Have you been Reading my ?
|
|
|
- Vivien Collins
- 9 years ago
- Views:
Transcription
1 Your on the Street Reporter Uyless Black Have you been Reading my ?
2 Have You Been Reading My Mail? 1 Part One Yesterday, you went to the mailbox to retrieve your letters, bills, and advertisements. There, you were surprised to find your neighbor as well as a stranger examining your envelopes. They also opened several of the envelopes and read the contents inside them. Your reaction? I will not venture a guess, as this is a family newspaper, but I would speculate it would not be one of acceptance. Yet this situation is identical to what is happening to our Internet correspondence, our . To frame the issue, which I hope will raise your concern about privacy in the Internet, I will start with two questions pertaining to postal service mail: - Should anyone but the recipient of a letter be allowed to read and record the information on the envelope? - Should anyone but the recipient of this envelope be allowed to read and record the information in the letter that was placed inside the envelope? I suspect your answer is no to both questions. If so, next question: Why should we relinquish this right of privacy because our letters are written in electronic images instead of ink or pencil? Some will answer: The Internet is not the U.S. Postal Service. True, but the Internet was founded courtesy of the American taxpayer and the U.S. government. Furthermore, at the rate citizens are moving from conventional mail to electronic mail, it is reasonable to assume Internet mail will supplant U.S. mail as the dominant medium for sending and receiving correspondence. Given this trend, by calling our letter instead of mail, and using a salutation of Hi instead of Dear, does that relinquish our rights to seclusion? Why should this private space to ourselves and those to whom we send correspondence suddenly become space for everyone to share? By changing the delivery mechanism for our message---from the postal service to the Internet--- our envelopes can be opened and our letters read. Not just by Uncle Sam s NSA. Not just by Google. Eventually, by anyone. Think about that idea for a minute or two, because that is where we are heading. Last question, what has happened, in only thirty years or so, for our society to reach a point in which the CEO of Google states: after privacy concerns were raised Eric Schmidt, declared: "If you have something that you don't want anyone to know, maybe you shouldn't be doing it in the first place. 2 I place Mr. Schmidt s quote in bold type because his assertion is straight out of an Orwellian scenario. Eric Schmidt is the Chief Executive Officer of the most powerful and influential Internet-based company on earth. 1 This piece was formatted for publication in the Coeur d Alene Press. Envelope in thought cloud on cover is courtesy of Google 2 "Will We Ever Get Strong Internet Privacy Rules?" Time, March 5, Also see: Cade, Metz (December 7, 2009). "Google chief: Only miscreants worry about net privacy," The Register. Uyless Black
3 He implies nothing is out of bounds to be examined: Your letter to your siblings about your parents failing health. Your debate with the IRS about your taxes. A credit card transaction. Your Dear John to Joan. Joan s Dear John to you. According to Schmidt, the Internet has altered the game. Cyberspace, because it is no longer a pen-and-ink world, renders our right to privacy irrelevant. After all, we have nothing to hide. Nothing to hide except one of the most treasured aspects of our nature: our privacy, our right to be left alone. On the August Minutes program an Internet vendor said, The Internet is an advertising medium. In fewer than three decades, the Internet has evolved from a network dedicated to the exchange of personal electronic mail and small files to one where this person declares it to be dedicated to selling various wares. How are these wares sold? By the sellers increasingly obtaining more-and-more personal information about you and me. The second article in this series will offer some ideas on how to seal your electronic envelope. The suggestions will not protect the privacy of the addresses on the outside of the envelope, nor will they necessarily stem the tide of Internet advertisements. But they will offer ways to protect the contents inside the envelope: our personal correspondence. By the way, don t throw away your postage stamps. They may come in handy Uyless Black
4 Have You Been Reading My Mail? Part Two In the first article of this series, I made the well-known claim that our Internet mail is not private. Our electronic letters can be read by anyone who has a smattering of knowledge about Internet . Given that electronic mail is supplanting hard copy mail, how can we American citizens go about living our personal and professional lives under the cloud of having forsaken privacy? The Internet vendors tell us we should not be using the Internet if we have something to hide. I disagree. Most of us use the Internet to exchange harmless, yet sometimes sensitive letters with our loved ones and friends. They are often personal and private. If they are exposed, they will not do us under, but why should they be exposed in the first place? The Internet vendors say our correspondence needs to be examined in order for their sales outlets to profile us---to find our tastes and distastes---for their targeted ads. Imagine! We have become marketing guinea pigs for Internet s Madison Avenue. Perhaps this exposure of our personal life could be considered harmless. After all, why should we care if a health monitoring website learns we have recently been diagnosed