In George Orwell’s work of fiction 1984, the reader is presented with a narrative about a totalitarian world where every movement and action by the population were scrutinized and analyzed by tyrannical regime, personified by the Big Brother construct. Big Brother as the ever watchful entity was always quick to silence dissent and any form of expression was cause for trouble. As a result any notions of privacy were soon dispatched for the characters, aware that they were always being watched. Though presented as a work of fiction there are number of parallels that can be drawn with the narrative and the modern day society we now enjoy.
While it may seem the type of rhetoric conveyed by conspiracy theorists, we are increasingly living in a highly monitored and scrutinized society. A high price has been placed on the information we as communicators now generate, with both government and private industry looking to extract as much data as from our day to lives as possible. Consider for a moment a person’s digital footprint. In this day of technological advances, the use of communications mediums such as the Internet and telephones have become so ingrained in our lives that it’s not often thought about where all the information we generate is ending up. We use technology for banking, shopping, correspondence, networking and countless other activities we now consider routine in our lives. Yet how often do we consider where all this information is going? Who owns our digital footprints and what level of privacy and safety do we have as result of this and how does it differ from what we expect?
As a result this paper will focus on the privacy issues surrounding the digital communication age we now live in. It will discuss how the integrity of our ability to communicate effectively is being compromised by privacy concerns. An age where the majority of the first world population now exists simultaneously within two worlds, the physical and the virtual world of the Internet. In the same way that we etch out an existence in the real world, we are increasingly leaving our mark in cyberspace. An ever increasing database of knowledge is being built up by actions we casually go about everyday. From purchasing grocery items with a credit card to socializing online through networking sites, every contact made is leaving a virtual trace.
We live in an age where governments are increasingly active in the monitoring and scrutinizing of our communications, a practice often performed without consent or disclosure to the public. Finally, an age where an increasing portion of the Internet is based on the user generated content. The rise of Web 2.0 has seen the increasing popularity of social networks that encourage the sharing our lives in a relatively public forum, to video and photographic websites dependant on public submission, the modern world is putting it their lives on show. So with so much information being generated by our actions what levels of privacy can we expect?
Firstly the concept of privacy isn’t about the right of individual or a group to engage in an activity without their actions being scrutinized and monitored, nor is it about the ability to hide ones activities. Instead as Garfinkel (2000, p 11) points out, “it’s about self-possession, autonomy and integrity”. In that, it is about the right as individual to decide what information is made public for the rest of the world to see and what we choose to keep to ourselves. As Hughes (1993, p 285) sees it, “privacy is the power to selectively reveal oneself to the world”, in that the power should be with the individual.
Many of the everyday tasks we perform now involve what Garfinkel termed ‘privacy – invasive technology”, referring to devices that collect, store and transmit information based on our actions for processing and analysis. For example in order to have the convenience of a credit card for shopping there needs to be the gathering of private information. Information about who you are as a consumer, financial details and purchasing habits are collected by a number of entities such as the retail store, the bank, credit card provider. Information that has been deemed necessary for collection, by an organization making a conscious decision to do so, so that it can better understand the behavior of its customers and react accordingly..
In the majority we have come to accept this. In the interest of convenience we seemingly are willing to accept this information becoming a commodity. As Garfinkel states, “we are entering a new world in which ever purchase we make, every place we travel, every word we say, and everything we read is routinely
What is of concern, is when the use of intrusive technology is done covertly. Increasingly governments and businesses are engaging in practices that they themselves would prefer to maintain private and confidential. These practices often defended as being in the interests of national security and crime prevention, often involve the surveillance and recording of the communications activities of the general public. As Hunter (2007, p 1) points out “surveillance has evolved from a helpful investigatory tool in solving crimes, to an essential technique used to prevent minor violations of the law and large scale catastrophes from occurring”. As a result the ability to communicate freely is being impaired.
However, the issue is that in order to capture the few, the majority is also under increased surveillance and scrutiny. An individual’s right to privacy has been compromised and justified against the perceived prospect of greater security for the collective population. In Australia, legislation is continually being pushed that would allow law enforcement agencies (State and Federal) to access personal information pertaining to the following: telephone (including mobile), email and Internet records, Common to each new legislation is the ability to access private information without a warrant or the knowledge of the intended target of the surveillance.
