Facebook has bought WhatsApp. I don’t like it.

February 20, 2014 by · Leave a Comment
Filed under: Uncategorized 

What does the acquisition of WhatsApp by Facebook mean? On the face of it (no pun intended), it means that whatever data you produce while interacting with WhatsApp will be available to Facebook. And I guess vice versa, though that’s less interesting.

I want to ask this question in two ways. What does this mean about the past, and what does this mean about the future?

Let’s start with the past. Does Facebook now have access to all the text messages, pictures and videos I have ever sent or received on WhatsApp? I think not. Whatsapp’s “Privacy Notice” says that “Once a message has been delivered, it no longer resides on our servers. The contents of any delivered messages are not kept or retained by WhatsApp.” That’s good. Facebook can’t see my texts. However, it also says: “The contents of messages that have been delivered by the WhatsApp Service are not copied, kept or archived by WhatsApp in the normal course of business.” It doesn’t define “the normal course of business,” but for now we’ll have to assume that they don’t know what I’ve been saying or reading on WhatsApp.

However, they do know who I’ve been in contact with: “WhatsApp may retain date and time stamp information associated with successfully delivered messages and the mobile phone numbers involved in the messages, as well as any other information which WhatsApp is legally compelled to collect.” Putting aside the question of what information WhatsApp is legally compelled to collect, what they are telling us here is that they are retaining metadata. This metadata is of huge importance (otherwise the NSA wouldn’t be so keen on it) and tells the service provider a great deal about us.

For instance, there are people I interact with on Facebook who I barely interact with outside of Facebook, if at all. They are kind of quirky Facebook chums. I enjoy reading their statuses and commenting on them. Sometimes they Like mine. However, on WhatsApp I interact with the people who are really important in my life (not meaning to diss my lovely Facebook friends): my partner, my siblings, my parents, the people who I see most regularly. It’s not unreasonable to assume that Facebook will use this information to tweak its EdgeRank algorithm to try and keep me on the site for longer (and thus make me a more saleable commodity to advertisers).

Facebook will be receiving all of the metadata collected by WhatsApp: “In the event that WhatsApp is acquired by or merged with a third party entity, we reserve the right to transfer or assign the information we have collected from our users as part of such merger, acquisition, sale, or other change of control.” I think a large part of the deal here is Facebook buying this metadata.

What does this mean for the future? Facebook is in the advertising business. More information about users means better targeted adverts, which, in theory, means that more advertisers will advertise on Facebook and Facebook earns more money. Up until now, the information collected about us by Facebook only went as far as the internet. (I say “only” – this is already a huge amount.) The acquisition of WhatsApp now lets Facebook into our text messages. Whatever we may think about the publicness of information we post on Facebook, surely we all feel that there is a difference between a Facebook status update and a text message.

Texting is private. It feels more like telling something quietly to a friend than shouting it out from the rooftops. So should the text messages we send be mineable for information that will help advertisers target us more efficiently? For those of us who have ditched regular SMSing for WhatsApp (i.e., nearly all of us), this is what’s about to happen.

This is just a very preliminary sketch of what I think the Facebook acquisition of WhatsApp means. It says nothing about the implications for state institutions to know us even better. It says nothing about the chilling feeling of knowing that your private communications are going to be integrated with your more public performances. I also haven’t gone in to the importance of the networks you belong to (i.e. the people you chat with on WhatsApp) in defining who you are for external observers, often very accurately and in ways that would surprise you (I’m thinking here of the deanonymization efforts of people like Latanya Sweeney, Arvind Narayanan and Vitaly Shmatikov).