with cancer, and we might be denied care or pay more for insurance? Why should we be concerned if neighbor Joe knows our spouse has left us and taken our credit cards in the process? I wager I am a preacher talking to a concerned congregation, because I sense all of us care. The Internet was conceived as a network for personal communications, not as a network for commercial advertisements. I am not opposed to money-making billboards. One of my former companies was built around advertising, but I did not check-out the religious, political, and sexual preferences of my advertising targets---as is being done today. What can we do to gain back our privacy in a system that is rendering U.S. mail moot? In view of Facebook, YouTube, and Linkedin onslaughts, how can we keep the valued American treasure of privacy intact? Answer: We cannot. The gate has long been opened, and the Internet advertiser cows are in the pasture, feeding on the long grass of information about you and me. In hindsight, the Internet envelope should have been given the same sanctity as a U.S. mail envelope. But no one in the early times of the Internet (including this writer) foresaw how the network would evolve. A Commercial and Social Problem I doubt the clock will be rolled back to treat with the same respect for privacy as regular mail. The lobbyists for keeping the Internet as an advertising and data-retrieving medium are too powerful for Washington to muster the political will to make amends, even if it had the constitutional authority to do so. Thus, unless the Supreme Court takes the matter into its hands, it is reasonable to predict that the Internet will evolve to a point where very little information is treated as private. However, all is not lost. I conclude this article with some good news: simple actions that Internet end-users can carry-out to take-back some of their privacy. Uyless Black
5 Encrypting s and Smartphone Traffic These two articles have been devoted to a specific kind of Internet end-user traffic: . This emphasis continues, but I interject the idea that similar privacy protection can be obtained with other traffic as well, such as voice traffic. An Internet end-user does have an effective line of defense (as of this writing): The use of encryption applications (apps) allows the communicating parties to scramble (encrypt) their correspondence. Unless Uncle Sam or sophisticated hackers move to the next level of breaking the codes of these apps (which they are working on), our electronic mails can once again have their envelopes sealed. For example, Google Message Encryption (GME) enables end-users to secure their by using a Google security package. To conclude this series, I take us one step further than what companies such as Google offer in protecting privacy. These systems protect our privacy while our is in the Internet. They do not protect our privacy after the s have been unscrambled and placed on our computer. If we are concerned about the privacy of the files stored on our machine, it is a simple matter to use another package to scramble this data. In this way, this information will be known only to us and anyone with whom we wish to share the key to unlock this information. For example, the widely-used Microsoft WORD has an easy-to-use encryption option that allows a user to scramble any WORD document. As mentioned, the same kinds of security packages are available to end-users who use smartphones. They, too have encryption packages. If you are not using these security services, it can only be assumed you do not mind if others know about your written and spoken communications. On the other hand, if you do care but you continue to ignore them, you have abandoned Benjamin Franklin s advice: Be aware that distrust and caution are the parents of security. and privacy. Uyless Black
STOP. THINK. CONNECT. Online Safety Quiz
STOP. THINK. CONNECT. Online Safety Quiz Round 1: Safety and Security Kristina is on Facebook and receives a friend request from a boy she doesn t know. What should she do? A. Accept the friend request.
Oxford Learning Institute University of Oxford
Oxford Learning Institute University of Oxford Writing Effective Emails Making sure your messages get read and acted upon Do people respond to your emails in the way you intend? Or do they seem to ignore
Data Use and the Liquid Grids Model
Data Use Policy Revision 1.1 03/09/2014 Ramos M. Mays, Chief Technology Officer Table of Contents 1. Information Sources... 3 2. Information we receive... 3 3. How we use information... 4 4. How long we
Big Data Big Security Problems? Ivan Damgård, Aarhus University
Big Data Big Security Problems? Ivan Damgård, Aarhus University Content A survey of some security and privacy issues related to big data. Will organize according to who is collecting/storing data! Intelligence
Salisbury Township School District Guidelines for Guiding Staff, Students and Parents in Use of Social Media
What is social media? Social media is defined as any form of online publication or presence that allows end users to engage in multidirectional conversations in or around the content on the website. (Online
Social Media Guidelines
Purpose for Social Media Guidelines: Guilford County Schools (GCS) realizes that part of 21st century learning is adapting to the changing methods of communication. The importance of teachers, students
Privacy Policy First National Real Estate Cremorne ACN 32096182571
Privacy Policy First National Real Estate Cremorne ACN 32096182571 First National Group of Independent Real Estate Agents Limited 1 Contents Privacy Statement... 3 Overview... 3 Collection of your personal
Internet Marketing Rules!
