Showing posts with label Privacy. Show all posts
Showing posts with label Privacy. Show all posts

Monday, February 7, 2011

Compassionate Privacy

 .
It would be nice if Mark Zuckerberg had actually said, "Privacy is so 20th century." But if he did, I can find no credible reference. However, the phrase does seem to capture the essence of his remarks about "changing social norms regarding privacy" that Facebook seeks to champion. There is evidence, though, that Eric Schmidt, the out-going CEO of Google, did actually say, "We know where you are. We know where you've been. We can more or less know what you're thinking about," and "If you have something you don't want anyone to know, maybe you shouldn't be doing it in the first place." Taken as a whole, these remarks reveal an unsettling trend toward mandating excessive sharing; like making you eavesdrop on cell phone calls about medical procedures in a coffee shop. Yeech.



This move to obsessive openness isn't a generational issue. Yes, Zuckerberg is 26, but Schmidt is 55. The phenomenon seems more a kind of “BigTech”-induced simplemindedness. Both Internet "A-listers" appear to view "privacy" as an archaic abuse of privilege: someone - your parents, your boss, "the man" - is “hiding” something to advantage themselves and disadvantage you, your friends, or "the people." I do wish privacy were that simple.



Certainly, there is a whole realm of hidden information that is venal and vindictive. We have seen too many examples of the misuse of governmental, corporate and personal secrecy to blithely assume an open and truthful world. People are "disappeared," elections are engineered, banks collapse, lakes become sewers, and the Gulf of Mexico is despoiled. One would be a fool to deny that webs of secrecy enable these human failings. But those webs of secrecy have been around for centuries. Their existence does not entitle the new digital Dons to rip away the gentle curtains of privacy that shield every human life. To acknowledge deceit does not deny the need for compassionate privacy. The Internet’s ability to peer into the most cherished and sheltered spaces in someone’s life does not legitimize the practice.

Perhaps much of the confusion surrounding the debate regarding Internet privacy stems from different entities using similar words to mean different things. “Privacy” and “secrecy” have become co-mingled to the extent that they are erroneously seen as being synonymous. However, the Oxford English Dictionary defines privacy as “The state or condition of being alone, undisturbed, or free from public attention, as a matter of choice or right; seclusion; freedom from interference or intrusion.” While secrecy is defined as “the quality of being secret or of not revealing secrets; the action, practice, or habit of keeping things secret.”

The “open life” advocates, among whom I would place both Zuckerberg and Schmidt use “privacy” when they really mean “secrecy.” Julian Assange provides perhaps the most salient contemporary example of the difference. As the majordomo of Wikileaks, Assange is secrecy’s fiercest antagonist. He obviously believes that, in the public sphere, no secret is sacred. For Assange, when governments and businesses are concerned, awkward transparency trumps the effective “habit of keeping things secret” every time. However, when the issue is what transpired in a Swedish bedroom among adults, privacy, “the right to be free from public attention” suddenly reigns supreme in his worldview.

Still, Zuckerberg and Schmidt did get a couple of things right. First, it is “complicated.” As personal information becomes increasingly valuable in the core human arenas of conflict and commerce, the ceaseless dance of Spy versus Spy drives the development of Internet-based applications that allow the gracious sphere of privacy to be punctured as never before. Second, those routine perforations of the very fabric of our lives have rightfully relegated many naïve assumptions regarding privacy to the previous century. What I believe Zuckerberg and Schmidt have gotten wrong are the implications of these realities for public policy.

The “open lifers” seem to reason that since privacy currently lies in tatters, we should simply affirm that state as acceptable: what is, is right. I have trouble with that notion. I believe we are capable of a more nuanced approach to life in the digital age, that we can devise processes that deliver the advantages of the Internet without turning our private lives into peep shows.

Let me close with a story from my life. When I was in college, shortly after the surrender at Yorktown, we were required to live in the dorm. There were 10 young men on my hall, in their teens, away from adult supervision for the first time. “This,” I thought, “is what they mean by ‘chaos theory.’” There was no privacy, ever. Oh, certainly, you could retreat to your room where only your roommate, and whomever he brought to visit, punctured your solitude. But that was as tranquil as it got. Graduation changed my life in many ways. In retrospect, one of the most profound shifts was the ability to live in a house where I could walk in and close the door. And behind that door I found “the state or condition of being alone, undisturbed, or free from public attention.” I found privacy.