Google+ first thoughts

June 30, 2011 by · Leave a Comment
Filed under: Uncategorized 

Google+ is calling its platform “real-life sharing”. It wants to approximate the ways we interact on its platform to our real life behaviors. This would certainly seem to be a good idea, assuming that what people want is to carry on interacting online in ways that are continuous with their offline interactions. A number of points need making at this point. First, the way we interact offline nowadays includes all sorts of computer mediations, such texting. In other words, it is not as if the “real life” part is unambiguous. Whose real life, exactly, is Google+ trying to mimic? This is a great question, because it gives us an insight into the ideal Google+ user.
This then iterates back into real life. First of all, we may want to adopt the lifestyle of the ideal Google+ user. It is an ideal type that we may think we ought to try and approximate ourselves. Second, maybe we will start to conceive of our friendships in the way that we enact them on social network sites – that is, as a collection of discreet acts of information transfer. Google is certainly right that Facebook is off the mark in terms of the nuances of what we share and with whom (and speaking from personal experience, this is certainly the reason that I would not befriend my mother on Facebook, and find it hard to believe that anyone would (befriend their mother, that is, not mine)). But you can’t help think that “real life” is not just sitting in front of your computer screen and sharing your thoughts (and favorite links) about your favorite hobby, but actually going out and doing that hobby (I’m thinking of the Sparks part of the Google+ platform right now). More generally, the interesting question – to me at least – is whether people are starting to understand their own friendships in terms of sharing, and whether this would reflect an adoption of a category from the Internet. After all, we understand ourselves and our lives through social categories and constructs. My hunch is that “sharing” is becoming an increasingly important one.

Facebook’s new facial recognition feature

June 15, 2011 by · Leave a Comment
Filed under: Uncategorized 

The latest privacy furore surrounding Facebook involves its new facial recognition feature. According to Facebook’s own blog entry on the feature, when you upload photos of people who are already tagged in other photos, Facebook will suggest their names, making it quicker for you to tag your photos.

Now I’m just as keen on privacy as the next person, but some of the anti-Facebook responses appear to me to be slightly overblown, especially those that think that this facial recognition gives governments greater access to information about its citizens. First of all, if governments can access our Facebook photos, they don’t need Facebook’s facial recognition technology to identify us. I’m sure they have their own. So the problem would lie with the photos being online, not with their being tagged. Secondly, just because someone has tagged a photo as being a photo of me doesn’t make it a photo of me. It may well be a photo of me, but the person tagging may have made a mistake, or may have tagged someone else as me in order to get my attention. Thirdly, to the best of my knowledge, I cannot prevent myself being tagged by someone else (but I can prevent other people from checking me in with them to places). I can remove the tag if I wish, but it may be too late. And disabling the facial recognition feature doesn’t mean I can’t be tagged anyway, which suggests that the problem, if there is one, is with tagging itself, and not with the new feature.

Most interestingly for me, though, as a sociologist of technology, is the fact that Facebook is offering a technological means for doing something that we can (and do) do anyway: Facebook says that 100m tags are added to photos every day. Actor-network theory analyzes how networks of humans and non-humans are configured so as to successfully perform so-called “programs of action”. It looks at those tasks that are undertaken by humans and those undertaken by non-humans, without privileging one type of “actant” over another. Often, non-humans (computers, say) can carry out out tasks much quicker than humans: a computer will find me someone’s phone number in the phone book much quicker than I can. Sometimes we are happy for non-humans to be involved in programs of action (such as finding someone’s number in the phone book) and sometimes we are less happy (for instance, cameras that photograph us speeding on the motorway).

I think the way to think about this new feature on Facebook is in terms of actor-network theory, and your view on the feature will be determined by whether you think that having a computer do something you could do yourself (and have been doing yourself) makes the action qualitatively different. Is having a machine help you identify your friends’ faces qualitatively different from you identifying them yourself? Does the fact that the machine can do it far quicker make the very task itself different? If it is OK to tag your friends, does having a computer help you tag them faster make it wrong? If so, how come?

And finally a quick “I’m not naive” disclosure. Of course, the reason Facebook wants to “help” us tag our friends is because Facebook makes money from the information it collects. A tag on a photo is information. I’m not so naive to think that Facebook is taking pity on those who have to spend hours tagging their friends in all their photos. There is real economic value in those tags, and so we should always be suspicious of everything Facebook does. Also, I have no doubt that there are serious privacy threats latent in facial recognition software. The state already knows what I look like (there are photos in my passport and on my driving license). If it wants to, it can film me at a political gathering, run facial recognition software, and thereby know I was at that gathering. That, to me, is much more worrying than Facebook’s offering.

