Post #108: Dark Spots, Light Spots, and Apple’s Protest

 

How’s this for bad choices?  A recent study by a Harvard group contended with the position of US intelligence agencies that tracking possible terrorists was becoming more difficult because there are too many “dark spots”—places where data can be encrypted to prevent tracking (www.nytimes.com/2016/02/01/us/politics/new-technologies-give-government-ample-means-to-track-suspects-study-finds.html).  Harvard “reassured” the FBI, CIA, and others that new technologies embedded in common objects will provide (or already provide) plenty of additional tracking opportunities.  What are these?  How about toothbrushes, toys (yes, Barbie dolls), television, and light bulbs, just for starters?  These are the “Internet of things,” in the cute phrase of one law professor quoted in the article above.  But let’s just call them light spots.

I suppose we are intended to feel comforted by the thought that we’re safe on both ends of the surveillance machine—the intelligence community’s and the corporations’.  Obviously, those of us who are still worrying about how Facebook, Google, and Amazon—the Big Three of Social Monitoring—keep us (and the authorities) in their sights are not thinking ahead.  We have already surrendered our privacy to them by signing up every day for their services (see Post #94), and by standing by while they willy-nilly transfer data to government agencies.

Europe’s national regulators, as distinct from the European Commission, suspect that the latest US-EU “Privacy Shield” agreement on personal data transfer does not adequately safeguard privacy.  All twenty-eight EU member-states must sign off on the agreement for it to take effect.  They want assurances that Europeans’ private information will not find its way into the hands of US intelligence services.  I doubt the Big Three will provide them.  And if they do, who would believe them?

Like most Europeans, Tim Cook, CEO of Apple, believes that some dark spots deserve protection.  Reminding us that we the consumer are “the product” and not really the customer when it comes to tracking of our likes and dislikes by Facebook et al., Cook has emerged as a stout defender of privacy against the demands of the FBI in the San Bernardino terrorism case (www.apple.com/customer-letter/).  He so far has rejected the US government’s demand, backed by a court decision, to unlock Apple smart phones in order to access one terrorist’s data.  Correctly, Cook sees surrendering to this request as having the potential to open the floodgates, allowing either the government or criminals to gain backdoor entry to people’s private information.  Cynics might say that he really wants to protect Apple’s proprietary encryption software, which evidently is much stronger than Google’s and the other giants’.  And clearly, Cook is concerned about the integrity of the Apple brand.  But motives aside, Cook’s action is laudable.

Interestingly, Cook’s impassioned defense of privacy has detractors and fence-sitters in the high-tech community.  Everyone among them want to protect their security systems.  But those companies which, like the Big Three, rely on Internet advertising and personal data entries to monitor tastes and movements will be loath to support Cook’s tough stand—all the more so if they have contracts with police departments and federal agencies, such as Amazon’s with the CIA and Microsoft’s with the Department of Defense.  But those which, like Apple, mainly sell hardware are likely to support him (www.nytimes.com/2016/02/19/technology/tech-reactions-on-apple-highlight-issues-with-government-requests.html).

In the end, Apple may have to concede at least to providing the specific data the FBI is demanding.  But let’s not lose sight of the core issue. We’re all in a bitter struggle to preserve our freedom of thought and movement against the rising tide of security-firsters who will forever contend that sacrificing our privacy is necessary if we are to erase the dark spots.  By their logic, 1984 is finally here, and embedding security (i.e., surveillance) chips in toothbrushes, children’s toys, and everywhere else The Enemy might lurk is both necessary and proper. You’d better consider flossing regularly and having your kids play with sticks and stones.  Barbie is watching, and even Tim Cook can’t stop her.

 

[Note: After I wrote this piece, the NY Times published an expert article that focuses on the “light spots” in the same way I do. See www.nytimes.com/2016/02/25/technology/personaltech/the-apple-case-will-grope-its-way-into-your-future.html.]

Categories: Tags: , , , ,

2 Comments

  1. Hi Mel,

    At a tech conference I once attended in a Chicago suburb in 1996, I listened to Marc Andreeson tell an audience of several hundred that personal privacy as a legitimate ideal was dead. Believers, all, no one dissented; he was viewed by many attendees as a their ultimate guru (over Gates and Jobs) because of his key role in developing Mosaic, predecessor to Netscape, the first overtly successful mainstream web browser (he was really just an unsavory part of the browser development team at U Illinois/Urbana-Champagne, but that’s another story). Internet Explorer is based on Mosaic, and so is virtuyally every other browser today. All those conference people seemed to agree with Andreeson, except, perhaps, me. But I was in the back of the crowd, and there wasn’t sufficient opportunity to challenge him. I always wished I had.

    At the same time that Autumn, it was big news that Bill Gates was backing Citrix, a key disparate operating systems interface even today, and also Steve Jobs, whom he gave enough dough to keep Apple going when it hadn’t the cash to cover payroll. At a Citrix conference in Seattle attended by upper level management from all these organizations, it was widely discussed that a backdoor was built into all software at the behest of the US government. Since DOD was behind the creation of the Internet, it was viewed by many if not most tech people of that era as a benevolent Creator that should be given its due even if such a backdoor violated Constitutional law and normative ethics. If there is a point to this rambling, Mel, it is that 1984 was very much in the technocrats’ minds when DARPA was formed, and they thought they were right and that Orwell was wrong. Nothing has changed, except people are starting to confront the DOD. Kudos to Cook, and to you.

    A sub-note is that most governments around the world have certainly almost from the beginning been aware of this fraud, and Eric Snowden’s revelations probably told them nothing new. But Microsoft O/S and Windows Office were so useful they have up to now played along.

    -Joe

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s