Feeds

Google calls time on AIMSearch prank

Cheating spouses and computer neophytes - relax

  • alert
  • submit to reddit

The essential guide to IT transformation

Google's legal department has put a stop to a subversive web prank that makes a point about our loss of Internet privacy.

The delicious URL has been circulating privately for the past fortnight.

The website is a détournement of the Google features page, only with the intriguing addition that Google now hosts five years' worth of searchable AOL chat logs.

Or as the page explains:-

"In November of 2001 AOL Time Warner, responding to a subpoena from Attorney General John Ashcroft, made available to the Justice Department a complete archive of all private conversations held over AOL Instant Messenger (AIM). Through the power of the Freedom of Information Act (FOIA), Google was able to obtain a copy of this entire logfile, totaling over 2 terabytes of conversations previously thought to be private."

"This unique resource provides insight into the minds of potential anti-American terrorists, cheating spouses, and countless computer neophytes."

AIM in a nutshell, then.

In the best Situationist tradition, the prank is followed to its logical conclusion with a real, ahem, searchable database of the "logs", which you can find here. And it works, too. You'll need to type in two AIM user Ids - although any two strings appear to get you into the logs.

But you'll need to hurry.

Not surprisingly, Google has objected to the cheeky appropriation of its trademark, and the site hoster has agreed to comply to its request to remove site by January 14th. We notice that already the "Google" logo has been altered to "Googol".

Credit for the prank, we can reveal, goes to one Brian Del Vecchio, a network systems engineer (and former lead at Ascend), who conceived the idea.

And we doubt if we'll see a funnier site all year. It's a slick and effortless response to our loss of privacy, our voyeurism, and the ease with which recent wiretapping legislation has ploughed through the constitution. Pretty much a neat summary of the zeitgeist.

And like the best engineering it's so gracefully constructed you don't see the joins.

Catch it before if comes down. ®

Related Stories

The Google Underpants Winners are...
A Walk Through Usenet memory lane
The Google attack engine
Detourn of the screw… (external link)

Build a business case: developing custom apps

More from The Register

next story
Cops baffled by riddle of CHICKEN who crossed ROAD
'Officers were unable to determine Chicken's intent'
MEN WANTED to satisfy town full of yearning BRAZILIAN HOTNESS
'Prettier, better organised, more harmonious than if men were in charge'
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
Drunkards warned: If you can't walk in a straight line, don't shop online, you fool!
Put it away boys. Cover them up ladies. Your credit cards, we mean
Why your mum was WRONG about whiffy tattooed people
They're a future source of RENEWABLE ENERGY
Murder accused DIDN'T ask Siri 'how to hide my roommate'
US court hears of cached browser image - not actual request
Chomp that sausage: Brits just LOVE scoffing a Full Monty
Sales of traditional brekkie foods soar as hungry folk get their mitts greasy
prev story

Whitepapers

A new approach to endpoint data protection
What is the best way to ensure comprehensive visibility, management, and control of information on both company-owned and employee-owned devices?
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Maximize storage efficiency across the enterprise
The HP StoreOnce backup solution offers highly flexible, centrally managed, and highly efficient data protection for any enterprise.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.