A change in popular views of technology?

March 16, 2011 by · Leave a Comment
Filed under: Uncategorized 

There are indications that utopian views of technological advance are being pushed back by more measured appraisals. This utopianism was out in full force during the Tunisian, but especially Egyptian revolutions. The techno-utopian view is that new media deterministically imply democracy. (This isn’t entirely dissimilar to Thomas Friedman’s ‘Golden Arches Theory of Conflict Resolution’ (countries with McDonald’s don’t go to war against each other…).)

However, Evgeny Morozov’s book, The Net Delusion argues against this, saying that actually the web enables dictatorial regimes to surveil its citizens in unprecedented ways. Today, an article in the Guardian quotes excerpts from a talk given by Julian Assange, in which he describes the Internet as “the greatest spying machine the world has ever seen”.

Are these weak signals of a more nuanced approach to technology? Or are they simply representations of technological distopianism? I suspect the former, and welcome such a move.

The Internet Never Forgets…

March 9, 2011 by · Leave a Comment
Filed under: Uncategorized 

…but sometimes we do. So a new startup, Memolane, wants to help us remember. You sign up and then add the services you want to add to your digital memory lane. Memolane then collects pretty much everything you’ve done using those services (Picassa, FourSquare, Twitter, and so on) and puts them in a time line. The right to be forgotten? Forget that. This is the most amazing instantiation of the internet’s memory that I’ve seen.

And I write this having just created my own memolane. It goes back to 2006, when I first posted a photo online using Picassa. I have to say that I’m sitting here looking at my screen with my jaw on the floor. It is completely remarkable.

The privacy issues here barely need stating: hack this, and you’ve hacked all of my Web 2.0 activities for the last five years. Having said that, the Memolane folk are very clear about privacy being extremely important to them.

I need to go and stare at my timeline for a bit longer and say wow a few more times. Perhaps then I’ll come back with something more intelligent to say. Until then, eat your heart out, Viktor Mayer-Schoenberger.

(Thanks to the New York Times for bringing my attention to this.)

Talk entitled “Privacy, Technology and Children: The Problem in Context”

December 20, 2010 by · Leave a Comment
Filed under: Uncategorized 

Below is a talk I gave yesterday at the annual conference of the Israeli Law and Society Association. The “Benny and Ayelet” are two academic lawyers who have written a paper arguing for children’s right to privacy vis-a-vis their parents. Parental surveillance of children includes all sorts of filtering and monitoring programs that parents might install on their computers so they know what their kids are getting up on online, for instance. Enjoy!

My aim for today is to try and put the discussion of children’s right to privacy in a broader social context. The first thing that I should note is that my perspective is that of a sociologist, and from this perspective I am not going to take a stance on whether children should or should not have a right to privacy, though I do have something to say about the reasons for parents’ surveillance of their children, some of which are creations of the media and based on empirically unfounded anxieties. My understanding of both rights and privacy, at least as a legal concept, is far inferior to the other speakers’. So the question I ask here is: What is the social context of our current discussion? This is not merely an academic question. If we can identify the trends that are framing our discussion today, then this could give us a clue as to what might happen in the future.

Before I get going, I would like to outline the limitations of my talk: firstly, like Benny and Ayelet, I’m dealing with children’s relations with their parents. [I’m not dealing, for instance, with the activities of companies who place adverts for children on the internet, or who track children as they surf.] Also, I’m mainly restricting myself to children’s exposure to pornography and online grooming, which is when an adult develops a relationship with a child in order to sexually abuse him or her.

My argument is that current parental concerns about what children are doing online are twofold. One aspect is to do with the transgression of the boundary between the inside and the outside. This in turn is the consequence of quite long-term and extremely widespread changes in childhood, specifically, the definition of the outside as dangerous and the domestic as safe. What I want to argue is that surfing is an activity that brings the outside in and takes the inside out. The second aspect is to do with a particularly modern uncertainty about the boundaries between adults and children, or adulthood and childhood, especially in relation to sex and sexuality. In my conclusion, I suggest that current parental practices are embedded in two extremely deep-rooted conceptions of childhood.

