The best thing I've read about the pending 'surveillance' society is David Brin's "transparent Society". It is a non-fiction exploration into the ideas of freedom and privacy and suggests that the most free society will have to make some trade off in privacy and posits a concept of 'reciprocal transparency' as the way to ensure freedom, and accountability.
This relates to advertising as well. What the discussion has missed so far (so far as I can tell) is the new model that Google represents. By selling key words to advertiser, the advertise is more likely to get to an interested potential customer and the customer/search is more like to be interested in the product/service. The scary thing is the consequence of public goods becoming funded by advertising. As it is in the current model, the audience is generally not the customer but "is the product" that is delivered to the real client - the advertiser. John Verdon Sr. Strategic HR Analyst DMP Strat Department of National Defence Major-General George R. Pearkes Building 101 Colonel By Drive. Ottawa Ontario K1A 0K2 voice: 992-6246 FAX: 995-5785 email: [EMAIL PROTECTED] "Searching for the pattern which connects.... and to know the difference that makes a difference" Sapare Aude -----Original Message----- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED] Behalf Of [EMAIL PROTECTED] Sent: Tuesday, 16 January, 2007 18:12 To: [email protected] Subject: Futurework Digest, Vol 38, Issue 31 Send Futurework mailing list submissions to [email protected] To subscribe or unsubscribe via the World Wide Web, visit http://fes.uwaterloo.ca/mailman/listinfo/futurework or, via email, send a message with subject or body 'help' to [EMAIL PROTECTED] You can reach the person managing the list at [EMAIL PROTECTED] When replying, please edit your Subject line so it is more specific than "Re: Contents of Futurework digest..." Today's Topics: 1. Digital Life (was Advertising spreads everywhere) (Karen Watters Cole) ---------------------------------------------------------------------- Message: 1 Date: Tue, 16 Jan 2007 15:25:27 -0800 From: "Karen Watters Cole" <[EMAIL PROTECTED]> Subject: [Futurework] Digital Life (was Advertising spreads everywhere) To: <[email protected]> Message-ID: <[EMAIL PROTECTED]> Content-Type: text/plain; charset="iso-8859-1" Natalia blames much of the dominance of corporatism on greed. From the consumer standpoint, as this tale shows, convenience and complacency seem to be primary factors. We all can name excellent examples of high tech supervision, monitoring the disabled so they can live more independently, for example, video conferences and linking continents by internet, tracking packages from point of origin to delivery, finding the lost, saving life. But for me the scary thing about this woman?s assumption is she believes because she lives a ?clean? life, she feels safe. Now, I am not admitting to being paranoid but at middle age have heard of or known of enough people who found themselves in trouble by accident or ill-advised missteps. We don?t have to limit ourselves to criminals or terrorists, bad things happen to good people, as the book reminded us. Can we go off the grid and still participate in active life? We?ve reached a tipping point, it seems. Technology has come so fast that it quickly moved from miraculous, life-saving, time-saving to also being intrusive and annoying. Are we just trapped in a mental transition? Our perspectives seem to be influenced by exposure to literature and film, as well as history and economics. If you never read/viewed Fahrenheit 351 or 1984, would you have any hesitation about the breathtaking advantages some of this technology delivers? If we were living in the outback of Australia or the savannas of Africa, would this bother us? kwc Enjoying Technology's Conveniences But Not Escaping Its Watchful Eyes By Ellen Nakashima, Washington Post Staff Writer, Tuesday, January 16, 2007; A01 The tracking of Kitty Bernard begins shortly after she wakes up. All through the 56-year-old real estate agent's day, from walking in her building's lobby to e-mailing friends and shopping and working, the watchful eye of technology records her movements and preferences. Welcome to the 21st century. Like many Americans, Bernard uses modern gadgets to make life easier, and along the way creates a data trail that others can access and preserve, sometimes permanently. Every Internet search resides on a computer somewhere. Comings and goings are monitored by security cameras. Phone calls are logged by telecommunications companies. This explosion in data collection has been embraced by many Americans as a trade-off for convenience and discounts. But it also has raised questions about personal privacy at a time when the government is increasingly tapping into these reservoirs of telling details to fight crime and terrorism. The new Congress has begun to examine the uses and abuses of data gathering for security and commerce. A look at Bernard's activity one recent day helps to illustrate what they're likely to find: that ordinary Americans leave a trail of digital data that is being gathered, stored and analyzed, and that these people seldom realize it. 6:15 a.m. Bernard, who is married and has a grandson, pads into the lobby of her Reston condo complex on the way to the building's gym, and almost no one else is about. But a security camera records her. If the government or a divorce lawyer wants the tapes, they can subpoena them. 7:17 a.m. Bernard returns to her condo after her workout, nestles into a bedroom love seat and fires up her laptop to check e-mail. She opens a few, deletes 38 more -- junk mail from Weight Watchers, a personal trainer, a firm that sells art posters. The U.S. government claims that even before she's opened them, it should have the right to read them if it needs to. The technology exists to do that. Bernard is not only trackable, but she is a tracker. She says it helps her be a better real estate agent. Through a Web-based notification service, she can see what homes her clients are interested in and copies of e-mails sent to new clients who register on her Web site, KittyBernard.com. "I can e-mail them and say, 'I see you've been on my Web site.' " 8:30 a.m. She takes a cellphone call from her daughter. After a brief chat, she hangs up. But her cellphone is still sending its ID signals to the nearest cellular towers, giving her phone company her approximate location. Approximate, but precise enough that the FBI has used such information to locate suspects, and marketers are contemplating using it for targeted cellphone advertising pitches by text message. 