Internet Marketing Rules! A Playbook of Game Changing Strategies for Marketing Your Business Online by Lane Jones, Content Strategist Internet Marketing Rules! Game Changing Strategies for Marketing Your
What the Life Insurance Industry Does Not Want You to Have.
What the Life Insurance Industry Does Not Want You to Have. 1. Who am I and why should you listen to me? 2. What can go wrong and how can you be affected by this? 3. After the government noticed there
Mailing List Growth Strategies. A guide to increasing the size of your mailing list. November 2012 Version 0.2
Mailing List Growth Strategies A guide to increasing the size of your mailing list November 2012 Version 0.2 Contents Introduction... 3 Lightboxes... 4 Implementation advice... 6 Social Media... 8 Implementation
The Top 10 Local Marketing Secrets
The Top 10 Local Marketing Secrets Using technology to beat your competitors Business Marketing techniques are changing rapidly, more rapidly than most business owners are able to keep up. This FREE report
Making A Difference In 90 Days. Making Contact. How will you keep in touch with clients and prospects?
Making A Difference In 90 Days Making Contact How will you keep in touch with clients and prospects? Gathering Contact Information Names, addresses Phone numbers E-mail addresses Social media handles Image:
SMARTPHONES & BIG DATA. Daniel Nelson Head of Enterprise Development, Braintree @DanielROINelson daniel.nelson@braintreepayments.
SMARTPHONES & BIG DATA Daniel Nelson Head of Enterprise Development, Braintree @DanielROINelson [email protected] TODAY WE LL COVER 1. Why smartphones represent a significant enabler
WELCOME! LETS BEGIN. James Marchant Founder of Diligence Digital [email protected] 01424 447858
James Marchant Founder of Diligence Digital [email protected] 01424 447858 Over 15 years of experience in the digital industry. Hello and congratulations on taking the time out to read our booklet.
Justifying digital signatures - the cost savings from eliminating paper based approvals
Justifying digital signatures - the cost savings from eliminating paper based approvals You might be thinking the price of paper is cheap, so why bother changing from traditional way of hand signing a
Hon. Peter W. Rodino, Jr. Archives. Access Policy
Hon. Peter W. Rodino, Jr. Archives Access Policy All visitors must observe the following rules, which are intended to protect the Archives and insure its preservation for future researchers. Failure to
PDF security - a brief history of development
PDF security - a brief history of development Background Adobe was the first organization that set out to try and provide security controls for PDF based documents, and had their own particular views as
Chapter 2. The Elements of Internet Marketing
Chapter 2 The Elements of Internet Marketing Everyone is concerned about how to market their business in the new age of the internet. In the early years, just having a website was enough. Soon it became
Elements of a Successful Marketing Plan Part 1. Inbound Marketing Strategies
Elements of a Successful Marketing Plan Part 1 Inbound Marketing Strategies What is Inbound Marketing? Inbound marketing is when a patient finds your office on their own (through search, social media,
Join the Mobile Marketing Revolution...it is HERE! Your customer has gone mobile, have you?
Join the Mobile Marketing Revolution...it is HERE! Your customer has gone mobile, have you? 23 Most Popular Features 1. Around Us Feature An Around Us Feature is a great way to display relevant locations
It is clear the postal mail is still very relevant in today's marketing environment.