So how do I establish these arguments?

As a starting point, we can say that if there is a call to recognize a right to privacy among children, it is because of a perception that their privacy is being invaded. There are all sorts of indicators that this is the case, or, to put it in more morally neutral terms, that today’s young people are subject to more forms of surveillance than children at any time in history (Howe & Strauss, 2000). It has even been suggested that ultra-sound technologies are part of this array of surveillance technologies, when fetuses are imaged to check for abnormalities.

This then raises the question, why is their privacy being invaded? What are parents, or adults more generally, hoping to achieve through these practices? In general terms, or more accurately, on their terms, parents want to protect their children. (But it might also be true that they don’t really know why they are doing it – in her study of CCTV in schools in England, Emmeline Taylor (2010) found that sometimes the school didn’t really have a well thought out rationale for placing cameras around the school, it just did it. In this sense it might be an act of imitation; or the principal might think he has to keep up with other schools. This might be the same with parents: they adopt certain practices though without necessarily knowing why. At bottom, though, the motivation is to protect children, very often from themselves.)

So what are the dangers that concern parents? There would appear to be two. The first, and most significant, are online predators and indecent material, especially pornography. This can be inferred from the marketing materials of companies who provide tracking and filtering software for parents. (For instance.) The second is a concern that young people in online environments are behaving in a way that is (1) inappropriate in and of itself; and (2) might have unwelcome unforeseen consequences by leaving digital footprints of youthful indiscretions. I am thinking here of the popular discourse, which has been shown to be inaccurate by study after study (boyd, 2007; Herring, 2007; Livingstone, 2008), that claims that the youth of today has no sense of shame or embarrassment.

One way of accounting for these concerns is in terms of a generation gap. One aspect of this is children’s relationship with technology. As Buckingham has noted: “new technology is often invested with our most intense fantasies and fears. It holds out the promise of a better future, while simultaneously provoking anxiety about a fundamental break with the past. In this scenario, children are perceived both as the avant-garde of media users and as the ones who are most at risk from new developments” (Buckingham, 2007). If we want to understand current concerns about youth and privacy, though, both those of privacy advocates and those of parents, we need to uncover the specific contours of the current day instantiation of this gap.

It is at this point that I shift my emphasis from privacy and technology to the sociology of childhood.

There has been a well-documented movement of children from the outside to the inside, and a change in the social meanings of those categories, which, I argue, is extremely relevant to our discussion. This movement might be said to have been ongoing since the expansion of formal schooling in mid-19th century Europe, and can be seen in the general idea that “the street” is no place for children. In recent decades the process has taken on specific characteristics, which, surprisingly enough, are very well captured by an ethnographic study of childhood in China. In her research, Orna Naftali describes a movement into the home among Chinese children, particularly since the emergence of capitalism. Children, she notes, are being given a room of their own. This is due to growing affluence in China and reduced fertility rates. Both of these are processes that have characterized the West in recent decades as well. There is also a sense in China, according to Naftali, that if a family only has one child, then they want the best for that child (Naftali, 2010). Interestingly, a study of privacy attitudes among Chinese teenagers shows them to have quite similar concerns to those of Western kids; it also shows differing views of what should be considered private among teenagers and their parents (Tang & Dong, 2006). (A study of children in Amsterdam that compares the 1950s with the 1990s discusses the movement of children from the outside to the inside too (Karsten, 2005)).

A related idea has been put forward by European sociologists of late modernity, and especially Ulrich Beck. For Beck, the contemporary era is one characterized by risk. As a result, children become the focus of their parents’ hopes and aspirations. “Late modern constructions of childhood become a form of moral rescue, a means by which adults try and recapture a sense of purpose and belonging”: this is how sociologist of childhood, William Corsaro describes it (Corsaro, 1997, p. 53). Similarly, Chris Jenks suggests that adults’ insecurities are projected onto children. This implies that the less control people feel they have over their own lives, the greater control they will try to assert over their children’s lives (Jenks, 1996).