Perhaps of even greater concern is the current proposal by the Australian government to mandate a “clean feed” for Internet connections to homes and schools. Under the proposed scheme, the government would censor content it deems inappropriate, denying access as a default. Individuals supposedly would be allowed to opt-out of the scheme but whether this would be an easy process remains to be seen, as would the possibility that in volunteering to “opt-out” would put those people under greater scrutiny.
As Electronic Frontiers Australia Chair Dale Clapperton (2008) stated about the proposed plan, “The proposals threaten the free speech rights of every Australian.... Australia is supposed to be a liberal democracy where adults have the freedom to say and read what they want, not just what the Government decides is ‘appropriate’ for them.” The concern is that once this technology is in place it becomes far too easy to monitor what people are doing online. Whilst it may impede some illegal activity, the question remains, under whose jurisdiction and governance does the notion of “appropriate content" get decided and what level of privacy can exist when the possibility exists that your actions are being monitored and recorded?
In the United States the Carnivore program was used to scan and monitor email traffic on the Internet during the early 1990’s. Developed by the United States Federal Bureau of Investigation, out of perceived need that it would allow for improved surveillance and detection of terrorist activities, the program would search for data that matched a predefined dataset. Naturally those engaged in criminal or terrorist activity don’t publicize the fact or their email address, so Carnivore worked by scanning/sniffing all communications traffic for keywords from the dataset. If the system flagged enough keywords, the email would be logged for further scrutiny regardless of who generated the message. The program was reportedly replaced by commercially available software that was deemed more suitable. This also raises a privacy concern that the technology for monitoring and capturing internet traffic covertly by governments is also available for exploitation by private commercial interests.
Similarly, in usage today, the Echelon system is used to intercept, voice, email, and facsimile communications around the world. A collaborative intelligence network consisting of the United States, Canada, United Kingdom, Australia and New Zealand was established for the sharing of information by circumventing each countries own national laws. In that, it is illegal to spy on one’s own citizens but it is not illegal to spy on another nation on their behalf and then pass on any information that may interest them.
Prior to these examples occurring, the United States government aand its agencies the Federal Bureau of Information (FBI) and the National Security Agency (NSA) pushed for the introduction of the “Clipper Chip”. A device that would encrypt communicated material, but the
These examples are demonstrative of governments that seem to think that in order to make the population safe, everyone needs to under suspicion and they highlight the increasing erosion of the peoples right to privacy. In the
The problem as Hunter (2007) sees it is the rapid evolution of these technologies has seen government so focus on what they could do rather than what they should. In that “technology continues to rapidly advance, far more quickly than most governments can create legislation. As a result, no international legal framework exists to deal with the issues of privacy rights and surveillance” (p. 13) As result in order for a perception of security within a community, citizen’s are being asked to give up on part of their right to privacy. The issue is how much are citizen’s willing to give and how much are those in power willing to take whilst our ability to communicate freely is being impeded..
When the
Yet it’s a concept that won’t go away, with just this month the government of the
While it seems rational to be outraged and suspicious of intrusive practices being carried out by governments, the popularity of Web 2.0 and its user interactive content highlights another privacy issue. As mentioned many social networking, user content generated, and virtual community sites are profiteering from the apparent increasing narcissistic need to share and exposé oneself to the rest of the world.
Little thought seems to be given to the implications that posting personal information about one self may have. This is under the misguided or ill-informed opinion that the information they post is only accessible by those they intended to view it. Yet the Internet is for the majority a publicly accessible forum. Social networking sites for example do offer privacy setting designed to limit accessibility, yet all too often these are easily negated or not engaged at all.
Furthermore with the increasingly popularity of user generated content based websites, either video (e.g. YouTube), photographic, (e.g. Photobucket, Flickr) or a blog site (Livejournal, Blogger), there exists a greater chance that an individuals digital footprint and wider personal network, may reveal more information about its creator than they ever intended. Voluntary postings about personal thoughts, feelings and beliefs, combined with online activities helps to form a virtual archetype of those individuals depending on how they choose to be seen.
