphor used by Mr. Windley is a familiar one to those of working in the information management industry. City planning as a model for governance topics has been used successfully in other information management arenas. Here it is referenced as a starting point for managing corporate and personal identities. The author has provided a link to his personal web site where tempate information is provided.
More interesting to me personally are the resources referenced in the article. As a recent victim of identity theft, I value the idea of protecting my personal identify. The Identity Commons, the commercial 2idi initiative have personal relevance.