This idea was also expressed by Wyness, who studied parents and children in Scotland in the early 1990s (Wyness, 1994). Asking whether parents know where their children are, he found that parents are worried about their children being outside, and would rather they bring friends home than hang out with them in the street. The television was part of this trend – a technological device that can help babysit the children.

So – and I am quite aware that I am painting in broad brush strokes here – there is a trend for children to be brought indoors and to be given more space within the home. This is to do with greater affluence and the re-conceptualization of the home as safe, and the outdoors, the “street”, as dangerous. I said at the beginning of my talk that the boundaries between inside and outside are being transgressed. I would now like to return to this notion.

[slide] The reason I say that the boundaries between inside and outside are being transgressed is that today, even when the child is at home, parents do not really know where he is. When the child is on the internet, he escapes the boundaries of the home. The internet undermines society’s attempts to create the domestic sphere as isolated and protected from the world outside. When surfing, the child brings the outside in. This is also an effect that has been attributed to the television (Harden, 2000), but my next point shows that the internet differs from the television quite dramatically.

I said earlier on that surfing the internet takes the inside out. My hunch here is that parental and societal anxiety about children’s self-over-exposure through social network sites can be conceptualized in terms of the inside – the domestic – making its way outside in a manner that is uncontrolled by the adults of the family. The domestic sphere is suddenly much less enclosed than we might think. There isn’t really time to develop this idea fully here, but there is an interesting literature about the importance of the secret in the construction of the family (Brown-Smith, 1998). It is also worth noting that the issue of family secrets has been brought up by researchers in the context of another medium of sharing, or over-sharing, according to some, namely the talk show.

The second aspect that I would like to touch upon as part of the explanation for parents’ invasion of children’s privacy is sexuality. This is of course relates to concerns about grooming and inappropriate contact with strangers, or “stranger danger”. Other practices that this relates to are surfing for pornography and sexting – the sending of sexually explicit photographs of oneself over mobile phones. Here, the problem is that the too-early onset of sexuality is seen as disrupting the project that we call raising children.

Childraising has by now been almost thoroughly psychologized. We are all familiar with Piaget and Erikson, even if we don’t know it, and we all talk about stages in development (Corsaro, 1997). We also know, thanks to Carol Gilligan and her feminist critique of Erikson’s theory of moral development, that what is presented as descriptive is very often normative (Gilligan, 1982). Thus, if children disrupt the proper order of things, this is a moral problem as much as anything else. This idea has deep roots in western culture: indeed, sociologists of childhood James, Jenks and Prout remind us that Freud himself thought that children seeing their parents, or other adults, in sexual congress could suffer from hysteria as a result (James, Jenks, & Prout, 1998, p. 39). Going even further back, Postman (1982), in his book on the disappearance of childhood, attributes to the ancient Romans the idea that young people should not be exposed to adult, and especially sexual, behavior.

If parents consider young people’s sexuality to be threatened by the use of the internet and other technologies, then this would help to explain why parents want to keep track of their children’s usage of these technologies – indeed, a recent report found that 65% of American parents have looked through their children’s text messages (Lenhart, Ling, Campbell, & Purcell, 2010).

We should notice here that parents, and society in general, are doing what Marcia Pally has called “image-blaming” (Pally, 1994), namely, holding pornographic images responsible for anti-social behavior. Image-blaming is an effective mechanism: it offers a simple, technological solution – preventing access to the images – to a perceived problem – over-sexed teenagers. Without going into this debate in depth, it at the very least suggests that parents’ attention is directed – by the media – to the wrong place. This is also the conclusion reached by John Holmes, who finds that the online dangers to young people are vastly over-stated. “There is little evidence to suggest young people are at significant risk and, where risks are present, most young people are able to safely negotiate them,” he says, adding that SNS users are “less likely to experience distressing stranger contact than non-users.” (Holmes, 2009, pp. 1177, 1184)

It is also reflective of the dominance of two particular models of childhood, as described by James, Jenks and Prout in their seminal book on the sociology of childhood (James, et al., 1998). For a right to privacy to take hold, I suggest that we would need to see the emergence of a different model of the child.

