Your connection is not private
Privacy online is an ever evolving topic. Back when I was first introduced to the internet, privacy issues were not something to be concerned about. Facebook, twitter and even Myspace didn’t exist at the time, and the ability to share to a big audience was significantly less than it is now. Technical skills of the common user made this even more so- with few able to print screen or take a screenshot, let alone upload it somewhere people could see. But now things have changed. The ability to send information around the world at speed has increased substantially and the average competency level of a computer user is far higher than 15 years ago. What is good and appropriate when it comes to personal privacy, and where do we draw the line?
Privacy and you
Facebook has been in the news repeatedly over the past decade (only to 2010) because of its changing attitude towards privacy. Facebook is a great example to look at too, both because it was the forerunner of the social media age and because individual privacy of our most intimate moments is what is most important to us. For example as discussed in my last blog post, what an employer might see on Facebook could make or break your ability to get a job. So that photo of you and your friends having a drink in town last Friday could cost you a job you apply for in years to come. In Facebooks case, you can stop others from seeing these photos, but what has been contentious through the years is who can see the photo by default. At time of posting is that photo shared globally, or is it private until you say otherwise? Again we can bring up the case of the Georgia teacher who posted a private photo on her Facebook page, only to be fired for it later. Her privacy was breached by ‘someone’, and that breach led to a dramatic change in her life.
This for me is really sad. It demonstrates that some employers make decisions based upon data that was acquired against the wishes of the employee. This article makes suggestions for how you can or should be writing your Facebook posts so that it would not go against you when job hunting – but that defeats the point of the social media platform. This article is even scarier, where it suggests employers have been requesting applicants passwords to their social media account in order to see what their private life is like. It might be that you drink heavily in your spare time, or worse take drugs – but if an employees record in their previous jobs makes no mention of poor behavior, lack of motivation etc then is it relevant to the candidates ability to perform the job? Sites like LinkedIn should be the type of place for employers to find out about a candidate. Facebook is where we post the most intimate parts of our life, where we share good and bad news, or our opinions on particular things with friends. It forms a story of our lives, and how we change through time. I dont see it as right for an employer to make use of private data in making job decisions, if other evidence suggests it makes no difference to their ability to perform the job well? Note that whatever data you do make public on Facebook I think could reasonably be looked at by employers, as this public face of an employee could potentially reflect upon the employers.
Thus another question is what do you mind being made public and private? Facebook gives us the option of who sees what (albeit through sometimes convoluted privacy settings). What about those devices that tell the manufacturer things without us knowing? The group Privacy International report on those things it considers to breach user privacy, their first aim being “[to] build[ing] the global movement for the protection of privacy”. One highlighted example of ‘market research’ being secretly collected was by the WeVibe sex toy, where they recorded ‘use’ and sent that data back to the company. Whilst this does not harm the user (as they probably dont give you a profile page on their website with achievements or anything!), the sensitive nature of the appliance maybe means users do not want their usage shared with others, irrespective of how anonymous it might have been. WeVibe were sued for this, and lost in court this year.
Most of the time, personal privacy with internet connected devices is controllable, and we are in charge what is posted as public or private. Where privacy becomes a bigger question is when governments and the law get involved.
Privacy and the Government
In India this past week, Privacy has been a big issue in the news. The question had been brought before the supreme court, asking the question, ‘is privacy a legal right for the people of India?’. The case came about because of a system the government wanted to introduce to help handle welfare payments. This system would require Indian citizens to submit their bio-metric information, but privacy groups were concerned about what else the government would use the data for, as they rolled it out into other financial transactions (such as purchasing expensive goods). The supreme court decided that yes, privacy is a fundamental right of the Indian people.
In the US, privacy is also hot topic, and one which was championed controversially by Apple in early 2016. An Iphone 5C owned by the shooter in the San Bernardino shootings was in the possession of the FBI, however it had been locked and encrypted. Encryption of the data meant that there was no way to pull it off the phone without compromising the data, but the problem was the FBI only had a certain number of guesses at the password before the phone automatically deleted all its data. The FBI requested that Apple help them circumvent the encryption so they may see the data in a readable format, but Apple declined. The reasons proposed vary, and Apple said it was in part an issue with reprogramming (as the OS would then supposedly be compromised). Apple argued that decrypting one phone potentially compromises all phones, and so the operating system could have to be rewritten to re-secure other phones. Amongst other reasons cited by Apple, such as:
“… compelling Apple to create software in this case will set a dangerous precedent for conscripting Apple and other technology companies to develop technology to do the government’s bidding in untold future criminal investigations. If the government can invoke the All Writs Act to compel Apple to create a special operating system that undermines important security measures on the iPhone, it could argue in future cases that the courts should compel Apple to create a version to track the location of suspects, or secretly use the iPhone’s microphone and camera to record sound and video.”
And so partly this is a law issue, where the courts may use this case as a way to argue for Apple to undermine security in particular phones in the future. But the question then becomes to what extent is privacy a right? The San Bernardino shooters phone may have contained information that lead to the capture of others intent upon causing harm. If the FBI had failed to get that information in time, and one of those potential links had killed, would the failure of the FBI to act in time be on Apples shoulders?
