In 'Part I' of this series (We Need a Social Network Constitution: http://evilchickenscratch.blogspot.com/2012/03/we-need-social-network-constitution.html) we looked at the concept how our technology has outpaced our laws & ethics. In this blog I will give some recent examples of this concept and offer a few, humble suggestions for participating in the Social Media arena. You don’t have to swing a dead external hard drive too far to find stories concerning personal information in Social Media these days and such stories will only become more intense in the future. That being said, I only pass this along for your edification and awareness. You may already know this information, Gentle Reader and, if so, feel free to sit this one out. Now, if you are concerned over things such as personal information, how that information can be used, and what your rights are here now in the United States of the 21st century please read on.
Now please don’t get me wrong. I love Facebook. It has become integral. Social networking is how things are and will continue to be done. Believe it. The data and information that is mined is priceless. It is not just people who want to sell you something who are taking notice of your likes and dislikes these days. “Social Network Forensics” is a burgeoning field and the federal government is paying very close attention in the name of security. Here is an article by Todd Piett on “How Law Enforcement Uses Social Media for Forensic Investigation”: http://mashable.com/2012/02/13/social-media-forensics/. Piett writes, “Of course, as with every technology employed by law enforcement, concerns about “Big Brother” inevitably arise. What is the expectation of privacy around social media? If I tweet “Jack deserves to get a beating for that one,” is that an admission of guilt? What if I only direct message someone as a joke but they retweet it to a broader audience and it incites action? What if I only post it on Facebook for my friends?” The simple truth of the matter is if you put it out there ~ it’s out there.
Then there are employers who fire employees who refuse to give them their Facebook password: http://www.themarysue.com/michigan-teachers-aide-fired-over-facebook/. There are also cases where potential employees were asked to give over their Facebook passwords before being hired (http://finance.yahoo.com/news/job-seekers-getting-asked-facebook-080920368.html). To it’s credit, Facebook has not been taking such threats to it’s very existence lightly and is considering suing employers who demand job applicants passwords: http://arstechnica.com/business/news/2012/03/facebook-says-it-may-sue-employers-who-demand-job-applicants-passwords.ars. From Jon Brodkin’s ars technica’s article, “As a user, you shouldn’t be forced to share your private information and communications just to get a job," Facebook said. "And as the friend of a user, you shouldn’t have to worry that your private information or communications will be revealed to someone you don’t know and didn’t intend to share with just because that user is looking for a job. That’s why we’ve made it a violation of Facebook’s Statement of Rights and Responsibilities to share or solicit a Facebook password.”
John Brownlee from Cult of Mac wrote an interesting piece about privacy, “This Creepy App Isn’t Just Stalking Women Without Their Knowledge, It’s a Wake-Up Call About Facebook Privacy”. It can be found right here: http://www.cultofmac.com/157641/this-creepy-app-isnt-just-stalking-women-without-their-knowledge-its-a-wake-up-call-about-facebook-privacy/. In the article, Mr. Brownlee very clearly illustrates the importance of privacy settings by showing an app that scrapes Facebook & Foursquare for information. The following is from his article…
“Okay, so here’s Zoe. Most of her information is visible, so I now know her full name. I can see at a glance that she’s single, that she is 24, that she went to Stoneham High School and Bunker Hill Community College, that she likes to travel, that her favorite book is Gone With The Wind and her favorite musician is Tori Amos, and that she’s a liberal. I can see the names of her family and friends. I can see her birthday.”
“All of that is visible on Facebook?” one of the other girls in our group asked.
“More, depending on how your privacy settings are configured! For example, I can also look at Zoe’s pictures.”
I tapped on the photo album, and a collection of hundreds of publicly visible photos loaded up. I quickly browsed them.
“Okay, so it looks like Zoe is my kind of girl. From her photo albums, I can see that she likes to party, and given the number of guys she takes photos with at bars and clubs at night, I can deduce that she’s frisky when she’s drunk, and her favorite drink is a frosty margarita. She appears to have recently been in Rome. Also, since her photo album contains pictures she took at the beach, I now know what Zoe looks like in a bikini… which, as it happens, is pretty damn good.”
My girlfriend scowled at me. I assured her Zoe in a bikini was no comparison, and moved on.