The two models, or ideal types, of childhood or children that play a role here are those of the innocent child and the evil child. The innocent child is the child whom we are contracted to bring up “in such a manner that their state of pristine innocence remains unspoilt by the violence and ugliness that surrounds them” (p. 14). This is the child whom parents are protecting from pornography and grooming. The view of the evil child, on the other hand, assumes that “evil, corruption, and baseness are primary elements in the constitution of ‘the child’” (p. 10). This is the child whom parents are preventing from accessing pornography in case it sets free the monster within. The point is that these two contrasting models of childhood give rise to identical practices: the strict surveillance of children’s online activities. If a single practice is able to draw on more than one deep social justification, then it may be hard to put an end to it. And this is without explicitly discussing surveillance as an increasingly central component of modern society. Of course, this is to say nothing about whether it is desirable to put an end to parental surveillance of their children; but it is to say that doing so will certainly not be easy.

Bibliography

boyd, d. (2007). Why Youth ♥ Social Network Sites: The Role of Networked Publics in Teenage Social Life. In D. Buckingham (Ed.), Youth, Identity and Digital Media (pp. 119-142). Cambridge: The MIT Press.

Brown-Smith, N. (1998). Family secrets. Journal of Family Issues, 19(1), 20.

Buckingham, D. (2007). Introducing Identity. The John D. and Catherine T. MacArthur Foundation Series on Digital Media and Learning, -, 1-22.

Corsaro, W. A. (1997). The sociology of childhood. Thousand Oaks, Calif.: Pine Forge Press.

Gilligan, C. (1982). In a different voice : psychological theory and women’s development. Cambridge, Mass.: Harvard University Press.

Harden, J. (2000). There’s no Place Like Home: The Public/Private Distinction in Children’s Theorizing of Risk and Safety. Childhood, 7(1), 43.

Herring, S. C. (2007). Questioning the generational divide: Technological exoticism and adult constructions of online youth identity. In D. Buckingham (Ed.), Youth, Identity, and Digital Media (pp. 71–92). Cambridge, MA: The MIT Press.

Holmes, J. (2009). Myths and Missed Opportunities — Young people’s not so risky use of online communication. Information, Communication & Society, 12(8), 1174 – 1196.

Howe, N., & Strauss, W. (2000). Millennials rising: The next great generation: Vintage.

James, A., Jenks, C., & Prout, A. (1998). Theorizing Childhood: Cambridge: Polity Press.

Jenks, C. (1996). Childhood. London ; New York: Routledge.

Karsten, L. (2005). It all used to be better? Different generations on continuity and change in urban children’s daily use of space. Children’s Geographies, 3(3), 275-290.

Lenhart, A., Ling, R., Campbell, S., & Purcell, K. (2010). Teens and Mobile Phones: Pew Internet & American Life Project.

Livingstone, S. (2008). Taking risky opportunities in youthful content creation: teenagers’ use of social networking sites for intimacy, privacy and self-expression. New Media & Society, 10(3), 393.

Naftali, O. (2010). Caged golden canaries: Childhood, privacy and subjectivity in contemporary urban China. Childhood, 17(3), 297-311.

Pally, M. (1994). Sex & sensibility : reflections on forbidden mirrors and the will to censor Available from http://www.marciapally.com/Pages/sxsn.html

Postman, N. (1982). The disappearance of childhood. New York: Delacorte Press.

Tang, S., & Dong, X. (2006). Parents’ and Children’s Perceptions of Privacy Rights In China. Journal of Family Issues, 27(3), 285-300.

Taylor, E. (2010). I spy with my little eye: the use of CCTV in schools and the impact on privacy. Sociological Review, 58(3), 381-405.