Email and Mobile Digital channels have many strengths, but they also have weaknesses. For example, many companies routinely send out emails as a part of their marketing campaigns. But people receive hundreds
PROCEDURES AND INSTRUCTIONS FOR FILING A SMALL CLAIMS PROPERTY TAX VALUATION APPEAL IN THE ARIZONA TAX COURT
Self-Service Center PROCEDURES AND INSTRUCTIONS FOR FILING A SMALL CLAIMS PROPERTY TAX VALUATION APPEAL IN THE ARIZONA TAX COURT Use the forms in this package only if you can say "yes" to ALL FIVE (5)
Zep Inc.: Global Online Privacy Notice
Zep Inc.: Global Online Privacy Notice Effective Date: March 26, 2015 We at Zep Inc., along with our affiliates (collectively, Zep ), respect your concerns about privacy. This Global Online Privacy Notice
How Local Businesses Can Use Mobile Applications to Attract and Retain More Customers
How Local Businesses Can Use Mobile Applications to Attract and Retain More Customers Contents 1. Why not going mobile is unthinkable, for any business 2. How mobile apps can attract more customers 3.
Americans Openness to Outreach From Churches. LifeWay Research
Americans Openness to Outreach From Churches 2 Methodology: Sampling The sample for the study is a national, random, stratified sample of Americans using a demographically balanced online panel. The survey
DEVELOPING A SOCIAL MEDIA STRATEGY
DEVELOPING A SOCIAL MEDIA STRATEGY Creating a social media strategy for your business 2 April 2012 Version 1.0 Contents Contents 2 Introduction 3 Skill Level 3 Video Tutorials 3 Getting Started with Social
October Is National Cyber Security Awareness Month!
(0 West Virginia Executive Branch Privacy Tip October Is National Cyber Security Awareness Month! In recognition of National Cyber Security Month, we are supplying tips to keep you safe in your work life
Powerful Email Marketing, That tracks your visitor's Email Opens, Clicks and other activities, So that you can follow up at right time
Powerful Email Marketing, That tracks your visitor's Email Opens, Clicks and other activities, So that you can follow up at right time And convert them into buyers. Why SmartEmail Marketing is No #1 Tool
Inbound Marketing. What is it and why do you need it?
What is it and why do you need it? let s start with the basics What is inbound marketing? If this is your first encounter with this term you re probably a little intimidated. Either that or you re a little
Agile Contract Options
Agile Contract Options By Allan Kelly, Director & Consultant Agile Contract Options One question frequent questions asked about Agile methods is: "How do you sign a contract based on Agile working?" The
Firewalls for small business
By James Thomas DTEC 6823 Summer 2004 What is a firewall? Firewalls for small business A firewall is either hardware, software or a combination of both that is used to prevent, block or should I say try
Transcription. Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage. Media Duration: 28:45
Transcription Founder Interview - Panayotis Vryonis Talks About BigStash Cloud Storage Media Duration: 28:45 Feel free to quote any passage from this interview for your articles. Please reference cloudwards.net
Key Words: Internet marketing, social media marketing, mobile advertising
Internet Marketing Professor, College of Business, San Francisco State University (William Perttula interviewed by Theodor Valentin Purc rea) The trend toward internet marketing has been going on since
Introduction to Cloud Services
Introduction to Cloud Services (brought to you by www.rmroberts.com) Cloud computing concept is not as new as you might think, and it has actually been around for many years, even before the term cloud
Feeling is believing: The 5 emotions of successful event apps
Why settle for good? A good event app is functional. It opens. It doesn t crash. It does what it says it will. A great event surprises and delights brings people together. It accelerates the emotional
What is social media?
The Scottish Social Services Council (SSSC) is responsible for registering people who work in social services and regulating their education and training. Our role is to raise standards of practice, strengthen
Small Business Guide to Monitoring your Online Reputation
Small Business Guide to Monitoring your Online Reputation Small Business Guide to Monitoring your Online Reputation Your customers are talking to each other, and to you. They are doing it in person, on
Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault. Best Practices Whitepaper June 18, 2014
Why Your SIEM Isn t Adding Value And Why It May Not Be The Tool s Fault Best Practices Whitepaper June 18, 2014 2 Table of Contents LIVING UP TO THE SALES PITCH... 3 THE INITIAL PURCHASE AND SELECTION
Internet Safety Guide for Parents
Internet Safety Guide for Parents How to Talk to Your Kids about Staying Safe Online Presented by Keith Dunn http://www.kdcop.com Page 1 Now I know each and every single one of you is extremely busy. Both
Internet Security Priorities. Benenson Strategy Group and American Viewpoint December 20, 2013
Internet Security Priorities Prepared for: Presented by: Benenson Strategy Group and American Viewpoint December 20, 2013 Methodology The Benenson Strategy Group and American Viewpoint conducted 1,000
Chair: Stephen Darvill (Logica) Raporteur: Edward Phelps (EURIM) SUMMARY OF ROUND TABLE STATEMENTS AND DISCUSSION
1 Summary Report of the Directors Round Table on Information Governance, 1600-1800, 24 th November 2008, The Boothroyd Room, Portcullis House, Westminster Chair: Stephen Darvill (Logica) Raporteur: Edward
Does Brand Matter to the Real Estate Consumer?