In the UK surveillance and intelligence gathering (Spying) is common. Indeed, terrorist incidents in the UK are now mostly carried out with easy and quick to acquire weapons such as cars and knives, as the process of making a bomb usually ends up with the government tracking them down before the bomb can be deployed. Searching on the internet for how to construct a bomb is illegal, and logged. The ability for governments to compromise security has prehaps lead to an increase in the amount of lives that can be saved. Another document leaked by Wikileaks suggests that GCHQ (Government Communications Headquarters, the ‘British NSA’) and (by extension) the NSA can infiltrate much of the data coming into and out of the UK. Wikileaks also published documents which demonstrated the extent to which the CIA could use internet connected devices (such as TVs) to spy on people. These are extreme cases of privacy breaches, but I am not per se against it, as it is unlikely to affect my life- and would only be used to catch criminals. The NSA is unlikely to be interested in me and my COETAIL blog posts, or my DOTA games. I am much more in favor of them knowing that I had the most awesome ‘toad in the hole‘ for dinner and potentially catching a terrorist, than them not knowing my dinner choices and people potentially dying.
The internet has exploded the conversation on privacy. I believe there has to be a balance between what we expect of our privacy and what we expect of law enforcement ability to catch criminals. But humans have a right to privacy (Universal Declaration of Human Rights, Article 12), and what we post on our private Facebook walls we should have confidence that it is treated in the context in which it was posted. Perhaps the question is not ‘How can we protect our privacy online?’, but rather ‘How can we prevent our private data being exploited?’.
- Amando Flavio. (2017, March 11). WikiLeaks’ Vault 7 Release Sparks Outrage Among Human Rights Campaigners, U.S. Government Condemned and Shamed. Retrieved August 27, 2017, from http://anonhq.com/wikileaks-vault-7-release-sparks-outrage-among-human-rights-campaigners-u-s-government-condemned-shamed/
- April 22, S. L. M., 2014, & Am, 6:48. (n.d.). Job hunting? Take a close look at your Facebook page. Retrieved August 27, 2017, from https://www.cbsnews.com/news/job-hunting-take-a-close-look-at-your-facebook-page/
- Barrett, D. (2013, July 10). One surveillance camera for every 11 people in Britain, says CCTV survey. Retrieved from http://www.telegraph.co.uk/technology/10172298/One-surveillance-camera-for-every-11-people-in-Britain-says-CCTV-survey.html
- Basu, A. T. and A. (2017, August 30). For the Many and the Few: What a Fundamental Right to Privacy Means for India. Retrieved August 27, 2017, from https://thewire.in/170988/right-to-privacy-supreme-court-2/
- Beauchamp, Z. (2017, June 5). The London attack is the new face of terrorism — and it’s very hard to stop. Retrieved August 27, 2017, from https://www.vox.com/world/2017/6/5/15739168/london-attack-terrorism-counterterrorism
- Burgess, M. (n.d.). Why Apple won’t unlock iPhones for the FBI. Retrieved August 27, 2017, from http://www.wired.co.uk/article/why-apple-refuse-help-fbi-iphone
- CNN, R. A. (n.d.). Top Indian court rules privacy a “fundamental right” in landmark case. Retrieved August 27, 2017, from http://www.cnn.com/2017/08/24/asia/indian-court-right-to-privacy/index.html
- Guerin, L., & J.D. (n.d.). Can Potential Employers Check Your Facebook Page? Retrieved August 27, 2017, from http://www.nolo.com/legal-encyclopedia/can-potential-employers-check-your-facebook-page.html
- Hill, K. (n.d.). This sex toy tells the manufacturer every time you use it. Retrieved August 27, 2017, from http://splinternews.com/this-sex-toy-tells-the-manufacturer-every-time-you-use-1793861000
- Mendick, R., Rayner, G., Evans, M., & Dixon, H. (2017, May 24). Security services missed five opportunities to stop the Manchester bomber. The Telegraph. Retrieved from http://www.telegraph.co.uk/news/2017/05/24/security-services-missed-five-opportunities-stop-manchester/
- Pantucci, R. (2017, May 23). Cars and knives are easier to use, but bombs will always be central to terrorist thinking. The Telegraph. Retrieved from http://www.telegraph.co.uk/news/2017/05/23/cars-knives-easier-use-bombs-will-always-central-terrorist-thinking/
- Press, A. (n.d.). Privacy Is A Fundamental Right, Rules India’s Supreme Court. Retrieved August 27, 2017, from http://time.com/4913629/india-privacy-supreme-court/
- Shubber, K. (n.d.). A simple guide to GCHQ’s internet surveillance programme Tempora. Retrieved August 27, 2017, from http://www.wired.co.uk/article/gchq-tempora-101
- The real reason that Apple won’t unlock a terrorist’s phone. (2016, February 19). Retrieved August 27, 2017, from http://www.independent.co.uk/life-style/gadgets-and-tech/news/what-is-the-real-reason-apple-wont-unlock-the-san-bernardino-killers-iphone-a6884581.html
- Toad in the hole. (2017, August 25). In Wikipedia. Retrieved from https://en.wikipedia.org/w/index.php?title=Toad_in_the_hole&oldid=797236389
- Why Apple Says It Won’t Help Unlock That iPhone, In 5 Key Quotes. (n.d.). Retrieved August 27, 2017, from http://www.npr.org/sections/thetwo-way/2016/02/25/468158520/why-apple-says-it-wont-help-unlock-that-iphone-in-5-key-quotes
- WikiLeaks Just Dumped a Mega-Trove of CIA Hacking Secrets. (n.d.). Retrieved August 27, 2017, from https://www.wired.com/2017/03/wikileaks-cia-hacks-dump/