Wyness, M. G. (1994). Keeping tabs on an uncivil society: positive parental control. Sociology, 28(1), 193.

Does WikiLeaks have any privacy issues?

December 12, 2010 by · 1 Comment
Filed under: Uncategorized 

The latest round of WikiLeaks excitement is still going on. The press is producing news story after news story from the leaked cables, and now Assange himself is a story, having been arrested in England and refused bail.

While I have heard it argued that there is no privacy issue here, I think there is. It is indeed true that none of the people exposed by the leaks are private people going about their private affairs, but rather public figures busy doing their jobs. However, there are several parallels in the way the latest WikiLeaks episode has been reported and the way that privacy is discussed nowadays.

Firstly, the technological basis of WikiLeaks and today’s concerns about privacy is shared. The diplomatic cables were leakable because they were stored online – not on the World Wide Web, but on a parallel network run by the US. The reasons for storing this data online are obvious: it is cheap; the data is searchable and analyzable; and the data can be accessed from anywhere in the world. A further reason for the US administration’s decision to upload certain cables to this network is to do with 9/11, when the US discovered that its various intelligence branches failed to share knowledge. The current WikiLeaks affair, therefore, was made possible at least partly because of a desire to share information, and blatantly exposes the danger of gathering digital information in a single (virtual) place. This, I would suggest, is the same danger we expose ourselves to when we store personal information, such as our emails, address books, and to-do lists, online.

There is a paradox here that we do not yet really know how to deal with: the digitalization of our lives provides us with new efficiencies, but also makes possible the leaking of our lives. This would appear to be just as true for private individuals as for governments.

Secondly, some of the responses of diplomats and governments to the latest leaks seem to be quite similar to those of people who have experienced some terrible technology-caused embarrassment. I say this without having conducted a systematic study of reactions (because this is a blog, and not an academic article), but my impression is that the phenomenological experience of diplomats whose missives have been exposed is not entirely dissimilar to that of having sent an email to the wrong address, or having been tagged in an inappropriate photograph. Information escapes its proper context and reappears in another one, often with embarrassing consequences. So even if the cables do not include personal information unrelated to the official capacities of their authors, the emotions caused by having their content exposed would appear to be akin to other instances of digital leakage, even if in many other ways they are quite different.

Thirdly, and perhaps slightly tenuously, my attention was grabbed by a description I read of WikiLeaks as lacking in shame and embarrassment, emotions that, the author claimed, “are in short supply these days.” Who else is accused these days of lacking shame and embarrassment if not the digital youth, who, according to popular discourse, is shamelessly exposing every aspect of their intimate lives online? Of course, study after study has shown young people to have a very sophisticated sense of privacy, but the popular conception is that they shamelessly share too much, and that they do not find it embarrassing to publicize their latest bowel movements, for instance. I wonder, then, if it is not too far-fetched to suggest that the above quotation constructs a discursive association between WikiLeaks and Facebook, in that both are symptomatic of a society that lacks shame in its exposure of information that it would be better to keep under wraps.

In general, I think that the questions that the US government is asking itself now are not all that different from those that we face in our everyday lives. Should we digitize the information at our disposal? Who should be able to access it? How easy is it to remove it from one context and publish it in another? In a way, we are all still struggling to find our feet in the digital world.

It’s not just the big corporations…

November 5, 2010 by · Leave a Comment
Filed under: Uncategorized 

I came across an interesting article in the New York Times “Home and Garden” section the other day about the use of video surveillance by private individuals to identify neighbors who have been throwing bags of dog poo into their garden or scratching their car or otherwise behaving in a non-neighborly manner.

For me, this article was a timely reminder that data collection is not only being carried out by big fat corporations with an economic interest in our data, but also by normal people going about their normal lives. The article discusses the increased availability of small, affordable CCTV systems that can help people solve the small problems of everyday life – the dog that keeps pooping in the garden, the neighbor who leaves his rubbish by your house.

What is the meaning of all this? I think a few things are worth pointing out. First, practices that were originally initiated by the state and law enforcement authorities are being adopted by citizens: we can all be the policemen of our front garden and our driveway and confront our neighbors with video evidence of their misdemeanors. Or, of course, we can take it to the police (effectively doing their job for them).