8:35 a.m. Bernard pulls into an Exxon Mobil <http://financial.washingtonpost.com/custom/wpost/html-qcn.asp?dispnav=busin ess&mwpage=qcn&symb=XOM&nav=el> gas station. She holds a small wand called a Speedpass to a sensor at the gas pump. The gadget uses radio frequency identification (RFID) waves to charge her Exxon Mobil account directly. No cash. No card swipe. RFID chips are being placed in credit cards, passports and items on store shelves. Some people have even had chips injected into their bodies so emergency-room doctors can have instant access to their medical records. The chips can track, conduct transactions and in some cases be hacked. They transmit information to private databases. Civil libertarians fear that one day soon this will mean a retailer could recognize Bernard as soon as she walks in the door, even before she identifies herself, or that data brokers could track how many times she entered a bar, even if she paid cash. By default, Exxon Mobil has the right to share her name and other information it collects on her with "consumer reporting agencies, banks, insurance companies, retailers, publishers and direct marketers" unless Bernard "opts out." But she has never done so. Such information is often buried in the privacy polices sent in the mail or posted on retail Web sites that Bernard never bothers to read. "I don't know anyone who's read them," she says. 8:40 a.m. Bernard enters her Coldwell Banker office building and is recorded by a hidden security camera. 10:25 a.m. She logs on to Top Producer, Web-based software for real estate agents that allows Bernard to retrieve notes on her clients wherever she has access to the Internet. She can look up clients' birthdays and home-buying anniversaries, lending a personal touch to her service. The trend toward Web-based computing means that reams of data Bernard and others used to keep in notebooks are now stored on servers owned by private companies, where the data is potentially vulnerable to hackers and potentially accessible to government authorities. 11:05 a.m. She dials Domino's for pizza. Domino's tracks her name, phone number, address, and size and type of pizza ordered. Unless a store decides otherwise, the data are held forever. That way, Domino's can provide more personalized service -- "Hi, Ms. Bernard, would you like your regular -- mushroom and sausage?" Domino's, which hopes to have a national database of customers soon, says it does not share or sell customer information. But companies that specialize in providing unlisted and cellphone numbers, among other records, often buy phone numbers from pizza delivery services, according to Merlin Information Services, a data broker. 12:30 p.m. Bernard gets back in her car, a 2003 Mercedes-Benz with navigation and roadside emergency service. She turns the key in the ignition, activating a Global Positioning System device that uses satellites to pinpoint her location and is constantly sending out signals. GPS technology allows her to map out a route and find streets and landmarks, restaurants and hotels. She can use a CD, which displays on a dashboard screen, or push a button and connect to a roadside-assistance call center run by the Texas telematics firm ATX, which can guide her if she's lost or call her a tow truck. GPS can generate a record of her travels, though ATX says it does not keep such location records now. The company stores emergency call records -- location, time, nature of call -- for billing and other purposes. 12:35 p.m. Bernard pulls up to a tollbooth on the Dulles Toll Road. A Smart Tag on her front license plate communicates with a sensor and pays her toll. A light flashes green. Over the long run, Bernard has saved hours by using her Smart Tag, with its RFID chip, to zip through tollbooths. The Virginia Department of Transportation records the date and time she passed, the toll location, the amount paid and her customer account information. The FBI has used this type of information to help solve murder cases, and private attorneys have used it in divorce cases. As she passes, two cameras record her -- one in front of her car and one in back. 2:10 p.m. Bernard enters Costco. She wheels her cart to a cashier and uses her Costco membership card, linked to an American Express <http://financial.washingtonpost.com/custom/wpost/html-qcn.asp?dispnav=busin ess&mwpage=qcn&symb=AXP&nav=el> card, to buy bottled drinks and bagged candy. She likes the credit voucher she will get at year's end, worth 1 percent of her total purchases, thanks to her Costco membership. Costco likes its database of 50 million shoppers' purchase histories, e-mail addresses and phone numbers, which it can use to notify consumers of a product recall or do marketing research. Bernard's credit card companies know her income and her shopping habits. They can share her information with affiliates without her permission and need not stop even if she asks them to. Credit bureaus maintain gigantic databases on consumers such as Bernard fed by tens of thousands of banks, auto lenders, credit card issuers, state welfare agencies, utility companies and court records. 