“So now I know everything to know about Zoe. I know where she is. I know what she looks like, both clothed and mostly disrobed. I know her full name, her parents’ full names, her brother’s full name. I know what she likes to drink. I know where she went to school. I know what she likes and dislikes. All I need to do now is go down to the Independent, ask her if she remembers me from Stoneham High, ask her how her brother Mike is doing, buy her a frosty margarita, and start waxing eloquently about that beautiful summer I spent in Roma.”
The App has been effectively killed by Foursquare. However, Mr. Brownlee also points out, “…Girls Around Me wasn’t actually doing anything wrong. Sure, on the surface, it looks like a hook-up app like Grindr for potential stalkers and date rapists, but all that Girls Around Me is really doing is using public APIs from Google Maps, Facebook and Foursquare and mashing them all up together, so you could see who had checked-in at locations in your area, and learn more about them. Moreover, the girls (and men!) shown in Girls Around Me all had the power to opt out of this information being visible to strangers, but whether out of ignorance, apathy or laziness, they had all neglected to do so. This was all public information. Nothing Girls Around Me does violates any of Apple’s policies.” Mr. Brownlee makes the point that he works in the technology field and that he always assumed that people knew that the information that they put out into the wild, so to speak, was public information. And that is frat boy stuff. What happens when the government takes note of who you are, what you do and whom you follow?
In an op-ed from Amy Gagran that ran on CNN entitled, “ACLU: Most Police Track Phones’ Locations Without Warrants” (http://www.cnn.com/2012/04/03/tech/mobile/police-phone-tracking-gahran/index.html), Ms. Gagran makes the case that such behavior is not so much the exception to the rule but is fast becoming the norm. That’s not only cell phone calls but all the texts and emails too. Ms. Gagran writes, “But don't the police need a warrant for that? It varies by state, but carriers generally say they require a court order to release this data. Regardless of these requirements, however, "Only a tiny minority reported consistently obtaining a warrant and demonstrating probable cause to do so," said the ACLU.
Not surprisingly, the ACLU disapproves of this practice.
"The government should have to obtain a warrant based upon probable cause before tracking cell phones. That is what is necessary to protect Americans' privacy, and it is also what is required under the Constitution," states the ACLU on its site.”
The ACLU is right. This is now constitutional law we are discussing. It is widely accepted that we live in a Post 911 world and that security takes precedence over rights that we used to take completely and utterly for granted. I, for one, believe this to be a frightening practice that pushes us a hair’s breadth away from utter tyranny. A place where the common communication of citizens is monitored for any danger that you may be to the state and concepts like privacy and dignity are luxuries that we have lost along the way to our glorious future. Who could pull off such a feat – the monitoring of not only a country but also the whole of the internet worldwide? Where would one build such a complex? Well, apparently the NSA could in the desert of Utah.
The cover story in April 2012’s WIRED magazine is by James Bamford, whom I’m pretty sure is currently on several people’s ‘watch lists’, entitled, “The NSA is Building the Country’s Biggest Spy Center (Watch What You Say)”. You can read Mr. Bamford’s article here: http://www.wired.com/threatlevel/2012/03/ff_nsadatacenter/all/1 and I encourage you to do so. So how much memory would be needed that could monitor and save Google searches, cell phone calls, texts, tweets, and pictures from the family vacation that were put on Facebook? Have you ever heard of a yottabyte? Mr. Bamford writes, “…as a 2007 Department of Defense report puts it, the Pentagon is attempting to expand its worldwide communications network, known as the Global Information Grid, to handle yottabyte (1024 bytes) of data. (A yottabyte is a septillion bytes—so large that no one has yet coined a term for the next higher magnitude.)
It needs that capacity because, according to a recent report by Cisco, global Internet traffic will quadruple from 2010 to 2015, reaching 966 exabytes per year. (A million exabytes equal a yottabyte.) In terms of scale, Eric Schmidt, Google’s former CEO, once estimated that the total of all human knowledge created from the dawn of man to 2003 totaled 5 exabytes. And the data flow shows no sign of slowing. In 2011 more than 2 billion of the world’s 6.9 billion people were connected to the Internet. By 2015, market research firm IDC estimates, there will be 2.7 billion users. Thus, the NSA’s need for a 1-million-square-foot data storehouse. Should the agency ever fill the Utah center with a yottabyte of information, it would be equal to about 500 quintillion (500,000,000,000,000,000,000) pages of text.
