Feeds

Japan seeks unheard-of new uses for cell location data

Big Brother by no means the only interested party

Designing a Defense for Mobile Applications

Japanese operator NTT Docomo plans to use its store of location data to work out where to build more houses, and how many people get stuck during an earthquake.

Those are two just of the potential applications for the huge amount of location data stored by mobile network operators, and where Docomo and the University of Tokyo will be starting their Mobile Spatial Statistics project with a view to finding other ways of exploiting the (anonymous) data for fun and profit.

The project site is entirely in Japanese, so we're grateful to Penn Olson for an explanation and comments from Docomo itself.

Mobile operators always know where their customers are, with a variable degree of accuracy dependent on the cell density. Most attention is on tracking individuals, but there's real value in knowing where the unnamed masses spend their time and it is that data which Docomo is hoping to exploit.

In the case of an earthquake, Docomo hopes it will be able to see where transit routes have been damaged and, based on historical tracking, be able to estimate the numbers of people unable to get home. For urban planning the idea is to be able to track how the distribution of people is changing over time, enabling city planners to address needs before they become problems.

The enormous amount of data stored by network operators isn't really utilised by anyone, at least not yet. That's partly the quantity of data is overwhelming (T-Mobile, for example, had 35,000 points of data for one customer), but also because of privacy concerns.

But it is interesting to note that every time there is a march, protest or gathering the mobile network operators know exactly how many people attended – even if the police and organisers can never seem to agree.

NTT Docomo won't be sharing its data willy nilly, telling Penn Olson that "We are willing to offer and make use of our operational data, if it's for our society to grow further. But it is not yet something we will open to the public in a specific format."

There's a huge amount of such data, and we're only starting to work out how best to make use of it. ®

HP ProLiant Gen8: Integrated lifecycle automation

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
Bring back error correction, say Danish 'net boffins
We don't need no steenkin' TCP/IP retransmission and the congestion it causes
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Samsung Z Tizen OS mobe is post-phoned – this time for good?
Russian launch for Sammy's non-droid knocked back
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
prev story

Whitepapers

Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Application security programs and practises
Follow a few strategies and your organization can gain the full benefits of open source and the cloud without compromising the security of your applications.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Securing Web Applications Made Simple and Scalable
Learn how automated security testing can provide a simple and scalable way to protect your web applications.