3:25 p.m. Bernard visits BestBuy.com to look for a CD case. Best Buy receives good ratings from customers on privacy, according to the Ponemon Institute, a privacy research group. But online retailers in general are a prime target for people who call the retailer pretending to be a customer to obtain passwords and other personal information that they then use to access online bank accounts. This practice, known as pretexting, is also done by fly-by-night data brokers who collect and sell phone numbers and other personal data. 4:15 p.m. She enters Belmont Country Club, a planned community in Loudoun County, to show a client a house. Two cameras record her car entering. Residents can tune their TV sets to the security channel and see who's at the gate. Bernard inserts an electronic key, which looks like a pager, into a black rectangular lockbox, and a real key drops out. The e-key uses an infrared beam to transmit the date and time, her name and phone number, and her company name to the lockbox. The lockbox, itself an electronic device, beams to the e-key a number linked to the house address. The information is kept by GE Security, which puts it on a Web site for real estate professionals who want to check the last three months of activity. The firm also stores the data for years just in case an agent needs it to, for instance, help settle a civil dispute. 5 p.m. Bernard, back in her car, presses a button for a concierge service. She wants to make a dinner reservation. "I'm speaking with Mrs. Bernard?" says Denise, her concierge. "Fan- tas-tic." The service, run by VIP Desk of Alexandria, can book hotel stays, set up scuba lessons and even find a pet sitter. Today, Denise reserves a table for Bernard and her husband, John Emert, at Legal Sea Foods in Tysons II Galleria mall. VIP Desk serves millions of customers and keeps large amounts of data that can be customized for its corporate clients, which include credit card companies and travel companies. 5:20 p.m. Back in her office, Bernard does a Google search on a coffee maker because she can't remember the model's exact name. "Tazzimo," she types. "Tazzamo," then "Tazmo." Finally, she types in "coffee makers" and gets a link to Amazon.com. She clicks on the link. "There it is! Braun Tassimo," she says. Google collects billions of search queries a month typed in by users such as Bernard, creating one of the largest databases of online behavioral data in the world. Google uses this data on an aggregate level for research purposes, such as refining its search engine, or to see how many people are clicking on ads so that Google can bill the advertisers. Google targets ads to users based on the search terms they use and can target ads by geography. 6:45 p.m. Bernard and her husband enter the mall. They are heading to Legal Sea Foods. Security cameras record their passage. 9:00 p.m. Bernard and Emert return from dinner and shopping, using an RFID key fob to enter the building. A camera again records them. 9:05 p.m. She logs on to her laptop again, seeing only a few e-mails. After watching a little television with her husband, she'll head to bed about11. * * * No one is forcing Bernard to embrace this technology. She loves the time she gains by paying road tolls electronically, the sense of security she feels by having GPS in her car. She sometimes buys real estate client lists so she can target categories of buyers -- seniors or first-time home buyers -- "as long as it's not intrusive," she said. Who's to say what's intrusive at a time when teenagers are baring their souls on Web sites? When people are taking video of routine and shocking events alike and putting them on the Web? When patients' health records are being scanned into giant databases? Much of these data -- voice, video, text -- are not being analyzed, at least not on a systematic basis. But the government is seeking ways to effectively do so, for law enforcement and security. These caches of data will only continue to grow, with storage cheap and tens of millions of people like Bernard eager to get in on the digital revolution, sending messages and conducting transactions with an ease futurists once only dreamed of. In just one day, Bernard paid eight tolls electronically. She used her credit card four times and sent 20 e-mails. She passed before security cameras at least 50 times. "Amazing," she said in a follow-up interview. "It's astounding to think that my whereabouts and activities can be tracked by any number of companies and individuals." But, she said, she's not inclined to change her ways. Bernard said she already takes measures to guard her privacy. She saves intimate details for phone calls. She's on a do-not-call telemarketing list. She trusts her company to keep her office system hacker-free. For the most part, she trusts that the government will not be interested in her personal life -- hoping for security through obscurity. "I have no tickets. I obey the law," she said. "I would trust them to look at me and see I'm a businessperson. I'm a family person." http://www.washingtonpost.com/wp-dyn/content/article/2007/01/15/AR2007011501 304.html <http://www.washingtonpost.com/wp-dyn/content/article/2007/01/15/AR200701150 1304.html> -------------- next part -------------- An HTML attachment was scrubbed... URL: http://fes.uwaterloo.ca/mailman/private/futurework/attachments/20070116/1462669f/attachment.html ------------------------------ _______________________________________________ Futurework mailing list [email protected] http://fes.uwaterloo.ca/mailman/listinfo/futurework End of Futurework Digest, Vol 38, Issue 31 ****************************************** _______________________________________________ Futurework mailing list [email protected] http://fes.uwaterloo.ca/mailman/listinfo/futurework