Current and future employers may find any number of pieces or personal information that may affect their judgement of the individual. A study by a
Also of concern is the greater number of opportunities the Internet has provided for those with criminal intent. Social networking sites can provide an abundance of information for identity thieves, hackers, crackers, phishers and predators with which they can use to their advantage. Furthermore as technology evolves the methods used by these protagonists are rapidly evolving making their activities harder to police.
Also one should consider that it standard practice for these sites to request the user to enter their personal likes and dislikes about a wide variety of subjects. For example through data mining, a music company can see how many people list their represented artists on their page. Combine this with the other demographic information provided by the user, (age, location, gender etc) and combine it with countless other users, the music company can get a greater understanding of who their customers like and dislike.
Taking this a step further, the Web 2.0 website operators are then able to provide targeted marketing efforts based on the content the user has provided. Content that although was provided by you the user, is now the property of the company whose website it was entered into. For the user this may result in them receiving targeted marketing based on the information they have unwittingly disclosed.
Facebook drew attention to itself earlier this year when its Beacon advertising feature caused a backlash amongst users of the social networking site. The application was incorporated into Facebook user profiles to data mine information about purchased items on web sites external to their own. The feature didn’t allow users to opt-out of the program initially and was seen (by those aware of it) as an invasion of privacy because the program would then broadcast user activities to their social network friends. The challenge for social networking sites is to balance their popularity and how to monetize the tremendous wealth of marketing and behavioral information that is available through these sites. It is become common practice to publicize aspects of one life in a public forum with little thought into the potential uses of this information.
Furthermore, in an effort to attract more traffic, these Internet websites are increasingly sharing information in effort to synchronize and amalgamate content from different sites. For example, both the popular websites, MySpace and Facebook, allow for users to input their email account details and then allow the social networking sites to harvest these email addresses and the user’s contacts details in attempt to find the users friends. In reality it also serves as another tool for obtaining marketing and behavioral information about the users of their website.
As a result of this a number of users of such sites are then deciding to delete the profiles and in there mind regain control over their personal information. However this isn’t always the case and many of these sites maintain archive copies of their content for backup purposes and future use. Aspan (2008) quoting Facebook’s terms of service that state that as a user “ you may remove your user content from the site and any time” and that while a user may delete their profile(s), they should be aware
This is because to the companies that operate these social networking sites; the amount of potential marketing information is exponentially linked to the number of users. Google attempted to take its market intelligence gathering process a step further when it launched its own web browser to compete with the likes of Microsoft’s Internet Explorer and Mozilla’s Firefox. Launched with great fanfare, Google’s Chrome browser promised faster user-friendlier interface for accessing the Internet.
What wasn’t initially made public was that the browser would harvest the page address of websites visited by a user and electronically report these back to Google. Through collecting about 2 percent of all keystrokes entered into the browser, over time a virtual catalogue of a person’s interests and activities would be built up over time. Compounding the issue was the in the browsers initial release, the terms and conditions of use stated that any content entered into the browser would become property of Google. Once again public outcry would see Google amend its terms and conditions of use but it still reserves the right to collect information obtained during its products usage.
So it is evident that with an increase in the availability of information there is an apparent need for greater security and awareness. One hope for better privacy lies in encryption. This process provides a secure means of transmitting encoded “scrambled” data. In that, the messages can only be read or heard by the intended receiver and the sender, through the use of a “key” necessary to decode the message. The intended receiver of the message is able to read and decipher it, as they have been made aware of the “key” previously.
The good news is that such technology to make the internet and a personal data more secure is already available with a number of commercially available products existing in the marketplace. However, because governments around the world consider the technology capable of being used by criminals and terrorist’s they lobby against the use of such techniques. In the
Information at this time is not always safe and perhaps the key to maintaining privacy for the individual is ensuring that they are in charge of what they share. Technology is advancing so rapidly that information we once thought secure and private is now being put into a public forum. Privacy however should not be surrendered under an illusion of security as championed by governments. Instead careful judgement should be made by individuals when choosing what information they choose to reveal and showing wise judgement with whom they share with it.
Realising that whilst they may not care what information is available about them today, but there is always the possibility that tomorrow may bring a change in attitude. The ability to control what the world sees of us remains in part up to the individual. How much we chose to reveal should be based on how comfortable we are with other people knowing and those choices should always be informed knowing that a number of Orwellian “Big Brother’s” may be watching us.