The data stored in Bluffdale will naturally go far beyond the world’s billions of public web pages. The NSA is more interested in the so-called invisible web, also known as the deep web or deepnet—data beyond the reach of the public. This includes password-protected data, US and foreign government communications, and noncommercial file-sharing between trusted peers. “The deep web contains government reports, databases, and other sources of information of high value to DOD and the intelligence community,” according to a 2010 Defense Science Board report. “Alternative tools are needed to find and index data in the deep web … Stealing the classified secrets of a potential adversary is where the [intelligence] community is most comfortable.” With its new Utah Data Center, the NSA will at last have the technical capability to store, and rummage through, all those stolen secrets. The question, of course, is how the agency defines who is, and who is not, “a potential adversary.”
Pogo is quoted as saying, “Yes son, we have met the enemy and it is us.” Mr. Bamford provides a link to my favorite second brain, Wikipedia, concerning totalitarianism, “Totalitarianism (or totalitarian rule) is a political system where the state recognizes no limits to its authority and strives to regulate every aspect of public and private life wherever feasible. Totalitarian regimes stay in political power through an all-encompassing propaganda campaign, which is disseminated through the state-controlled mass media, a single party that is often marked by political repression, personality cultism, control over the economy, regulation and restriction of speech, mass surveillance, and widespread use of terror.”
Heavy stuff, n'est-ce pas? Now please don’t get me wrong here. I am proud and blessed to be a citizen of this country. Further, I am thankful to those not only on the front-lines protecting my freedoms but also to those behind the scenes (perhaps even in Utah) who are doing the same. One of those freedoms is the freedom of speech. I would hope that writing a blog such as this would not put yours truly onto a ‘watch list’ or label me as, “a potential adversary”. This being said, no one should be above the law. We are not a totalitarian regime, we are a democracy and we should act like one.
No. Really. We should.
THIS section should really be ‘Part III’ but I am growing weary of my own slacktivist rantings; so now, as promised, a word about Facebook that I mentioned way back in the beginning of this particular blog entry. I said I would offer some humble suggestions for participating in the Social Media arena. Please take the following with a grain of salt. Facebook is, at the end of the day, is driven by the individual user. The way you run your Facebook is completely and utterly up to you. My simple guidelines are as follows:
Social Media is NOT my diary.
Words still mean things. Actions do too.
Don’t be stupid… or at the very least, TRY not to be stupid.
Never feed the trolls.
Treat others, as I would want to be treated.
There you go. That’s it. These are my guidelines. Yours may be completely different and that’s ok too. That’s why they make different flavors of ice cream. As we have already established, Facebook is user driven and that’s how I drive.
I love Facebook. Is it intrusive and do they sell my demographic information to data aggregators? Sure they do but information is the new currency and if you want to participate in the Social Media arena then you must be aware of the consequences. Before I post I try to remind myself that whatever I put out there, is out there. We have already established this. Facebook; however, can take on a life of its own if you don’t understand a few key things. Bilbo Baggins was onto something when he said, “I don't know half of you half as well as I should like; and I like less than half of you half as well as you deserve.”
Just for the sake of discussion, for instance, suppose I start to annoy you. You don’t like what I am saying, the silly way that I say it, or you are sick of seeing my pictures fill up your Facebook experience. If such is the case you have a few options open to you, (don’t feel bad, I know how annoying I can be). First, I would recommend that you familiarize yourself with this: http://mashable.com/2011/02/07/facebook-privacy-guide/. It will show you how to exclude me from your feed. If that doesn’t shut me up to your liking you can simply un-friend me. It’s ok; we’ll always have Paris. I know this flies in the face of any perceptions of narcissism on the branch of Social Media known as Facebook but why would I wish to torture you any longer? Go now; know that I will carry your memory with me wherever I go & that you have carved out a special place in my heart. You see, on Facebook, I am not there to entertain you ~ I’m there to entertain me and to communicate with those I wish to communicate with on my own terms. If all that is too much or too little, too bad.
Just look at how empowered we all are now!
Who da thunk?
...Now where do I go to get a yottabyte of memory?
Graphic from Forbes. Interesting article too: http://www.forbes.com/sites/benkerschberg/2011/09/28/managing-information-risk-and-archiving-social-media/