Does Brand Matter to the Real Estate Consumer? Does Brand Matter to the Real Estate Consumer? Overview When Keller Williams Realty announced in February of 2011 that it had become the second-largest real
Expanded Sales and Compensating Use Tax Exemption for Promotional Materials
New York State Department of Taxation and Finance Taxpayer Services Division Technical Services Bureau Expanded Sales and Compensating Use Tax Exemption for Promotional Materials The Tax Law has been amended
TURN VISITORS INTO LEADS
TURN VISITORS INTO LEADS HOW TO BUILD AN ONLINE LEAD CAPTURE MACHINE By Andrea Parker Imagine that I just handed you a crisp stack of one hundred $10 bills. Each $10 bill represents one of the last hundred
A parents guide to being Share Aware. Helping you to keep your child safe online
A parents guide to being Share Aware Helping you to keep your child safe online We tell children it s good to share, but online it s different. That s why we re asking parents to be Share Aware. Help keep
The Lukens Company Turning Clicks into Conversions: How to Evaluate & Optimize Online Marketing Channels
The Lukens Company Turning Clicks into Conversions: How to Evaluate & Optimize Online Marketing Channels Turning Clicks into Conversions: How to Evaluate & Optimize Online Marketing Channels We ve all
The New List Builder. Fred LAM. Sign up
The New List Builder Fred LAM $ Sign up Meet Fred Lam Before we dive into this whitepaper about Facebook Lead Ads, I want to formally introduce myself and share my story with you. Hi, my name is Fred Lam.
Advertising Creative Promotional Services
www.revenue.state.mn.us Advertising Creative Promotional Services Nontaxable advertising services Minnesota Rule 8130.9250, Advertising, is the basis for this fact sheet. The guidelines in the rule apply
CONSUMERLAB. sharing information. The rise of consumer influence
CONSUMERLAB sharing information The rise of consumer influence An Ericsson Consumer Insight Summary Report September 2015 Contents 3 INFORMATION SHARING DYNAMICS 4 INFORMATION SHARING WITH INDIVIDUALS
Social Media Statement
Social Media Statement Social media is changing the way our society interacts and engages in conversation and dialogue. It has become an important and influential communication channel for the University.
Digital marketing strategy
Digital marketing strategy You don t need a digital strategy, you need a business strategy for the digital age Judy Goldberg, Sony Pictures #HRVision14 Branding goes Digital Understand your brand before
INSIDER TRADING. a. Charles Fogarty d. Texas Gulf Sulphur. b. Martha Stewart e. U.S. Security and Exchange Commission
Insider Trading 1 INSIDER TRADING PRE-READING QUESTIONS 1. What do you know about these people or organizations? a. Charles Fogarty d. Texas Gulf Sulphur b. Martha Stewart e. U.S. Security and Exchange
Return on Investment and Social Media
Connect with us. Return on Investment and Social Media Measuring your impact FLOW20.C0M Contact us Streatham Business Center1 Empire Mews, London, SW16 6AG 0208 1500 294 [email protected] Getting Started
Medical Errors: How To NOT Throw A Colleague Under The Bus Tara Mah, DVM, JD Veterinary Business Advisors, Inc. www.veterinarybusinessadvisors.
Introduction Medical Errors: How To NOT Throw A Colleague Under The Bus Tara Mah, DVM, JD Veterinary Business Advisors, Inc. www.veterinarybusinessadvisors.com For many veterinarians, being confronted
House Didn t Sell? Let s Get it Sold Fast!
