The best thing I've read about the pending 'surveillance' society is David 
Brin's "transparent Society". It is a non-fiction exploration into the ideas of 
freedom and privacy and suggests that the most free society will have to make 
some trade off in privacy and posits a concept of 'reciprocal transparency' as 
the way to ensure freedom, and accountability.

This relates to advertising as well. What the discussion has missed so far (so 
far as I can tell) is the new model that Google represents. By selling key 
words to advertiser, the advertise is more likely to get to an interested 
potential customer and the customer/search is more like to be interested in the 
product/service. The scary thing is the consequence of public goods becoming 
funded by advertising. As it is in the current model, the audience is generally 
not the customer but "is the product" that is delivered to the real client - 
the advertiser. 

John Verdon
Sr. Strategic HR Analyst
DMP Strat
Department of National Defence
Major-General George R. Pearkes Building
101 Colonel By Drive.
Ottawa Ontario
K1A 0K2
voice:  992-6246
FAX:    995-5785
email:  [EMAIL PROTECTED]

"Searching for the pattern which connects.... and to know the difference that 
makes a difference"
Sapare Aude



-----Original Message-----
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] Behalf Of
[EMAIL PROTECTED]
Sent: Tuesday, 16 January, 2007 18:12
To: [email protected]
Subject: Futurework Digest, Vol 38, Issue 31


Send Futurework mailing list submissions to
        [email protected]

To subscribe or unsubscribe via the World Wide Web, visit
        http://fes.uwaterloo.ca/mailman/listinfo/futurework
or, via email, send a message with subject or body 'help' to
        [EMAIL PROTECTED]

You can reach the person managing the list at
        [EMAIL PROTECTED]

When replying, please edit your Subject line so it is more specific
than "Re: Contents of Futurework digest..."


Today's Topics:

   1. Digital Life (was Advertising spreads everywhere)
      (Karen Watters Cole)


----------------------------------------------------------------------

Message: 1
Date: Tue, 16 Jan 2007 15:25:27 -0800
From: "Karen Watters Cole" <[EMAIL PROTECTED]>
Subject: [Futurework] Digital Life (was Advertising spreads
        everywhere)
To: <[email protected]>
Message-ID: <[EMAIL PROTECTED]>
Content-Type: text/plain; charset="iso-8859-1"

Natalia blames much of the dominance of corporatism on greed. From the
consumer standpoint, as this tale shows, convenience and complacency seem to
be primary factors. We all can name excellent examples of high tech
supervision, monitoring the disabled so they can live more independently,
for example, video conferences and linking continents by internet, tracking
packages from point of origin to delivery, finding the lost, saving life.

But for me the scary thing about this woman?s assumption is she believes
because she lives a ?clean? life, she feels safe. Now, I am not admitting to
being paranoid but at middle age have heard of or known of enough people who
found themselves in trouble by accident or ill-advised missteps. We don?t
have to limit ourselves to criminals or terrorists, bad things happen to
good people, as the book reminded us.

Can we go off the grid and still participate in active life? We?ve reached a
tipping point, it seems. Technology has come so fast that it quickly moved
from miraculous, life-saving, time-saving to also being intrusive and
annoying. Are we just trapped in a mental transition? Our perspectives seem
to be influenced by exposure to literature and film, as well as history and
economics. If you never read/viewed Fahrenheit 351 or 1984, would you have
any hesitation about the breathtaking advantages some of this technology
delivers? If we were living in the outback of Australia or the savannas of
Africa, would this bother us?  kwc

