• Print

The Results of Reality Mining at Where 2.0

Your cellphone and laptop leave an invisible trail. Collecting this data is known as Reality Mining. A formal definition of Reality Mining is “the collection of machine-sensed environmental data pertaining to human social behavior“. We had two such collection projects this year at Where 2.0. They each took advantage of the signals that our inadvertent sensors (mobile phones and laptops primarily) broadcast. Several times through out the conference I told the attendees about the projects and showed them the same visualizations shared in this post.

The goal in having them at Where 2.0 was two-fold. First, Where 2.0 is a conference on location, It’s the goal of the conference to show the latest technology at the intersection of location and technology. Reality Mining applications definitely fit that description. Though our attendees’ devices are undoubtedly tracked without their knowledge all the time we wanted to make the applications. Secondly, as an event organizer knowing even a little more about attendees group actions is very valuable. We received a little bit of useful data, but there definitely would need to be refinements before it could be considered one of our tools for judging how well a talk was received (the number of new http requests might be more accurate than the movement of attendees).

pathint

Path Intelligence is able to detect GSM signals from cellphones. We used it to learn more about the attendees of Where 2.0. The embedded slides show where our attendees are from and when they were in the session rooms vs. the hallway. One of the slides also shows the path of a single cellphone. All of the data that was collected is anonymous. The team behind Path Intelligence were on-hand to discuss the application and they were usually busy explaining See the TechCrunch post for more information on the company. (Disclosure: OATV has invested in the company)

Leonard Lin, co-founder of Upcoming, has put together a fun reality mining project for the conference. A couple of weeks ago Leonard created Fireball (also profiled on TechCrunch) to let attendees check in locations at the Web 2.0 Expo (like Dodgeball). We got to talking about how on could use BlueTooth to do the same thing at a more contained conference. He took on the challenge and turned three Mac Minis into sensors to be used at the conference. He wasn’t able to detect signal strength via the native BlueTooth stack on the Minis so there is no proximity or geolocationbut he was able to collect some interesting info like the number of devices. He used Nodebox to create the visualizations. Future versions might be on the much cheaper and smaller Gumstix hardware.

blueball

The BlueBall data is more revealing on people’s identities in some ways. As you can see from the image below sometimes the BlueTooth name has been modified to reveal more about the person. Other times it is just a device number. As these sensors proliferate (or people realize that any computer they walk by can detect their BlueTooth signal) I wonder how much the device names will change.

Thanks Toby, Sharon and Leonard for your hard work.

tags: ,
  • http://www.spurgeonworld.com/blog/ Chris Spurgeon

    I’d love to see a larger version of that BlueBall graphic!

  • http://relations.ka2.de Gerd Kamp

    Don’t you see any privacy issues? Over in Germany there is a lively discussion on path intelligence technology at http://www.heise.de/newsticker/meldung/108078 (sorry: german only). PathIntelligenc is likely to be illegal in Germany too (it definitely is illegal if it is based on active IMSI-catching, not sure about the legal state of passively catching e.g. the TMSI-signal).

    Yes, we germans might be paranoid on anybody (not only the government) monitoring us, but for a reason.

    In related news, a recent ruling decided that using an unsecured Wifi without the permission of the owner is illegal based on the arguments that:

    a) obtaining an IP address is illegal wiretapping, since the messages sending IPs to the device are considered news protected by the illegal wiretapping section of the respective law
    b) the IP addresses the router assigns to the device are part of a persons privacy.

    I’m somewhat surprised that you didn’t touch the thematic angle of privacy invasion, neither at the cnference nor in this article. I would love to hear from you about this aspect.

    BTW.: According to PathIntelligence i was only one of 3 germans attending Where2.0, which was a great conference. But i have to admit it was beaten by far by Wherecamp (at least for geeks like me).

  • http://ux.mortenjust.com Morten Just

    We did something similar with Bluetooth at Imity. It was at music festival in Copenhagen. Just like the slideshow, the output was quite interesting.

    http://www.imity.com/blog/2007/06/18/peoplespotting-with-imity-blue-bunny-at-vesterbro-festival/

    We asked around for legal advice and were told that as long as we cannot track a Bluetooth signal to an identified owner, we should be on the legal side

  • http://randomfoo.net/ Leonard Lin

    Chris, I’ve posted up a little writeup of my own that has a link to the fullsize image (on my flickr stream) as well as the “Proximity and Relative Location” session notes from WhereCamp:

    http://randomfoo.net/blog/id/4181

    Agree w/ Gerd that for geo-geeks, WhereCamp was great. There was a pretty spirited geoprivacy session, notes here: http://wherecamp.pbwiki.com/GeoPrivacy

    I think that a good discussion/post about the current state of the legal framework/gov’t regulation would be pretty welcome, although the extent that’d protect your privacy from say, the government or the entities that is already tracking all your data (ie mobile carriers)…