-Caveat Lector-

http://www.nytimes.com/2000/11/22/technology/22NET.html

Software to Track E-Mail Raises Privacy Concerns
By AMY HARMON
NEW YORK TIMES

                    November 22, 2000


It was during a recent job search that Donald Bell gave in to the temptation to
bug his own e-mail. Mr. Bell, 55, had
e-mailed dozens of r�sum�s to prospective employers and received scant response.
Naturally he wondered: was he
being rejected, or had his messages gone unread?

Anyone who has been left hanging knows it is the sort of nagging question that
is rarely answered. But thanks to a
furtive application of a feature common to the latest e-mail programs, Mr. Bell
was able to learn, undetected, that the
intended recipients were indeed opening his messages. With a service he found on
the Internet, he could even tell
precisely when a recipient read his e-mail messages and if the message was sent
on to anyone else.

"It feels a little naughty, because you can't do this with postal mail," said
Mr. Bell, who has since started his own
company in San Francisco and sometimes uses the e-mail service to check whether
colleagues forward messages that
he considers confidential. "But e-mail is a different animal. You have to just
reach into your heart and decide what
you're going to do."

Mr. Bell is not alone in taking advantage of new e-mail software that makes
certain kinds of monitoring easy and
nearly imperceptible. At a time when many Internet users have come to grips with
advertisers' tracking their
anonymous trail of clicks across the World Wide Web, the frontier of the
electronic privacy wars is shifting to the
more personal realm of the e-mail "in" box.

Marketing companies now regularly keep tabs on which prospective customers open
their e-mail solicitations, and at
what time of day, arguing that consumers benefit because the information is used
to devise more personalized
promotions. Individuals who have used e-mail tracking services say they feel
entitled to monitor their own
correspondence in a medium where it is so easily passed along or ignored.

But privacy advocates contend that such practices open a new window of
surveillance on a traditionally private sphere
of communications. They compare it to having someone who leaves a message on
your answering machine  a
telemarketer, say, or your mother  alerted the moment you listen to it. More
troubling, they say, is that the same
technology can be used to match a recipient's e-mail address with previously
anonymous records of the Web sites
visited from that person's computer.

Connecting the data collected through files known as cookies with an e-mail
address, the privacy advocates argue, will
be irresistible to marketers seeking to identify the buying habits and personal
tastes of individual consumers. The
linked databases, they say, could also be consulted by law enforcement agencies,
insurance companies, employers and
others who would need only an e-mail address to look up a record of an
individual's activities on the Web.

"You can buy 50,000 addresses of people who subscribe to The New Yorker," said
Richard M. Smith, chief
technology officer of the Privacy Foundation. "But you don't know what articles
they're reading in it, or what books
they've bought or what medical problems they've been researching lately. That's
very much a possibility within this
technology."

The technology in question is seemingly innocuous: the ability of the latest
e-mail programs to send and display
images. E-mail senders use the feature, based on the Web's computer language, to
create colorful messages known as
HTML mail.

But many also use it to embed tiny images that are invisible to the recipients.
Marketers call them pixel tags and say
they are used to gauge the success of e-mail campaigns. Privacy advocates prefer
a more ominous name  Web bugs.

The instant someone opens an e-mail message that contains instructions to
display a graphic file, his or her computer
automatically fetches the image from a specified location on the Internet. By
adding a unique identifying code to those
instructions, a sender can record when a particular recipient retrieves the
image, and, thus, when the e-mail message is
opened.

Subsequent retrieval of the image can tell the sender how often the message is
reopened, and sometimes whether it has
been forwarded (though not the precise forwarding address).

Direct marketers, the most frequent users of the technique, say it is akin to
the standard practice among Internet
advertisers of tracking which banners Web surfers click on.

"I don't see any privacy issues there because the data is secure and never
sold," said William Park, chief executive of
Digital Impact, an e- mail marketing company that has designed campaigns for
dozens of clients. "From the marketing
perspective, if you're not opening that e- mail it might be we're sending it on
the wrong day of the week, or the
subject line is really boring, or the subject line is really cryptic."

The emergence of HTML mail may well make reading e-mail messages more like
visiting a Web site, with all the
attendant privacy risks. But for many Internet users, such risks may seem more
acceptable on the Web than they do in
their "in" box.

Sophisticated Internet users know that when they click on a Web advertisement
they are probably exposing themselves
to scrutiny, and that it is possible to reject the files that record such behavior.

But few are aware of the tracking capability of HTML mail. And while some e-mail
programs, like Microsoft Outlook
and Eudora, give users the option of screening images out, others, like America
Online 6.0 and Web-based Hotmail do
not.

Some recipients of e-mail newsletters say they do not mind if the sender knows
when they open a message,
particularly if the aim is to alert them to a sale or a new product. But others
argue that it violates their right to
communicate, or not, without being observed. And particularly in a country where
postal mailboxes are protected by
federal law, the notion that reading e-mail messages is no longer a private act
may prove disconcerting.