House Didn t Sell? Let s Get it Sold Fast! Presented by Patrick Parker Realty My House Didn t Sell Now What? If your house has just come off the market and hasn't sold, don't be discouraged. The reason
Internet Marketing for Local Businesses Online
Dear Business Owner, I know you get calls from all sorts of media outlets and organizations looking to get a piece of your advertising budget. Today I am not pitching you anything. I would just like to
The Benefits of Online Ratings and Reviews for E-commerce Merchants
The Benefits of Online Ratings and Reviews for E-commerce Merchants 3/21/2013 Table of Contents The Benefits of Online Ratings and Reviews... 3 How Ratings and Reviews Benefit Businesses... 3 How Ratings
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS
DATA SECURITY HACKS, HIPAA AND HUMAN RISKS MSCPA HEALTH CARE SERVICES SEMINAR Ken Miller, CPA, CIA, CRMA, CHC, CISA Senior Manager, Healthcare HORNE LLP September 25, 2015 AGENDA 2015 The Year of the Healthcare
The biggest mistake we made as a company was betting too much on HTML5 as opposed to native.
Myths About Web-Enabled Mobile event solutions With so many vendors in the marketplace, it s hard to know where to start looking for the right mobile solution for your next event and even harder to tell
Introduction Email Marketing: Online Marketing:
Table of Contents Introduction... 3 Marketing Plan... 4 Advertising... 9 Social Media Marketing... 11 Online Marketing... 14 Coupons and Contests... 19 Email Marketing... 21 Quick Tips... 22 Introduction
C. Buyer lead generation online IDX integration vs. MLS, automatic updates, accessibility
www.mastersguilduniversity.com Lead Generation I. Internet ideas to help your Rainmaker generate more business A. Email/Video B. Blogging/personal website C. Buyer lead generation online IDX integration
A HOW TO GUIDE FOR A DIRECT MAIL CAMPAIGN
A HOW TO GUIDE FOR A DIRECT MAIL CAMPAIGN Direct mail is an effective marketing tool for congregations. While it may appear to be expensive on a per piece basis, it is a very efficient advertising tool
Mammon and the Archer
O. H e n r y p Mammon and the Archer OLD ANTHONY ROCKWALL, WHO HAD MADE millions of dollars by making and selling Rockwall s soap, stood at a window of his large Fifth Avenue house. He was looking out
OAuth Web Authorization Protocol Barry Leiba
www.computer.org/internet computing OAuth Web Authorization Protocol Barry Leiba Vol. 16, No. 1 January/February, 2012 This material is presented to ensure timely dissemination of scholarly and technical
What is Content Marketing? http://socialmediachimps.com/infographics/content-marketing-infographic-historytrends-and-opportunities/
1 Early historical content marketing examples: 4200 B.C. cave drawings, 1895 John Deere s launch of its first customer magazine Areas of web content marketing: Social Media Networking Sites & Social Media
Advertising Rate Card
Advertising Rate Card The Paso Robles Daily News is the most comprehensive local source information on Paso Robles breaking news, events, politics, crime, police, city hall, sports, travel, wine, regional,
Developing your Content Strategy for Social Media (and Beyond!)
Developing your Content Strategy for Social Media (and Beyond!) MSBDC November 19, 2015 Overview Introductions What Is Content Strategy? Developing Your Content Strategy What It Looks Like In The Wild
SOCIAL MEDIA STRATEGIES
SOCIAL MEDIA STRATEGIES How to develop a concept consisting of Strategy and Goals to increase ROI TANGRAM MEDIA INC. SVEN SCHAEFER 877-426 - 8880 [email protected] WWW.TANGRAMMEDIA.COM I believe that
Terms and Conditions
- 1 - Terms and Conditions LEGAL NOTICE The Publisher has strived to be as accurate and complete as possible in the creation of this report, notwithstanding the fact that he does not warrant or represent
H I V. and Insurance YOUR LEGAL RIGHTS HIV AND INSURANCE 1
HIV AND INSURANCE 1 H I V and Insurance YOUR LEGAL RIGHTS UPDATED MARCH 2014 published by: AIDS Legal Council of Chicago 180 North Michigan Avenue, Suite 2110 Chicago, Illinois 60601 (312) 427.8990 2 AIDS