Second, as the hardware costs come down, we are likely to see more of this: people want to stop their neighbor throwing his bags of dog poo into their garden more than they worry about the broader social implications of covering the streets with private CCTV cameras.

Third, unlike CCTV footage collected by the police, privately recorded images can be shared with the world, and YouTube would appear to be a popular destination for them. In other words, people are able to publicly shame their neighbors by posting their footage onto the internet. (This is an issue discussed at length by Viktor Mayer-Schonberger in his book Delete, which I mentioned in a previous post.)

I’m writing about this issue not because I want to start a campaign against private individuals’ CCTV networks, but because it looks like an interesting extension of debates over CCTV. More accurately, we might say that the same rationale given for the use of CCTV appears here, but writ small: there is a desire to prevent criminal or anti-social behavior; surveillance technologies are adopted that do not require physical presence (many of these systems enable you to access your cameras over your smartphone); and to the person who might be concerned that he is being filmed as he walks past someone’s house one might say, if you’ve nothing to hide, you’ve nothing to worry about – perhaps the most fallacious of arguments in favor of CCTV.

Data with a sell-by date

November 3, 2010 by · Leave a Comment
Filed under: Uncategorized 

I was at the recent OECD Conference on the Evolving Role of Individual in Privacy Protection: 30 Years after the OECD Privacy Guidelines. One of the issues that was discussed was the right to be forgotten. This is analyzed in an extremely readable book, Delete, by Victor Mayer-Schonberger. The problem is simply that digital memory is eternal: stupid stuff that we say online, or pictures that perhaps we shouldn’t have uploaded, are there for ever. You might take down the picture, but if someone has already saved it and distributed it, it’s out of your control.

A solution that people are beginning to think about is the idea of an automatic self-destruct feature for stuff we put on Facebook and other social networks. In other words, unless you specifically request otherwise, any update or comment you write on Facebook, say, would disappear after a certain period of time. This would make it harder for future employees (or dates) to prejudge you on a youthful indiscretion, as the automatically deleted stuff would not appear when they Google you (and they will Google you).

There is, of course, no business case for doing this. The more data Facebook has about us, the more accurate profiles it can sell to advertisers. So there are two ways something like this could happen. The first would be through regulation, the second would be through consumer power. I wouldn’t count on either of them.

When does an reasonable expectation of privacy become unreasonable?

September 19, 2010 by · Leave a Comment
Filed under: Uncategorized 

One of the more interesting questions about the future of privacy revolves, I think, around changing cultural perceptions of the private. By this I mean that what we see as private today, we might not consider as private tomorrow. Examples are readily available: not too long ago, a diagnosis of cancer was something to be kept secret, not shared with neighbors, friends, and sometimes even family. It was private. Today, that is the case to far lesser extent.

The issue of perceptions is an important one, not least because the law (in the US) sometimes rests on what the reasonable person’s expectations of privacy are. In a recent court case in the United States, the judges ruled that the reasonable person does not expect the authorities to know exactly where he has driven over the period of a month. As a result, they deemed as inadmissible evidence gleaned from a GPS device attached to a suspect’s car without a warrant.

This, of course, raises the question as to what cultural or social conditions might precipitate a change in this expectation. If Facebook Places wins over the hearts of all Facebook users, and we become used to logging our location ourselves throughout the day, would this constitute a lessening of the expectation to locational privacy? Would this make the use of GPS devices by the police without a warrant less unexpected by the reasonable person?

The flip side of this is that the private sector carries out completely legal activities that the reasonable person really might not expect (such as his shopping habits on one site influencing the adverts he sees on another, completely unrelated site (unrelated in every way apart from having contracts with the same ad provider, of course)). I’m not a lawyer, and I might be missing the point of these reasonable expectations, but it does appear to me that (1) what is reasonable can change over time, and (2) that which we might reasonably expect not to be going on is already going on.

Next Page »