"We would shudder if regular letters were implanted with secret signals that
alerted their senders when they were
opened," said Jeffrey Rosen, author of "The Unwanted Gaze: The Destruction of
Privacy in America" (Random
House, 2000). "It seems to invade both the privacy of the home and in some sense
the privacy of the mind."

Still, the practice is becoming more common. About 60 percent of e- mail users
have software that can read HTML
mail, according to the online research firm Jupiter Media Metrix, a number
expected to grow significantly as America
Online users install version 6.0, the first update to include the feature,
released last month.

As advertising on Web sites proves increasingly ineffective, many companies like
Eddie Bauer and Borders are relying
more heavily on e-mail solicitations whose value lies in part in the ability to
track recipient response. How many
subscribers actually open e-mail has also become an important measurement by
which e-mail newsletter companies
like Lifeminders sell advertising. Companies that send unsolicited bulk e-mail
use tracking to increase the value of
their address lists by weeding out those who never open their messages.

And individuals can use Postel Services, the Korean company whose service Mr.
Bell used to learn the fate of his job
applications. Messages routed through its servers have tiny graphic files
appended before being sent on. When the
recipient opens the message, Postel is alerted and in turn alerts the sender.

Soobok Lee, the company's founder, said about 30,000 people had used the service
since its introduction in May, in
addition to several companies that had purchased licenses to track all of their
correspondence. The first 30 messages a
month are free, after which Postel charges 2 cents a message.

But whatever the utility or etiquette involved in monitoring the opening of a
single e-mail message, it is the potential
for that act to open a door to far more personal information that some find most 
unsettling.

The main object of concern is advertising companies like DoubleClick, Engage and
24/7 Media that already track the
Web travels of tens of millions of Internet users, anonymously, by way of cookies.

The first time someone visits a site where DoubleClick places advertisements,
for instance, the company deposits an
identifying code  No. 1234, say  on the visitor's computer. After that, every
time the computer with cookie No. 1234
visits one of the several thousand sites that contract with DoubleClick, the
company records the visit.

DoubleClick and others use the information gleaned from cookies to choose which
advertisement from the hundreds of
clients they represent is most suited to an individual's tastes. They may know,
for instance, that No. 1234 has recently
visited sites related to quitting smoking, sport utility vehicles and the Green
Party  but they have generally had no way
of knowing who No. 1234 is.

The opportunity to identify the person behind the cookie comes when one of the
advertising firms sends HTML mail
to a consumer on behalf of a client, tagged with a unique identifier to track
when it is opened. When the recipient
opens such a message, the cookie code is exposed to the sender's server
computer, which can compare it with those
stored in its own database. At that moment, No. 1234 could be revealed as 
[EMAIL PROTECTED]

After drawing scrutiny this year from the Federal Trade Commission, the major
advertisers have vowed to refrain
from linking personally identifiable information to anonymously collected data
without permission from the
consumer. But privacy advocates say consumers may consent unwittingly, and they
note that voluntary privacy policies are easily modified.

Another practice, which involves using e-mail as a kind of Trojan horse to
deliver a cookie file, recently prompted the
Michigan attorney general's office to warn that it would sue one Web site,
Evite, under the state's Consumer Protection Act unless it began to inform consumers.

Party organizers use Evite, a San Francisco-based online invitation service, to
send e-mail HTML invitations. In
addition to collecting the official R.S.V.P.'s, Evite is able to tell the
organizer who opened the mail without
responding, and who did not open it. Those who open the invitation receive a
cookie from Evite, which would not
otherwise be possible unless they visited its Web site.

Privacy advocates speculate that the company could "rent"the cookie and the
e-mail address it is associated with to
other sites.

Evite's chief executive, Josh Silverman, declined to be interviewed, citing
continuing negotiations with the Michigan
attorney general. He said in a statement that the cookies Evite delivered were
not linked to addresses.

But Nick Ragouzis, a technically savvy business consultant in San Francisco who
discovered Evite's invisible pixel in
an invitation he received recently, said that alone was enough to make him feel
his privacy had been invaded.

"I don't really care that they know I opened this particular message," Mr.
Ragouzis said. "But they never asked me.
And there would be other messages that I would care about. I feel I should be asked."

Mr. Ragouzis said he told the host of the party, Jad Duwaik, to refrain from
sending him future Evite invitations and
asked that he stop using the company's services altogether. But Mr. Duwaik, who
organizes networking events for
entrepreneurs, said the information provided by Evite about how many of the
invitees open the messge helped him
gauge interest in his parties.

"It's something I feel uncomfortable with as a consumer," Mr. Duwaik said. "But
as an organizer it's just too useful to
give up."
________________________________________________

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance�not soap-boxing�please!  These are
sordid matters and 'conspiracy theory'�with its many half-truths, mis-
directions and outright frauds�is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to