Enjoying Technology's Conveniences But Not Escaping Its Watchful Eyes
By Ellen Nakashima, Washington Post Staff Writer, Tuesday, January 16, 2007;
A01
The tracking of Kitty Bernard begins shortly after she wakes up. All through
the 56-year-old real estate agent's day, from walking in her building's
lobby to e-mailing friends and shopping and working, the watchful eye of
technology records her movements and preferences.
Welcome to the 21st century.
Like many Americans, Bernard uses modern gadgets to make life easier, and
along the way creates a data trail that others can access and preserve,
sometimes permanently. Every Internet search resides on a computer
somewhere. Comings and goings are monitored by security cameras. Phone calls
are logged by telecommunications companies.
This explosion in data collection has been embraced by many Americans as a
trade-off for convenience and discounts. But it also has raised questions
about personal privacy at a time when the government is increasingly tapping
into these reservoirs of telling details to fight crime and terrorism.
The new Congress has begun to examine the uses and abuses of data gathering
for security and commerce. A look at Bernard's activity one recent day helps
to illustrate what they're likely to find: that ordinary Americans leave a
trail of digital data that is being gathered, stored and analyzed, and that
these people seldom realize it.
6:15 a.m.
Bernard, who is married and has a grandson, pads into the lobby of her
Reston condo complex on the way to the building's gym, and almost no one
else is about. But a security camera records her. If the government or a
divorce lawyer wants the tapes, they can subpoena them.
7:17 a.m.
Bernard returns to her condo after her workout, nestles into a bedroom love
seat and fires up her laptop to check e-mail.  She opens a few, deletes 38
more -- junk mail from Weight Watchers, a personal trainer, a firm that
sells art posters. The U.S. government claims that even before she's opened
them, it should have the right to read them if it needs to. The technology
exists to do that.
Bernard is not only trackable, but she is a tracker. She says it helps her
be a better real estate agent. Through a Web-based notification service, she
can see what homes her clients are interested in and copies of e-mails sent
to new clients who register on her Web site, KittyBernard.com.  "I can
e-mail them and say, 'I see you've been on my Web site.' "
8:30 a.m.
She takes a cellphone call from her daughter.
After a brief chat, she hangs up. But her cellphone is still sending its ID
signals to the nearest cellular towers, giving her phone company her
approximate location. Approximate, but precise enough that the FBI has used
such information to locate suspects, and marketers are contemplating using
it for targeted cellphone advertising pitches by text message.
8:35 a.m.
Bernard pulls into an Exxon Mobil
<http://financial.washingtonpost.com/custom/wpost/html-qcn.asp?dispnav=busin
ess&mwpage=qcn&symb=XOM&nav=el>  gas station. She holds a small wand called
a Speedpass to a sensor at the gas pump.  The gadget uses radio frequency
identification (RFID) waves to charge her Exxon Mobil account directly. No
cash. No card swipe.
RFID chips are being placed in credit cards, passports and items on store
shelves. Some people have even had chips injected into their bodies so
emergency-room doctors can have instant access to their medical records. The
chips can track, conduct transactions and in some cases be hacked. They
transmit information to private databases. Civil libertarians fear that one
day soon this will mean a retailer could recognize Bernard as soon as she
walks in the door, even before she identifies herself, or that data brokers
could track how many times she entered a bar, even if she paid cash.
By default, Exxon Mobil has the right to share her name and other
information it collects on her with "consumer reporting agencies, banks,
insurance companies, retailers, publishers and direct marketers" unless
Bernard "opts out." But she has never done so.  Such information is often
buried in the privacy polices sent in the mail or posted on retail Web sites
that Bernard never bothers to read. "I don't know anyone who's read them,"
she says.
8:40 a.m.
Bernard enters her Coldwell Banker office building and is recorded by a
hidden security camera.
10:25 a.m.
She logs on to Top Producer, Web-based software for real estate agents that
allows Bernard to retrieve notes on her clients wherever she has access to
the Internet. She can look up clients' birthdays and home-buying
anniversaries, lending a personal touch to her service.
The trend toward Web-based computing means that reams of data Bernard and
others used to keep in notebooks are now stored on servers owned by private
companies, where the data is potentially vulnerable to hackers and
potentially accessible to government authorities.
11:05 a.m.
She dials Domino's for pizza. Domino's tracks her name, phone number,
address, and size and type of pizza ordered. Unless a store decides
otherwise, the data are held forever. That way, Domino's can provide more
personalized service -- "Hi, Ms. Bernard, would you like your regular --
mushroom and sausage?"
Domino's, which hopes to have a national database of customers soon, says it
does not share or sell customer information. But companies that specialize
in providing unlisted and cellphone numbers, among other records, often buy
phone numbers from pizza delivery services, according to Merlin Information
Services, a data broker.
12:30 p.m.
Bernard gets back in her car, a 2003 Mercedes-Benz with navigation and
roadside emergency service. She turns the key in the ignition, activating a
Global Positioning System device that uses satellites to pinpoint her
location and is constantly sending out signals.
GPS technology allows her to map out a route and find streets and landmarks,
restaurants and hotels. She can use a CD, which displays on a dashboard
screen, or push a button and connect to a roadside-assistance call center
run by the Texas telematics firm ATX, which can guide her if she's lost or
call her a tow truck.
GPS can generate a record of her travels, though ATX says it does not keep
such location records now. The company stores emergency call records --
location, time, nature of call -- for billing and other purposes.
12:35 p.m.
Bernard pulls up to a tollbooth on the Dulles Toll Road. A Smart Tag on her
front license plate communicates with a sensor and pays her toll. A light
flashes green.  Over the long run, Bernard has saved hours by using her
Smart Tag, with its RFID chip, to zip through tollbooths.
The Virginia Department of Transportation records the date and time she
passed, the toll location, the amount paid and her customer account
information. The FBI has used this type of information to help solve murder
cases, and private attorneys have used it in divorce cases.