I do not believe that, as a culture, we are intellectually or technically unable to craft hardware, software, and policy that allows us to occasionally turn off the lights of the Internet and just "shut the door."
.

Sunday, November 7, 2010

Varying Degrees of Intrusion

.
It is, no doubt, another innovation designed to deliver us from our more slothful evil twins.  And, come Monday, thousands of folks will roll out of bed, unaware that their clock radios had automatically “Fallen Back” in the tiny hours of Sunday morning.  They will head off to work right on time, with clock radio, computer and cell phone throbbing along in silent syncopation with the National Institute of Standards and Technology and the U.S. Naval Observatory. Personally, I found it just a bit creepy.

I have come to accept that my cell phone will keep track of the vagaries of time zones as I wander around the country or the world.  That falls within its job description, that’s why no one wears a watch anymore, except for bling appeal.  A cell phone is supposed to “reach out and touch someone” as Ma Bell was wont to say, back in the less politically correct 1980s.  But my clock radio?  How did it know that it was supposed to “fall back” at 2:00 a.m. on this particular Sunday morning?  My wristwatch in the drawer didn’t know it was supposed to “fall back.” The microwave didn’t know it was supposed to “fall back.” The oven clock didn’t know it was supposed to “fall back.”  How did the clock radio know it was supposed to “fall back”?  To whom, or to what, is my clock radio talking in the middle of the night?

I realize that it is probably no great feat of programming to tell a machine when “Spring Forward,” 2:00 a.m. on the second Sunday in March; and “Fall Back,” 2:00 a.m. on the first Sunday in November, will occur for the next gazillion years and put it on a chip the size of a gnat’s eyelash.  But how does the radio know what “today” is?  I didn’t “set up” the date when I pulled it out of the box.  I just plugged it in and toggled up the correct time.  So how did it know where it was, in its infinite calendar, the moment I plugged it in?  How did the radio know if it was June, July or January?  You see, it had to know that if it was going to "Fall Back" at just the right instant.  If the answer is “the chip just knows,” we are neither comforted nor amused.  What else does the chip know?

We hear a lot about privacy in digital spaces these days.  It usually centers around the improper use of information that we, at some point via some device, intentionally tossed out into “Cyber Cloud Cuckooland.”  This sentient radio is, to my somewhat paranoid mind, a bird of a different feather.  The radio – without my instructions or permission, mind you – appears to be in communication with some entity that feeds information into this appliance in my home.  “Well, duh.  What does a radio do, dude? It brings stuff into your home – like music and words.”  True, but we did not request this channel. We were not informed of this channel.  "Back channels" are supposed to be the stuff of spy novels.

Perhaps my paranoia stems from my deep understanding that communication is transactional.  If a device can store or receive “Spring Forward” or “Fall Back” data without my instruction, it is technological child’s play to give it transmission capacity as well.  Want to walk a little way down that path with me?  Consider Microsoft’s new gaming rave, the Kinect.  It sounds awesome.  Three cameras peer into your home and allow you to interact with games as if you were actually up there on the screen.  No wires, no remote, you move, it sees you and reacts.  Now consider that last sentence all by itself: No wires, no remote, you move, it sees you and reacts.  You perceive, perhaps, the reason a shiver just ran down my spine.

When someone seems to look the latest multi-gigabyte gizmo gift horse in the mouth, it is easy to cry “Luddite!” and trot out the myriad wonders that technology has given us.  I do not deny them.  I have no desire to live in some seemingly bucolic past where we spent most of our lives finding or raising food, where, in lieu of vaccines, children died of the measles, and, think about it – there was no Novocain! But, I must repeat a favorite mantra: the role of technology in society is a continual negotiation, we ask and the engineers respond.  The first part of the equation must dominate.  We must be thoughtful when we make demands, and bestow limitless trust upon, the technologists who create our toys.  Our most powerful tools can also be our most dangerous weapons.  Human intent defines the difference.

Garth Brooks wrote, “Some of God’s greatest gifts are unanswered prayers.” There is an oblique B-side to that hit: “Be careful what you ask for, you may get it.”
.