As she passes, two cameras record her -- one in front of her car and one in
back.
2:10 p.m.
Bernard enters Costco. She wheels her cart to a cashier and uses her Costco
membership card, linked to an American Express
<http://financial.washingtonpost.com/custom/wpost/html-qcn.asp?dispnav=busin
ess&mwpage=qcn&symb=AXP&nav=el>  card, to buy bottled drinks and bagged
candy. She likes the credit voucher she will get at year's end, worth 1
percent of her total purchases, thanks to her Costco membership.
Costco likes its database of 50 million shoppers' purchase histories, e-mail
addresses and phone numbers, which it can use to notify consumers of a
product recall or do marketing research. Bernard's credit card companies
know her income and her shopping habits. They can share her information with
affiliates without her permission and need not stop even if she asks them
to.
Credit bureaus maintain gigantic databases on consumers such as Bernard fed
by tens of thousands of banks, auto lenders, credit card issuers, state
welfare agencies, utility companies and court records.
3:25 p.m.
Bernard visits BestBuy.com to look for a CD case.
Best Buy receives good ratings from customers on privacy, according to the
Ponemon Institute, a privacy research group. But online retailers in general
are a prime target for people who call the retailer pretending to be a
customer to obtain passwords and other personal information that they then
use to access online bank accounts. This practice, known as pretexting, is
also done by fly-by-night data brokers who collect and sell phone numbers
and other personal data.
4:15 p.m.
She enters Belmont Country Club, a planned community in Loudoun County, to
show a client a house. Two cameras record her car entering. Residents can
tune their TV sets to the security channel and see who's at the gate.
Bernard inserts an electronic key, which looks like a pager, into a black
rectangular lockbox, and a real key drops out.
The e-key uses an infrared beam to transmit the date and time, her name and
phone number, and her company name to the lockbox. The lockbox, itself an
electronic device, beams to the e-key a number linked to the house address.
The information is kept by GE Security, which puts it on a Web site for real
estate professionals who want to check the last three months of activity.
The firm also stores the data for years just in case an agent needs it to,
for instance, help settle a civil dispute.
5 p.m.
Bernard, back in her car, presses a button for a concierge service. She
wants to make a dinner reservation.
"I'm speaking with Mrs. Bernard?" says Denise, her concierge. "Fan-
tas-tic." The service, run by VIP Desk of Alexandria, can book hotel stays,
set up scuba lessons and even find a pet sitter. Today, Denise reserves a
table for Bernard and her husband, John Emert, at Legal Sea Foods in Tysons
II Galleria mall.
VIP Desk serves millions of customers and keeps large amounts of data that
can be customized for its corporate clients, which include credit card
companies and travel companies.
5:20 p.m.
Back in her office, Bernard does a Google search on a coffee maker because
she can't remember the model's exact name.  "Tazzimo," she types. "Tazzamo,"
then "Tazmo." Finally, she types in "coffee makers" and gets a link to
Amazon.com. She clicks on the link. "There it is! Braun Tassimo," she says.
Google collects billions of search queries a month typed in by users such as
Bernard, creating one of the largest databases of online behavioral data in
the world. Google uses this data on an aggregate level for research
purposes, such as refining its search engine, or to see how many people are
clicking on ads so that Google can bill the advertisers. Google targets ads
to users based on the search terms they use and can target ads by geography.
6:45 p.m.
Bernard and her husband enter the mall. They are heading to Legal Sea Foods.
Security cameras record their passage.
9:00 p.m.
Bernard and Emert return from dinner and shopping, using an RFID key fob to
enter the building. A camera again records them.
9:05 p.m.
She logs on to her laptop again, seeing only a few e-mails. After watching a
little television with her husband, she'll head to bed about11.
* * *
No one is forcing Bernard to embrace this technology. She loves the time she
gains by paying road tolls electronically, the sense of security she feels
by having GPS in her car. She sometimes buys real estate client lists so she
can target categories of buyers -- seniors or first-time home buyers -- "as
long as it's not intrusive," she said.
Who's to say what's intrusive at a time when teenagers are baring their
souls on Web sites? When people are taking video of routine and shocking
events alike and putting them on the Web? When patients' health records are
being scanned into giant databases? Much of these data -- voice, video,
text -- are not being analyzed, at least not on a systematic basis. But the
government is seeking ways to effectively do so, for law enforcement and
security.
These caches of data will only continue to grow, with storage cheap and tens
of millions of people like Bernard eager to get in on the digital
revolution, sending messages and conducting transactions with an ease
futurists once only dreamed of.
In just one day, Bernard paid eight tolls electronically. She used her
credit card four times and sent 20 e-mails. She passed before security
cameras at least 50 times.
"Amazing," she said in a follow-up interview. "It's astounding to think that
my whereabouts and activities can be tracked by any number of companies and
individuals."
But, she said, she's not inclined to change her ways. Bernard said she
already takes measures to guard her privacy. She saves intimate details for
phone calls. She's on a do-not-call telemarketing list. She trusts her
company to keep her office system hacker-free. For the most part, she trusts
that the government will not be interested in her personal life -- hoping
for security through obscurity.
"I have no tickets. I obey the law," she said. "I would trust them to look
at me and see I'm a businessperson. I'm a family person."
http://www.washingtonpost.com/wp-dyn/content/article/2007/01/15/AR2007011501
304.html
<http://www.washingtonpost.com/wp-dyn/content/article/2007/01/15/AR200701150
1304.html>

-------------- next part --------------
An HTML attachment was scrubbed...
URL: 
http://fes.uwaterloo.ca/mailman/private/futurework/attachments/20070116/1462669f/attachment.html
 

------------------------------

_______________________________________________
Futurework mailing list
[email protected]
http://fes.uwaterloo.ca/mailman/listinfo/futurework


End of Futurework Digest, Vol 38, Issue 31
******************************************


_______________________________________________
Futurework mailing list
[email protected]
http://fes.uwaterloo.ca/mailman/listinfo/futurework

Reply via email to